首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5166篇
  免费   132篇
  国内免费   46篇
电工技术   93篇
综合类   5篇
化学工业   997篇
金属工艺   122篇
机械仪表   199篇
建筑科学   97篇
矿业工程   2篇
能源动力   194篇
轻工业   239篇
水利工程   27篇
石油天然气   7篇
无线电   915篇
一般工业技术   919篇
冶金工业   564篇
原子能技术   25篇
自动化技术   939篇
  2024年   9篇
  2023年   31篇
  2022年   113篇
  2021年   109篇
  2020年   35篇
  2019年   56篇
  2018年   67篇
  2017年   76篇
  2016年   103篇
  2015年   103篇
  2014年   177篇
  2013年   378篇
  2012年   276篇
  2011年   325篇
  2010年   235篇
  2009年   270篇
  2008年   273篇
  2007年   244篇
  2006年   230篇
  2005年   199篇
  2004年   164篇
  2003年   158篇
  2002年   126篇
  2001年   116篇
  2000年   90篇
  1999年   101篇
  1998年   250篇
  1997年   152篇
  1996年   114篇
  1995年   72篇
  1994年   96篇
  1993年   61篇
  1992年   45篇
  1991年   54篇
  1990年   36篇
  1989年   45篇
  1988年   53篇
  1987年   39篇
  1986年   33篇
  1985年   24篇
  1984年   28篇
  1983年   24篇
  1982年   11篇
  1981年   16篇
  1980年   15篇
  1979年   9篇
  1978年   12篇
  1977年   18篇
  1976年   34篇
  1974年   7篇
排序方式: 共有5344条查询结果,搜索用时 0 毫秒
61.
The supplier–buyer coordination is an important policy in the supply chain management. The buyer in the two-echelon inventory system with regular selling season has to face the uncertainty of customer demand, supplier’s delivery time and variable price change. At the same time, the supplier has to consider the inventory holding and delay cost. The objective of this study is to develop an integrated supply chain strategy for products with short lifecycle and variable selling price to entice cooperation. The strategy must provide a win–win situation for both the supplier and the buyer. A numerical case example, sensitivity analysis and compensation mechanism are given to illustrate the model.  相似文献   
62.
Design of BOM configuration for reducing spare parts logistic costs   总被引:1,自引:0,他引:1  
This paper proposes an approach to reduce the total operational cost of a spare part logistic system by appropriately designing the BOM (bill of material) configuration. A spare part may have several vendors. Parts supplied by different vendors may vary in failure rates and prices – the higher the failure rate, the lower the price. Selecting vendors for spare parts is therefore a trade-off decision. Consider a machine where the BOM is composed of s critical parts and each part has k vendors. The number of possible BOM configurations for the machine is then ks. For each BOM configuration, we can use OPUS10 (proprietary software) to calculate an optimum inventory policy and its associated total logistic cost. Exhaustively searching the solution space by OPUS10 can yield an optimal BOM configuration; however, it may be formidably time-consuming. To remedy the time-consuming problem, this research proposes a GA-neural network approach to solve the BOM configuration design problem. A neural network is developed to efficiently emulate the function of OPUS10 and a GA (genetic algorithm) is developed to quickly find a near-optimal BOM configuration. Experiment results indicate that the approach can obtain an effective BOM configuration efficiently.  相似文献   
63.
This correspondence presents a novel hierarchical clustering approach for knowledge document self-organization, particularly for patent analysis. Current keyword-based methodologies for document content management tend to be inconsistent and ineffective when partial meanings of the technical content are used for cluster analysis. Thus, a new methodology to automatically interpret and cluster knowledge documents using an ontology schema is presented. Moreover, a fuzzy logic control approach is used to match suitable document cluster(s) for given patents based on their derived ontological semantic webs. Finally, three case studies are used to test the approach. The first test case analyzed and clustered 100 patents for chemical and mechanical polishing retrieved from the World Intellectual Property Organization (WIPO). The second test case analyzed and clustered 100 patent news articles retrieved from online Web sites. The third case analyzed and clustered 100 patents for radio-frequency identification retrieved from WIPO. The results show that the fuzzy ontology-based document clustering approach outperforms the K-means approach in precision, recall, F-measure, and Shannon's entropy.  相似文献   
64.
