首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3452篇
  免费   65篇
  国内免费   22篇
电工技术   29篇
综合类   6篇
化学工业   225篇
金属工艺   17篇
机械仪表   31篇
建筑科学   109篇
能源动力   103篇
轻工业   47篇
水利工程   6篇
石油天然气   1篇
武器工业   1篇
无线电   668篇
一般工业技术   310篇
冶金工业   1478篇
原子能技术   40篇
自动化技术   468篇
  2023年   6篇
  2022年   19篇
  2021年   27篇
  2020年   26篇
  2019年   23篇
  2018年   21篇
  2017年   24篇
  2016年   39篇
  2015年   30篇
  2014年   59篇
  2013年   119篇
  2012年   78篇
  2011年   116篇
  2010年   67篇
  2009年   99篇
  2008年   111篇
  2007年   128篇
  2006年   109篇
  2005年   84篇
  2004年   98篇
  2003年   84篇
  2002年   79篇
  2001年   60篇
  2000年   61篇
  1999年   94篇
  1998年   432篇
  1997年   300篇
  1996年   191篇
  1995年   108篇
  1994年   96篇
  1993年   104篇
  1992年   41篇
  1991年   56篇
  1990年   42篇
  1989年   62篇
  1988年   56篇
  1987年   34篇
  1986年   34篇
  1985年   42篇
  1984年   16篇
  1983年   12篇
  1982年   15篇
  1981年   14篇
  1980年   25篇
  1979年   12篇
  1978年   13篇
  1977年   46篇
  1976年   102篇
  1974年   8篇
  1973年   6篇
排序方式: 共有3539条查询结果,搜索用时 16 毫秒
91.
Nitrite inhalants are commonly abused substances in the US and Europe. "Nitrite inhalants and AIDS" was a popular topic in the early 1980s when the cause of AIDS was not known. With the discovery of HIV, concern about nitrite use wained. However, nitrite inhalant use is associated with behavioral relapse and HIV transmission among gay men, with decreased lymphocyte counts and natural killer cell activity in laboratory studies, and remains a candidate "cofactor" in the pathogenesis of AIDS-related Karposi sarcoma. Discouraging nitrite use continues to be a worthwhile public health goal. Participants recommend specific research efforts.  相似文献   
92.
The problem of recognizing offline handwritten Chinese characters has been investigated extensively. One difficulty is due to the existence of characters with very similar shapes. In this paper, we propose a “critical region analysis” technique which highlights the critical regions that distinguish one character from another similar character. The critical regions are identified automatically based on the output of the Fisher's discriminant. Additional features are extracted from these regions and contribute to the recognition process. By incorporating this technique into the character recognition system, a record high recognition rate of 99.53% on the ETL-9B database is obtained.  相似文献   
93.
We consider the problem of nonpreemptively scheduling a set of n jobs with equal processing times on m parallel machines so as to minimize the makespan. Each job has a prespecified set of machines on which it can be processed, called its eligible set. We consider the most general case of machine eligibility constraints as well as special cases of nested and inclusive eligible sets. Both online and offline models are considered. For offline problems we develop optimal algorithms that run in polynomial time, while for online problems we focus on the development of optimal algorithms of a new and more elaborate structure as well as approximation algorithms with good competitive ratios.  相似文献   
94.
Formal Concept Analysis of real set formal contexts is a generalization of classical formal contexts. By dividing the attributes into condition attributes and decision attributes, the notion of real decision formal contexts is introduced. Based on an implication mapping, problems of rule acquisition and attribute reduction of real decision formal contexts are examined. The extraction of “if–then” rules from the real decision formal contexts, and the approach to attribute reduction of the real decision formal contexts are discussed. By the proposed approach, attributes which are non-essential to the maximal s rules or l rules (to be defined later in the text) can be removed. Furthermore, discernibility matrices and discernibility functions for computing the attribute reducts of the real decision formal contexts are constructed to determine all attribute reducts of the real set formal contexts without affecting the results of the acquired maximal s rules or l rules.  相似文献   
95.
