首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   159087篇
  免费   18064篇
  国内免费   12841篇
电工技术   14580篇
技术理论   2篇
综合类   16397篇
化学工业   19506篇
金属工艺   10835篇
机械仪表   11271篇
建筑科学   12433篇
矿业工程   5617篇
能源动力   4291篇
轻工业   15917篇
水利工程   5329篇
石油天然气   5840篇
武器工业   2242篇
无线电   18191篇
一般工业技术   13848篇
冶金工业   6377篇
原子能技术   2412篇
自动化技术   24904篇
  2024年   886篇
  2023年   2454篇
  2022年   5571篇
  2021年   7169篇
  2020年   5234篇
  2019年   3860篇
  2018年   4332篇
  2017年   4880篇
  2016年   4421篇
  2015年   6791篇
  2014年   8672篇
  2013年   10042篇
  2012年   12339篇
  2011年   13117篇
  2010年   12463篇
  2009年   12020篇
  2008年   12180篇
  2007年   11841篇
  2006年   10763篇
  2005年   8726篇
  2004年   6766篇
  2003年   5181篇
  2002年   5751篇
  2001年   4946篇
  2000年   3373篇
  1999年   1809篇
  1998年   869篇
  1997年   698篇
  1996年   559篇
  1995年   460篇
  1994年   408篇
  1993年   289篇
  1992年   213篇
  1991年   182篇
  1990年   133篇
  1989年   130篇
  1988年   71篇
  1987年   68篇
  1986年   52篇
  1985年   22篇
  1984年   23篇
  1983年   16篇
  1982年   15篇
  1981年   30篇
  1980年   34篇
  1979年   28篇
  1977年   12篇
  1976年   24篇
  1959年   30篇
  1951年   30篇
排序方式: 共有10000条查询结果,搜索用时 3 毫秒
91.
高职学院经过合并升格后,既面临机遇也面临挑战,全面整合高职学院的各种资源,需要厘清整合的涵义和特征,把握整合的内容,从精神引领、利益调整、文化整合等途径探寻有效的整合之道。  相似文献   
92.
为了检测网络融合边界的电信拒绝服务攻击,首先针对攻击的类型分别提出了基于呼叫统计或流量信号分析的检测方法,并采用分步骤的策略设计了检测系统,将两种检测算法分别应用于粗检测步骤,再通过精检测步骤确认攻击并找出攻击源.模拟实验结果表明,该方案能够有效地检测出典型的攻击,并能够实时在线检测,具有良好的实用价值,为应对网络融合所带来的新安全问题提供了一种解决方案.  相似文献   
93.
企业价值链价值分配的优化研究   总被引:1,自引:0,他引:1  
为研究价值链中各企业间价值合理分配的问题,在明确企业价值链中各参与者关系的基础上,从价值分析和成本分析入手,针对价值链中各参与者的不同行为模式,对企业价值链的稳定性问题和价值链调整的合理性问题进行了分析,并给出了价值链稳定性及调整合理性的判定公式和相应经济学解释.阐述了在价值贞献和价值分配之间产生偏差的原因和几种情况,依据博弈论原理建立了价值链价值分配议价模型,模型分析表明存在唯一的子博弈完美均衡,最终可以得到一个均衡策略.研究结果为合理构建和调整企业价值链提供了理论依据.  相似文献   
94.
Temperature control curve is the key to achieving temperature control and crack prevention of high concrete dam during construction,and its rationality depends on the accurate measurement of temperature stress.With the simulation testing machine for the temperature stress,in the present study,we carried out the deformation process tests of concrete under three temperature curves:convex,straight and concave.Besides,we not only measured the early-age elastic modulus,creep parameters and stress process,but also proposed the preferred type.The results show that at early age,higher temperature always leads to greater elastic modulus and smaller creep.However,the traditional indoor experiments have underestimated the elastic modulus and creep development at early age,which makes the calculated value of temperature stress too small,thus increasing the cracking risk.In this study,the stress values of the three curves calculated based on the strain and early-age parameters are in good agreement with the temperature stress measured by the temperature stress testing machine,which verifies the method accuracy.When the temperature changes along the concave curve,the law of stress development is in consistent with that of strength.Under this condition,the stress fluctuation is small and the crack prevention safety of the concave type is higher,so the concave type is better.The test results provide a reliable basis and support for temperature control curve design and optimization of concrete dams.  相似文献   
95.
