首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1751篇
  免费   88篇
  国内免费   12篇
电工技术   20篇
综合类   5篇
化学工业   457篇
金属工艺   65篇
机械仪表   56篇
建筑科学   34篇
能源动力   89篇
轻工业   82篇
水利工程   12篇
石油天然气   5篇
无线电   270篇
一般工业技术   350篇
冶金工业   88篇
原子能技术   6篇
自动化技术   312篇
  2024年   6篇
  2023年   40篇
  2022年   68篇
  2021年   93篇
  2020年   87篇
  2019年   67篇
  2018年   90篇
  2017年   97篇
  2016年   82篇
  2015年   51篇
  2014年   80篇
  2013年   155篇
  2012年   89篇
  2011年   98篇
  2010年   84篇
  2009年   90篇
  2008年   77篇
  2007年   71篇
  2006年   61篇
  2005年   44篇
  2004年   21篇
  2003年   25篇
  2002年   21篇
  2001年   26篇
  2000年   18篇
  1999年   20篇
  1998年   13篇
  1997年   26篇
  1996年   20篇
  1995年   20篇
  1994年   19篇
  1993年   18篇
  1992年   14篇
  1991年   10篇
  1990年   10篇
  1989年   4篇
  1988年   5篇
  1987年   5篇
  1986年   3篇
  1985年   3篇
  1984年   2篇
  1983年   1篇
  1982年   3篇
  1981年   4篇
  1980年   1篇
  1979年   5篇
  1978年   2篇
  1976年   1篇
  1975年   1篇
排序方式: 共有1851条查询结果,搜索用时 15 毫秒
11.
12.
Virtual paths (VPs) are an integral part of the resource management and control hierarchy of ATM (asynchronous transfer mode) networks. To improve the utilization of network resources and facilitate management and control, source types are organized into traffic classes. Each traffic class is transported by its own virtual path subnetwork. In this paper, we consider issues related to the design of traffic classes. We consider an ATM switch node to which cells arrive from a diverse set of source types. Traffic classes are assumed to be served according to a weighted round robin policy, while cells belonging to a given traffic class are served in first-come-first-served order. We consider the problem of determining the optimal set of traffic classes. Under suitable simplifying assumptions, it is shown that the above problem can be modeled as a set-partitioning problem. The structure of the problem at hand is then exploited to develop an efficient heuristic. Several examples are given to illustrate the developed methodology.Supported partially through NSF Grant NCR-891447 and AT&T Grant 5-23690.  相似文献   
13.
Neural Computing and Applications - Marston’s load theory is commonly used for understanding the soil–conduit interaction. However, there are no practical methods available which can...  相似文献   
14.
Experimental data on the monomer conversion, xm, and the weight average molecular weight, Mw, have been generated under several isothermal and non-isothermal conditions for the polymerization of methyl methacrylate in a rheometer-reactor assembly. The non-isothermal results, in particular, can be used to provide more stringent tests of kinetic models than isothermal data alone. A simple empirical model has been used to describe this system that accounts for the gel (Trommsdorff) and glass effects. The model involves only xm and the temperature, and is quite general. The model parameters are tuned using only three sets of isothermal data. Good agreement is found between the experimental results and model predictions for a whole variety of experimental conditions, including non-isothermal operation and with intermediate addition of initiator. Because of its generality, this model is quite suitable for use for on-line optimizing control as well as for describing industrial reactors.  相似文献   
15.
Tracer tests were conducted at the 6,000 pounds of ozone per day Tucson, CAP Water Treatment Plant in Tucson, Arizona. The tests were designed to determine T10 values through the contactors at various operating conditions. The tests were modeled using three techniques. Peclet Number was calculated for each of the runs, which would indicate the hydrodynamic conditions inside the ozone contactor. The results indicated that the increase in water flow rate and the number of cells with gas flow increased Peclet Number. The flow rate of liquid seemed to impact the Peclet Number more than gas flow. The headloss in each cell appeared to be important in controlling the distribution of liquid and gas through the cell. A correlation was developed between the product of gas and liquid phase Reynolds Number and Peclet Number.  相似文献   
16.
17.
Automatic classes are classes of languages for which a finite automaton can decide whether a given element is in a set given by its index. The present work studies the learnability of automatic families by automatic learners which, in each round, output a hypothesis and update a long-term memory, depending on the input datum, via an automatic function. Many variants of automatic learners are investigated: where the long-term memory is restricted to be the current hypothesis whenever this exists, cannot be of length larger than the length of the longest datum seen, or has to consist of a constant number of examples seen so far. Learnability is also studied with respect to queries which reveal information about past data or past computation history; the number of queries per round is bounded by a constant.  相似文献   
18.
EGIS'92     

Announcement

EGIS'92 Third European Conference on Geographical Information Systems at the Park Hilton in Munich Germany, March 23–26, 1992  相似文献   
19.
Multimedia Tools and Applications - New mobile applications need to estimate user activities by using sensor data provided by smart wearable devices and deliver context-aware solutions to users...  相似文献   
20.

Digital image watermarking technique based on LSB Substitution and Hill Cipher is presented and examined in this paper. For better imperceptibility watermark is inserted in the spatial domain. Further the watermark is implanted in the Cover Image block having the highest entropy value. To improve the security of the watermark hill cipher encryption is used. Both subjective and objective image quality assessment technique has been used to evaluate the imperceptibility of the proposed scheme.Further, the perceptual perfection of the watermarked pictures accomplished in the proposed framework has been contrasted and some state-of-art watermarking strategies. Test results demonstrates that the displayed method is robust against different image processing attacks like Salt and Peppers, Gaussian filter attack, Median filter attacks, etc.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号