首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11429篇
  免费   1018篇
  国内免费   592篇
电工技术   725篇
综合类   1043篇
化学工业   1785篇
金属工艺   631篇
机械仪表   676篇
建筑科学   915篇
矿业工程   339篇
能源动力   263篇
轻工业   1034篇
水利工程   257篇
石油天然气   736篇
武器工业   114篇
无线电   1267篇
一般工业技术   1055篇
冶金工业   562篇
原子能技术   114篇
自动化技术   1523篇
  2024年   41篇
  2023年   145篇
  2022年   286篇
  2021年   403篇
  2020年   324篇
  2019年   251篇
  2018年   301篇
  2017年   316篇
  2016年   302篇
  2015年   420篇
  2014年   600篇
  2013年   693篇
  2012年   814篇
  2011年   777篇
  2010年   800篇
  2009年   705篇
  2008年   824篇
  2007年   710篇
  2006年   757篇
  2005年   629篇
  2004年   431篇
  2003年   397篇
  2002年   384篇
  2001年   374篇
  2000年   288篇
  1999年   250篇
  1998年   152篇
  1997年   131篇
  1996年   112篇
  1995年   114篇
  1994年   67篇
  1993年   54篇
  1992年   43篇
  1991年   43篇
  1990年   19篇
  1989年   19篇
  1988年   20篇
  1987年   20篇
  1986年   6篇
  1985年   4篇
  1984年   1篇
  1983年   1篇
  1982年   6篇
  1981年   1篇
  1980年   1篇
  1975年   1篇
  1973年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
The information resources on the Web are diversified, the amount of which is increasing rapidly. Demands for selecting useful information from the Internet, managing personal contents, and sharing contents under control have risen. In this study, we propose the Ubiquitous Personal Study, a framework of personalized virtual study to support accessing, managing, organizing, sharing and recommending information. In this paper, we focus on discussing the framework, and design and implementation issues on how to implement it with Web 2.0 mash-up technology and Open Source Software.  相似文献   
62.
课程表的自动生成是大学课程表编排中最复杂的一个环节,是一个典型的时间规划问题。针对这一问题。本文设计了一种全新的使用改进的D_时刻表的设计方法,提出一套大学课程表白动生成方法。该方法是以文献[5]中介绍的有效解决时间规划问题的D_时刻表算法为基础,并通过试验说明了该方法具有一定的可行性和有效性。  相似文献   
63.
CCC has lower hardware complexity than hypercube and is suited for current VLSI technology.LC-permutations are a large set of important permutations frequently used in various parallel computations.Existing routing algorithms for CCC cannot realize LC-permutations without network conflict.We present an algorithm to realize LC-permutations on CCC.The algorithm consists of two periods of inter-cycle transmissions and one period of inner-cycle transmissions.In the inter-cycle transmissions the dimensional links of CCC are used in a “pipeline” manner and in the inner-cycle transmissions the data packets are sorted by a part of its destination address.The algorithm is fast (O(log2N)) and no conflict will occur.  相似文献   
64.
With the development of organic solar cells (OSCs), the high-performance and stable batch variance are becoming a new challenge for designing polymer donors. To obtain high photovoltaic performance, adopting polymers with high molecular weight as donors is an ordinary strategy. However, the high molecular weight need to subtly control the reaction time and state, inevitably caused batch-to-batch variations. Herein, a strategy of steric effect is applied to benzodifuran (BDF)-based polymer by introducing different positions of Cl atom, producing two polymers PBDFCl-1 and PBDFCl-2. The more twisted side chains conformation not only achieve the control of moderate molecular weight for PBDFCl-2, but also easily form molecular stacking through adopting BDF unit and maintain sufficient polymeric crystallinity. Due to the optimized stacking mode and good blend miscibility, PBDFCl-2-based device exhibitsa more elegant power conversion efficiency (PCE) of 17.00% compared to PBDFCl-1-based device. This is the highest efficiency record for BDF-based binary OSCs. Meanwhile, the PCE device variation of the different molecular weights for PBDFCl-2 is little, indicating the reduction of the batch variation. Therefore, smartly using steric effect of Cl atom in strong crystalline BDF unit can form efficient molecular stacking regulations and realize the coordination of high-performance and stable batch variance.  相似文献   
65.
Emerging soft ionotronics better match the human body mechanically and electrically compared to conventional rigid electronics. They hold great potential for human-machine interfaces, wearable and implantable devices, and soft machines. Among various ionotronic devices, ionic junctions play critical roles in rectifying currents as electrical p–n junctions. Existing ionic junctions, however, are limited in electrical and mechanical performance, and are difficult to fabricate and degrade. Herein, the design, fabrication, and characterization of tough transient ionic junctions fabricated via 3D ionic microgel printing is reported. The 3D printing method demonstrates excellent printability and allows one to fabricate ionic junctions of various configurations with high fidelity. By combining ionic microgels, degradable networks, and highly charged biopolymers, the ionic junctions feature high stretchability (stretch limit 27), high fracture energy (>1000 Jm−2), excellent electrical performance (current rectification ratio >100), and transient stability (degrade in 1 week). A variety of ionotronic devices, including ionic diodes, ionic bipolar junction transistors, ionic full-wave rectifiers, and ionic touchpads are further demonstrated. This study merges ionotronics, 3D printing, and degradable hydrogels, and will motivate the future development of high-performance transient ionotronics.  相似文献   
66.
This article focuses on designing sensor attacks to deteriorate the state estimation in cyber-physical systems. The scenario that the malicious attack signals can be injected into different but limited number of sensor communication channels is considered. The state estimation error variations and innovation variations are adopted to measure attack performance and attack stealthiness, respectively. A switching attack strategy is proposed, under which the estimation error variations are driven to the predesigned target value and the norm of innovation variations remains at a small level. The switching attack design problem is formulated as a discrete switched optimal control problem which can be solved by dynamic programming, while the computational burden is heavy. To overcome this difficulty, by using pruning technique to remove the redundant matrices generated in dynamic programming, the quadratic optimization problem becomes numerically tractable. In this way, the suboptimal attack signal sequence and switching sequence can be acquired. Finally, a simulation example is provided to illustrate the effectiveness of the proposed attack strategy.  相似文献   
67.
68.
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.  相似文献   
69.
为了满足基于PCI总线的高速数据采集卡中大批量数据存取使用需要,设计了一种工作在整页模式下的SDR SDRAM控制器;简单介绍了SDRAM工作原理,详细阐述了SDR SDRAM控制器模块的组成结构及其在整页模式下读写状态机实现方法;使用Al-tera公司的FPGA器件EP1C6Q240C8N,在QuartusⅡ6.0开发环境下进行仿真并应用于实验室自行研发的数据采集卡进行实验验证,通过DMA方式读取SDRAM中数据,PCI总线传输速率能达到85MB/s以上,实验结果证实了该控制器的实用性和正确性。  相似文献   
70.
分析高职网络技术基础课程的特点及教学中的问题,介绍该课程在我校的教改实践情况。探讨引入行业软件、建立虚拟仿真实训平台、采用行业认证与形成性考核相结合的学业评价等课改举措,以此激发学生的学习兴趣,提高课程教学质量。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号