首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   37301篇
  免费   870篇
  国内免费   48篇
电工技术   383篇
综合类   29篇
化学工业   7287篇
金属工艺   726篇
机械仪表   739篇
建筑科学   2007篇
矿业工程   114篇
能源动力   1102篇
轻工业   2920篇
水利工程   465篇
石油天然气   131篇
武器工业   5篇
无线电   2568篇
一般工业技术   6262篇
冶金工业   6599篇
原子能技术   268篇
自动化技术   6614篇
  2023年   265篇
  2022年   451篇
  2021年   744篇
  2020年   573篇
  2019年   741篇
  2018年   784篇
  2017年   698篇
  2016年   873篇
  2015年   757篇
  2014年   1040篇
  2013年   2373篇
  2012年   1681篇
  2011年   2091篇
  2010年   1651篇
  2009年   1547篇
  2008年   1800篇
  2007年   1774篇
  2006年   1591篇
  2005年   1439篇
  2004年   1174篇
  2003年   1122篇
  2002年   1051篇
  2001年   702篇
  2000年   549篇
  1999年   595篇
  1998年   583篇
  1997年   574篇
  1996年   549篇
  1995年   572篇
  1994年   525篇
  1993年   510篇
  1992年   500篇
  1991年   288篇
  1990年   418篇
  1989年   389篇
  1988年   319篇
  1987年   355篇
  1986年   310篇
  1985年   418篇
  1984年   416篇
  1983年   318篇
  1982年   295篇
  1981年   281篇
  1980年   270篇
  1979年   270篇
  1978年   247篇
  1977年   225篇
  1976年   206篇
  1975年   194篇
  1974年   173篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
151.
We present our experience withEuLisp as a teaching language, focussing on the level of the language which was specifically designed for this purpose (level-0).EuLisp has been used in undergraduate and postgraduate teaching since 1990, in lectures and laboratories, where in many cases it has replaced Scheme or Common Lisp. It has been used extensively in programming courses, parallelism courses, as a vehicle for advanced courses in symbolic computing and programming language design; it has also been used as a platform for final year undergraduate projects. This experience has demonstrated thatEuLisp is well suited to teaching and far reaching in its capabilities: it supports the relevant concepts in a consistent and versatile framework, so that the language serves to facilitate the educational process. The discussion is illustrated with examples, and where appropriate we draw a comparison with the Lisp dialects used previously in these courses.  相似文献   
152.
Database systems for real-time applications must satisfy timing constraints associated with transactions in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multi-level security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that, due to the conflicting goals of each requirement, tradeoffs need to be made between security and timeliness. We first define mutual information, a measure of the degree to which security is being satisfied by a system. A secure two-phase locking protocol is then described and a scheme is proposed to allow partial violations of security for improved timeliness. Analytical expressions for the mutual information of the resultant covert channel are derived, and a feedback control scheme is proposed that does not allow the mutual information to exceed a specified upper bound. Results showing the efficacy of the scheme obtained through simulation experiments are also discussed  相似文献   
153.
The GIAO-SCF method for calculating isotropic nuclear magnetic shielding values has been utilized to explain certain features in the 1H-NMR spectrum of 2-methylene-8,8-dimethyl-1,4,6,10-tetraoxaspiro[4.5] decane. Population distributions of the low-energy conformers based on their ab initio energies were used to produce weighting factors for the individual calculated shielding values to calculate the weighted average of the shielding values for a complete set of conformers. The differences in 1H chemical shifts between the hydrogens of the two methyl groups and between the axial and equatorial hydrogens in 2-methylene-8,8-dimethyl-1,4,6,10-tetraoxaspiro[4.5] decane were shown to be due to energy differences between the chair and boat orientations of the six-membered ring and contribution from a twist-boat conformation. Results suggest a hypothesis that intramolecular differences in chemical shift might be calculated to a greater degree of accuracy than chemical shifts calculated relative to a standard.  相似文献   
154.
