首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   179969篇
  免费   10053篇
  国内免费   5729篇
电工技术   7533篇
技术理论   2篇
综合类   9495篇
化学工业   26473篇
金属工艺   10641篇
机械仪表   9624篇
建筑科学   9923篇
矿业工程   3833篇
能源动力   3703篇
轻工业   9958篇
水利工程   3284篇
石油天然气   5372篇
武器工业   952篇
无线电   20656篇
一般工业技术   26937篇
冶金工业   6819篇
原子能技术   1393篇
自动化技术   39153篇
  2024年   437篇
  2023年   1416篇
  2022年   2888篇
  2021年   3978篇
  2020年   3036篇
  2019年   2461篇
  2018年   16855篇
  2017年   16231篇
  2016年   12556篇
  2015年   4822篇
  2014年   5330篇
  2013年   6329篇
  2012年   9942篇
  2011年   16516篇
  2010年   14900篇
  2009年   12064篇
  2008年   13008篇
  2007年   13918篇
  2006年   5871篇
  2005年   6095篇
  2004年   4418篇
  2003年   4029篇
  2002年   3325篇
  2001年   2507篇
  2000年   2209篇
  1999年   2040篇
  1998年   1448篇
  1997年   1271篇
  1996年   1130篇
  1995年   885篇
  1994年   733篇
  1993年   534篇
  1992年   431篇
  1991年   356篇
  1990年   268篇
  1989年   224篇
  1988年   186篇
  1987年   109篇
  1986年   104篇
  1985年   44篇
  1984年   50篇
  1968年   43篇
  1966年   42篇
  1965年   45篇
  1959年   42篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In this paper, the resilient control under the Denial-of-Service (DoS) attack is rebuilt within the framework of Joint Directors of Laboratories (JDL) data fusion model. The JDL data fusion process is characterized by the so-called Game-in-Game approach, where decisions are made at different layers. The interactions between different JDL levels are considered which take the form of Packet Delivery Rate of the communication channel. Some criterions to judge whether the cyber defense system is able to protect the underlying control system is provided. Finally, a numerical example is proposed to verify the validity of the proposed method.  相似文献   
992.
Traditionally, model calibration is formulated as a single objective problem, where fidelity to measurements is maximized by adjusting model parameters. In such a formulation however, the model with best fidelity merely represents an optimum compromise between various forms of errors and uncertainties and thus, multiple calibrated models can be found to demonstrate comparable fidelity producing non-unique solutions. To alleviate this problem, the authors formulate model calibration as a multi-objective problem with two distinct objectives: fidelity and robustness. Herein, robustness is defined as the maximum allowable uncertainty in calibrating model parameters with which the model continues to yield acceptable agreement with measurements. The proposed approach is demonstrated through the calibration of a finite element model of a steel moment resisting frame.  相似文献   
993.
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.  相似文献   
994.
A performance-driven application of shape grammars is presented. A parametric shape grammar that generates a language of pattern designs for the principal façade of a prototype house—featuring a 5 × 20 matrix of electrochromic windows—based equally on performance and aesthetic criteria is described. The adjustment of the chromatism and light transmittance of each individual windowpane on the façade enables the adjustment of solar radiation at the house interior. The novel aspect of the grammar is that it encodes performance constraints of interior daylight illuminance and associates them to visual, symmetry principles of two-dimensional pattern generation. Twelve parametric rules account for the generation of the façade pattern language and five subclasses account for the symmetry of the patterns in the language.  相似文献   
995.
Thyristor controlled series capacitor (TCSC) can regulate line impedance and therefore increase transferred power of the system. On the other hand power system stabilizer (PSS) increases dynamic stability of generator. To enhance the stability, combination of TCSC and PSS can be applied, and in such a case coordination of TCSC and PSS is essential. This paper applies this combined controller in order to enhance the stability of multi-machine system. Parameters of these controllers are optimized by velocity update relaxation particle swarm optimization (VURPSO) algorithm and Genetic algorithm (GA). The simulation results show that the combination of VURPSO algorithm and GA leads to a better design and stability.  相似文献   
996.
The MapReduce framework has become the de facto standard for big data processing due to its attractive features and abilities. One is that it automatically parallelizes a job into multiple tasks and transparently handles task execution on a large cluster of commodity machines. The increasing heterogeneity of distributed environments may result in a few straggling tasks, which prolong job completion. Speculative execution is proposed to mitigate stragglers. However, the existing speculative execution mechanism could not work efficiently as many speculative tasks are still slower than their original tasks. In this paper, we explore an approach to increase the efficiency of speculative execution, and further improve MapReduce performance. We propose the Partial Speculative Execution (PSE) strategy to make speculative tasks start from the checkpoint. By leveraging the checkpoint of original tasks, PSE can eliminate the costs of re-reading, re-copying, and re-computing the processed data. We implement PSE in Hadoop, and evaluate its performance in terms of job completion time and the efficiency of speculative execution under several kinds of classical workloads. Experimental results show that, in heterogeneous environments with stragglers, PSE completes jobs 56 % faster than that with no speculation and 12 % faster than that with LATE, an improved speculative execution algorithm. In addition, on average PSE can improve the efficiency of speculative execution by 24 % compared to LATE.  相似文献   
997.
The enigmatic Hypnerotomachia Poliphili published anonymously in 1499 has long posed puzzles for historians and other scholars. This present text argues that the volume can credibly be attributed, not to Francesca Colonna as is often done, but to the Renaissance humanist and polymath Leon Battista Alberti. Evidence for this is found in the unravelling of arithmogrammatical evidence sprinkled throughout the work, similar to those found in other of Alberti’s works.  相似文献   
998.
In 2013 Gaspar-Cunha et al. proposed a set of novel robust multi-objective benchmark functions to increase the difficulty of the current test problems and effectively mimic the characteristics of real search spaces. Despite the merits of the proposed benchmark problems, it is observed that the robust Pareto optimal fronts are located on the boundaries of the search space, which may result in the infeasibility of solutions obtained in case of perturbations along the negative side of the second parameter. This paper modifies the proposed test functions by Gaspar-Cunha et al. to mimic real problems better and allow the parameters to be fluctuated by any degree of perturbations. In fact, the robust fronts are shifted to the centre of the search space, so that any degree of uncertainties can be considered. The paper considers theoretical and experimental analysis of both set of test functions as well.  相似文献   
999.
Resonance and wave-propagation problems are known to be highly sensitive towards parameter variations. This paper discusses topology optimization formulations for creating designs that perform robustly under spatial variations for acoustic cavity problems. For several structural problems, robust topology optimization methods have already proven their worth. However, it is shown that direct application of such methods is not suitable for the acoustic problem under consideration. A new double filter approach is suggested which makes robust optimization for spatial variations possible. Its effect and limitations are discussed. In addition, a known explicit penalization approach is considered for comparison. For near-uniform spatial variations it is shown that highly robust designs can be obtained using the double filter approach. It is finally demonstrated that taking non-uniform variations into account further improves the robustness of the designs.  相似文献   
1000.
This educational paper describes the implementation aspects, user interface design considerations and workflow potential of the recently published TopOpt 3D App. The app solves the standard minimum compliance problem in 3D and allows the user to change design settings interactively at any point in time during the optimization. Apart from its educational nature, the app may point towards future ways of performing industrial design. Instead of the usual geometrize, then model and optimize approach, the geometry now automatically adapts to the varying boundary and loading conditions. The app is freely available for iOS at Apple’s App Store and at http://www.topopt.dtu.dk/TopOpt3D for Windows and OSX.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号