首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33631篇
  免费   2322篇
  国内免费   1222篇
电工技术   1514篇
综合类   1933篇
化学工业   5982篇
金属工艺   1571篇
机械仪表   1895篇
建筑科学   3025篇
矿业工程   617篇
能源动力   1050篇
轻工业   2058篇
水利工程   486篇
石油天然气   1840篇
武器工业   210篇
无线电   4085篇
一般工业技术   4403篇
冶金工业   1826篇
原子能技术   437篇
自动化技术   4243篇
  2024年   128篇
  2023年   462篇
  2022年   807篇
  2021年   1127篇
  2020年   865篇
  2019年   736篇
  2018年   811篇
  2017年   957篇
  2016年   871篇
  2015年   1116篇
  2014年   1452篇
  2013年   1870篇
  2012年   1958篇
  2011年   2128篇
  2010年   1784篇
  2009年   1791篇
  2008年   1744篇
  2007年   1726篇
  2006年   1771篇
  2005年   1599篇
  2004年   1100篇
  2003年   987篇
  2002年   979篇
  2001年   830篇
  2000年   909篇
  1999年   981篇
  1998年   966篇
  1997年   783篇
  1996年   783篇
  1995年   643篇
  1994年   505篇
  1993年   456篇
  1992年   314篇
  1991年   232篇
  1990年   237篇
  1989年   163篇
  1988年   138篇
  1987年   94篇
  1986年   78篇
  1985年   56篇
  1984年   48篇
  1983年   34篇
  1982年   32篇
  1981年   20篇
  1980年   19篇
  1979年   10篇
  1977年   10篇
  1976年   12篇
  1973年   8篇
  1970年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
PC/PA1010共混物的热行为   总被引:2,自引:0,他引:2  
利用热失重、微分热失重和显示扫描量热法研究了聚碳酸酯/尼龙1010共混物的热行为和解降解过程。结果表明:共混物在600℃以下分两步降解,降解温度随尼龙1010用量增加有下降趋势;共混物的熔点随尼龙1010用量增加而升高。  相似文献   
72.
In order to solve the transformation problem of Bill of Materials (BOM) from engineering BOM to maintenance BOM for Maintenance, Repair and Overhaul (MRO) systems, a formal transformation model of BOM view is proposed. In this model, the intermediate component, inherited component, virtual component are defined in the specific maintenance management domain, and the transformation process from engineering BOM to maintenance BOM is discussed through feature recognition methods and rules. The proposed transformation model has been developed and deployed in an MRO system for a steel manufacturing enterprise.  相似文献   
73.
沈长文 《大氮肥》2006,29(1):48-49
介绍自密封阀的密封原理及其在氨汽提尿素装置中的应用,对其长期运行中出现的泄漏及泄漏原因进行分析,根据不同的泄漏方式分别提出了现场维修的方法.  相似文献   
74.
In a large-scale locality-driven network such as in modular robotics and wireless sensor networks, knowing the state of a local area is sometimes necessary due to either interactions being local and driven by neighborhood proximity or the users being interested in the state of a certain region. We define locality-aware predicates (LAP) that aim at detecting a predicate within a specified area. We model the area of interest as the set of processes that are within a breadth-first search tree (BFST) of height kk rooted at the initiator process. Although a locality-aware predicate specifies a predicate only within a local area, observing the area consistently requires considering the entire system in a consistent manner. This raises the challenge of making the complexities of the corresponding predicate detection algorithms scale-free, i.e., independent of the size of the system. Since all existing algorithms for getting a consistent view of the system require either a global snapshot of the entire system or vector clocks of the size of the system, a new solution is needed. We focus on stable LAP, which are those LAP that remain true once they become true. We propose a scale-free algorithm to detect stable LAP within a kk-height BFST. Our algorithm can detect both stable conjunctive LAP and stable relational LAP. In the process of designing our algorithm, we also propose the first distributed algorithm for building a BFST within an area of interest in a graph, and the first distributed algorithm for recording a consistent sub-cut within the area of interest. This paper demonstrates that LAPs are a natural fit for detecting distributed properties in large-scale distributed systems, and stable LAPs can be practically detected at low cost.  相似文献   
75.
