首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11414篇
  免费   87篇
  国内免费   149篇
电工技术   141篇
综合类   5篇
化学工业   511篇
金属工艺   461篇
机械仪表   74篇
建筑科学   115篇
矿业工程   8篇
能源动力   69篇
轻工业   125篇
水利工程   35篇
石油天然气   20篇
武器工业   2篇
无线电   416篇
一般工业技术   313篇
冶金工业   271篇
原子能技术   94篇
自动化技术   8990篇
  2024年   2篇
  2023年   18篇
  2022年   36篇
  2021年   69篇
  2020年   52篇
  2019年   53篇
  2018年   75篇
  2017年   68篇
  2016年   73篇
  2015年   52篇
  2014年   273篇
  2013年   273篇
  2012年   839篇
  2011年   3155篇
  2010年   1192篇
  2009年   1058篇
  2008年   723篇
  2007年   631篇
  2006年   481篇
  2005年   613篇
  2004年   553篇
  2003年   605篇
  2002年   290篇
  2001年   16篇
  2000年   16篇
  1999年   40篇
  1998年   95篇
  1997年   41篇
  1996年   23篇
  1995年   14篇
  1994年   13篇
  1993年   10篇
  1992年   13篇
  1991年   10篇
  1990年   13篇
  1989年   12篇
  1988年   11篇
  1987年   10篇
  1986年   22篇
  1985年   15篇
  1984年   29篇
  1983年   16篇
  1982年   16篇
  1981年   10篇
  1980年   2篇
  1979年   4篇
  1976年   4篇
  1972年   4篇
  1963年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Traffic matrix (TM) is a key input of traffic engineering and network management. However, it is significantly difficult to attain TM directly, and so TM estimation is so far an interesting topic. Though many methods of TM estimation are proposed, TM is generally unavailable in the large-scale IP backbone networks and is difficult to be estimated accurately. This paper proposes a novel method of TM estimation in large-scale IP backbone networks, which is based on the generalized regression neural network (GRNN), called GRNN TM estimation (GRNNTME) method. Firstly, building on top of GRNN, we present a multi-input and multi-output model of large-scale TM estimation. Because of the powerful capability of learning and generalizing of GRNN, the output of our model can sufficiently capture the spatio-temporal correlations of TM. This ensures that the estimation of TM can accurately be attained. And then GRNNTME uses the procedure of data posttreating further to make the output of our model closer to real value. Finally, we use the real data from the Abilene Network to validate GRNNTME. Simulation results show that GRNNTME can perform well the accurate and fast estimation of TM, track its dynamics, and holds the stronger robustness and lower estimation errors.  相似文献   
102.
Keystream reuse, also known as the two time pad problem, is a well known weakness in stream ciphers. The implementers of the cryptographic algorithms are still underestimating this threat. The keystream reuse exploitation techniques presented so far assume the underlying plaintext to be textual data and all the heuristics presented previously are based on the language characteristics of the underlying text based data, which fail when compression is applied on the plaintext before encryption. This paper presents exploitation techniques for two time pads in case of stream ciphered digitized and compressed speech signals. In this paper we show that how an adversary can automatically recover the digitized speech signals encrypted under the same keystream provided the language (e.g. English) and digital encoding/compression scheme details of the underlying speech signals are known. Our technique of cryptanalysis is based on the modeling of the speech parameters by exploiting the inter frame correlations between each components of the speech vectors in different frames and then using these models to decode the two speech signals in the keystream reuse scenario. The technique is flexible enough to incorporate all modern speech coding schemes based on parameter or hybrid encoding and compression techniques. The simulation experiments have showed promising results for most of the present day speech digitization and compression techniques.  相似文献   
103.
In this paper, we investigate the prediction of the cell composition of bacteria with respect to their medium. By modeling the bacterium as an interconnection of subsystems, the problem is written as a non-smooth convex optimization problem equivalent to a Linear Programming feasibility problem. We then obtain a new method, called Resource Balance Analysis (RBA), predicting the distribution of the available resources in the medium among the various cellular subsystems. Beyond its predictive capability, the proposed approach grasps some fundamental aspects of the bacterium physiology by including a refined model. This method reveals the existence of an intrinsic bottleneck in the system resource distribution of the bacterium, leading to the existence of a structural limitation of its growth rate which can be predicted. RBA is also able to predict the configuration of the metabolic network for a given medium at steady-state regimen which nicely fits the available experimental results for the gram-positive model bacterium Bacillus subtilis.  相似文献   
104.
Adaptive Optimal Control (AOC) by reinforcement synthesis is proposed to facilitate the application of optimal control theory in feedback controls. Reinforcement synthesis uses the critic–actor architecture of reinforcement learning to carry out sequential optimization. Optimality conditions for AOC are formulated using the discrete minimum principle. A proof of the convergence conditions for the reinforcement synthesis algorithm is presented. As the final time extends to infinity, the reinforcement synthesis algorithm is equivalent to the Dual Heuristic dynamic Programming (DHP) algorithm, a version of approximate dynamic programming. Thus, formulating DHP with the AOC approach has rigorous proofs of optimality and convergence. The efficacy of AOC by reinforcement synthesis is demonstrated by solving a linear quadratic regulator problem.  相似文献   
105.
In this paper, we investigate opacity of discrete event systems. We define two types of opacities: strong opacity and weak opacity. Given a general observation mapping, a language is strongly opaque if all strings in the language are confused with some strings in another language and it is weakly opaque if some strings in the language are confused with some strings in another language. We show that security and privacy of computer systems and communication protocols can be investigated in terms of opacity. In particular, two important properties in security and privacy, namely anonymity and secrecy, can be studied as special cases of opacity. We also show that by properly specifying the languages and the observation mapping, three important properties of discrete event systems, namely observability, diagnosability, and detectability, can all be reformulated as opacity. Thus, opacity has a wide range of applications. Also in this paper we provide algorithms for checking strong opacity and weak opacity for systems described by regular languages and having a generalized projection as the observation mapping.  相似文献   
106.
It is a demanding and time-consuming task to construct the side window mechanism of a car such that the deflections along the seals are minimized. The reason for this is that the window surface S delivered by the stylist, will in general not be movable in a proper way: It is required that the surface tightly moves along the seals. Deflections will necessarily occur no matter how much effort the engineer invests. This article describes how to find a spatial motion that minimizes seal deflection for some given automobile side window surface. Necessary but acceptable modification of the stylist’s surface S is also addressed, as well as the lifting mechanism design. It is argued that our systematic approach offers considerable savings compared to the prevailing trial-and-error approach.  相似文献   
107.
108.
109.
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号