首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9001篇
  免费   318篇
  国内免费   39篇
电工技术   121篇
综合类   22篇
化学工业   2104篇
金属工艺   168篇
机械仪表   230篇
建筑科学   573篇
矿业工程   31篇
能源动力   171篇
轻工业   772篇
水利工程   54篇
石油天然气   11篇
武器工业   1篇
无线电   591篇
一般工业技术   1444篇
冶金工业   1520篇
原子能技术   70篇
自动化技术   1475篇
  2023年   58篇
  2022年   122篇
  2021年   144篇
  2020年   106篇
  2019年   119篇
  2018年   168篇
  2017年   110篇
  2016年   191篇
  2015年   191篇
  2014年   250篇
  2013年   564篇
  2012年   397篇
  2011年   545篇
  2010年   410篇
  2009年   389篇
  2008年   432篇
  2007年   420篇
  2006年   363篇
  2005年   312篇
  2004年   291篇
  2003年   221篇
  2002年   227篇
  2001年   173篇
  2000年   165篇
  1999年   157篇
  1998年   258篇
  1997年   194篇
  1996年   159篇
  1995年   140篇
  1994年   122篇
  1993年   136篇
  1992年   130篇
  1991年   75篇
  1990年   92篇
  1989年   79篇
  1988年   94篇
  1987年   66篇
  1986年   54篇
  1985年   79篇
  1984年   94篇
  1983年   60篇
  1982年   66篇
  1981年   83篇
  1980年   68篇
  1979年   85篇
  1978年   68篇
  1977年   67篇
  1976年   56篇
  1975年   58篇
  1973年   47篇
排序方式: 共有9358条查询结果,搜索用时 15 毫秒
91.
We introduce a simple, linear time algorithm for recognizing trivially perfect (TP) graphs. It improves upon the algorithm of Yan et al. [J.-H. Yan, J.-J. Chen, G.J. Chang, Quasi-threshold graphs, Discrete Appl. Math. 69 (3) (1996) 247–255] in that it is certifying, producing a P4 or a C4 when the graph is not TP. In addition, our algorithm can be easily modified to recognize the complement of TP graphs (co-TP) in linear time as well. It is based on lexicographic BFS, and in particular the technique of partition refinement, which has been used in the recognition of many other graph classes [D.G. Corneil, Lexicographic breadth first search—a survey, in: WG 2004, in: Lecture Notes in Comput. Sci., vol. 3353, Springer, 2004, pp. 1–19].  相似文献   
92.
Evolutionary algorithms are randomized search heuristics, which are applied to problems whose structure is not well understood, as well as to problems in combinatorial optimization. They have successfully been applied to different kinds of arc routing problems. To start the analysis of evolutionary algorithms with respect to the expected optimization time on these problems, we consider the Eulerian cycle problem. We show that a variant of the well-known (1+1)(1+1) EA working on the important encoding of permutations is able to find an Eulerian tour of an Eulerian graph in expected polynomial time. Altering the operator used for mutation in the considered algorithm, the expected optimization time changes from polynomial to exponential.  相似文献   
93.
94.
Frank.C. 《微型计算机》2009,(12):140-143
“好小啊!”几乎所有人第一次看到NVIDIA离子平台的时候,都会发出这样的惊呼,然后人们会有三种反应,要反围观之后走开,要么打听哪里可以买到,而我们发烧级DLYer则会想:它为什么这么小,我们能自己搭建一台出来吗?为了实现打造超迷你平台客厅电脑的愿望,  相似文献   
95.
看着扫描仪的规格说明书,2400dpi×4800dpi的光学分辩率、19200dpi×19200dpi的插值分辩率并列写在上面;准备扫描资料,结果发现可以选择的分辨率从75dpi到2400dpi,项目似乎更多了。这些分辨率究竟是怎么回事呢?  相似文献   
96.
根据本刊2007年的年度调查结果显示,有高达70%的读者是有固定收入的上班族,其中信息传播、计算机服务和软件行业的读者比例达到18.47%、教育行业的读者有14.63%、制造业的读者达10.96%,国家机构和金融业的读者也有10%左右。他们一直希望在本刊看到更多关于商务产品、技术和解决方案的内容报道。而对于大多数企业来说,如何能用经济的成本买到最适合需要的办公设备也一直是个难题。  相似文献   
97.
A fast heuristic for quay crane scheduling with interference constraints   总被引:5,自引:0,他引:5  
This paper considers the problem of scheduling quay cranes which are used at sea port container terminals to load and unload containers. This problem is studied intensively in a recent stream of research but still lacks a correct treatment of crane interference constraints. We present a revised optimization model for the scheduling of quay cranes and propose a heuristic solution procedure. At its core a Branch-and-Bound algorithm is applied for searching a subset of above average quality schedules. The heuristic takes advantage from efficient criteria for branching and bounding the search with respect to the impact of crane interference. Although the used techniques are quite standard, the new heuristic produces much better solutions in considerably shorter run times than all algorithms known from the literature.  相似文献   
98.
Among the many 3D face matching techniques that have been developed, are variants of 3D facial curve matching, which reduce the amount of face data to one or a few 3D curves. The face’s central profile, for instance, proved to work well. However, the selection of the optimal set of 3D curves and the best way to match them has not been researched systematically. We propose a 3D face matching framework that allows profile and contour based face matching. Using this framework we evaluate profile and contour types including those described in the literature, and select subsets of facial curves for effective and efficient face matching. With a set of eight geodesic contours we achieve a mean average precision (MAP) of 0.70 and 92.5% recognition rate (RR) on the 3D face retrieval track of the Shape Retrieval Contest (SHREC’08), and a MAP of 0.96 and 97.6% RR on the University of Notre Dame (UND) test set. Face matching with these curves is time-efficient and performs better than other sets of facial curves and depth map comparison.  相似文献   
99.
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library.  相似文献   
100.
Multiple sclerosis is characterized by inflammatory demyelination and axonal loss as pathophysiological correlates of relapsing activity and progressive development of clinical disability. The molecular processes involved in this pathogenesis are still unclear as they are quite complex and heterogeneous. In this article we present protein expression analysis of brain and spinal cord tissues from different models of murine experimental autoimmune encephalomyelitis (EAE), the most commonly used animal model for multiple sclerosis. We observed a number of EAE-specific protein expression and PTM differences. Proteome analysis was extended to multiple sclerosis specimens in order to validate the EAE findings. Our findings suggest the regulation of a number of proteins that shed light on the molecular mechanisms of the disease processes taking place in EAE and multiple sclerosis. We found consistent modulation of proteins including serum amyloid P component, sirtuin 2, dihydropyrimidinase-related protein family proteins, stathmin 1, creatine kinase B and chloride intracellular channel protein 1. Functional classification of the proteins by database and the literature mining reveals their association with neuronal development and myelinogenesis, suggesting possible disease processes that mediate neurodegeneration.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号