首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30073篇
  免费   3799篇
  国内免费   2072篇
电工技术   2490篇
综合类   2694篇
化学工业   4604篇
金属工艺   1795篇
机械仪表   1818篇
建筑科学   2373篇
矿业工程   892篇
能源动力   910篇
轻工业   3228篇
水利工程   740篇
石油天然气   1147篇
武器工业   463篇
无线电   3518篇
一般工业技术   3257篇
冶金工业   882篇
原子能技术   507篇
自动化技术   4626篇
  2024年   231篇
  2023年   719篇
  2022年   1531篇
  2021年   2081篇
  2020年   1442篇
  2019年   1141篇
  2018年   1158篇
  2017年   1250篇
  2016年   1052篇
  2015年   1655篇
  2014年   1859篇
  2013年   2089篇
  2012年   2395篇
  2011年   2499篇
  2010年   2233篇
  2009年   2106篇
  2008年   1950篇
  2007年   1669篇
  2006年   1431篇
  2005年   1228篇
  2004年   860篇
  2003年   695篇
  2002年   747篇
  2001年   654篇
  2000年   376篇
  1999年   248篇
  1998年   130篇
  1997年   103篇
  1996年   87篇
  1995年   66篇
  1994年   57篇
  1993年   43篇
  1992年   18篇
  1991年   27篇
  1990年   14篇
  1989年   16篇
  1988年   9篇
  1987年   10篇
  1986年   14篇
  1985年   3篇
  1984年   3篇
  1983年   2篇
  1982年   3篇
  1981年   3篇
  1980年   12篇
  1979年   6篇
  1974年   1篇
  1972年   1篇
  1959年   7篇
  1951年   10篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
102.
大学计算机基础课程是高校非计算机专业的一门公共基础课。它着力培养学生运用计算机技术分析问题、解决问题的意识和能力;培养学生的系统思维能力,提高大学生的信息素养。该文分析了目前大学计算机基础课程教学的存在的主要问题,针对问题,提出了一些改革性的建议。  相似文献   
103.
We study single machine batch scheduling with release times. Our goal is to minimize the sum of weighted flow times (or completion times) and delivery costs. Since the problem is strongly $\mathcal{NP}$ -hard even with no delivery cost and identical weights for all jobs, an approximation algorithm is presented for the problem with identical weights. This uses the polynomial time solution we give for the preemptive version of the problem. We also present an evolutionary metaheuristic algorithm for the general case. Computational results show very small gaps between the results of the metaheuristic and the lower bound.  相似文献   
104.
As probabilistic data management is becoming one of the main research focuses and keyword search is turning into a more popular query means, it is natural to think how to support keyword queries on probabilistic XML data. With regards to keyword query on deterministic XML documents, ELCA (Exclusive Lowest Common Ancestor) semantics allows more relevant fragments rooted at the ELCAs to appear as results and is more popular compared with other keyword query result semantics (such as SLCAs). In this paper, we investigate how to evaluate ELCA results for keyword queries on probabilistic XML documents. After defining probabilistic ELCA semantics in terms of possible world semantics, we propose an approach to compute ELCA probabilities without generating possible worlds. Then we develop an efficient stack-based algorithm that can find all probabilistic ELCA results and their ELCA probabilities for a given keyword query on a probabilistic XML document. Finally, we experimentally evaluate the proposed ELCA algorithm and compare it with its SLCA counterpart in aspects of result probability, time and space efficiency, and scalability.  相似文献   
105.
Upflow anaerobic sludge bed reactors fed on glucose were used to investigate the effects of Ce(3+) on soluble microbial products (SMP) production, which is the majority of the residual chemical oxygen demand present in the effluent. It was found that Ce(3+) concentration of 0.05 mg/L had no significant effect on the amount of SMP production, whereas that of 1 mg/L led to the increase in SMP production. The molecular-weight distribution and carbohydrate analysis indicated that an increase in SMP production may be partly attributed to the release of extracellular polymeric substances (EPS) into the bulk solution resulted from cerium toxicity, and the nucleic acids analysis suggested that increased cell lysis also contributed to SMP accumulation in the presence of Ce(3+). The increase in SMP production in the presence of Ce(3+) is possibly a consequence of the release of EPS and increased cell lysis due to cerium toxicity.  相似文献   
106.
Key-privacy is a notion of security that is concerned with the key anonymity in public-key encryption.Some popular schemes keep key-privacy,while others do not.Key-privacy has been shown to be orthogonal to data-privacy within one cryptosystem.This paper investigates the relationship between keyprivacy and data-privacy in public-key encryption.We show that the existence of IK-CPA secure cryptosystems implies the existence of IE-CCA secure cryptosystems in the random oracle model.The main contributions include a novel construction of a family of injective one-way trapdoor functions directly based on any IK-CPA secure public-key cryptosystem in the random oracle model.This construction adopts a novel idea in the construction compared to the existing one.The latter was based on unapproximable trapdoor predicates.The novelty of the construction allows to show that the injective trapdoor functions are secure under correlated products with respect to uniform repetitional distribution.That further allows us to conclude,in the random oracle model,that the existence of IK-CPA secure public-key cryptosystems implies the existence of CCA secure cryptosystems by a result of Rosen and Segev.  相似文献   
107.
通过对各种SIM卡技术的对比,说明了SIM卡不仅用于解决用户入网鉴权和加密问题,还在向着双面应用、非预置个人化信息、更小更薄、存储容量更大等方向发展。SIM卡技术的演进,推动着手机终端的发展,随着智能手机的普及,手机终端除具备通信功能外,还将具有银行卡、门禁卡、公交卡等多种个人化应用。  相似文献   
108.
This paper focuses on the mechanism underlying the overall delay of a real-time video communication system from the time of capture at the encoder to the time of display at the decoder. A detailed analysis is presented to illustrate the delay problem. We then describe a statistically uniform intra-block refresh scheme for very low delay video communication. By scattering intra-blocks uniformly into continuous frames, the overall delay is significantly decreased, and object changes in the scene could be presented to the end user instantly. For comparison, the overall delay and the peak signal-to-noise ratio (PSNR) performance are tested. The experiment results show that an average of approximately 0.1 dB PSNR gain on average is obtained relative to random intra-macroblock refresh algorithm in H.264 JM, and the end-to-end delay performance is significantly improved.  相似文献   
109.
对分层海洋中本征声线的求取方法进行了改进.在本征声线模型基础上,分别利用二分法、单点弦截法对初始掠射角进行了精确计算和分析,结果表明,单点弦截法在保证精度的基础上节省了计算时间.计算结果可以为分层海洋本征声线建模提供理论依据.  相似文献   
110.
随着企业的业务变更越来越频繁,业务系统中的异构数据越来越多.采用SOA的设计思想,引入Web Service、XML等技术,提出了一种异构数据集成的方法,给出了一个面向SOA的异构数据集成框架,能有效地应对业务的快速变更,降低异构数据集成中组件的内部耦合度,提高数据集成中组件的复用性和可扩展性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号