首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   412405篇
  免费   6555篇
  国内免费   1376篇
电工技术   7698篇
综合类   349篇
化学工业   61785篇
金属工艺   14282篇
机械仪表   11875篇
建筑科学   11660篇
矿业工程   868篇
能源动力   11126篇
轻工业   43862篇
水利工程   3312篇
石油天然气   1836篇
武器工业   13篇
无线电   55396篇
一般工业技术   76684篇
冶金工业   75281篇
原子能技术   5576篇
自动化技术   38733篇
  2021年   2657篇
  2019年   2439篇
  2018年   3839篇
  2017年   3906篇
  2016年   4144篇
  2015年   3426篇
  2014年   5724篇
  2013年   19315篇
  2012年   10222篇
  2011年   14706篇
  2010年   11301篇
  2009年   12900篇
  2008年   13930篇
  2007年   14312篇
  2006年   12799篇
  2005年   11976篇
  2004年   11594篇
  2003年   11299篇
  2002年   10933篇
  2001年   11140篇
  2000年   10287篇
  1999年   10785篇
  1998年   24094篇
  1997年   17640篇
  1996年   13944篇
  1995年   11009篇
  1994年   9794篇
  1993年   9376篇
  1992年   7124篇
  1991年   6796篇
  1990年   6404篇
  1989年   6112篇
  1988年   5869篇
  1987年   4893篇
  1986年   4842篇
  1985年   5984篇
  1984年   5606篇
  1983年   4835篇
  1982年   4504篇
  1981年   4456篇
  1980年   4212篇
  1979年   4082篇
  1978年   3774篇
  1977年   4559篇
  1976年   6119篇
  1975年   3116篇
  1974年   3016篇
  1973年   2891篇
  1972年   2322篇
  1971年   2006篇
排序方式: 共有10000条查询结果,搜索用时 500 毫秒
201.
The problem of designing fibre-optic networks for local-access telecommunications generates (at least) three non-trivial subproblems. In the first of these subproblems one must determine how many fibre-optic cables (fibres) are required at either end of a street. In the next subproblem a minimum-cost network must be designed to support the fibres. The network must also provide distinct paths from either end of the street to the central exchange(s). Finally, the fibre-optic cables must be placed in protective covers. These covers are available in a number of different sizes, allowing some flexibility when covering each section of the network. In this paper we describe a dynamic programming (DP) formulation for finding a minimum-cost (protective) covering for the network (the third of the subproblems). This problem is a generalised set covering problem with side constraints and is further complicated by the introduction of fixed and variable welding costs. The DP formulation selects covers along each arc (in the network), but cannot exactly model the fixed costs and so does not guarantee optimality. We also describe an integer programming (IP) formulation for assessing the quality of the DP solutions. The cost of the networks constructed by the IP model is less than those designed using the DP model, but the saving is not significant for the problems examined (less than 0.1%). This indicates that the DP model will generally give very good solutions. Furthermore, as the problem dimensions grow, DP gives significantly better solution times than IP.  相似文献   
202.
The Boundary Element Method (BEM) incorporating the Embedded Cell Approach (ECA) has been used to analyse the effects of constituent material properties, fibre spatial distribution and microcrack damage on the localised behaviour of transversely fractured, unidirectional fibre-reinforced composites. Three specific composites, i.e., glass fibre reinforced polyester, carbon fibre reinforced epoxy and a glass-carbon hybrid, are considered. The geometrical structures examined were perfectly periodic, uniformly spaced fibre arrangements in square and hexagonal embedded cells. In addition, numerical simulations were also conducted using embedded cells containing randomly distributed fibres. The models involve both elastic fibres and matrix, with the interfaces between the different phases being fully bonded. The results indicate that the constituent material properties (two phase composite) and spatial distribution have a significant effect on the localised stress distributions around the primary crack tip. However, the strain energy release rate associated with crack propagation is predominantly influenced by the material composition. The three-phase hybrid composite exhibited an apparent intermediate fracture toughness value, compared to the all-glass and all-carbon models. Furthermore, the strain energy release rate for the macrocrack lowers as it enters a zone of localised damage (microcracking). The presence of microcracks relaxes the stress field, which can result in a significant reduction in the energetics of the primary crack.  相似文献   
203.
