首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   54824篇
  免费   1219篇
  国内免费   145篇
电工技术   754篇
综合类   73篇
化学工业   11293篇
金属工艺   2220篇
机械仪表   3420篇
建筑科学   1162篇
矿业工程   25篇
能源动力   2297篇
轻工业   4227篇
水利工程   283篇
石油天然气   92篇
武器工业   2篇
无线电   8598篇
一般工业技术   11813篇
冶金工业   3937篇
原子能技术   696篇
自动化技术   5296篇
  2024年   710篇
  2023年   678篇
  2022年   925篇
  2021年   1648篇
  2020年   1342篇
  2019年   1461篇
  2018年   1503篇
  2017年   1495篇
  2016年   1921篇
  2015年   1404篇
  2014年   2224篇
  2013年   3161篇
  2012年   3434篇
  2011年   4102篇
  2010年   2958篇
  2009年   3064篇
  2008年   2934篇
  2007年   2284篇
  2006年   2135篇
  2005年   1816篇
  2004年   1637篇
  2003年   1594篇
  2002年   1389篇
  2001年   1170篇
  2000年   1049篇
  1999年   971篇
  1998年   1603篇
  1997年   1015篇
  1996年   828篇
  1995年   568篇
  1994年   477篇
  1993年   418篇
  1992年   301篇
  1991年   279篇
  1990年   264篇
  1989年   246篇
  1988年   211篇
  1987年   174篇
  1986年   121篇
  1985年   119篇
  1984年   95篇
  1983年   67篇
  1982年   39篇
  1981年   42篇
  1980年   32篇
  1979年   32篇
  1978年   31篇
  1977年   38篇
  1976年   62篇
  1973年   20篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
This study describes techniques for the cascade modeling and the optimization that are required to conduct the simulator-based process optimization of solar cell fabrication. Two modeling approaches, neural networks and genetic programming, are employed to model the crucial relation for the consecutively connected two processes in solar cell fabrication. One model (Model 1) is used to map the five inputs (time, amount of nitrogen and DI water in surface texturing and temperature and time in emitter diffusion) to the two outputs (reflectance and sheet resistance) of the first process. The other model (Model 2) is used to connect the two inputs (reflectance and sheet resistance) to the one output (efficiency) of the second process. After modeling of the two processes, genetic algorithms and particle swarm optimization were applied to search for the optimal recipe. In the first optimization stage, we searched for the optimal reflectance and sheet resistance that can provide the best efficiency in the fabrication process. The optimized reflectance and sheet resistance found by the particle swarm optimization were better than those found by the genetic algorithm. In the second optimization stage, the five input parameters were searched by using the reflectance and sheet resistance values obtained in the first stage. The found five variables such as the texturing time, amount of nitrogen, DI water, diffusion time, and temperature are used as a recipe for the solar cell fabrication. The amount of nitrogen, DI water, and diffusion time in the optimized recipes showed considerable differences according to the modeling approaches. More importantly, repeated applications of particle swarm optimization yielded process conditions with smaller variations, implying greater consistency in recipe generation.  相似文献   
82.
In automated container terminals, containers are transported from the marshalling yard to a ship and vice versa by automated vehicles. The automated vehicle type studied in this paper is an automated lifting vehicle (ALV) that is capable of lifting a container from the ground by itself. This study discusses how to dispatch ALVs by utilizing information about pickup and delivery locations and time in future delivery tasks. A mixed-integer programming model is provided for assigning optimal delivery tasks to ALVs. A procedure for converting buffer constraints into time window constraints and a heuristic algorithm for overcoming the excessive computational time required for solving the mathematical model are suggested. Numerical experiments are reported to compare the objective values and computational times by a heuristic algorithm with those by an optimizing method and to analyze the effects of dual cycle operation, number of ALVs, and buffer capacity on the performance of ALVs.  相似文献   
83.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA.  相似文献   
84.
85.
It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme [30] for large scale elections. However, in the following paper, Okamoto [31] proved that the scheme [30] was not receipt-free and presented two improved schemes. One scheme requires the help of the parameter registration committee and the other needs a stronger physical assumption of the voting booth. In this paper, we utilize the double-trapdoor commitment to propose a new receipt-free voting scheme based on blind signatures for large scale elections. Neither the parameter registration committee nor the voting booth is required in our scheme. We also present a more efficient zero-knowledge proof for secret permutation. Therefore, our scheme is much more efficient than Okamoto’s schemes [30] and [31] with the weaker physical assumptions. Moreover, we prove that our scheme can achieve the desired security properties.  相似文献   
86.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed.  相似文献   
87.
A pushdown automaton (PDA) is quasi-rocking if it preserves the stack height for no more than a bounded number of consecutive moves. Every PDA can be transformed into an equivalent one that is quasi-rocking and real-time and every finite-turn (one-turn) PDA can be transformed into an equivalent one that is quasi-rocking or real-time. The quasi-rocking [quasi-rocking in the increasing mode, and quasi-rocking in the decreasing mode] real-time restriction in finite-turn (one-turn) PDAs coincides with the double Greibach [reverse Greibach, and Greibach] form in nonterminal-bounded (linear) context-free grammars. This provides complete grammatical characterizations of quasi-rocking and/or real-time (finite-turn and one-turn) PDAs and, together with known relations and other relations proved in the present paper, yields an extended hierarchy of PDA languages. Basic decision properties for PDAs can be stated in stronger forms by using the quasi-rocking and real-time restrictions and their undecidability/decidability status rests on the way PDAs quasi-rock.  相似文献   
88.
On the use of energy minimization for CA based analysis in elasticity   总被引:2,自引:1,他引:1  
There has been recent interest in exploring alternative computational models for structural analysis that are better suited for a design environment requiring repetitive analysis. The need for such models is brought about by significant increases in computer processing speeds, realized primarily through parallel processing. To take full advantage of such parallel machines, however, the computational approach itself must be revisited from a totally different perspective; parallelization of inherently serial paradigms is subject to limitations introduced by a requirement of information coordination. The cellular automata (CA) model of decentralized computations provides one such approach which is ideally tailored for parallel computers. The proposed paper examines the applicability of the cellular automata model in problems of 2-D elasticity. The focus of the paper is in the use of a genetic algorithm based optimization process to derive the rules for local interaction required in evolving the cellular automata. Received August 28, 2000  相似文献   
89.
State explosion is a well-known problem that impedes analysis and testing based on state-space exploration. This problem is particularly serious in real time systems because unbounded time values cause the state space to be infinite even for simple systems. The author presents an algorithm that produces a compact representation of the reachable state space of a real time system. The algorithm yields a small state space, but still retains enough information for analysis. To avoid the state explosion which can be caused by simply adding time values to states, our algorithm uses history equivalence and transition bisimulation to collapse states into equivalent classes. Through history equivalence, states are merged into an equivalence class with the same untimed executions up to the states. Using transition bisimulation, the states that have the same future behaviors are further collapsed. The resultant state space is finite and can be used to analyze real time properties. To show the effectiveness of our algorithm, we have implemented the algorithm and have analyzed several example applications  相似文献   
90.
Kim  D. Managuli  R. Kim  Y. 《Micro, IEEE》2001,21(4):33-42
Mediaprocessors provide high performance by using both instruction- and data-level parallelism. Because of the increased computing power, transferring data between off- and on-chip memories without slowing down the core processor's performance is challenging. Two methods, data cache and direct memory access, address this problem in different ways  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号