首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   362057篇
  免费   8460篇
  国内免费   3510篇
电工技术   7553篇
综合类   5182篇
化学工业   52397篇
金属工艺   14593篇
机械仪表   12033篇
建筑科学   11247篇
矿业工程   1977篇
能源动力   9224篇
轻工业   35240篇
水利工程   4077篇
石油天然气   3335篇
武器工业   468篇
无线电   45747篇
一般工业技术   64791篇
冶金工业   49771篇
原子能技术   4122篇
自动化技术   52270篇
  2022年   2551篇
  2021年   3865篇
  2020年   2785篇
  2019年   2804篇
  2018年   17713篇
  2017年   16758篇
  2016年   13530篇
  2015年   4370篇
  2014年   5713篇
  2013年   14178篇
  2012年   12109篇
  2011年   21136篇
  2010年   17601篇
  2009年   15788篇
  2008年   17326篇
  2007年   18004篇
  2006年   9800篇
  2005年   9823篇
  2004年   9129篇
  2003年   8885篇
  2002年   7856篇
  2001年   7762篇
  2000年   6858篇
  1999年   7117篇
  1998年   16551篇
  1997年   11488篇
  1996年   8709篇
  1995年   6617篇
  1994年   5775篇
  1993年   5617篇
  1992年   4025篇
  1991年   3821篇
  1990年   3562篇
  1989年   3385篇
  1988年   3291篇
  1987年   2599篇
  1986年   2501篇
  1985年   3159篇
  1984年   2800篇
  1983年   2561篇
  1982年   2347篇
  1981年   2393篇
  1980年   2213篇
  1979年   2054篇
  1978年   1879篇
  1977年   2176篇
  1976年   2724篇
  1975年   1584篇
  1974年   1490篇
  1973年   1558篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
81.
82.
83.
This paper presents and analyzes in detail an efficient search method based on evolutionary algorithms (EA) assisted by local Gaussian random field metamodels (GRFM). It is created for the use in optimization problems with one (or many) computationally expensive evaluation function(s). The role of GRFM is to predict objective function values for new candidate solutions by exploiting information recorded during previous evaluations. Moreover, GRFM are able to provide estimates of the confidence of their predictions. Predictions and their confidence intervals predicted by GRFM are used by the metamodel assisted EA. It selects the promising members in each generation and carries out exact, costly evaluations only for them. The extensive use of the uncertainty information of predictions for screening the candidate solutions makes it possible to significantly reduce the computational cost of singleand multiobjective EA. This is adequately demonstrated in this paper by means of mathematical test cases and a multipoint airfoil design in aerodynamics.  相似文献   
84.
Critical systems are aptly named - from electric power to water and gas to the telephone system and the Internet, they're all critical to some aspect of our daily lives. We're a networked society and as such, it's important to both know whether critical systems are trustworthy and be able to communicate, review, and debate the level of trust achieved in them. In the safety domain, explicit safety cases are increasingly required by law, regulations, and standards. In this article, we outline what a small, international group of experts, spanning various disciplines in safety, security, reliability, and critical infrastructure, been doing with the International Working Group on Assurance Cases (for Security), what we hope to achieve, and where we go next.  相似文献   
85.
In this letter, a concise process technology is proposed for the first time to enable the fabrication of good quality three-dimensional (3-D) suspended radio frequency (RF) micro-inductors on bulk silicon, without utilizing the lithography process on sidewall and trench-bottom patterning. Samples were fabricated to demonstrate the applicability of the proposed process technology.  相似文献   
86.
87.
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.  相似文献   
88.
89.
90.
This paper describes a sequential tripping strategy used in a wide area back-up protection expert system (BPES) to combat situations in which protection relays have maloperated or information is missing. The BPES is an innovative back-up protection scheme designed to prevent the occurrence of widespread blackouts. The BPES evaluates the certainty that transmission lines are likely to be affected by the fault and uses a sequential tripping strategy to isolate the fault if a firm decision is not available due to maloperated relays and/or missing information. The mode of analysis and the sequential tripping strategy ensures that the BPES will clear a fault at minimum risk to the network. An example is included to demonstrate how the certainty factor based sequential tripping strategy is employed by the BPES to clear a fault which occurred on the South Western part of the UK National Grid System  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号