204.
This paper describes the specification and implementation of a new three-layer time-aware agent architecture. This architecture is designed for applications and environments where societies of humans and agents play equally active roles, but interact and operate in completely different time frames. The architecture consists of three layers: the April real-time run-time (ART) layer, the time aware layer (TAL), and the application agents layer (AAL). The ART layer forms the underlying real-time agent platform. An original online, real-time, dynamic priority-based scheduling algorithm is described for scheduling the computation time of agent processes, and it is shown that the algorithm's O(n) complexity and scalable performance are sufficient for application in real-time domains. The TAL layer forms an abstraction layer through which human and agent interactions are temporally unified, that is, handled in a common way irrespective of their temporal representation and scale. A novel O(n2) interaction scheduling algorithm is described for predicting and guaranteeing interactions' initiation and completion times. The time-aware predicting component of a workflow management system is also presented as an instance of the AAL layer. The described time-aware architecture addresses two key challenges in enabling agents to be effectively configured and applied in environments where humans and agents play equally active roles. It provides flexibility and adaptability in its real-time mechanisms while placing them under direct agent control, and it temporally unifies human and agent interactions.  相似文献   
205.
206.
We have compared experimentally the transmission performance of return-to-zero differential phase-shift keying (RZ-DPSK) with RZ-ON-OFF keying (OOK), nonreturn-to-zero differential phase-shift keying (NRZ-DPSK), and NRZ-OOK for 100/spl times/10-Gb/s transmission with a spectral efficiency of 0.22 b/s/Hz over transoceanic distances. The Q degradation of the RZ-DPSK after transmission over 9180 km was 3 dB greater than that of RZ-OOK. The experimental results clearly showed the major cause of degradation for DPSK is not cross-phase modulation but self-phase modulation. The calculated nonlinear phase noise, i.e., the Gordon-Mollenauer effect, agreed with the experimental results. A distributed-Raman-amplifier assisted erbium-doped-fiber-amplified transmission line acted well in reducing the nonlinear phase noise.  相似文献   
207.
Ball-milling method was applied to dissolve Fe into titanium dioxide (TiO2). X-ray diffraction indicated the starting anatase changed to a rutile-type structure with oxygen deficiency after ball milling. Transmission electron microscopy and X-ray absorption experiments were conducted to examine the possible existence of magnetic impurities in the ball-milled powders after they were leached in HCl solutions. Temperature dependence of the resistivity shows semiconducting behavior and the magnetic hysteresis loops at 5 and 300 K exhibit ferromagnetic characteristics. Fe-doped TiO2 films were also prepared by pulsed laser deposition. The magnetic properties of the films are discussed.  相似文献   
208.
给出了一种GPS卡尔曼滤波的自适应方案,该方案能根据GPS导航中变化的动态来估计协方差.当增强卡尔曼滤波器时,方案可得到更精确的定位修正.此外,也可将此估计方法用于完整监测,以增强故障检测的阈值选择.采用模拟数据验证了提出方法的正确性.  相似文献   
209.
Self-organized public-key management for mobile ad hoc networks   总被引:6,自引:0,他引:6  
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.  相似文献   
210.
Personal telecommunication radiation safety and the precautionary principle   总被引:4,自引:0,他引:4  
The approach to risk management for RF and microwave radiation has been to establish guidelines for maximum permissible levels of exposure. These guidelines are based on evaluations of the relevant scientific literature and, with safety margins to account for uncertainties and gaps in scientific knowledge, offer a significant level of protection against established hazards of RF and microwave radiation for short-term exposures. One can argue, on this basis, that the precautionary principle - specifically, safety factors -have been used to guide the making and promulgation of existing permissible-exposure standards for RF and microwave radiation. Therefore, discussions on the appropriateness of the precautionary principle for RF radiation may be "much ado about nothing". Clearly, this approach to "pre caution" neither has stifled technological development, nor has it helped to enforce the acceptance of zero risk, but it provided a basis for action when science was unable to give a clear answer.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号