Data races hamper parallel programming and threaten the reliability of future software. This paper proposes the data race prevention scheme View-Oriented Data race Prevention (VODAP), which can prevent data races in the View-Oriented Parallel Programming (VOPP) model. VOPP is a novel shared-memory data-centric parallel programming model, which uses views to bundle mutual exclusion with data access. We have implemented the data race prevention scheme with a memory protection mechanism. Experimental results show that the extra overhead of memory protection is trivial in our applications. The performance is evaluated and compared with modern programming models such as OpenMP and Cilk.  相似文献   
96.
97.
Next generation heterogeneous wireless networks are expected to interwork with Internet Protocol (IP)-based infrastructures. Conventional network services operate like silos in that a specific set of services are offered over a specific type of access network. It is desirable for users to be able to roam between fixed and mobile networks that employ different access technologies. Therefore, mobility management with quality of service (QoS) support is of particular importance and one of the driving forces of convergence. Since service providers often provide more than one service to their subscribers, it is important to facilitate convergence of network charging architecture through a common charging framework. One of the main issues of IP-based convergence is security and privacy. This requires coordination of different security policies in diverse networks that have different security levels and capabilities. The business case for migration to an IP-based platform motivates operators to deliver more powerful services for customers as well as a better user experience. This paper provides an overview of converged mobile Internet architectures and their implications on QoS, charging/billing and security, as well as emerging business models for telecommunication services.  相似文献   
98.
Many researches have been devoted to select the kernel parameters, including the centers, kernel width and weights, for fault-free radial basis function (RBF) neural networks. However, most are concerned with the centers and weights identification, and fewer focus on the kernel width selection. Moreover, to our knowledge, almost no literature has proposed the effective and applied method to select the optimal kernel width for faulty RBF neural networks. As is known that the node faults inevitably take place in real applications, which results in a great many of faulty networks, it will take a lot of time to calculate the mean prediction error (MPE) for the traditional method, i.e., the test set method. Thus, the letter derives a formula to estimate the MPE of each candidate width value and then use it to select the optimal one with the lowest MPE value for faulty RBF neural networks with multi-node open fault. Simulation results show that the chosen optimal kernel width by our proposed MPE formula is very close to the actual one by the conventional method. Moreover, our proposed MPE formula outperforms other selection methods used for fault-free neural networks.  相似文献   
99.
Squeeze-film damping on microresonators is a significant damping source even when the surrounding gas is highly rarefied. This article presents a general modeling approach based on Monte Carlo (MC) simulations for the prediction of squeeze-film damping on resonators in the free-molecule regime. The generality of the approach is demonstrated in its capability of simulating resonators of any shape and with any accommodation coefficient. The approach is validated using both the analytical results of the free-space damping and the experimental data of the squeeze-film damping on a clamped–clamped plate resonator oscillating at its first flexure mode. The effect of oscillation modes on the quality factor of the resonator has also been studied and semi-analytical approximate models for the squeeze-film damping with diffuse collisions have been developed.  相似文献   
100.
Hou [Visual cryptography for color images, Pattern Recognition 36 (2003) 1619-1629] proposed a four-share visual cryptography scheme for color images. The scheme splits a dithered eight-color secret image into four shares: the black mask and other three shares. It was claimed that without knowing the black mask, no information about the secret image can be obtained even if all the other three shares are known. In this paper, we show that this may be true for a few specific two-color secret images only. In all other cases, however, security cannot be guaranteed. We show that an attacker can compromise a randomly chosen two-color secret image from any two of the other three shares with probability by completely recovering the shape and pattern of the secret image. The advantage will increase to if all the three shares are known. If the secret image has three or four colors, we show that the attacker can compromise it with probability and , respectively. Finally, we show that our technique can be extended to compromising secret images with more than four colors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号