Previous NMR microimaging studies at 360 MHz have demonstrated a clear differentiation between the nucleus and cytoplasm in isolated single neurons. In particular, theT 2 of the cell nucleus is 2.5 times larger than that of the cytoplasm. In order to determine the magnitude of possibleT 2 * influences on these observations, images of single cells have been obtained at 500 MHz using spin-echo and line-narrowing sequences. Comparison of the images acquired by the two sequences, and of the spin-echo images at 360 and 500 MHz, imply that anyT 2 * contributions are relatively small. Consequently, the measuredT 2 differences in spin-echo imaging represent a true difference in theT 2 relaxation in the two cellular compartments.  相似文献   
65.
66.
Huang SL  Kao FJ  Hsieh HS  Hsu CS 《Applied optics》1998,37(12):2397-2401
We demonstrate that two cross-polarized longitudinal modes can have 50% higher conversion efficiency than two parallel-polarized longitudinal modes in a diode-laser-pumped and intracavity frequency-doubled Nd:YVO(4) laser when operated under periodic pulse oscillation. Through simulations of the rate equations for primary frequency intensities and gains, we also verify that this effect can be attributed to gain competition and complementary conversion coefficient between second-harmonic and sum-frequency generations.  相似文献   
67.
Hsu JC  Lee CC 《Applied optics》1998,37(7):1171-1176
The optical properties and the surface morphologies of single-ion-beam sputtering (SIBS) and dual-ion-beam sputtering (DIBS) depositions of titanium oxide films are investigated and compared. In the DIBS process, the ion-assisted deposition by the voltage of a low ion beam ranged from 50 to 300 V at a 0% and 44% oxygen percentage. Cosputtering with materials of Si, SiO(2) (fused silica), and Al is also utilized in SIBS to improve amorphous-structure film. For the low-absorption and surface-roughness film, the optimum deposition condition of DIBS and postdeposition baking temperature for SIBS and DIBS are essential to the process.  相似文献   
68.
Fault-tolerant broadcasting and secure message distribution are important issues for numerous applications in networks. It is a common idea to design multiple spanning trees with a specific property in the underlying graph of a network to serve as a broadcasting scheme or a distribution protocol for receiving high levels of fault-tolerance and of security. A set of spanning trees in a graph is said to be edge-disjoint if these trees are rooted at the same node without sharing any common edge. Hsieh and Tu [S.-Y. Hsieh, C.-J. Tu, Constructing edge-disjoint spanning trees in locally twisted cubes, Theoretical Computer Science 410 (2009) 926-932] recently presented an algorithm for constructing n edge-disjoint spanning trees in an n-dimensional locally twisted cube. In this paper, we prove that indeed all spanning trees constructed by their algorithm are independent, i.e., any two spanning trees are rooted at the same node, say r, and for any other node vr, the two different paths from v to r, one path in each tree, are internally node-disjoint.  相似文献   
69.
Recognizing human faces in various lighting conditions is quite a difficult problem. The problem becomes more difficult when face images are taken in extremely high dynamic range scenes. Most of the automatic face recognition systems assume that images are taken under well-controlled illumination. The face segmentation as well as recognition becomes much simpler under such a constrained condition. However, illumination control is not feasible when a surveillance system is installed in any location at will. Without compensating for uneven illumination, it is impossible to get a satisfactory recognition rate. In this paper, we propose an integrated system that first compensates uneven illumination through local contrast enhancement. Then the enhanced images are fed into a robust face recognition system which adaptively selects the most important features among all candidate features and performs classification by support vector machines (SVMs). The dimension of feature space as well as the selected types of features is customized for each hyperplane. Three face image databases, namely Yale, Yale Group B, and Extended Yale Group B, are used to evaluate performance. The experimental result shows that the proposed recognition system give superior results compared to recently published literatures.  相似文献   
70.
Digital Rights Management (DRM) of videos is an important issue nowadays. Considering that H.264/AVC videos will be widely used in various applications, we propose a practical design, which combines the methodologies of selective encryption and fingerprinting, for effective DRM of H.264/AVC streaming videos. A selective encryption scheme is first presented to scramble the video content by encrypting a small amount of data in the compressed bit-stream. The scrambled video is H.264-compliant to reduce the complexity of decoder since it can still be played without triggering errors in the decoding process. A fingerprinting scheme is then introduced to provide further protection. We extract a reasonable amount of data from the video and embed the watermark acting as the fingerprint of the video recipient. To acquire the high-quality video for viewing, the user has to decrypt the video obtained from a video server and then combine it with the watermarked data provided from a user information server. The resulting viewable video is thus fingerprinted to deter the user from illegally redistributing the content. Experimental results will demonstrate the feasibility of the proposed approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号