首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   100765篇
  免费   3631篇
  国内免费   125篇
电工技术   1494篇
综合类   74篇
化学工业   27354篇
金属工艺   2505篇
机械仪表   4074篇
建筑科学   2832篇
矿业工程   25篇
能源动力   3225篇
轻工业   11193篇
水利工程   652篇
石油天然气   136篇
武器工业   2篇
无线电   14453篇
一般工业技术   21976篇
冶金工业   4420篇
原子能技术   692篇
自动化技术   9414篇
  2024年   756篇
  2023年   681篇
  2022年   913篇
  2021年   1886篇
  2020年   3335篇
  2019年   5394篇
  2018年   4231篇
  2017年   4467篇
  2016年   5581篇
  2015年   4988篇
  2014年   5645篇
  2013年   7719篇
  2012年   5822篇
  2011年   6135篇
  2010年   5280篇
  2009年   5254篇
  2008年   4756篇
  2007年   3974篇
  2006年   3624篇
  2005年   3037篇
  2004年   2847篇
  2003年   2759篇
  2002年   2535篇
  2001年   2187篇
  2000年   2053篇
  1999年   1379篇
  1998年   1617篇
  1997年   1040篇
  1996年   834篇
  1995年   572篇
  1994年   486篇
  1993年   423篇
  1992年   308篇
  1991年   288篇
  1990年   269篇
  1989年   248篇
  1988年   211篇
  1987年   177篇
  1986年   129篇
  1985年   120篇
  1984年   96篇
  1983年   68篇
  1982年   38篇
  1981年   41篇
  1980年   33篇
  1979年   31篇
  1978年   31篇
  1977年   39篇
  1976年   61篇
  1973年   20篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
A scanning electron microscope (SEM) is a sophisticated equipment employed for fine imaging of a variety of surfaces. In this study, prediction models of SEM were constructed by using a generalized regression neural network (GRNN) and genetic algorithm (GA). The SEM components examined include condenser lens 1 and 2 and objective lens (coarse and fine) referred to as CL1, CL2, OL-Coarse, and OL-Fine. For a systematic modeling of SEM resolution (R), a face-centered Box–Wilson experiment was conducted. Two sets of data were collected with or without the adjustment of magnification. Root-mean-squared prediction error of optimized GRNN models are GA 0.481 and 1.96×10-12 for non-adjusted and adjusted data, respectively. The optimized models demonstrated a much improved prediction over statistical regression models. The optimized models were used to optimize parameters particularly under best tuned SEM environment. For the variations in CL2 and OL-Coarse, the highest R could be achieved at all conditions except a larger CL2 either at smaller or larger OL-Coarse. For the variations in CL1 and CL2, the highest R was obtained at all conditions but larger CL2 and smaller CL1.  相似文献   
92.
This study describes techniques for the cascade modeling and the optimization that are required to conduct the simulator-based process optimization of solar cell fabrication. Two modeling approaches, neural networks and genetic programming, are employed to model the crucial relation for the consecutively connected two processes in solar cell fabrication. One model (Model 1) is used to map the five inputs (time, amount of nitrogen and DI water in surface texturing and temperature and time in emitter diffusion) to the two outputs (reflectance and sheet resistance) of the first process. The other model (Model 2) is used to connect the two inputs (reflectance and sheet resistance) to the one output (efficiency) of the second process. After modeling of the two processes, genetic algorithms and particle swarm optimization were applied to search for the optimal recipe. In the first optimization stage, we searched for the optimal reflectance and sheet resistance that can provide the best efficiency in the fabrication process. The optimized reflectance and sheet resistance found by the particle swarm optimization were better than those found by the genetic algorithm. In the second optimization stage, the five input parameters were searched by using the reflectance and sheet resistance values obtained in the first stage. The found five variables such as the texturing time, amount of nitrogen, DI water, diffusion time, and temperature are used as a recipe for the solar cell fabrication. The amount of nitrogen, DI water, and diffusion time in the optimized recipes showed considerable differences according to the modeling approaches. More importantly, repeated applications of particle swarm optimization yielded process conditions with smaller variations, implying greater consistency in recipe generation.  相似文献   
93.
