首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9324篇
  免费   436篇
  国内免费   6篇
电工技术   128篇
综合类   21篇
化学工业   2126篇
金属工艺   283篇
机械仪表   195篇
建筑科学   565篇
矿业工程   29篇
能源动力   207篇
轻工业   738篇
水利工程   59篇
石油天然气   15篇
无线电   784篇
一般工业技术   1807篇
冶金工业   1131篇
原子能技术   110篇
自动化技术   1568篇
  2023年   126篇
  2022年   167篇
  2021年   274篇
  2020年   176篇
  2019年   178篇
  2018年   247篇
  2017年   211篇
  2016年   309篇
  2015年   289篇
  2014年   376篇
  2013年   530篇
  2012年   477篇
  2011年   592篇
  2010年   451篇
  2009年   431篇
  2008年   432篇
  2007年   423篇
  2006年   343篇
  2005年   293篇
  2004年   253篇
  2003年   231篇
  2002年   209篇
  2001年   138篇
  2000年   170篇
  1999年   169篇
  1998年   304篇
  1997年   202篇
  1996年   187篇
  1995年   136篇
  1994年   101篇
  1993年   103篇
  1992年   69篇
  1991年   65篇
  1990年   55篇
  1989年   62篇
  1988年   53篇
  1987年   59篇
  1986年   40篇
  1985年   36篇
  1984年   60篇
  1983年   44篇
  1982年   36篇
  1981年   30篇
  1980年   45篇
  1979年   37篇
  1978年   42篇
  1977年   63篇
  1976年   94篇
  1975年   34篇
  1974年   40篇
排序方式: 共有9766条查询结果,搜索用时 0 毫秒
101.
This article discusses data security and controls, primarily in the context of data base management systems (DBMSs), with an emphasis on basic principles and mechanisms that have been successfully used by practitioners in actual products and systems. The general discussion does not focus on particular products, although a later section does review several products to illustrate previously discussed concepts. The discussion of data bases is limited specifically to relational DBMSs, which store data in relations that have specific mathematical properties. All examples given are in SQL. It is assumed that readers are familiar with rudimentary concepts of relational data bases and SQL.

This article begins with a review of basic security objectives, followed by a discussion of access controls in the current generation of commercially available DBMSs. The problem of multilevel security is then introduced, including a review of techniques developed specifically for multilevel security.  相似文献   
102.
103.
This paper studies a new class of single-machine scheduling problems, which are faced by Just-in-Time-suppliers satisfying a given demand. In these models the processing of jobs leads to a release of a predefined number of product units into inventory. Consumption is triggered by predetermined time-varying, and product-specific demand requests. While all demands have to be fulfilled, the objective is to minimize the resulting product inventory. We investigate different subproblems of this general setting with regard to their computational complexity. For more restricted problem versions strongly polynomial time algorithms are presented. In contrast to this, NP-hardness in the strong sense is proven for more general problem versions. Moreover, for the most general version, even finding a feasible solution is shown to be strongly NP-hard.  相似文献   
104.
Transformation optics (TO) is a new tool for controlling electromagnetic fields. In the context of metamaterial technology, it provides a direct link between a desired electromagnetic (EM) phenomenon and the material response required for its occurrence. Recently, this powerful framework has been successfully exploited to study surface plasmon assisted phenomena such as light harvesting. Here, we review the general strategy based on TO to design plasmonic devices capable of harvesting light over a broadband spectrum and achieving considerable field confinement and enhancement. The methodology starts with two-dimensional (2D) cases, such as 2D metal edges, crescent-shaped cylinders, nanowire dimers, and rough metal surfaces, and is well extended to fully-fledged three-dimensional (3D) situations. The largely analytic approach gives physical insights into the processes involved and suggests a way forward to study a wide variety of plasmonic nanostructures.  相似文献   
105.
Surgical therapy has become an important therapeutic alternative for patients with medically intractable epilepsy. Correct and anatomically precise localization of an epileptic focus is essential to decide if resection of brain tissue is possible. The inverse problem in EEG-based source localization is to determine the location of the brain sources that are responsible for the measured potentials at the scalp electrodes. We propose a new global optimization method based on particle swarm optimization (PSO) to solve the epileptic spike EEG source localization inverse problem. In a forward problem a modified subtraction method is proposed to reduce the computational time. The good accuracy and fast convergence are demonstrated for 2D and 3D cases with realistic head models. The results from the new method are promising for use in the pre-surgical clinic in the future.  相似文献   
106.
We show that from a communication-complexity perspective, the primitive called oblivious transfer—which was introduced in a cryptographic context—can be seen as the classical analogue to a quantum channel in the same sense as non-local boxes are of maximally entangled qubits. More explicitly, one realization of non-cryptographic oblivious transfer allows for the perfect simulation of sending one qubit and measuring it in an orthogonal basis. On the other hand, a qubit channel allows for realizing non-cryptographic oblivious transfer with probability roughly 85 %, whereas 75 % is the classical limit.  相似文献   
107.
108.
The profile of a graph is an integer-valued parameter defined via vertex orderings; it is known that the profile of a graph equals the smallest number of edges of an interval supergraph. Since computing the profile of a graph is an NP-hard problem, we consider parameterized versions of the problem. Namely, we study the problem of deciding whether the profile of a connected graph of order n is at most n−1+k, considering k as the parameter; this is a parameterization above guaranteed value, since n−1 is a tight lower bound for the profile. We present two fixed-parameter algorithms for this problem. The first algorithm is based on a forbidden subgraph characterization of interval graphs. The second algorithm is based on two simple kernelization rules which allow us to produce a kernel with linear number of vertices and edges. For showing the correctness of the second algorithm we need to establish structural properties of graphs with small profile which are of independent interest. A preliminary version of the paper is published in Proc. IWPEC 2006, LNCS vol. 4169, 60–71.  相似文献   
109.
The high-conductance state of cortical networks   总被引:3,自引:0,他引:3  
We studied the dynamics of large networks of spiking neurons with conductance-based (nonlinear) synapses and compared them to networks with current-based (linear) synapses. For systems with sparse and inhibition-dominated recurrent connectivity, weak external inputs induced asynchronous irregular firing at low rates. Membrane potentials fluctuated a few millivolts below threshold, and membrane conductances were increased by a factor 2 to 5 with respect to the resting state. This combination of parameters characterizes the ongoing spiking activity typically recorded in the cortex in vivo. Many aspects of the asynchronous irregular state in conductance-based networks could be sufficiently well characterized with a simple numerical mean field approach. In particular, it correctly predicted an intriguing property of conductance-based networks that does not appear to be shared by current-based models: they exhibit states of low-rate asynchronous irregular activity that persist for some period of time even in the absence of external inputs and without cortical pacemakers. Simulations of larger networks (up to 350,000 neurons) demonstrated that the survival time of self-sustained activity increases exponentially with network size.  相似文献   
110.
We present a humidity sensor based on H-ZSM-5 type zeolite that is suitable to detect traces of humidity (10–110 ppmV) under harsh conditions, e.g. reducing atmosphere (H2) and high temperature (up to 600 °C). By means of complex impedance spectroscopy (IS) we show that the zeolite sensor responds linearly towards minimal changes in humidity. Therefore this result indicates that the zeolite sensor is capable to detect traces of humidity in processes where high temperatures in a hydrogen environment are required.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号