首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19030篇
  免费   518篇
  国内免费   17篇
电工技术   227篇
综合类   14篇
化学工业   2631篇
金属工艺   230篇
机械仪表   343篇
建筑科学   919篇
矿业工程   42篇
能源动力   464篇
轻工业   1981篇
水利工程   267篇
石油天然气   28篇
无线电   1729篇
一般工业技术   2421篇
冶金工业   5419篇
原子能技术   142篇
自动化技术   2708篇
  2023年   69篇
  2022年   118篇
  2021年   269篇
  2020年   144篇
  2019年   206篇
  2018年   278篇
  2017年   257篇
  2016年   285篇
  2015年   263篇
  2014年   402篇
  2013年   680篇
  2012年   703篇
  2011年   939篇
  2010年   655篇
  2009年   680篇
  2008年   718篇
  2007年   695篇
  2006年   580篇
  2005年   566篇
  2004年   520篇
  2003年   473篇
  2002年   439篇
  2001年   351篇
  2000年   324篇
  1999年   445篇
  1998年   1942篇
  1997年   1183篇
  1996年   796篇
  1995年   487篇
  1994年   468篇
  1993年   462篇
  1992年   205篇
  1991年   201篇
  1990年   194篇
  1989年   192篇
  1988年   195篇
  1987年   129篇
  1986年   131篇
  1985年   181篇
  1984年   140篇
  1983年   98篇
  1982年   107篇
  1981年   111篇
  1980年   85篇
  1979年   92篇
  1978年   79篇
  1977年   133篇
  1976年   147篇
  1975年   76篇
  1974年   71篇
排序方式: 共有10000条查询结果,搜索用时 171 毫秒
991.
An experimental study of flow-induced failure of cable-tied blocks is presented. The particular failure mechanism studied is overturning and rolling up of the leading edge of a cable-tied block mat. Individual blocks were investigated also. The block size, flow depth, and block (mat) protrusion above the surrounding bed were systematically varied. The results are presented in terms of the critical dimensionless shear stress θc for block (mat) failure. A relationship between θc, block size and block protrusion, and flow depth is given.  相似文献   
992.
Many studies have found smokers' quit history to correlate with quitting smoking, but little is known about the psychological processes explaining this relationship. This study uses the integrative model of behavioral prediction to examine how quit history affects quit intention. Data from 3,428 Dutch smokers demonstrate that quit history affects (a) beliefs about quitting and (b) the degree to which self-efficacy predicts quit intention. It seems that a relatively unsuccessful history of prior quit attempts reduces self-efficacy over quitting and strengthens the relationship of self-efficacy with the intention to quit. The results are used to call for more process-oriented research in order to advance our understanding of the relationship between quit history and quit intention. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
993.
Current analytic solutions to the execution time distribution of a parallel composition of tasks having stochastic execution times are computationally complex, except for a limited number of distributions. In this paper, we present an analytical solution based on approximating execution time distributions in terms of the first four statistical moments. This low-cost approach allows the parallel execution time distribution to be approximated at ultra-low solution complexity for a wide range of execution time distributions. The accuracy of our method is experimentally evaluated for synthetic distributions as well as for task execution time distributions found in real parallel programs and kernels (NAS-EP, SSSP, APSP, Splash2-Barnes, PSRS, and WATOR). Our experiments show that the prediction error of the mean value of the parallel execution time for N-ary parallel composition is in the order of percents, provided the task execution time distributions are sufficiently independent and unimodal.  相似文献   
994.
Cones and foci: A mechanical framework for protocol verification   总被引:1,自引:0,他引:1  
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between data objects. Compared to the original cones and foci method from Groote and Springintveld, our method is more generally applicable, because it does not require a preprocessing step to eliminate τ-loops. We prove soundness of our approach and present a set of rules to prove the reachability of focus points. Our method has been formalized and proved correct using PVS. Thus we have established a framework for mechanical protocol verification. We apply this framework to the Concurrent Alternating Bit Protocol.
  相似文献   
995.
In this paper, methods for improved parametric coding of transients are presented. We propose a signal model for coding of transients consisting of a sum of sinusoids each being amplitude-modulated by a different gamma envelope. These envelopes are characterized by an onset time, an attack and a decay parameter. An efficient method for estimating these parameters is presented. Further, methods are proposed that combine this transient model with a constant-amplitude sinusoidal model in order to achieve efficient coding of both stationary and transient signal parts. By rate-distortion optimization using a perceptual distortion measure, we combine variable rate bit allocation and segmentation in an optimal way. Formal, as well as informal, listening tests show that significant improvements can be achieved with the proposed model as compared to a state-of-the-art sinusoidal coder by the combination of optimal segmentation and amplitude modulated sinusoidal audio coding.  相似文献   
996.
As organizations flesh out their enterprise software security framework (ESSF), they quickly spot an overwhelming gap between their current state of practice and their eventual goals for building secure applications. To address this gap, the application security group must bring ESSF plans to other parts of the organization: corporate, engineering, business, training, and IT groups, to name a few. Such socialization helps organizational participants understand their role in framework adoption and roll out, and it should cover what tools people will need, how they'll interact with each other, and what levels of effort they can expect to put forth  相似文献   
997.
998.
Geometric constraints are at the heart of parametric and feature-based CAD systems. Changing values of geometric constraint parameters is one of the most common operations in such systems. However, because allowable parameter values are not known to the user beforehand, this is often a trial-and-error process. We present an approach for automatically determining the allowable range for parameters of geometric constraints. Considered are systems of distance and angle constraints on points in 3D that can be decomposed into triangular and tetrahedral subproblems, by which most practical situations in parametric and feature-based CAD systems can be represented. Our method uses the decomposition to find critical parameter values for which subproblems degenerate. By solving one problem instance for each interval between two subsequent critical values, the exact parameter range is determined for which a solution exists.  相似文献   
999.
Either from a control theoretic viewpoint or from an analysis viewpoint it is necessary to convert smooth systems to discrete systems, which can then be implemented on computers for numerical simulations. Discrete models can be obtained either by discretizing a smooth model, or by directly modeling at the discrete level itself. One of the goals of this paper is to model port-Hamiltonian systems at the discrete level. We also show that the dynamics of the discrete models we obtain exactly correspond to the dynamics obtained via a usual discretization procedure. In this sense we offer an alternative to the usual procedure of modeling (at the smooth level) and discretization.  相似文献   
1000.
This work examines two methods for evolving dimensionally correct equations on the basis of data. It is demonstrated that the use of units of measurement aids in evolving equations that are amenable to interpretation by domain specialists. One method uses a strong typing approach that implements a declarative bias towards correct equations, the other method uses a coercion mechanism in order to implement a preferential bias towards the same objective. Four experiments using real-world, unsolved scientific problems were performed in order to examine the differences between the approaches and to judge the worth of the induction methods.Not only does the coercion approach perform significantly better on two out of the four problems when compared to the strongly typed approach, but it also regularizes the expressions it induces, resulting in a more reliable search process.A trade-off between type correctness and ability to solve the problem is identified. Due to the preferential bias implemented in the coercion approach, this trade-off does not lead to sub-optimal performance. No evidence is found that the reduction of the search space achieved through declarative bias helps in finding better solutions faster. In fact, for the class of scientific discovery problems the opposite seems to be the case.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号