In automated container terminals, containers are transported from the marshalling yard to a ship and vice versa by automated vehicles. The automated vehicle type studied in this paper is an automated lifting vehicle (ALV) that is capable of lifting a container from the ground by itself. This study discusses how to dispatch ALVs by utilizing information about pickup and delivery locations and time in future delivery tasks. A mixed-integer programming model is provided for assigning optimal delivery tasks to ALVs. A procedure for converting buffer constraints into time window constraints and a heuristic algorithm for overcoming the excessive computational time required for solving the mathematical model are suggested. Numerical experiments are reported to compare the objective values and computational times by a heuristic algorithm with those by an optimizing method and to analyze the effects of dual cycle operation, number of ALVs, and buffer capacity on the performance of ALVs.  相似文献   
94.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA.  相似文献   
95.
Personal connections, also called guanxi in Chinese culture, are embedded within a network of interdependent social exchanges, providing access to resources, information and supports, therefore facilitating performance. Building guanxi networks means building social networks. Project teams are commonly used as fundamental units in organizations, partly in order to generate more creative ideas, and so this paper evaluates how project teams use their guanxi networks within and outside of their teams and across boundaries to stimulate their creative performance. Fifty‐four product development project teams with 293 members from high‐tech Taiwanese firms participated in this study. Findings suggested that, in a guanxi culture such as Taiwan's, in order to facilitate a project team's creative performance, the most important task is to develop a more cohesive social unit before the team extends its external networks, since Chinese culture regards people first as members of groups, and secondly as individuals.  相似文献   
96.
97.
It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme [30] for large scale elections. However, in the following paper, Okamoto [31] proved that the scheme [30] was not receipt-free and presented two improved schemes. One scheme requires the help of the parameter registration committee and the other needs a stronger physical assumption of the voting booth. In this paper, we utilize the double-trapdoor commitment to propose a new receipt-free voting scheme based on blind signatures for large scale elections. Neither the parameter registration committee nor the voting booth is required in our scheme. We also present a more efficient zero-knowledge proof for secret permutation. Therefore, our scheme is much more efficient than Okamoto’s schemes [30] and [31] with the weaker physical assumptions. Moreover, we prove that our scheme can achieve the desired security properties.  相似文献   
98.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed.  相似文献   
99.
A pushdown automaton (PDA) is quasi-rocking if it preserves the stack height for no more than a bounded number of consecutive moves. Every PDA can be transformed into an equivalent one that is quasi-rocking and real-time and every finite-turn (one-turn) PDA can be transformed into an equivalent one that is quasi-rocking or real-time. The quasi-rocking [quasi-rocking in the increasing mode, and quasi-rocking in the decreasing mode] real-time restriction in finite-turn (one-turn) PDAs coincides with the double Greibach [reverse Greibach, and Greibach] form in nonterminal-bounded (linear) context-free grammars. This provides complete grammatical characterizations of quasi-rocking and/or real-time (finite-turn and one-turn) PDAs and, together with known relations and other relations proved in the present paper, yields an extended hierarchy of PDA languages. Basic decision properties for PDAs can be stated in stronger forms by using the quasi-rocking and real-time restrictions and their undecidability/decidability status rests on the way PDAs quasi-rock.  相似文献   
100.
On the use of energy minimization for CA based analysis in elasticity   总被引:2,自引:1,他引:1  
There has been recent interest in exploring alternative computational models for structural analysis that are better suited for a design environment requiring repetitive analysis. The need for such models is brought about by significant increases in computer processing speeds, realized primarily through parallel processing. To take full advantage of such parallel machines, however, the computational approach itself must be revisited from a totally different perspective; parallelization of inherently serial paradigms is subject to limitations introduced by a requirement of information coordination. The cellular automata (CA) model of decentralized computations provides one such approach which is ideally tailored for parallel computers. The proposed paper examines the applicability of the cellular automata model in problems of 2-D elasticity. The focus of the paper is in the use of a genetic algorithm based optimization process to derive the rules for local interaction required in evolving the cellular automata. Received August 28, 2000  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号