首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   44093篇
  免费   4064篇
  国内免费   2018篇
电工技术   2510篇
技术理论   2篇
综合类   2554篇
化学工业   7613篇
金属工艺   2633篇
机械仪表   2994篇
建筑科学   3016篇
矿业工程   1301篇
能源动力   1288篇
轻工业   2869篇
水利工程   654篇
石油天然气   2470篇
武器工业   355篇
无线电   5395篇
一般工业技术   5938篇
冶金工业   2432篇
原子能技术   496篇
自动化技术   5655篇
  2024年   188篇
  2023年   830篇
  2022年   1388篇
  2021年   2146篇
  2020年   1534篇
  2019年   1428篇
  2018年   1490篇
  2017年   1529篇
  2016年   1439篇
  2015年   1885篇
  2014年   2266篇
  2013年   2720篇
  2012年   2811篇
  2011年   3185篇
  2010年   2520篇
  2009年   2494篇
  2008年   2500篇
  2007年   2240篇
  2006年   2356篇
  2005年   1905篇
  2004年   1382篇
  2003年   1213篇
  2002年   1134篇
  2001年   993篇
  2000年   959篇
  1999年   989篇
  1998年   827篇
  1997年   710篇
  1996年   625篇
  1995年   520篇
  1994年   405篇
  1993年   271篇
  1992年   226篇
  1991年   200篇
  1990年   168篇
  1989年   152篇
  1988年   99篇
  1987年   85篇
  1986年   55篇
  1985年   49篇
  1984年   34篇
  1983年   37篇
  1982年   29篇
  1981年   23篇
  1980年   26篇
  1979年   17篇
  1978年   15篇
  1976年   18篇
  1975年   10篇
  1973年   13篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
961.
962.
According to actual needs, a generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than the existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Compared with existing identity based generalized signcryption, the new scheme has less implementation complexity. Moreover, the new scheme has comparable computation complexity with the existing normal signcryption schemes.  相似文献   
963.
Recent advances in algorithms for the multidimensional multiple choice knapsack problems have enabled us to solve rather large problem instances. However, these algorithms are evaluated with very limited benchmark instances. In this study, we propose new methods to systematically generate comprehensive benchmark instances. Some instances with special correlation properties between parameters are found to be several orders of magnitude harder than those currently used for benchmarking the algorithms. Experiments on an existing exact algorithm and two generic solvers show that instances whose weights are uncorrelated with the profits are easier compared with weakly or strongly correlated cases. Instances with classes containing similar set of profits for items and with weights strongly correlated to the profits are the hardest among all instance groups investigated. These hard instances deserve further study and understanding their properties may shed light to better algorithms.  相似文献   
964.
In product design process, when dealing with technical problems or initiating a new design, R&D personnel would often turn to technical database to seek inspiration. The building of a database with such documents has not been systematically dealt with. In this paper, several issues on how to build up a product design database are investigated: input source, sampling scheme and quality control. A case study of building a database for robotic design is used to demonstrate the concept. It is an archive of more than 1500 relevant technical papers. A total of 16 graduates are employed as operators in the labeling process and subsequently the hypothesis tests are utilized to process the labeling results. To ensure this database quality, the labeling consistency of each operator and the understanding of each category are tested. With the use of statistical methods, this work proposes a feasible and practical way to create such a database for product design.  相似文献   
965.
This paper considers the existence of the equilibrium point and its global exponential robust stability for reaction-diffusion interval neural networks with variable coefficients and distributed delays by means of the topological degree theory and Lyapunov-functional method. The sufficient conditions on global exponential robust stability established in this paper are easily verifiable. An example is presented to demonstrate the effectiveness and efficiency of our results.  相似文献   
966.
There are a number of dirty data in observation data set derived from ocean observing network. These data should be carefully and reasonably processed before they are used for forecasting or analysis in oceanic warning system (OWS). Due to high-dimensional and dynamic oceanic data, we propose an intelligent integrated data processing model for the OWS. Firstly, we design an integrated framework of the oceanic data processing and present its processing model. The function of each module of this model is analyzed in details. Then, we propose several intelligent data processing methods, such as an intelligent data cleaning method based on the fuzzy c-means algorithm, a data filtering and clustering method based on the greedy clustering algorithm, and a data processing method based on the maximum entropy for the OWS. The efficiency and accuracy of the proposed model is proved by experimental results of observation data of the Red Tide. The proposed model can automatically find the new clustering center with the updated sample data, and outperforms several algorithms in data processing for the OWS.  相似文献   
967.
利用三维可视化软件包,采用Shear—Warp算法实现地震数据的模型可视化,并给出了具体算法流程。实验结果表明此算法可提高地震数据的体绘制速度,实现地震数据解释的实时交互式绘制,为地质勘探提供可视化依据。  相似文献   
968.
基于GPRS的远程监控系统中,监控中心实现与前端采集系统的网络数据传输是整个系统的重要的组成部分。本文提出了采用套接字(socket),基于TCP/IP协议实现远程数据收发的办法。简要介绍了基于GPRS的远程监控系统的组成功能,详细论述了基于套接字的编程技术,给出了基于Win32控制台的部分源码。  相似文献   
969.
VPN技术种类繁多,但是不同的用户有不同的需求,本文依据当前文献中出现的不同VPN技术,在分析了它们各自的技术特点后,提出了一种远程用户接入本地网络时的VPN方案的选择方法。  相似文献   
970.
本文通过对量子密码BB84协议及IEEE802.11i认证协议的分析与讨论,深入研究了802.11i密钥管理机制中的4次握手,利用量子密码安全的优势与IEEE802.11i无线网络相结合,提出量子握手,为无线网络中数据的通信安全提供保障。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号