首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   97853篇
  免费   6917篇
  国内免费   6102篇
电工技术   6781篇
技术理论   6篇
综合类   9241篇
化学工业   12371篇
金属工艺   8887篇
机械仪表   5714篇
建筑科学   6776篇
矿业工程   2452篇
能源动力   2651篇
轻工业   6021篇
水利工程   1938篇
石油天然气   7568篇
武器工业   808篇
无线电   11149篇
一般工业技术   10075篇
冶金工业   3723篇
原子能技术   2317篇
自动化技术   12394篇
  2025年   282篇
  2024年   1734篇
  2023年   1624篇
  2022年   2111篇
  2021年   2939篇
  2020年   2314篇
  2019年   1947篇
  2018年   1890篇
  2017年   2131篇
  2016年   1933篇
  2015年   2498篇
  2014年   3288篇
  2013年   3837篇
  2012年   4313篇
  2011年   7933篇
  2010年   5478篇
  2009年   4433篇
  2008年   4593篇
  2007年   4187篇
  2006年   4402篇
  2005年   4046篇
  2004年   6213篇
  2003年   4427篇
  2002年   4488篇
  2001年   3369篇
  2000年   2514篇
  1999年   3331篇
  1998年   2354篇
  1997年   2247篇
  1996年   1599篇
  1995年   1343篇
  1994年   1107篇
  1993年   2343篇
  1992年   1889篇
  1991年   1331篇
  1990年   1182篇
  1989年   934篇
  1988年   660篇
  1987年   382篇
  1986年   268篇
  1985年   178篇
  1984年   119篇
  1983年   72篇
  1982年   74篇
  1981年   50篇
  1980年   92篇
  1979年   67篇
  1965年   59篇
  1958年   28篇
  1957年   34篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
In many applications, such as intelligent decision systems, there are usually random perturbations caused by the constant changing of real situations, thus the analysis of the robustness with respect to random perturbations is practically important. In the side of fuzzy methods, a corresponding problem arises: will a small random perturbation of fuzzy input cause a big variance of fuzzy output? This paper study the robustness of fuzzy schemes in environments with random perturbations. It focuses on fuzzy algebraic operators, and proposes two methods to analyze their robustness in environments with random perturbations. The effectiveness and features of the methods are shown by simulations.  相似文献   
62.
63.
With the rapid development of network technologies and deteriorating of network environment, traditional single-net security system cannot satisfy the security requirement. The excellent security performance of biological systems impels the bio-inspired network security theory to be a hot research area currently. Based on Bio-inspired Multidimensional Network Security Model we have put forward, we have advanced Bio-inspired Multi-Net Security system by implementing the functional distribution of different subnets of different transient states in Multi-Net Paralleling structure. Firstly, parameter estimation and modified algorithms of Hidden Markov Model are introduced to construct the mathematical mode of B-MNS; secondly, the integrated performance of our modified B-MNS has been tested and its simulation has been carried out. So the feasibility, validity and high efficiency of our model have been demonstrated theoretically, and practically.  相似文献   
64.
“Emergency medicine” is the front line of medical service a hospital provides; also it is the department people seek medical care from immediately after an emergency happens. The statistics by the Department of Health, Executive Yuan, indicate that over years, the number of people at the emergency department has been increasing. The US has introduced and practiced the triage system in the emergency medicine in 1960, whereby to aid the emergency department in allocating the patients, to give them appropriate medical care by the fast decision of the nurses and doctors in case of the patients’ seriousness through their judgment.This study takes on the knowledge contained in the massive data of unknown characteristics in the triage database at a Taiwanese regional hospital, using the cluster analysis and the rough set theory as tools for data mining to extract, with the analysis software ROSE2 (Rough Sets Data Explorer) and through rule induction technique, the imprecise, uncertain and vague information of rules from the massive database, and builds the model that is capable of simplifying massive data while maintaining the accuracy in classifying rules. After analyzing and evaluating the knowledge obtained from relevant mining in the hospitals past medical data for the consumption of emergency medical resources, this thesis proposes suggestions as reference for the hospitals in subsequent elevation of medical quality and decrease in operative costs.  相似文献   
65.
66.
67.
This paper addresses the food distribution decision from a wholesaler's perspective, as the wholesalers are often faced with thorny issues such as when, where, how to deliver products at the lowest costs to best satisfy the retailers’ changing needs. This research relies on a distribution problem encountered at Northern Grocery Company in Beijing as an example to develop a two-stage solution procedure and subsequent computer-enabled programs for identifying efficient vehicle routing alternatives. The solution process, which integrates heuristic search algorithms and an integer programming model, can be applied to a wide range of distribution problems with specified route durations and a circular transportation network structure as exemplified by City of Beijing.  相似文献   
68.
69.
Multimedia Tools and Applications - In this paper, we propose a novel low dimensional chaotic map, namely, compounded piecewise linear map (CPLM) in order to balance between security and...  相似文献   
70.
Reachability is one of the most important behavioral properties of Petri nets. We propose in this paper a novel approach for solving the fundamental equation in the reachability analysis of acyclic Petri nets, which has been known to be NP-complete. More specifically, by adopting a revised version of the cell enumeration method for an arrangement of hyperplanes in discrete geometry, we develop an efficient solution scheme to identify firing count vector solution(s) to the fundamental equation on a bounded integer set, with a complexity bound of O((nu)nm), where n is the number of transitions, m is the number of places and u is the upper bound of the number of firings for all individual transitions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号