首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   44279篇
  免费   3926篇
  国内免费   2015篇
电工技术   2483篇
技术理论   2篇
综合类   2501篇
化学工业   7718篇
金属工艺   2609篇
机械仪表   2937篇
建筑科学   3023篇
矿业工程   1296篇
能源动力   1285篇
轻工业   2870篇
水利工程   647篇
石油天然气   2478篇
武器工业   337篇
无线电   5406篇
一般工业技术   5995篇
冶金工业   2480篇
原子能技术   492篇
自动化技术   5661篇
  2024年   245篇
  2023年   883篇
  2022年   1519篇
  2021年   2180篇
  2020年   1577篇
  2019年   1471篇
  2018年   1524篇
  2017年   1553篇
  2016年   1460篇
  2015年   1900篇
  2014年   2263篇
  2013年   2704篇
  2012年   2785篇
  2011年   3163篇
  2010年   2482篇
  2009年   2445篇
  2008年   2461篇
  2007年   2187篇
  2006年   2293篇
  2005年   1837篇
  2004年   1332篇
  2003年   1199篇
  2002年   1126篇
  2001年   981篇
  2000年   948篇
  1999年   996篇
  1998年   835篇
  1997年   713篇
  1996年   631篇
  1995年   526篇
  1994年   408篇
  1993年   277篇
  1992年   228篇
  1991年   205篇
  1990年   169篇
  1989年   155篇
  1988年   101篇
  1987年   88篇
  1986年   57篇
  1985年   51篇
  1984年   37篇
  1983年   37篇
  1982年   29篇
  1981年   23篇
  1980年   26篇
  1979年   17篇
  1978年   15篇
  1976年   18篇
  1975年   10篇
  1973年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
With today’s global digital environment, the Internet is readily accessible anytime from everywhere, so does the digital image manipulation software; thus, digital data is easy to be tampered without notice. Under this circumstance, integrity verification has become an important issue in the digital world. The aim of this paper is to present an in-depth review and analysis on the methods of detecting image tampering. We introduce the notion of content-based image authentication and the features required to design an effective authentication scheme. We review major algorithms and frequently used security mechanisms found in the open literature. We also analyze and discuss the performance trade-offs and related security issues among existing technologies.  相似文献   
92.
93.
94.
面向攻击图构建的网络连通性分析   总被引:1,自引:0,他引:1       下载免费PDF全文
针对目前网络攻击图构建系统的需求,设计网络连通性分析算法。通过对网络拓扑及防火墙规则进行离线分析,可以判断网络中由若干台过滤设备分隔的任意2台主机间的连通性。引入关键实体集的概念,结合经典的Apriori算法提出一种快速有效的获取关键实体集的方法。分析对比表明,关键实体集可以在连通性分析过程中为网络中各节点的重要性评估提供有力依据。  相似文献   
95.
Surrogate models are used to dramatically improve the design efficiency of numerical aerodynamic shape optimization, where high-fidelity, expensive computational fluid dynamics (CFD) is often employed. Traditionally, in adaptation, only one single sample point is chosen to update the surrogate model during each updating cycle, after the initial surrogate model is built. To enable the selection of multiple new samples at each updating cycle, a few parallel infilling strategies have been developed in recent years, in order to reduce the optimization wall clock time. In this article, an alternative parallel infilling strategy for surrogate-based constrained optimization is presented and demonstrated by the aerodynamic shape optimization of transonic wings. Different from existing methods in which multiple sample points are chosen by a single infill criterion, this article uses a combination of multiple infill criteria, with each criterion choosing a different sample point. Constrained drag minimizations of the ONERA-M6 and DLR-F4 wings are exercised to demonstrate the proposed method, including low-dimensional (6 design variables) and higher-dimensional problems (up to 48 design variables). The results show that, for surrogate-based optimization of transonic wings, the proposed method is more effective than the existing parallel infilling strategies, when the number of initial sample points are in the range from N v to 8N v (N v here denotes the number of design variables). Each case is repeated 50 times to eliminate the effect of randomness in our results.  相似文献   
96.
Impact of the discrete dopants on device performance is crucial in determining the behavior of nanoscale semiconductor devices. Atomistic quantum mechanical device simulation for studying the effect of discrete dopants on device's physical quantities is urgent. This work explores the physics of discrete-dopant-induced characteristic fluctuations in 16-nm fin-typed field effect transistor (FinFET) devices. Discrete dopants are statistically positioned in the three-dimensional channel region to examine associated carrier's characteristic, concurrently capturing “dopant concentration variation” and “dopant position fluctuation”. An experimentally validated quantum hydrodynamic device simulation was conducted to investigate the potential profile and threshold voltage fluctuations of the 16-nm FinFET. Results of this study provide further insight into the problem of fluctuation and the mechanism of immunity against fluctuation in 16-nm devices.  相似文献   
97.
This paper analyzes the execution behavior of “No Random Accesses” (NRA) and determines the depths to which each sorted file is scanned in growing phase and shrinking phase of NRA respectively. The analysis shows that NRA needs to maintain a large quantity of candidate tuples in growing phase on massive data. Based on the analysis, this paper proposes a novel top-k algorithm Top-K with Early Pruning (TKEP) which performs early pruning in growing phase. General rule and mathematical analysis for early pruning are presented in this paper. The theoretical analysis shows that early pruning can prune most of the candidate tuples. Although TKEP is an approximate method to obtain the top-k result, the probability for correctness is extremely high. Extensive experiments show that TKEP has a significant advantage over NRA.  相似文献   
98.
99.
Implementation and maintenance of interorganizational systems (IOS) require investments by all the participating firms. Compared with intraorganizational systems, however, there are additional uncertainties and risks. This is because the benefits of IOS investment depend not only on a firm’s own decisions, but also on those of its business partners. Without appropriate levels of investment by all the firms participating in an IOS, they cannot reap the full benefits. Drawing upon the literature in institutional economics, we examine IOS ownership as a means to induce value-maximizing noncontractible investments. We model the impact of two factors derived from the theory of incomplete contracts and transaction cost economics: relative importance of investments and specificity of investments. We apply the model to a vendor-managed inventory system (VMI) in a supply chain setting. We show that when the specificity of investments is high, this is a more critical determinant of optimal ownership structure than the relative importance of investments. As technologies used in IOS become increasingly redeployable and reusable, and less specific, the relative importance of investments becomes a dominant factor. We also show that the bargaining mechanism—or the agreed upon approach to splitting the incremental payoffs—that is used affects the relationship between these factors in determining the optimal ownership structure of an IOS.
Barrie R. NaultEmail:
  相似文献   
100.
Li KW  Yu RF  Han XL 《Applied ergonomics》2007,38(3):259-265
A study on combined manual materials-handling tasks performed on floors under three friction levels was conducted. Eight male subjects participated in the study. The maximum acceptable weight of handling, including lifting, carrying for 3m, lowering, and walking 3m back at twice per minute was determined. The subject then performed the same tasks for 10 min. Heart rate, Vo2, energy efficiency, perceived sense of slip, and rating of perceived exertion for whole body strain were measured. The results showed that the effects of friction level on the maximum acceptable weights of handling, perceived sense of slip, Vo2, and energy efficiency were statistically significant (p相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号