首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4207篇
  免费   223篇
  国内免费   4篇
电工技术   42篇
综合类   6篇
化学工业   1179篇
金属工艺   70篇
机械仪表   111篇
建筑科学   196篇
矿业工程   8篇
能源动力   152篇
轻工业   523篇
水利工程   25篇
石油天然气   14篇
无线电   286篇
一般工业技术   703篇
冶金工业   158篇
原子能技术   46篇
自动化技术   915篇
  2024年   8篇
  2023年   38篇
  2022年   187篇
  2021年   216篇
  2020年   106篇
  2019年   116篇
  2018年   151篇
  2017年   140篇
  2016年   191篇
  2015年   111篇
  2014年   171篇
  2013年   309篇
  2012年   279篇
  2011年   337篇
  2010年   224篇
  2009年   246篇
  2008年   231篇
  2007年   187篇
  2006年   193篇
  2005年   153篇
  2004年   109篇
  2003年   98篇
  2002年   79篇
  2001年   60篇
  2000年   56篇
  1999年   53篇
  1998年   51篇
  1997年   38篇
  1996年   41篇
  1995年   41篇
  1994年   24篇
  1993年   23篇
  1992年   11篇
  1991年   16篇
  1990年   10篇
  1989年   12篇
  1988年   7篇
  1987年   8篇
  1986年   9篇
  1985年   10篇
  1984年   10篇
  1983年   6篇
  1982年   16篇
  1981年   11篇
  1980年   6篇
  1979年   8篇
  1978年   7篇
  1977年   6篇
  1976年   4篇
  1973年   3篇
排序方式: 共有4434条查询结果,搜索用时 0 毫秒
21.
Verification methods based on SAT, SMT, and theorem proving often rely on proofs of unsatisfiability as a powerful tool to extract information in order to reduce the overall effort. For example a proof may be traversed to identify a minimal reason that led to unsatisfiability, for computing abstractions, or for deriving Craig interpolants. In this paper we focus on two important aspects that concern efficient handling of proofs of unsatisfiability: compression and manipulation. First of all, since the proof size can be very large in general (exponential in the size of the input problem), it is indeed beneficial to adopt techniques to compress it for further processing. Secondly, proofs can be manipulated as a flexible preprocessing step in preparation for interpolant computation. Both these techniques are implemented in a framework that makes use of local rewriting rules to transform the proofs. We show that a careful use of the rules, combined with existing algorithms, can result in an effective simplification of the original proofs. We have evaluated several heuristics on a wide range of unsatisfiable problems deriving from SAT and SMT test cases.  相似文献   
22.
Variability for oil and fatty acid composition in castorbean varieties   总被引:1,自引:0,他引:1  
Thirty-six castorbean varieties were surveyed for oil and fatty acid composition, in order to determine variability of these seed compounds. A large variability of seed oil percentage was observed, ranging from 39.6 to 59.5%. Concerning the fatty acids, little variability was observed for ricinoleic acid, which was the most abundant in the oil, ranging from 83.65 to 90.00%. The other fatty acids appeared in small concentrations and showed a small range: 0.87 to 2.35, 0.68 to 1.84, 2.96 to 5.64, 3.19 to 5.98, and 0.34 to 0.91%, for palmitic, stearic, oleic, linoleic, and linolenic acid, respectively. Non-significant correlations were observed between fatty acids and seed oil percentage. However, significant correlations were observed among fatty acid concentrations: positive and negative ones. These significant correlations could be associated with the biosynthetic pathways of the fatty acids, which are not fully elucidated. They suggest, however, that selection for a particular fatty acid will tend to increase those positively correlated, and decrease those negative ones. Selection and plant breeding techniques could then be applied to modify the oil content of the castorbean seeds, considering the variability observed. For the fatty acid composition, however, the variability was not large enough to make substantial changes in their concentrations by selection procedures. More varieties should be surveyed to find out if such variability is available.  相似文献   
23.
We consider an initial-boundary-value problem for a time-fractional diffusion equation with initial condition u0(x) and homogeneous Dirichlet boundary conditions in a bounded interval [0, L]. We study a semidiscrete approximation scheme based on the pseudo-spectral method on Chebyshev–Gauss–Lobatto nodes. In order to preserve the high accuracy of the spectral approximation we use an approach based on the evaluation of the Mittag-Leffler function on matrix arguments for the integration along the time variable. Some examples are presented and numerical experiments illustrate the effectiveness of the proposed approach.  相似文献   
24.
