首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13661篇
  免费   852篇
  国内免费   110篇
电工技术   205篇
综合类   61篇
化学工业   3535篇
金属工艺   347篇
机械仪表   493篇
建筑科学   515篇
矿业工程   21篇
能源动力   952篇
轻工业   1276篇
水利工程   188篇
石油天然气   224篇
武器工业   4篇
无线电   1378篇
一般工业技术   2528篇
冶金工业   490篇
原子能技术   95篇
自动化技术   2311篇
  2024年   70篇
  2023年   268篇
  2022年   587篇
  2021年   892篇
  2020年   751篇
  2019年   812篇
  2018年   911篇
  2017年   828篇
  2016年   807篇
  2015年   474篇
  2014年   748篇
  2013年   1367篇
  2012年   903篇
  2011年   948篇
  2010年   664篇
  2009年   595篇
  2008年   419篇
  2007年   355篇
  2006年   302篇
  2005年   192篇
  2004年   174篇
  2003年   152篇
  2002年   119篇
  2001年   91篇
  2000年   90篇
  1999年   81篇
  1998年   137篇
  1997年   114篇
  1996年   96篇
  1995年   69篇
  1994年   51篇
  1993年   59篇
  1992年   46篇
  1991年   38篇
  1990年   40篇
  1989年   32篇
  1988年   25篇
  1987年   24篇
  1986年   34篇
  1985年   27篇
  1984年   27篇
  1983年   25篇
  1982年   21篇
  1981年   19篇
  1980年   19篇
  1979年   16篇
  1978年   18篇
  1977年   18篇
  1976年   24篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Inertial microfluidics for continuous particle filtration and extraction   总被引:3,自引:2,他引:1  
In this paper, we describe a simple passive microfluidic device with rectangular microchannel geometry for continuous particle filtration. The design takes advantage of preferential migration of particles in rectangular microchannels based on shear-induced inertial lift forces. These dominant inertial forces cause particles to move laterally and occupy equilibrium positions along the longer vertical microchannel walls. Using this principle, we demonstrate extraction of 590 nm particles from a mixture of 1.9 μm and 590 nm particles in a straight microfluidic channel with rectangular cross-section. Based on the theoretical analysis and experimental data, we describe conditions required for predicting the onset of particle equilibration in square and rectangular microchannels. The microfluidic channel design has a simple planar structure and can be easily integrated with on-chip microfluidic components for filtration and extraction of wide range of particle sizes. The ability to continuously and differentially equilibrate particles of different size without external forces in microchannels is expected to have numerous applications in filtration, cytometry, and bioseparations.  相似文献   
82.
Neural Computing and Applications - Feature selection (FS) is one of the basic data preprocessing steps in data mining and machine learning. It is used to reduce feature size and increase model...  相似文献   
83.
The Journal of Supercomputing - On the battlefield, early detection of armored vehicles can have a positive effect. Because according to this issue, timely and appropriate reactions can be done....  相似文献   
84.
Owing to constant changes in user needs, new technologies have been introduced to keep pace by building sustainable applications. Researchers and practitioners are keen to understand the factors that create an attractive user interface. Although the use of cross-platform applications and services is increasing, limited research has examined and evaluated cross-platforms for developing mobile applications for different operating systems. This study evaluates cross-platform features, identifying the main factors that help to create an attractive user adaptation when building sustainable applications for both Android and iOS. Flutter and React Native were selected so end-users could test their features using the cross-platform usability assessment model. Usability, satisfaction, and navigation were tested to measure the cross-platform adaptation and end-user experience. The data were analyzed using hybrid structural equation modeling (SEM) and artificial neural network (ANN) approaches. The study results show that usability and navigation both have a positive effect on adaptation on Flutter and React Native, while satisfaction only has an effect on Flutter. The navigation variable was also the most significant predictor of adaptation for both models. This study has several implications and makes contributions to the research field, to developers, and to end-users.  相似文献   
85.
The Journal of Supercomputing - Fast execution of functions is an inevitable challenge in the serverless computing landscape. Inefficient dispatching, fluctuations in invocation rates, burstiness...  相似文献   
86.
Dome structures provide cost-effective solutions for covering large areas without intermediate supports. In this article, simple procedures are developed to reach the configuration of the geodesic domes. A new definition of dome optimization problems is given which consists of finding optimal sections for elements (size optimization), optimal height for the crown (geometry optimization) and the optimum number of elements (topology optimization) under determined loading conditions. In order to find the optimum design, the recently developed meta-heuristic algorithm, known as the Charged System Search (CSS), is applied to the optimum design of geodesic domes. The CSS takes into account the nonlinear response of the domes. Using CSS, the optimum design of the geodesic domes is efficiently performed.  相似文献   
87.
Detection of rapidly evolving malware requires classification techniques that can effectively and efficiently detect zero-day attacks. Such detection is based on a robust model of benign behavior and deviations from that model are used to detect malicious behavior. In this paper we propose a low-complexity host-based technique that uses deviations in static file attributes to detect malicious executables. We first develop simple statistical models of static file attributes derived from the empirical data of thousands of benign executables. Deviations among the attribute models of benign and malware executables are then quantified using information-theoretic (Kullback-Leibler-based) divergence measures. This quantification reveals distinguishing attributes that are considerably divergent between benign and malware executables and therefore can be used for detection. We use the benign models of divergent attributes in cross-correlation and log-likelihood frameworks to classify malicious executables. Our results, using over 4,000 malicious file samples, indicate that the proposed detector provides reasonably high detection accuracy, while having significantly lower complexity than existing detectors.  相似文献   
88.
Determining the Ordered Weighted Averaging (OWA) operator weights is important in decision making applications. Several approaches have been proposed in the literature to obtain the associated weights. This paper provides an alternative disparity model to identify the OWA operator weights. The proposed mathematical model extends the existing disparity approaches by minimizing the sum of the deviation between two distinct OWA weights. The proposed disparity model can be used for a preference ranking aggregation. A numerical example in preference ranking and an application in search engines prove the usefulness of the generated OWA weights.  相似文献   
89.
While the demand for mobile broadband wireless services continues to increase, radio resources remain scarce. Even with the substantial increase in the supported bandwidth in the next generation broadband wireless access systems (BWASs), it is expected that these systems will severely suffer from congestion, due to the rapid increase in demand of bandwidth-intensive multimedia services. Without efficient bandwidth management and congestion control schemes, network operators may not be able to meet the increasing demand of users for multimedia services, and hence they may suffer an immense revenue loss. In this paper, we propose an admission-level bandwidth management scheme consisting of call admission control (CAC) and dynamic pricing. The main aim of our proposed scheme is to provide monetary incentives to users to use the wireless resources efficiently and rationally, hence, allowing efficient bandwidth management at the admission level. By dynamically determining the prices of units of bandwidth, the proposed scheme can guarantee that the number of connection requests to the system are less than or equal to certain optimal values computed dynamically, hence, ensuring a congestion-free system. The proposed scheme is general and can accommodate different objective functions for the admission control as well as different pricing functions. Comprehensive simulation results with accurate and inaccurate demand modeling are provided to show the effectiveness and strengths of our proposed approach.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号