回顾了无线传感网络技术的发展历史,对无线传感网络的结构和关键技术进行详细阐述;综述了无线传感网络技术在环境监测中的研究及应用现状,对该技术的发展方向和趋势作一展望.  相似文献   
96.
Xia  Bin  Bai  Yuxuan  Yin  Junjie  Li  Yun  Xu  Jian 《Information Systems Frontiers》2021,23(2):285-298
Information Systems Frontiers - System logs that trace system states and record valuable events comprise a significant component of any computer system in our daily life. Each log contains...  相似文献   
97.
Jia  Wei  Gao  Jian  Xia  Wei  Zhao  Yang  Min  Hai  Lu  Jing-Ting 《国际自动化与计算杂志》2021,18(1):18-44

Palmprint recognition and palm vein recognition are two emerging biometrics technologies. In the past two decades, many traditional methods have been proposed for palmprint recognition and palm vein recognition, and have achieved impressive results. However, the research on deep learning-based palmprint recognition and palm vein recognition is still very preliminary. In this paper, in order to investigate the problem of deep learning based 2D and 3D palmprint recognition and palm vein recognition in-depth, we conduct performance evaluation of seventeen representative and classic convolutional neural networks (CNNs) on one 3D palmprint database, five 2D palmprint databases and two palm vein databases. A lot of experiments have been carried out in the conditions of different network structures, different learning rates, and different numbers of network layers. We have also conducted experiments on both separate data mode and mixed data mode. Experimental results show that these classic CNNs can achieve promising recognition results, and the recognition performance of recently proposed CNNs is better. Particularly, among classic CNNs, one of the recently proposed classic CNNs, i.e., EfficientNet achieves the best recognition accuracy. However, the recognition performance of classic CNNs is still slightly worse than that of some traditional recognition methods.

  相似文献   
98.
International Journal of Control, Automation and Systems - An underwater gliding snake-like robot (UGSR) combines the advantages of an underwater glider (UG) and an underwater snake-like robot...  相似文献   
99.
Modern database systems desperate for the ability to support highly scalable transactions and efficient queries simultaneously for real-time applications. One solution is to utilize query optimization techniques on the on-line transaction processing (OLTP) systems. The materialized view is considered as a panacea to decrease query latency. However, it also involves the significant cost of maintenance which trades away transaction performance. In this paper, we examine the design space and conclude several design features for the implementation of a view on a distributed log-structured merge-tree (LSMtree), which is a well-known structure for improving data write performance. As a result, we develop two incremental view maintenance (IVM) approaches on LSM-tree. One avoids join computation in view maintenance transactions. Another with two optimizations is proposed to decouple the view maintenance with the transaction process. Under the asynchronous update, we also provide consistency queries for views. Experiments on TPC-H benchmark show our methods achieve better performance than straightforward methods on different workloads.  相似文献   
100.
A sequent is a pair (Γ, Δ), which is true under an assignment if either some formula in Γ is false, or some formula in Δ is true. In L3-valued propositional logic, a multisequent is a triple Δ|Θ|Γ, which is true under an assignment if either some formula in Δ has truth-value t, or some formula in Θ has truth-value m, or some formula in Γ has truth-value f. Correspondingly there is a sound and complete Gentzen deduction system G for multisequents which is monotonic. Dually, a comultisequent is a triple Δ : Θ : Γ, which is valid if there is an assignment v in which each formula in Δ has truth-value≠t, each formula in Θ has truth-value≠m, and each formula in Γ has truth-value≠f. Correspondingly there is a sound and complete Gentzen deduction system G for co-multisequents which is nonmonotonic.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号