首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62346篇
  免费   4881篇
  国内免费   2774篇
电工技术   3314篇
技术理论   6篇
综合类   4153篇
化学工业   10612篇
金属工艺   3889篇
机械仪表   3822篇
建筑科学   4689篇
矿业工程   2220篇
能源动力   1958篇
轻工业   3554篇
水利工程   1073篇
石油天然气   4589篇
武器工业   486篇
无线电   6523篇
一般工业技术   7288篇
冶金工业   3376篇
原子能技术   753篇
自动化技术   7696篇
  2024年   248篇
  2023年   998篇
  2022年   1732篇
  2021年   2458篇
  2020年   1855篇
  2019年   1670篇
  2018年   1858篇
  2017年   2058篇
  2016年   1834篇
  2015年   2371篇
  2014年   3028篇
  2013年   3511篇
  2012年   3689篇
  2011年   4038篇
  2010年   3713篇
  2009年   3327篇
  2008年   3302篇
  2007年   3243篇
  2006年   3217篇
  2005年   2794篇
  2004年   2051篇
  2003年   2161篇
  2002年   2486篇
  2001年   2087篇
  2000年   1624篇
  1999年   1712篇
  1998年   1269篇
  1997年   1086篇
  1996年   1117篇
  1995年   852篇
  1994年   636篇
  1993年   475篇
  1992年   367篇
  1991年   274篇
  1990年   206篇
  1989年   167篇
  1988年   153篇
  1987年   88篇
  1986年   69篇
  1985年   37篇
  1984年   38篇
  1983年   27篇
  1982年   25篇
  1981年   14篇
  1980年   22篇
  1979年   5篇
  1978年   2篇
  1977年   2篇
  1974年   1篇
  1951年   4篇
排序方式: 共有10000条查询结果,搜索用时 17 毫秒
81.
系统地评述了车辆四轮转向系统的原理及其控制方法的发展,在此基础上指出四轮转向系统的研究必须以闭环综合评价为出发点,并与其它主动安全技术相结合才能真正达到实用阶段。  相似文献   
82.
Let G1 and G2 be two connected graphs. The Kronecker product G1×G2 has vertex set V(G1×G2)=V(G1V(G2) and the edge set . In this paper, we show that if G is a bipartite graph with κ(G)=δ(G), then G×Kn(n?3) is super-κ.  相似文献   
83.
Over the past few years, large human populations around the world have been affected by an increase in significant seismic activities. For both conducting basic scientific research and for setting critical government policies, it is crucial to be able to explore and understand seismic and geographical information obtained through all scientific instruments. In this work, we present a visual analytics system that enables explorative visualization of seismic data together with satellite-based observational data, and introduce a suite of visual analytical tools. Seismic and satellite data are integrated temporally and spatially. Users can select temporal ;and spatial ranges to zoom in on specific seismic events, as well as to inspect changes both during and after the events. Tools for designing high dimensional transfer functions have been developed to enable efficient and intuitive comprehension of the multi-modal data. Spread-sheet style comparisons are used for data drill-down as well as presentation. Comparisons between distinct seismic events are also provided for characterizing event-wise differences. Our system has been designed for scalability in terms of data size, complexity (i.e. number of modalities), and varying form factors of display environments.  相似文献   
84.
针对斩拌滚揉机在滚揉过程中必须保持低温、真空的特点,首先在滚筒夹层设计带有制冷剂流动的蓄冷层以实现温度控制,其次采用PLC和变频器对滚筒和真空泵进行闭环控制,实现滚揉过程中螺旋桨叶的匀渐变速度调节,从而解决滚揉不足或滚揉过度造成的产品蛋白严重变性或保水性都较差的问题;实际运行结果表明,该控制系统具有精度高、运行稳定可靠、监控能力强、操作简便等特点,能够满足斩拌滚揉机的控制要求.  相似文献   
85.
In infrastructure financed projects, in order to attract private investors, host governments often provide some guarantees. This paper develops a value model of minimum revenue guarantee with multiple-exercise real options under the impact of the emergency incident. The model is applied to infrastructure financed projects using the minimum revenue guarantee under simulation. The simulation results indicate that, before quantifying the value of the minimum revenue guarantee, it is necessary to forecast the jump degree and intensity of the emergency incident, as well as prevent and control risks arising from such emergencies. Otherwise, underestimation of the guarantee value will occur and the government will have to bear huge debt in this condition. We also analyze the dependence of the guaranteed value on the minimum guaranteed revenue level, initial revenue and number of exercise rights. For various conditions, the diagrams of the guaranteed value are also presented.  相似文献   
86.
This paper is devoted to investigating inventory control problems under nonstationary and uncertain demand. A belief-rule-based inventory control (BRB-IC) method is developed, which can be applied in situations where demand and demand-forecast-error (DFE) do not follow certain stochastic distribution and forecasting demand is given in single-point or interval styles. The method can assist decision-making through a belief-rule structure that can be constructed, initialized and adjusted using both manager’s knowledge and operational data. An extended optimal base stock (EOBS) policy is proved for initializing the belief-rule-base (BRB), and a BRB-IC inference approach with interval inputs is proposed. A numerical example and a case study are examined to demonstrate potential applications of the BRB-IC method. These studies show that the belief-rule-based expert system is flexible and valid for inventory control. The case study also shows that the BRB-IC method can compensate DFE by training BRB using historical demand data for generating reliable ordering policy.  相似文献   
87.
88.
根据唐山市玉田县当地污水水质情况,针对奥贝尔氧化沟污水处理工艺的特点及其处理过程对控制的要求,采用PLC以及其它控制元件,完成对污水处理装置中的粗处理装置、排污泵的启停,氧化沟及沉淀池的控制,以及回流污泥处理系统、除磷加药系统等过程的顺序控制.并对安全系统的紧急停车进行PLC控制处理,从而实现了安全、稳定、高效、低耗的目的.  相似文献   
89.
提出一种针对选择自动重传(SR-ARQ)技术结合自适应调制系统(AMS)的跨层分析和设计方法.该方法采用有限状态马尔可夫链(FSMC),同时对物理层和链路层进行建模,然后用更新报酬(renewal-reward)理论对系统的有效吞吐量进行精确分析,并根据分析结果设计系统中所使用的参数.计算机仿真结果验证了该跨层分析方法的精确性,并可以从中看出本方法对系统参数选取的指导意义.  相似文献   
90.
The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentiation in groups, can be pre-computed in the offline phase without knowing the message to be encrypted and/or recipient’s identity. The online phase only requires light computation, such as modular multiplication. In this paper, we propose two novel identity-based online/offline schemes: a full secure identity-based online/offline encryption scheme and an identity-based online/offline signcryption scheme. Compared to the other schemes in the literature, our schemes achieve the shortest ciphertext size in both offline and online phases and demonstrate the best performance in offline computation. Our schemes are applicable to devices with limited computation power. They are proven secure in the random oracle model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号