We introduce a framework for the generation of polygonal gridshell architectural structures, whose topology is designed in order to excel in static performances. We start from the analysis of stress on the input surface and we use the resulting tensor field to induce an anisotropic nonEuclidean metric over it. This metric is derived by studying the relation between the stress tensor over a continuous shell and the optimal shape of polygons in a corresponding gridshell. Polygonal meshes with uniform density and isotropic cells under this metric exhibit variable density and anisotropy in Euclidean space, thus achieving a better distribution of the strain energy over their elements. Meshes are further optimized taking into account symmetry and regularity of cells to improve aesthetics. We experiment with quad meshes and hexdominant meshes, demonstrating that our gridshells achieve better static performances than stateoftheart gridshells.  相似文献   
25.
Within the Constraint Satisfaction Problems (CSP) context, a methodology that has proven to be particularly performant consists of using a portfolio of different constraint solvers. Nevertheless, comparatively few studies and investigations have been done in the world of Constraint Optimization Problems (COP). In this work, we provide a generalization to COP as well as an empirical evaluation of different state of the art existing CSP portfolio approaches properly adapted to deal with COP. The results obtained by measuring several evaluation metrics confirm the effectiveness of portfolios even in the optimization field, and could give rise to some interesting future research.  相似文献   
26.
Semantic similarity has typically been measured across items of approximately similar sizes. As a result, similarity measures have largely ignored the fact that different types of linguistic item can potentially have similar or even identical meanings, and therefore are designed to compare only one type of linguistic item. Furthermore, nearly all current similarity benchmarks within NLP contain pairs of approximately the same size, such as word or sentence pairs, preventing the evaluation of methods that are capable of comparing different sized items. To address this, we introduce a new semantic evaluation called cross-level semantic similarity (CLSS), which measures the degree to which the meaning of a larger linguistic item, such as a paragraph, is captured by a smaller item, such as a sentence. Our pilot CLSS task was presented as part of SemEval-2014, which attracted 19 teams who submitted 38 systems. CLSS data contains a rich mixture of pairs, spanning from paragraphs to word senses to fully evaluate similarity measures that are capable of comparing items of any type. Furthermore, data sources were drawn from diverse corpora beyond just newswire, including domain-specific texts and social media. We describe the annotation process and its challenges, including a comparison with crowdsourcing, and identify the factors that make the dataset a rigorous assessment of a method’s quality. Furthermore, we examine in detail the systems participating in the SemEval task to identify the common factors associated with high performance and which aspects proved difficult to all systems. Our findings demonstrate that CLSS poses a significant challenge for similarity methods and provides clear directions for future work on universal similarity methods that can compare any pair of items.  相似文献   
27.
28.
Enterprise activities are governed by regulations and laws that are multiple, heterogeneous and not always easy to understand. The arising and/or the modification of these regulations and laws can cause a significant impact in the business context, especially in terms of enterprise information systems adaptation. Currently, there are many methodological and technological tools that facilitate the application of regulations and procedures, but they are not integrated enough to ensure a complete problem management. Therefore, they are not sufficient to support organizations and companies in the management of their business processes. In this paper we propose a methodological and technological solution, able to model, manage, execute and monitor business processes of complex domains. The system allows both the design of an information system and its prototyping as a web application, by the extension of an appropriately selected Business Process Management suite. During both the design and the usage phases of the prototyped information system, it is possible to interface with a knowledge base that contains information about regulations and aspects that characterize the enterprise (organizational chart, tasks, etc.).  相似文献   
29.
Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus.The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware—and Zeus in particular—that could pave the way for further investigation in this field.  相似文献   
30.
This paper presents a contingent valuation study concerning landscape impacts generated by the construction of one dam (Baker 1) of the HIDROAYSEN hydropower project located in the Chilean Patagonia. A survey was used to collect information about citizens’ opinions towards the hydropower project in four major cities in Chile. Specifically, a One-and-One-Half-Bound (OOHB) willingness to pay eliciting format was applied to capture citizens’ WTP. The economic loss, associated to the landscape impacts for people living in urban areas of the country, is found to be approximately US$ 205 million, which is nearly 28% of the total investment. Our results also show that the cities’ distance from the dam affects citizens’ willingness to pay.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号