甲基葡萄糖甙(MeG)水溶液工艺改进试验   总被引:1,自引:0,他引:1  
介绍了用5次以上的母液生产MeG水溶液工艺的改进试验。  相似文献   
76.
We note that in the literature it is often taken for granted that for fractional-order system without delays, whenever the system trajectory reaches the equilibrium, it will stay there. In fact, this is the well-known phenomenon of finite-time stability. However, in this paper, we will prove that for fractional-order nonlinear system described by Caputo’s or Riemann–Liouville’s definition, any equilibrium cannot be finite-time stable as long as the continuous solution corresponding to the initial value problem globally exists. In addition, some examples of stability analysis are revisited and linear Lyapunov function is used to prove the asymptotic stability of positive fractional-order nonlinear systems.  相似文献   
77.
Extracting significant features from high-dimension and small sample size biological data is a challenging problem. Recently, Micha? Draminski proposed the Monte Carlo feature selection (MC) algorithm, which was able to search over large feature spaces and achieved better classification accuracies. However in MC the information of feature rank variations is not utilized and the ranks of features are not dynamically updated. Here, we propose a novel feature selection algorithm which integrates the ideas of the professional tennis players ranking, such as seed players and dynamic ranking, into Monte Carlo simulation. Seed players make the feature selection game more competitive and selective. The strategy of dynamic ranking ensures that it is always the current best players to take part in each competition. The proposed algorithm is tested on 8 biological datasets. Results demonstrate that the proposed method is computationally efficient, stable and has favorable performance in classification.  相似文献   
78.
This paper analyzes the robustness of globally exponential stability of time-varying delayed neural networks (NNs) subjected to random disturbances. Given a globally exponentially stable neural network, and in the presence of noise, we quantify how much noise intensity that the delayed neural network can remain to be globally exponentially stable. We characterize the upper bounds of the noise intensity for the delayed NNs to sustain globally exponential stability. The upper bounds of parameter uncertainty intensity are characterized by using transcendental equation. A numerical example is provided to illustrate the theoretical result.  相似文献   
79.
The study of collective user behaviours in social networking sites has become an increasing important topic in social media mining. Understanding such behaviours has its potential to extract actionable patterns that can be beneficial to develop effective marketing strategies, optimise user experiences and maximise website revenues. With the rapid development of micro-blogging, Twitter has become a richer source of intelligence that can be used to study collective user behaviour, due to its efficient and meaningful user-to-user interactions. However, the classical statistical methods have some drawbacks in bridging the gap between user-generated data and human analysts who mostly use linguistic terms to analyse data and model/summarise knowledge learned. To address this gap, this work proposes a new approach, which employs the mass assignment theory-based fuzzy association rules algorithm (MASS-FARM), for the first time, to extract useful interaction behaviour of Twitter users. The influential factors (including activity time, number of friends/followers and the number of tweets) are represented as fuzzy granules, and the associations amongst are studied by employing MASS-FARM. The collective user behaviours are analysed in the Reply category and the Non-Reply category, respectively. The applicability and usefulness of the proposed method are demonstrated via an empirical study on a collected Twitter data set. The derived results are also discussed and compared with existing works.  相似文献   
80.
In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a classical binary key is implemented on quantum image. Then, we utilize a dynamic vector, instead of a fixed parameter as in other previous schemes, to control the embedding process. The dynamic embedding vector is decided by both the carrier quantum image and the watermark image, which is only known by the authorized owner. The proposed scheme is analyzed from visual quality, computational complexity, and payload capacity. Analysis and results show that the proposed scheme has better visual quality under a higher embedding capacity and lower complexity compared with other schemes proposed recently.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号