首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24682篇
  免费   2008篇
  国内免费   898篇
电工技术   1195篇
技术理论   5篇
综合类   1376篇
化学工业   4470篇
金属工艺   1645篇
机械仪表   1470篇
建筑科学   1852篇
矿业工程   701篇
能源动力   830篇
轻工业   1655篇
水利工程   397篇
石油天然气   1693篇
武器工业   158篇
无线电   2483篇
一般工业技术   3070篇
冶金工业   1388篇
原子能技术   258篇
自动化技术   2942篇
  2024年   125篇
  2023年   498篇
  2022年   766篇
  2021年   1053篇
  2020年   864篇
  2019年   712篇
  2018年   828篇
  2017年   859篇
  2016年   730篇
  2015年   990篇
  2014年   1181篇
  2013年   1591篇
  2012年   1533篇
  2011年   1616篇
  2010年   1425篇
  2009年   1346篇
  2008年   1286篇
  2007年   1247篇
  2006年   1307篇
  2005年   1139篇
  2004年   702篇
  2003年   645篇
  2002年   602篇
  2001年   472篇
  2000年   545篇
  1999年   655篇
  1998年   556篇
  1997年   412篇
  1996年   398篇
  1995年   338篇
  1994年   280篇
  1993年   194篇
  1992年   156篇
  1991年   108篇
  1990年   88篇
  1989年   49篇
  1988年   66篇
  1987年   42篇
  1986年   30篇
  1985年   32篇
  1984年   28篇
  1983年   16篇
  1982年   13篇
  1981年   9篇
  1980年   13篇
  1979年   9篇
  1978年   4篇
  1974年   3篇
  1959年   2篇
  1958年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results.  相似文献   
102.
用有限状态图来识别系统入侵   总被引:8,自引:1,他引:7  
文章首先对系统入侵的状态转换进行了研究,通过使用有限状态图的分析方法,分析识别了常见黑客攻击的特征,包括ROOT用户攻击、TCPSYNFLOODING、IP分片攻击等等;最后根据对系统入侵的状态转换图的研究和对攻击特征的分析设计了一个入侵检测系统。  相似文献   
103.
Three-dimensional quantitative structure-activity relationship (3D-QSAR) models were developed using comparative molecular field analysis (CoMFA) and comparative molecular similarity analysis (CoMSIA) on a series of agonists of thyroid hormone receptor beta (TRbeta), which may lead to safe therapies for non-thyroid disorders while avoiding the cardiac side effects. The reasonable q(2) (cross-validated) values 0.600 and 0.616 and non-cross-validated r(2) values of 0.974 and 0.974 were obtained for CoMFA and CoMSIA models for the training set compounds, respectively. The predictive ability of two models was validated using a test set of 12 molecules which gave predictive correlation coefficients (r(pred)(2)) of 0.688 and 0.674, respectively. The Lamarckian Genetic Algorithm (LGA) of AutoDock 4.0 was employed to explore the binding mode of the compound at the active site of TRbeta. The results not only lead to a better understanding of interactions between these agonists and the thyroid hormone receptor beta but also can provide us some useful information about the influence of structures on the activity which will be very useful for designing some new agonist with desired activity.  相似文献   
104.
The filtering problem for continuous‐time linear systems with unknown parameters is considered. A new suboptimal filter is herein proposed. It is based on the optimal mean‐square linear combination of the local Kalman filters. In contrast to the optimal weights, the suboptimal weights do not depend on current observations; thus, the proposed filter can easily be implemented in real‐time. Examples demonstrate high accuracy and efficiency of the suboptimal filter. Copyright © 2008 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
105.
106.
