首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   586410篇
  免费   8532篇
  国内免费   2067篇
电工技术   10598篇
综合类   527篇
化学工业   87434篇
金属工艺   19610篇
机械仪表   16611篇
建筑科学   16300篇
矿业工程   1275篇
能源动力   16244篇
轻工业   62039篇
水利工程   4656篇
石油天然气   3384篇
武器工业   16篇
无线电   76646篇
一般工业技术   106341篇
冶金工业   111591篇
原子能技术   7684篇
自动化技术   56053篇
  2021年   3971篇
  2020年   2858篇
  2019年   3626篇
  2018年   5629篇
  2017年   5710篇
  2016年   6207篇
  2015年   4931篇
  2014年   8252篇
  2013年   27703篇
  2012年   14705篇
  2011年   21240篇
  2010年   16361篇
  2009年   18622篇
  2008年   19839篇
  2007年   20161篇
  2006年   18320篇
  2005年   16868篇
  2004年   16312篇
  2003年   15985篇
  2002年   15257篇
  2001年   15594篇
  2000年   14323篇
  1999年   15329篇
  1998年   36200篇
  1997年   25917篇
  1996年   20011篇
  1995年   15504篇
  1994年   13696篇
  1993年   13321篇
  1992年   9726篇
  1991年   9259篇
  1990年   8747篇
  1989年   8379篇
  1988年   8088篇
  1987年   6709篇
  1986年   6558篇
  1985年   8082篇
  1984年   7476篇
  1983年   6627篇
  1982年   6100篇
  1981年   6168篇
  1980年   5746篇
  1979年   5457篇
  1978年   5066篇
  1977年   6153篇
  1976年   8130篇
  1975年   4267篇
  1974年   4046篇
  1973年   3970篇
  1972年   3123篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in literature. Some examples illustrate the proposed approach.  相似文献   
992.
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy.  相似文献   
993.
994.
Boron is observed to diffuse very slowly in germanium, as opposed to its behaviour in silicon where it exhibits Transient Enhanced Diffusion effects in implanted samples. As a result of this slow diffusion, boron is a very stable dopant, allowing devices to be created with very well-defined doping regions. To understand this superior performance, calculations were performed on a variety of boron diffusion paths, within vacancy and interstitial mediated methods. It was found that the vacancy mediated diffusion which is associated with the fast diffusion of many other species in germanium exhibits a total barrier of 5.8 eV. Interstitial-mediated diffusion had a total barrier for migration of 3.4 eV in the neutral and singly negative charge states, 3.2 eV for the positive charge state, but a formation barrier of 4.1 eV. Thus the barrier for interstitial-mediated diffusion is dominated by the formation energy of the self-interstitial.  相似文献   
995.
Perceptual Temporal Quality Metric for Compressed Video   总被引:2,自引:0,他引:2  
This paper presents a metric to quantify frame loss according to the impact on perceived temporal quality. This metric particularly aims at measuring the temporal quality degradation caused by both regular and irregular frame loss. Experimental results with subjective viewing demonstrate high performance on prediction of perceptual temporal quality.  相似文献   
996.
Pervasive computing is as much about the user as it is about the technology. So, the Fifth International Conference on Pervasive Computing emphasized desirability rather than just feasibility. Featured themes included user benefits, human-computer interaction, group and social interactions, context awareness, finding and positioning people and objects, and personal privacy.  相似文献   
997.
Unicode is rapidly becoming the preferred means for representing symbols used in creating multimedia content, especially for information that's presented in multiple languages. This article discusses a unicode vulnerability that makes such content susceptible to being used for creation of covert channel communications. We also developed a solution architecture, the unified secure message augmentation (USMA) service. The USMA service incorporates rules (in an XML vocabulary) that we can apply to unicode transmissions that will detect an attempt to transmit a potential exploit, alert network managers to the presence of the unicode anomaly, and take action to mitigate the exploit.  相似文献   
998.
The Magtalo prototype environment harnesses dialogue protocols to support flexible, intuitive interaction with data in complex, contentious domains and provides mechanisms for eliciting structured knowledge. Magtalo represents the first example of an implemented online system that uses a closely specified argument-based dialogue protocol combined with a rich language for representing monologic argument to provide a tool for intuitive user exploration of a disagreement space. This approach also enables the expansion of argument resources through knowledge elicitation, which is structured by the argument dialogue protocol. The continuing aim of our research is to use advances in argumentation theory to push the practice of argumentation technology in providing tools and interfaces that have wide appeal.  相似文献   
999.
1000.
This paper discusses a new application of data mining, quantifying the importance of responding to trigger events with reactive contacts. Trigger events happen during a customer’s lifecycle and indicate some change in the relationship with the company. If detected early, the company can respond to the problem and retain the customer; otherwise the customer may switch to another company. It is usually easy to identify many potential trigger events. What is needed is a way of prioritizing which events demand interventions. We conceptualize the trigger event problem and show how survival analysis can be used to quantify the importance of addressing various trigger events. The method is illustrated on four real data sets from different industries and countries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号