首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3104篇
  免费   138篇
  国内免费   53篇
电工技术   52篇
综合类   83篇
化学工业   732篇
金属工艺   111篇
机械仪表   91篇
建筑科学   98篇
矿业工程   19篇
能源动力   126篇
轻工业   119篇
水利工程   36篇
石油天然气   68篇
武器工业   9篇
无线电   531篇
一般工业技术   459篇
冶金工业   274篇
原子能技术   40篇
自动化技术   447篇
  2023年   14篇
  2022年   66篇
  2021年   89篇
  2020年   39篇
  2019年   39篇
  2018年   45篇
  2017年   52篇
  2016年   64篇
  2015年   52篇
  2014年   105篇
  2013年   230篇
  2012年   169篇
  2011年   178篇
  2010年   168篇
  2009年   186篇
  2008年   173篇
  2007年   143篇
  2006年   127篇
  2005年   111篇
  2004年   101篇
  2003年   86篇
  2002年   86篇
  2001年   64篇
  2000年   63篇
  1999年   68篇
  1998年   124篇
  1997年   81篇
  1996年   81篇
  1995年   59篇
  1994年   49篇
  1993年   40篇
  1992年   38篇
  1991年   30篇
  1990年   28篇
  1989年   32篇
  1988年   20篇
  1987年   19篇
  1986年   9篇
  1985年   19篇
  1984年   18篇
  1983年   12篇
  1982年   9篇
  1981年   9篇
  1980年   9篇
  1979年   11篇
  1977年   15篇
  1976年   12篇
  1975年   13篇
  1973年   8篇
  1967年   5篇
排序方式: 共有3295条查询结果,搜索用时 15 毫秒
81.
82.
This study clarifies the implicit potential deficiency caused by the sparse cardinality parameter k in Rong et al. (2014). In addition, k = β × W × M × N (0.9 ≤ β < 1) is suggested to avert this potential deficiency, where β is a ratio controlling the amount of sparse cardinality, W is the number of multispectral bands and M × N is the size of panchromatic image. With the choice of k suggested in this study, the low rank matrix L and sparse matrix S obtained by Go Decomposition (Zhou and Tao 2011) can be iteratively optimized and solved. Thus, instead of choosing k as W × M × N in Rong et al. (2014), the potential deficiency that L is directly obtained as an analytic solution can be averted.  相似文献   
83.
One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to inadequate experimental design. This has prevented us from modeling a computational system to protect against insider threat situations. This paper provides a contemporary methodological approach for using online games to simulate insider betrayal for predictive behavioral research. The Leader’s Dilemma Game simulates an insider betrayal scenario for analyzing organizational trust relationships, providing an opportunity to examine the trustworthiness of focal individuals, as measured by humans as sensors engaging in computer-mediated communication. This experimental design provides a window into trustworthiness attribution that can generate a rigorous and relevant behavioral dataset, and contributes to building a cyber laboratory that advances future insider threat study.  相似文献   
84.
Traditional microfluidic paper-based analytical devices (μPADs) consist of a flat straight channel printed on a paper substrate. Such devices provide a promising low-cost solution for a variety of biomedical assays. However, they have a relatively high sample consumption due to their use of external reservoirs. Moreover, in μPADs based on the ion concentration polarization (ICP) effect, controlling the cross-sectional area of the Nafion membrane relative to that of the hydrophilic channel is difficult. Accordingly, the present study utilizes an origami technique to create a μPAD with a three-dimensional (3D) structure. The μPAD features short channels and embedded reservoirs, and therefore reduces both the driving voltage requirement and the sample consumption. Moreover, the preconcentration effect is enhanced through the use of an additional hydrophilic area adjacent to the Nafion membrane. The existence of electroosmotic flow (EOF) within the proposed device is confirmed using a current-monitoring method. In addition, the occurrence of ICP is evaluated by measuring the current–voltage response of the device at external voltages ranging from 0 to 50 V. The experimental results obtained for a fluorescein sample with an initial concentration of 10?5 M show that a 100-fold enhancement factor can be achieved given the use of a non-uniform-geometry design for the assay channel and an additional hydrophilic region with an area equal to approximately 10% of the channel cross-sectional area. Finally, a 100-fold factor can also be achieved for a fluorescein isothiocyanate sample with an initial concentration of 10?6 M given an external driving voltage of 40 V.  相似文献   
85.
86.
We prove a unique property of single-link distance, based on which an algorithm is designed for data clustering. The property states that a single-link cluster is a subset with inter-subset distance greater than intra-subset distance, and vice versa. Among the major linkages (single, complete, average, centroid, median, and Ward's), only single-link distance has this property. Based on this property we introduce monotonic sequences of iclusters (i.e., single-link clusters) to model the phenomenon that a natural cluster has a dense kernel and the density decreases as we move from the kernel to the boundary. A monotonic sequence of iclusters is a sequence of nested iclusters such that an icluster in the sequence is a dominant child (in terms of size) of the icluster before it. Our data clustering algorithm is monotonic sequence based. We classify a dataset of one monotonic sequence into to two classes by splitting the sequence into two parts: the kernel part and the surrounding part. For a data set of multiple monotonic sequences, each leaf monotonic sequence represents the kernel of a class, which then “grows” by absorbing nearby non-kernel points. This algorithm, proved by experiments, compares favorable in effectiveness to other clustering algorithms.  相似文献   
87.
Molecular Verification of Rule-Based Systems Based on DNA Computation   总被引:1,自引:0,他引:1  
Various graphic techniques have been developed to analyze structural errors in rule-based systems that utilize inference (propositional) logic rules. Four typical errors in rule-based systems are: redundancy (numerous rule sets resulting in the same conclusion); circularity (a rule leading back to itself); incompleteness (deadends or a rule set conclusion leading to unreachable goals); and inconsistency (rules conflicting with each other). This study presents a new DNA-based computing algorithm mainly based upon Adleman's DNA operations. It can be used to detect such errors. There are three phases to this molecular solution: rule-to-DNA transformation design, solution space generation, and rule verification. We first encode individual rules using relatively short DNA strands, and then generate all possible rule paths by the directed joining of such short strands to form longer strands. We then conduct the verification algorithm to detect errors. The potential of applying this proposed DNA computation algorithm to rule verification is promising given the operational time complexity of O(n*q), in which n denotes the number of fact clauses in the rule base and q is the number of rules with longest inference chain.  相似文献   
88.
Electrostatic model for an asymmetric combdrive   总被引:4,自引:0,他引:4  
This paper presents an analytical solution to the electrostatic actuation of an asymmetric combdrive in out-of-plane and torsional motions. The exact solutions to force in the out-of-plane motion and the integral for torque in the torsional motion are obtained. The dependence of the peak force on the thickness of the movable fingers and the amount of overlap of the combs is given in closed form. Using our model, the shift of the natural resonant frequency due to a dc bias is analyzed. Furthermore, our solution also applies to the in-plane motion of an in-plane interdigitated combdrive. We found that an in-plane interdigitated combdrive generates a constant force within 0.1% when the minimum initial engagement length of the combs is twice the separation gap  相似文献   
89.
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号