首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   67354篇
  免费   6442篇
  国内免费   3405篇
电工技术   4228篇
技术理论   2篇
综合类   4518篇
化学工业   10288篇
金属工艺   3808篇
机械仪表   4458篇
建筑科学   5441篇
矿业工程   1885篇
能源动力   1789篇
轻工业   4551篇
水利工程   1412篇
石油天然气   3138篇
武器工业   622篇
无线电   9071篇
一般工业技术   7776篇
冶金工业   3816篇
原子能技术   750篇
自动化技术   9648篇
  2024年   298篇
  2023年   1184篇
  2022年   2284篇
  2021年   3028篇
  2020年   2293篇
  2019年   1826篇
  2018年   1936篇
  2017年   2287篇
  2016年   2077篇
  2015年   2965篇
  2014年   3629篇
  2013年   4457篇
  2012年   4696篇
  2011年   5208篇
  2010年   4513篇
  2009年   4460篇
  2008年   4396篇
  2007年   3915篇
  2006年   3608篇
  2005年   2910篇
  2004年   1911篇
  2003年   1573篇
  2002年   1434篇
  2001年   1328篇
  2000年   1145篇
  1999年   1158篇
  1998年   1266篇
  1997年   929篇
  1996年   829篇
  1995年   734篇
  1994年   553篇
  1993年   483篇
  1992年   316篇
  1991年   278篇
  1990年   199篇
  1989年   166篇
  1988年   144篇
  1987年   99篇
  1986年   92篇
  1985年   93篇
  1984年   52篇
  1983年   52篇
  1982年   62篇
  1981年   51篇
  1980年   50篇
  1979年   36篇
  1977年   26篇
  1976年   48篇
  1975年   19篇
  1973年   20篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Multichannel security protocols transmit messages over multiple communication channels, taking into account each channel's security properties. Our first intentional use of these protocols goes back to a 1999 article that proposed physical contact for imprinting as opposed to the wireless channel used in subsequent operations. Only later did we understand three key points. First, explicit use of multiple channels in the same protocol can offer significant advantages for both security and usability. Second, explicitly stating the properties of the channel on which each protocol message is transmitted is useful for understanding one's own protocol in greater depth and therefore for addressing subtle vulnerabilities early on. Third, multichannel protocols existed long before we recognized them as such - think of the courier handcuffed to the briefcase carrying the code book that will later protect postal or telegraphic traffic. The paper presents a security protocol that exploit additional transmissions over lower-capacity channels, typically found in ubicomp environments, that offer a different combination of security properties.  相似文献   
62.
63.
Analysis and synthesis of on-chip spiral inductors   总被引:3,自引:0,他引:3  
This paper presents a physically based compact model for estimating high-frequency performance of spiral inductors. The model accurately accounts for skin and proximity effects in the metal conductors as well as eddy current losses in the substrate. The model shows excellent agreement with measured data mostly within 10% across a variety of inductor geometries and substrate dopings up to 20 GHz. A web-based spiral inductor synthesis and analysis tool COILS, which makes use of the compact models, is presented. An optimization algorithm using binary searches speeds up the synthesis of inductor designs.  相似文献   
64.
An active set truncated-Newton algorithm (ASTNA) is proposed to solve the large-scale bound constrained sub-problems. The global convergence of the algorithm is obtained and two groups of numerical experiments are made for the various large-scale problems of varying size. The comparison results between ASTNA and the subspace limited memory quasi-Newton algorithm and between the modified augmented Lagrange multiplier methods combined with ASTNA and the modified barrier function method show the stability and effectiveness of ASTNA for simultaneous optimization of distillation column.  相似文献   
65.
本文给出了作者开发的一个单处理机实时多任务操作系统的响应性能(响应时间,同步时间)的实验结果和/或估算。与国外同期文献发表的数据相比,指标先进。  相似文献   
66.
Performance model of interactive video-on-demand systems   总被引:5,自引:0,他引:5  
An interactive video-on-demand (VoD) system allows users to access video services, such as movies, electronic encyclopedia, interactive games, and educational videos from video servers on a broadband network. This paper develops a performance evaluation tool for the system design. In particular, a user activity model is developed to describe the usage of system resources, i.e., network bandwidth and video server usage, by a user as it interacts with the service. In addition, we allow batching of user requests, and the effect of such batching is captured in a batching model. Our proposed queueing model integrates both the user activity and the batching model. This model can be used to determine the requirements of network bandwidth and video server and, hence, the trade-off in communication and storage costs for different system resource configurations  相似文献   
67.
68.
本文从无线电引信相对杀伤比率出发,引伸出引信被干扰率及抗干扰率的定义及计算公式。  相似文献   
69.
A genetic algorithm for multiple molecular sequence alignment   总被引:1,自引:0,他引:1  
MOTIVATION: Multiple molecular sequence alignment is among the most important and most challenging tasks in computational biology. The currently used alignment techniques are characterized by great computational complexity, which prevents their wider use. This research is aimed at developing a new technique for efficient multiple sequence alignment. APPROACH: The new method is based on genetic algorithms. Genetic algorithms are stochastic approaches for efficient and robust searching. By converting biomolecular sequence alignment into a problem of searching for optimal or near-optimal points in an 'alignment space', a genetic algorithm can be used to find good alignments very efficiently. RESULTS: Experiments on real data sets have shown that the average computing time of this technique may be two or three orders lower than that of a technique based on pairwise dynamic programming, while the alignment qualities are very similar. AVAILABILITY: A C program on UNIX has been written to implement the technique. It is available on request from the authors.  相似文献   
70.
本文介绍了广播发射台利用计算机技术、网络技术、遥控遥测技术、现代测试手段,对设备进行自动化控制与管理;实现设备技术指标自动测试,发射台无人值班、有人留守,建立机器的计算机档案制度,确保安全优质播出的方法和经验。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号