首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   504081篇
  免费   10059篇
  国内免费   2663篇
电工技术   9258篇
技术理论   5篇
综合类   1472篇
化学工业   80555篇
金属工艺   18297篇
机械仪表   14461篇
建筑科学   13431篇
矿业工程   2237篇
能源动力   12657篇
轻工业   54809篇
水利工程   4976篇
石油天然气   7863篇
武器工业   252篇
无线电   56938篇
一般工业技术   92114篇
冶金工业   92936篇
原子能技术   8395篇
自动化技术   46147篇
  2022年   3139篇
  2021年   5106篇
  2020年   3696篇
  2019年   4435篇
  2018年   6848篇
  2017年   6804篇
  2016年   7455篇
  2015年   5663篇
  2014年   8863篇
  2013年   24241篇
  2012年   15231篇
  2011年   20139篇
  2010年   15908篇
  2009年   17144篇
  2008年   18152篇
  2007年   18077篇
  2006年   16134篇
  2005年   14262篇
  2004年   13223篇
  2003年   12777篇
  2002年   12207篇
  2001年   12422篇
  2000年   11394篇
  1999年   11912篇
  1998年   28486篇
  1997年   20369篇
  1996年   15388篇
  1995年   11542篇
  1994年   10329篇
  1993年   10054篇
  1992年   7373篇
  1991年   6984篇
  1990年   6899篇
  1989年   6666篇
  1988年   6396篇
  1987年   5337篇
  1986年   5227篇
  1985年   6189篇
  1984年   5780篇
  1983年   5309篇
  1982年   4770篇
  1981年   5059篇
  1980年   4624篇
  1979年   4654篇
  1978年   4409篇
  1977年   4919篇
  1976年   6398篇
  1975年   3843篇
  1974年   3630篇
  1973年   3715篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in literature. Some examples illustrate the proposed approach.  相似文献   
992.
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy.  相似文献   
993.
994.
995.
Boron is observed to diffuse very slowly in germanium, as opposed to its behaviour in silicon where it exhibits Transient Enhanced Diffusion effects in implanted samples. As a result of this slow diffusion, boron is a very stable dopant, allowing devices to be created with very well-defined doping regions. To understand this superior performance, calculations were performed on a variety of boron diffusion paths, within vacancy and interstitial mediated methods. It was found that the vacancy mediated diffusion which is associated with the fast diffusion of many other species in germanium exhibits a total barrier of 5.8 eV. Interstitial-mediated diffusion had a total barrier for migration of 3.4 eV in the neutral and singly negative charge states, 3.2 eV for the positive charge state, but a formation barrier of 4.1 eV. Thus the barrier for interstitial-mediated diffusion is dominated by the formation energy of the self-interstitial.  相似文献   
996.
Perceptual Temporal Quality Metric for Compressed Video   总被引:2,自引:0,他引:2  
This paper presents a metric to quantify frame loss according to the impact on perceived temporal quality. This metric particularly aims at measuring the temporal quality degradation caused by both regular and irregular frame loss. Experimental results with subjective viewing demonstrate high performance on prediction of perceptual temporal quality.  相似文献   
997.
The Magtalo prototype environment harnesses dialogue protocols to support flexible, intuitive interaction with data in complex, contentious domains and provides mechanisms for eliciting structured knowledge. Magtalo represents the first example of an implemented online system that uses a closely specified argument-based dialogue protocol combined with a rich language for representing monologic argument to provide a tool for intuitive user exploration of a disagreement space. This approach also enables the expansion of argument resources through knowledge elicitation, which is structured by the argument dialogue protocol. The continuing aim of our research is to use advances in argumentation theory to push the practice of argumentation technology in providing tools and interfaces that have wide appeal.  相似文献   
998.
999.
This paper discusses a new application of data mining, quantifying the importance of responding to trigger events with reactive contacts. Trigger events happen during a customer’s lifecycle and indicate some change in the relationship with the company. If detected early, the company can respond to the problem and retain the customer; otherwise the customer may switch to another company. It is usually easy to identify many potential trigger events. What is needed is a way of prioritizing which events demand interventions. We conceptualize the trigger event problem and show how survival analysis can be used to quantify the importance of addressing various trigger events. The method is illustrated on four real data sets from different industries and countries.  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号