首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   471707篇
  免费   7442篇
  国内免费   2631篇
电工技术   9034篇
技术理论   5篇
综合类   1377篇
化学工业   72858篇
金属工艺   17720篇
机械仪表   13791篇
建筑科学   12363篇
矿业工程   2159篇
能源动力   11832篇
轻工业   48481篇
水利工程   4689篇
石油天然气   7665篇
武器工业   250篇
无线电   55527篇
一般工业技术   87036篇
冶金工业   87455篇
原子能技术   8271篇
自动化技术   41267篇
  2021年   3913篇
  2020年   2820篇
  2019年   3466篇
  2018年   5468篇
  2017年   5445篇
  2016年   6014篇
  2015年   4624篇
  2014年   7512篇
  2013年   21455篇
  2012年   13094篇
  2011年   18087篇
  2010年   14208篇
  2009年   15629篇
  2008年   16762篇
  2007年   16891篇
  2006年   15209篇
  2005年   13522篇
  2004年   12553篇
  2003年   12115篇
  2002年   11674篇
  2001年   12073篇
  2000年   11104篇
  1999年   11537篇
  1998年   26728篇
  1997年   19171篇
  1996年   14619篇
  1995年   11091篇
  1994年   9962篇
  1993年   9702篇
  1992年   7238篇
  1991年   6877篇
  1990年   6812篇
  1989年   6556篇
  1988年   6284篇
  1987年   5222篇
  1986年   5144篇
  1985年   6095篇
  1984年   5703篇
  1983年   5251篇
  1982年   4704篇
  1981年   4960篇
  1980年   4530篇
  1979年   4608篇
  1978年   4363篇
  1977年   4758篇
  1976年   6113篇
  1975年   3805篇
  1974年   3592篇
  1973年   3673篇
  1972年   3006篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
991.
This paper concerns the following problem: given a set of multi-attribute records, a fixed number of buckets and a two-disk system, arrange the records into the buckets and then store the buckets between the disks in such a way that, over all possible orthogonal range queries (ORQs), the disk access concurrency is maximized. We shall adopt the multiple key hashing (MKH) method for arranging records into buckets and use the disk modulo (DM) allocation method for storing buckets onto disks. Since the DM allocation method has been shown to be superior to any other allocation methods for allocating an MKH file onto a two-disk system for answering ORQs, the real issue is knowing how to determine an optimal way for organizing the records into buckets based upon the MKH concept.

A performance formula that can be used to evaluate the average response time, over all possible ORQs, of an MKH file in a two-disk system using the DM allocation method is first presented. Based upon this formula, it is shown that our design problem is related to a notoriously difficult problem, namely the Prime Number Problem. Then a performance lower bound and an efficient algorithm for designing optimal MKH files in certain cases are presented. It is pointed out that in some cases the optimal MKH file for ORQs in a two-disk system using the DM allocation method is identical to the optimal MKH file for ORQs in a single-disk system and the optimal average response time in a two-disk system is slightly greater than one half of that in a single-disk system.  相似文献   

992.
L-Expressnet is the communication suxbnetwork for the CNET local area network project of the CNR, Italy. Based on a single bus topology, it utilizes a simple and efficient virtual-token access protocol which provides ordered and collision-free transmission. The paper discusses the needs which led to L-Expressnet, describes the protocol, proves its correct operation, and compares its throughput-delay performance with those of other typical bus Protocols. A major advantage of L-Expressnet is that its implementation may be based on Ethernet standard transceivers and network interfaces.  相似文献   
993.
994.
Reversible watermarking scheme with image-independent embedding capacity   总被引:1,自引:0,他引:1  
Permanent distortion is one of the main drawbacks of all the irreversible watermarking schemes. Attempts to recover the original signal after the signal passes the authentication process are being made, starting just a few years ago. Some common problems, such as salt-and-pepper artefacts owing to intensity wraparound and low embedding capacity, can now be resolved. However, some significant problems remain unsolved. First, the embedding capacity is signal-dependent, i.e., capacity varies significantly depending on the nature of the host signal. The direct impact of this is compromised security for signals with low capacity. Some signals may be even non-embeddable. Secondly, while seriously tackled in irreversible watermarking schemes, the well-known problem of block-wise dependence, which opens a security gap for the vector quantisation attack and transplantation attack, are not addressed by researchers of the reversible schemes. This work proposes a reversible watermarking scheme with near-constant signal-independent embedding capacity and immunity to the vector quantisation attack and transplantation attack.  相似文献   
995.
996.
997.
Summary The thermal properties of an epoxy resin (diglycidyl ether Bisphenol A, DGEBA) cured with a primary amine (ethylenediamine, ETDA) and filled with 10, 20 and 30 wt. % of ultra fine copper particles were analyzed. The thermal results were evaluated by means of the Romero-Garcia method, which allowed to obtain the resin degradation kinetic parameters, as well as the possible decomposition mechanism. From the obtained results is possible to infer that higger copper content strongly affects the degradation process of the epoxy resin, which causes a drop off on the composites thermal stability. This behavior could be attributed to water presence, being this effect less pronounced for the resin with 10 wt. % copper and unfilled resin. Regarding to decomposition mechanism, three way transport showed the best correlation for all samples.  相似文献   
998.
Scaling System-Level Science: Scientific Exploration and IT Implications   总被引:1,自引:0,他引:1  
Foster  I. Kesselman  C. 《Computer》2006,39(11):31-39
The study and creation of the infrastructure required to enable system-level science--the integration of diverse sources of knowledge about the constituent parts of a complex system with the goal of obtaining an understanding of the system's properties as a whole--is becoming increasingly important, spawning new knowledge in variety of fields at a rapid pace.  相似文献   
999.
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号