首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13579篇
  免费   975篇
  国内免费   110篇
电工技术   206篇
综合类   61篇
化学工业   3535篇
金属工艺   346篇
机械仪表   490篇
建筑科学   515篇
矿业工程   21篇
能源动力   951篇
轻工业   1281篇
水利工程   188篇
石油天然气   224篇
武器工业   4篇
无线电   1396篇
一般工业技术   2535篇
冶金工业   497篇
原子能技术   97篇
自动化技术   2317篇
  2024年   70篇
  2023年   268篇
  2022年   589篇
  2021年   891篇
  2020年   752篇
  2019年   814篇
  2018年   911篇
  2017年   828篇
  2016年   809篇
  2015年   475篇
  2014年   750篇
  2013年   1370篇
  2012年   904篇
  2011年   951篇
  2010年   666篇
  2009年   597篇
  2008年   422篇
  2007年   358篇
  2006年   303篇
  2005年   194篇
  2004年   177篇
  2003年   152篇
  2002年   119篇
  2001年   91篇
  2000年   90篇
  1999年   82篇
  1998年   142篇
  1997年   115篇
  1996年   97篇
  1995年   68篇
  1994年   51篇
  1993年   61篇
  1992年   46篇
  1991年   38篇
  1990年   40篇
  1989年   32篇
  1988年   25篇
  1987年   24篇
  1986年   34篇
  1985年   27篇
  1984年   27篇
  1983年   25篇
  1982年   21篇
  1981年   19篇
  1980年   19篇
  1979年   16篇
  1978年   18篇
  1977年   18篇
  1976年   24篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
This paper presents a novel hybrid optimization approach based on teaching–learning based optimization (TLBO) algorithm and Taguchi’s method. The purpose of the present research is to develop a new optimization approach to solve optimization problems in the manufacturing area. This research is the first application of the TLBO to the optimization of turning operations in the literature The proposed hybrid approach is applied to two case studies for multi-pass turning operations to show its effectiveness in machining operations. The results obtained by the proposed approach for the case studies are compared with those of particle swarm optimization algorithm, hybrid genetic algorithm, scatter search algorithm, genetic algorithm and integration of simulated annealing, and Hooke–Jeeves patter search.  相似文献   
942.
In the present study, wear properties of A356 unreinforced alloy and composites with different vol.% of boron carbide particles were investigated. It is noted that composites exhibit better wear resistance compared to unreinforced alloy. According to the differences in wear rates of the composites, two separate wear rate were identified as low and high wear rate regimes. A combination of artificial neural network (ANN) and finite element technique (FEM) was implemented in order to predict the composites wear behavior. The FEM method is used for discretization and to calculate the transient temperature field of quenching. It is observed that predictions of ANN are consistent with experimental measurements for A356 composite and considerable savings in terms of cost and time could be obtained by using neural network model.  相似文献   
943.
944.
945.
Tunnels are increasingly being excavated in soft ground conditions when services are required in urban environments, and it is now common to have tunnels crossing at various elevations. As the tunnel excavations are undertaken at different levels, there will be an interaction which can have a significant influence on stress distributions and consequently deformations within the tunnels and surface settlement. As multi-layer tunnelling is a three dimensional phenomenon in nature, 3D numerical solutions must be utilized for perpendicularly crossing tunnels at various levels. This paper reports the investigations into the changes in stress distribution, deformations and surface settlements which may be expected when the twin Tohid Tunnels pass beneath the Line 4 metro tunnel in Tehran.  相似文献   
946.
Temporal fluctuations of the speckle pattern formed upon backscattering of a laser beam from an interface between gold and nonlinear polymer film have been observed as a function of optical power. The instability can be explained by coupling of laser light to surface plasmons and other guided modes, which experience multiple scattering while propagating in the film along the interface. The speckle pattern produced in this process is extremely sensitive to fluctuations of the scattering potential near the interface.  相似文献   
947.
An unprecedented growth in computer and communication systems in the last two decades has resulted in a proportional increase in the number and sophistication of network attacks. In particular, the number of previously-unseen attacks has increased exponentially in the last few years. Due to the rapidly evolving nature of network attacks, a considerable paradigm shift has taken place in the intrusion detection community. The main focus is now on Network Anomaly Detection Systems (NADSs) which model and flag deviations from normal/benign behavior of a network and can hence detect previously-unseen attacks. Contemporary NADS borrow concepts from a variety of theoretical fields (e.g., Information theory, stochastic and machine learning, signal processing, etc.) to model benign behavior. These NADSs, however, fall short of achieving acceptable performance levels as therefore widespread commercial deployments. Thus, in this paper, we firstly evaluate the performance of eight prominent network-based anomaly detectors under malicious portscan attacks to identify which NADSs perform better than others and why. These NADSs are evaluated on three criteria: accuracy (ROC curves), scalability (with respect to varying normal and attack traffic rates, and deployment points) and detection delay. These criteria are evaluated using two independently collected datasets with complementary strengths. We then propose novel methods and promising guidelines to improve the accuracy and scalability of existing and future anomaly detectors. Experimental analysis of the proposed guidelines is also presented for the proof of concept.  相似文献   
948.
In this paper, an adaptive control scheme, based on fuzzy logic systems, for pH control is addressed. For implementation of the proposed scheme no composition measurement is required. Stability of the closed-loop system is established and it is shown that the solution of the closed-loop system is uniformly ultimately bounded and under a certain condition, asymptotical stability is achieved. Effectiveness of the proposed controller is tested through simulation and experimental studies. Results indicate that the proposed controller has good performances in set-point tracking and load rejection and much better than that of a tuned PI controller.  相似文献   
949.
Murat  Ali  Wei  Bradley   《Data & Knowledge Engineering》2009,68(11):1206
Organizations, such as federally-funded medical research centers, must share de-identified data on their consumers to publicly accessible repositories to adhere to regulatory requirements. Many repositories are managed by third-parties and it is often unknown if records received from disparate organizations correspond to the same individual. Failure to resolve this issue can lead to biased (e.g., double counting of identical records) and underpowered (e.g., unlinked records of different data types) investigations. In this paper, we present a secure multiparty computation protocol that enables record joins via consumers’ encrypted identifiers. Our solution is more practical than prior secure join models in that data holders need to interact with the third party one time per data submission. Though technically feasible, the speed of the basic protocol scales quadratically with the number of records. Thus, we introduce an extended version of our protocol in which data holders append k-anonymous features of their consumers to their encrypted submissions. These features facilitate a more efficient join computation, while providing a formal guarantee that each record is linkable to no less than k individuals in the union of all organizations’ consumers. Beyond a theoretical treatment of the problem, we provide an extensive experimental investigation with data derived from the US Census to illustrate the significant gains in efficiency such an approach can achieve.  相似文献   
950.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号