In this paper, we extend the binary Gray code to symbolic Gray code. We then show that this symbolic Gray code can be used as a multikey hashing function for storing symbolic records. The record stored at location k and the record stored at location k + 1 will be nearest neighbors if this hashing function is used. Thus, this symbolic Gray code hashing function exhibits some kind of clustering property which will group similar records together. This property is a desirable property for designing nearest neighbor searching (also called best match searching) systems. There are many other interesting properties of this hashing function. For instance, there exists an address-to-key transformation which can be used to determine the record stored at certain location k if this hashing function is used. Besides, if there are totally M records, we only have to reserve exactly M locations; there are no collisions and wasting of memory storage. At the end of this paper, it is shown that the resulting file exhibits the multiple-attribute tree structure.  相似文献   
107.
This paper presents a novel divide-and-integrate strategy based approach for solving large scale job-shop scheduling problems. The proposed approach works in three phases. First, in contrast to traditional job-shop scheduling approaches where optimization algorithms are used directly regardless of problem size, priority rules are deployed to decrease problem scale. These priority rules are developed with slack due dates and mean processing time of jobs. Thereafter, immune algorithm is applied to solve each small individual scheduling module. In last phase, integration scheme is employed to amalgamate the small modules to get gross schedule with minimum makespan. This integration is carried out in dynamic fashion by continuously checking the preceding module's machine ideal time and feasible slots (satisfying all the constraint). In this way, the proposed approach will increase the machine utilization and decrease the makespan of gross schedule. Efficacy of the proposed approach has been tested with extremely hard standard test instances of job-shop scheduling problems. Implementation results clearly show effectiveness of the proposed approach.  相似文献   
108.
The purpose is to perform a sharp analysis of the Lavrentiev method applied to the regularization of the ill-posed Cauchy problem, set in the Steklov-Poincaré variational framework. Global approximation results have been stated earlier that demonstrate that the Lavrentiev procedure yields a convergent strategy. However, no convergence rates are available unless a source condition is assumed on the exact Cauchy solution. We pursue here bounds on the approximation (bias) and the noise propagation (variance) errors away from the incomplete boundary where instabilities are located. The investigation relies on a Carleman inequality that enables enhanced local convergence rates for both bias and variance errors without any particular smoothness assumption on the exact solution. These improved results allows a new insight on the behavior of the Lavrentiev solution, look similar to those established for the Quasi-Reversibility method in [Inverse Problems 25, 035005, 2009]. There is a case for saying that this sort of ??super-convergence?? is rather inherent to the nature of the Cauchy problem and any reasonable regularization procedure would enjoy the same locally super-convergent behavior.  相似文献   
109.
Hyperspectral band selection aims at the determination of an optimal subset of spectral bands for dimensionality reduction without loss of discriminability. Many conventional band selection approaches depend on the concept of “statistical distance” measure between the probability distributions characterizing sample classes. However, the maximization of separability does not necessarily guarantee that a classification process results in the best classification accuracies. This paper presents a multidimensional local spatial autocorrelation (MLSA) measure that quantifies the spatial autocorrelation of the hyperspectral image data. Based on the proposed spatial measure, a collaborative band selection strategy is developed that combines both spectral separability measure and spatial homogeneity measure for hyperspectral band selection without losing the spectral details useful in classification processes. The selected band subset by the proposed method shows both larger separability between classes and stronger spatial similarity within class. Case studies in biomedical and remote sensing applications demonstrate that the MLSA-based band selection approach improves object classification accuracies in hyperspectral imaging compared with conventional approaches.  相似文献   
110.
Case learning for CBR-based collision avoidance systems   总被引:1,自引:1,他引:0  
With the rapid development of case-based reasoning (CBR) techniques, CBR has been widely applied to real-world applications such as collision avoidance systems. A successful CBR-based system relies on a high-quality case base, and a case creation technique for generating such a case base is highly required. In this paper, we propose an automated case learning method for CBR-based collision avoidance systems. Building on techniques from CBR and natural language processing, we developed a methodology for learning cases from maritime affair records. After giving an overview on the developed systems, we present the methodology and the experiments conducted in case creation and case evaluation. The experimental results demonstrated the usefulness and applicability of the case learning approach for generating cases from the historic maritime affair records.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号