首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   320274篇
  免费   4408篇
  国内免费   1713篇
电工技术   5618篇
综合类   244篇
化学工业   47318篇
金属工艺   11403篇
机械仪表   9696篇
建筑科学   8359篇
矿业工程   1020篇
能源动力   8865篇
轻工业   33922篇
水利工程   2929篇
石油天然气   4109篇
武器工业   47篇
无线电   39766篇
一般工业技术   61154篇
冶金工业   57889篇
原子能技术   5891篇
自动化技术   28165篇
  2021年   2651篇
  2020年   2008篇
  2019年   2407篇
  2018年   4038篇
  2017年   4101篇
  2016年   4538篇
  2015年   3058篇
  2014年   5109篇
  2013年   15224篇
  2012年   8869篇
  2011年   12230篇
  2010年   9616篇
  2009年   10787篇
  2008年   11274篇
  2007年   11236篇
  2006年   10231篇
  2005年   9218篇
  2004年   8835篇
  2003年   8681篇
  2002年   8140篇
  2001年   8513篇
  2000年   7832篇
  1999年   8202篇
  1998年   19533篇
  1997年   13620篇
  1996年   10275篇
  1995年   7873篇
  1994年   6882篇
  1993年   6768篇
  1992年   4894篇
  1991年   4738篇
  1990年   4543篇
  1989年   4348篇
  1988年   4165篇
  1987年   3411篇
  1986年   3331篇
  1985年   4023篇
  1984年   3551篇
  1983年   3288篇
  1982年   2984篇
  1981年   3020篇
  1980年   2826篇
  1979年   2667篇
  1978年   2465篇
  1977年   2900篇
  1976年   3620篇
  1975年   2139篇
  1974年   2013篇
  1973年   2071篇
  1972年   1598篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
A fast algorithm is proposed for estimating the auto- and cross-correlation functions of a large signal. The algorithm is based on the sectioning method by the fast Fourier transform. We determine the optimal length of the portion of data read from external memory into RAM which achieves Tmin—a minimum processing time. An estimate of Tmin is obtained.Translated from Kibernetika, No. 3, pp. 78–81, May–June, 1991.  相似文献   
92.
93.
94.
This paper presents and analyzes in detail an efficient search method based on evolutionary algorithms (EA) assisted by local Gaussian random field metamodels (GRFM). It is created for the use in optimization problems with one (or many) computationally expensive evaluation function(s). The role of GRFM is to predict objective function values for new candidate solutions by exploiting information recorded during previous evaluations. Moreover, GRFM are able to provide estimates of the confidence of their predictions. Predictions and their confidence intervals predicted by GRFM are used by the metamodel assisted EA. It selects the promising members in each generation and carries out exact, costly evaluations only for them. The extensive use of the uncertainty information of predictions for screening the candidate solutions makes it possible to significantly reduce the computational cost of singleand multiobjective EA. This is adequately demonstrated in this paper by means of mathematical test cases and a multipoint airfoil design in aerodynamics.  相似文献   
95.
Critical systems are aptly named - from electric power to water and gas to the telephone system and the Internet, they're all critical to some aspect of our daily lives. We're a networked society and as such, it's important to both know whether critical systems are trustworthy and be able to communicate, review, and debate the level of trust achieved in them. In the safety domain, explicit safety cases are increasingly required by law, regulations, and standards. In this article, we outline what a small, international group of experts, spanning various disciplines in safety, security, reliability, and critical infrastructure, been doing with the International Working Group on Assurance Cases (for Security), what we hope to achieve, and where we go next.  相似文献   
96.
In this letter, a concise process technology is proposed for the first time to enable the fabrication of good quality three-dimensional (3-D) suspended radio frequency (RF) micro-inductors on bulk silicon, without utilizing the lithography process on sidewall and trench-bottom patterning. Samples were fabricated to demonstrate the applicability of the proposed process technology.  相似文献   
97.
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.  相似文献   
98.
99.
100.
This paper describes a sequential tripping strategy used in a wide area back-up protection expert system (BPES) to combat situations in which protection relays have maloperated or information is missing. The BPES is an innovative back-up protection scheme designed to prevent the occurrence of widespread blackouts. The BPES evaluates the certainty that transmission lines are likely to be affected by the fault and uses a sequential tripping strategy to isolate the fault if a firm decision is not available due to maloperated relays and/or missing information. The mode of analysis and the sequential tripping strategy ensures that the BPES will clear a fault at minimum risk to the network. An example is included to demonstrate how the certainty factor based sequential tripping strategy is employed by the BPES to clear a fault which occurred on the South Western part of the UK National Grid System  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号