The identification problem for linear stochastic systems may be stated roughly as follows: given observations on two stochastic processes which are the input and output of some unknown linear system, determine some estimate of the parameters of the system. A set of candidate linear systems which contains the “true” system is introduced, and probabilistic assumptions on the two stochastic processes turn the identification problem into the deterministic problem of minimizing some objective function over this candidate model set. If this set is a manifold, the existence of globally convergent identification algorithms hinges on the critical point behavior of the objective functions which it carries. By way of Morse Theory, the critical point behavior of objective functions on a manifold has implications with regard to the topology of the manifold. This paper analyzes the topology and critical point behavior of objective functions on a specific manifold of linear systems which appears frequently as the candidate model set in identification problems. This manifold is the set Σ of allm-input,p-output linear systems of fixed McMillan degree with real or complex coefficients. Over this manifold sits the principal bundle \(\tilde \Sigma\) of minimal realizations of systems in Σ It is shown that there exist three natural analytic metrics on the associated vector bundle. It is also shown that, in the real case, the first Stiefel-Whitney class of the bundle \(\tilde \Sigma\) has min(m, p)-1 nonvanishing powers; the same conclusion is drawn about the first Chern class of \(\tilde \Sigma\) in the complex case. These results, which follow from Morse Theory and some elementary homotopy and homology theory, imply that the category of the bundle \(\tilde \Sigma\) is at least min(m, p), and hence that the Lusternik-Schnirelmann category of Σ is at least min(m, p). It follows that canonical forms (i.e. sections of \(\tilde \Sigma\) ) may exist only when min(m, p) = 1 and that any objective function on Σ with compact sublevel sets has at least min(m, p) critical points. In particular, there exist on Σ no globally convergent gradient algorithms when min(m, p) > 1.  相似文献   
155.
Cable response to X-rays is linear with incident fluence, provided the deposited charge in cable dielectrics is directly proportional to the X-ray flux. To estimate the level at which the linear region ends, we discuss three nonlinear processes that modify the deposited charge profile in a hypothetical cable model: field-limiting in vacuum gaps, ionization effects in air-filled gaps, and radiation-induced dielectric conductivity. The exact level at which limiting of the Norton driver in an elemental length of cable begins depends on the cable geometry and the X-ray source. Estimates of the onset of nonlinearities caused by field-limiting and by dielectric conductivity are found in terms of cable and source parameters. With air-filled gaps, the Norton driver is always nonlinear. In addition to limiting of the Norton drivers, the load response of a long cable may be limited because propagating currents are attenuated by the induced conductivity of the bulk of the dielectric.  相似文献   
156.
Summary A weak logic of programs is a formal system in which statements that mean the program halts cannot be expressed. In order to prove termination, we would usually have to use a stronger logical system. In this paper we show how we can prove termination of both iterative and recursive programs within a weak logic by augmenting the programs with counters and adding bound assertions on the counters as loop invariants and entry conditions. Thus, most of the existing verifiers which are based on a weak logic of programs can be used to prove termination of programs without any modification. We give examples of proofs of termination and of upper bounds on computation time that were obtained using a Pascal program verifier. The use of the method to locate causes of non-termination is also illustrated.This research was supported inpart by the Advanced Research Agency of the Office of the Secretary of Defence under contract DAHC 15-73-C-0435  相似文献   
157.
This is the second paper of a series which begins by treating the perception of pitch relations in musical contexts and the perception of timbre and speech. The first paper discusses in some detail those properties of musical scales required in order for them to function as reference frames which provide for the measurement of intervals such that ([1], p. 270),Every melodic phrase, every chord, which can be executed at any pitch, can be also executed at any other pitch in such a way that we immediately perceive the characteristic marks of their similarity. Here we continue this discussion by developing quantitative measures of the degree to which different scales possess the above properties. Then that property of musical scales which permits a listener to code the pitches of which it is constituted into degrees is examined and a corresponding quantitative measure developed. Musical scales are shown to be optimal choices with respect to both the former and latter measures, and a theory limiting those scales which are musically useful to a small fraction of possible sets of pitches is proposed. Existing scales which have been examined fall within the theory, which links the techniques of composition which may be used (i.e., those which produce perceptible relations between musical segments) to the above properties of the scale structures. This paper is not self-contained—reading of the previous paper in this series is required.This research was supported in part by grants and contracts AF-AFOSR 881-65, AF 49(638)-1738 and AF-AFOSR 68-1596.  相似文献   
158.
159.
160.
Construction litigation has become commonplace in numerous construction projects, particularly in large contracts. Miscommunication, inadequate plans and specifications, rigid contracts, changes in site conditions, nonpayment, catch up profits, limitations on manpower, tools, and equipment, improper supervision, notice requirements, constructive changes not recognized as such by owner, delays, and acceleration measures provoke claims and often result in disputes. A boosted decision tree system was used to predict the outcome of construction litigation. The study was conducted by using the same 114 Illinois court cases that were used in earlier prediction studies conducted with artificial neural networks in 1998 and case-based reasoning in 1999, augmented by an additional 18 cases that were filed in 1990–2000. All cases were extracted from the Westlaw on-line service. The best prediction result obtained with boosted decision trees was 90%. The boosted decision tree model appears to be a promising tool to help create a dispute-free construction industry.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号