首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   614457篇
  免费   7947篇
  国内免费   1575篇
电工技术   10648篇
综合类   411篇
化学工业   95015篇
金属工艺   27719篇
机械仪表   20639篇
建筑科学   12739篇
矿业工程   5023篇
能源动力   14954篇
轻工业   42118篇
水利工程   7644篇
石油天然气   17032篇
武器工业   42篇
无线电   63894篇
一般工业技术   132394篇
冶金工业   105854篇
原子能技术   16526篇
自动化技术   51327篇
  2021年   6465篇
  2020年   5095篇
  2019年   6321篇
  2018年   11345篇
  2017年   11501篇
  2016年   12263篇
  2015年   7442篇
  2014年   11973篇
  2013年   29897篇
  2012年   18415篇
  2011年   23247篇
  2010年   18786篇
  2009年   20668篇
  2008年   21168篇
  2007年   20604篇
  2006年   17616篇
  2005年   15654篇
  2004年   15031篇
  2003年   14772篇
  2002年   13989篇
  2001年   13641篇
  2000年   12997篇
  1999年   13012篇
  1998年   32153篇
  1997年   22698篇
  1996年   17145篇
  1995年   12835篇
  1994年   11394篇
  1993年   11558篇
  1992年   8542篇
  1991年   8224篇
  1990年   8268篇
  1989年   7834篇
  1988年   7528篇
  1987年   6866篇
  1986年   6644篇
  1985年   7361篇
  1984年   6907篇
  1983年   6334篇
  1982年   5901篇
  1981年   6041篇
  1980年   5783篇
  1979年   5828篇
  1978年   5943篇
  1977年   6596篇
  1976年   8316篇
  1975年   5256篇
  1974年   5163篇
  1973年   5286篇
  1972年   4562篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
为了分析多水库系统中两座水库之间灌溉用水的分配问题,建立了基到动态规划的神经网络模型。为了研究从一座上游水库取水在下游两座之库之间进行水量分配的问题,提出了3个状态变量和4个决策变量的改进的动态规划算法。采用神经网络模型,用3个状态变量动态规划算法得出调度原则,就所研究的多水库系统实例来说,新的动态规划神经网络模型的性能很好,将该模型的性能与临时凑合的标准调度原则和以前推荐使用的约束动态规划神经网络模型进行了比较。  相似文献   
72.
Self-organized public-key management for mobile ad hoc networks   总被引:6,自引:0,他引:6  
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.  相似文献   
73.
74.
A series of small–capacity units has recently been constructed in regions of oil field development and crude oil and gas condensate production to satisfy the requirements for such petroleum products as naphtha, diesel fuel, kerosene, and boiler fuel and to reduce costs for delivery of these products. There are almost no data in the technical literature, particularly in periodicals, on the construction and operation of small–capacity units. We attempt to generalize the experience of Orgeneftekhimzavody Trust in this area. We hope that this experience will be useful to specialists in the development and management of small–capacity plants.  相似文献   
75.
This paper presents the evolution of low-frequency, high-power transcontinental transmission, starting from the first successful transatlantic link from Poldhu up to the Italian transcontinental station of Coltano. The trend toward higher and higher transmitting power, and the dead end into which wireless was heading if it were not for research in the higher frequency ranges, are pointed out.  相似文献   
76.
Reducible rank codes and their applications to cryptography   总被引:2,自引:0,他引:2  
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.  相似文献   
77.
This article presents a graph-theoretic method for constructing low-density parity-check (LDPC) codes from connected graphs without the requirement of large girth. This method is based on finding a set of paths in a connected graph, which satisfies the constraint that any two paths in the set are either disjoint or cross each other at one and only one vertex. Two trellis-based algorithms for finding these paths are devised. Good LDPC codes of practical lengths are constructed and they perform well with iterative decoding.  相似文献   
78.
79.
Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used technique is to replace Toeplitz matrices with their associated circulant matrices, based on the well-known fact that Toeplitz matrices asymptotically converge to their associated circulant matrices in the weak sense. This often leads to considerable simplification. However, it is well known that such a weak convergence cannot be strengthened into strong convergence. It is this fact that severely limits the usefulness of the close relation between Toeplitz matrices and circulant matrices. Observing that communication receiver design often needs to seek optimality in regard to a data sequence transmitted within finite duration, we define the finite-term strong convergence regarding two families of matrices. We present a condition under which the inverses of a Toeplitz matrix converges in the strong sense to a circulant matrix for finite-term quadratic forms. This builds a critical link in the application of the convergence theorems for the inverses of Toeplitz matrices since the weak convergence generally finds its usefulness in issues associated with minimum mean squared error and the finite-term strong convergence is useful in issues associated with the maximum-likelihood or maximum a posteriori principles.  相似文献   
80.
In this paper, we describe a method for increasing the external efficiency of polymer light‐emitting diodes (LEDs) by coupling out waveguided light with Bragg gratings. We numerically model the waveguide modes in a typical LED structure and demonstrate how optimizing layer thicknesses and reducing waveguide absorption can enhance the grating outcoupling. The gratings were created by a soft‐lithography technique that minimizes changes to the conventional LED structure. Using one‐dimensional and two‐dimensional gratings, we were able to increase the forward‐directed emission by 47 % and 70 %, respectively, and the external quantum efficiency by 15 % and 25 %.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号