首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15162篇
  免费   1257篇
  国内免费   596篇
电工技术   852篇
技术理论   2篇
综合类   847篇
化学工业   2673篇
金属工艺   924篇
机械仪表   959篇
建筑科学   1129篇
矿业工程   516篇
能源动力   434篇
轻工业   880篇
水利工程   244篇
石油天然气   1188篇
武器工业   102篇
无线电   1666篇
一般工业技术   1889篇
冶金工业   836篇
原子能技术   147篇
自动化技术   1727篇
  2024年   79篇
  2023年   302篇
  2022年   472篇
  2021年   656篇
  2020年   520篇
  2019年   445篇
  2018年   512篇
  2017年   511篇
  2016年   438篇
  2015年   595篇
  2014年   765篇
  2013年   825篇
  2012年   929篇
  2011年   997篇
  2010年   877篇
  2009年   850篇
  2008年   871篇
  2007年   743篇
  2006年   780篇
  2005年   646篇
  2004年   521篇
  2003年   436篇
  2002年   425篇
  2001年   360篇
  2000年   343篇
  1999年   403篇
  1998年   295篇
  1997年   279篇
  1996年   240篇
  1995年   212篇
  1994年   172篇
  1993年   120篇
  1992年   104篇
  1991年   66篇
  1990年   62篇
  1989年   45篇
  1988年   28篇
  1987年   25篇
  1986年   15篇
  1985年   12篇
  1984年   13篇
  1983年   5篇
  1982年   5篇
  1981年   7篇
  1980年   3篇
  1979年   3篇
  1978年   1篇
  1977年   1篇
  1970年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
二维任意形状寄生电阻电容的边界元计算   总被引:1,自引:0,他引:1  
由于集成电路技术高速发展,精确提取任意形状寄生电阻电容变得十分重要,本文以直接边界元素法为基础,利用圆弧样条插值近似任意曲线边界,使插值曲线具有整体一阶连续性,并克服了大挠度与多值的困扰。在直线边界使用线性连续元,在曲线边界使用二次连续无。对两邻国为直线的角点,我们曾提出处理角点处存在多重法的导数的一种方法。这里,它被推广到角点邻边含曲线段的情形。数值结果表明模拟器是可行的。  相似文献   
52.
A growing concern about the consumer behavior in Internet economy has spurred the study of Material Flow, resulting in a unique type of consumer behavioral analysis. This research proposes an enhanced conceptual model for Personalized Material Flow Services for consumer behavior. In the era of Internet information technology, customer’s taste tends to be personalized for their market demand. It is observed that there are number of “Long Tail” phenomena in several successful e-commerce business cases. However, the Long Tail phenomenon is an open question for our research in terms of its role in e-commerce marketing. In the proposed model-X-Party Personalized Material Flow Services, three elements are discussed. They are “providing”, “locating” and “obtaining” based on X-Party Material Flow theory for which the concept of virtual collector, information filter and Material Flow coordinator are discussed. Business examples of Amazon, Dangdang and Taobao are used to analyze the elements of the virtual collector, information filter and Material Flow coordinator of the Personalized Material Flow Service system.  相似文献   
53.
In the processes of product innovation and design, it is important for the designers to find and capture customer's focus through customer requirement weight calculation and ranking. Based on the fuzzy set theory and Euclidean space distance, this paper puts forward a method for customer requirement weight calculation called Euclidean space distances weighting ranking method. This method is used in the fuzzy analytic hierarchy process that satisfies the additive consistent fuzzy matrix. A model for the weight calculation steps is constructed; meanwhile, a product innovation design module on the basis of the customer requirement weight calculation model is developed. Finally, combined with the instance of titanium sponge production, the customer requirement weight calculation model is validated. By the innovation design module, the structure of the titanium sponge reactor has been improved and made innovative.  相似文献   
54.
Resolving the broadcast storm problem is an important issue in mobile ad hoc networks (MANETs). In this paper, we propose an approach for constructing a virtual subnet whose nodes are logically related. The virtual subnet can be spread upon clusters of a MANET. An intelligent agent with a routing filtering table is proposed to assist the best known clustering algorithms, the original Least ID algorithm and the original Highest Connection Cluster (HCC) algorithm, to improve group communication efficiency. Our simulation covers the network factors of hop count, deprave rate, and delay time. The simulation results show that when the proposed intelligent agent is used with the HCC algorithm, the delay time was reduced by 81.84% as compared with flooding, and by 49.25% as compared with the Ad Hoc On-Demand Distance Vector (AODV) routing algorithm. The delay time for the Least ID algorithm assisted by the proposed agents reduced by 81.84% compared to that of flooding and by 50% compared to that of AODV.  相似文献   
55.
Yang et al. [J.P. Yang, S.H. Cheng, Q. Wu, Recursive equations for compound distribution with the severity distribution of the mixed type, Science in China Series A 48 (2005) 594-609] investigated a recursive procedure for a kind of compound distributions with the number of claims belonging to (a,b)-family and the severity distribution of the mixed type. In this paper, we extend their results by assuming that the claim number belongs to a larger class. As applications, the excess-of-loss reinsurance treaty is discussed and concrete examples are considered in some detail.  相似文献   
56.
57.
In this paper, two delayed SEIR epidemic models with continuous and impulsive vaccination and saturating incidence are investigated. The dynamical behaviors of the disease are analyzed. For continuous vaccination, we obtain a basic reproductive number R1R1 and prove that if R1≤1R11 then the disease-free equilibrium is globally attractive and if R1>1R1>1 then the disease is permanent by using the Lyapunov functional method. For impulsive vaccination, we obtain two thresholds RR and RR and prove that if R<1R<1 then the disease-free periodic solution is globally attractive and if R>1R>1 then the disease is permanent by using the comparison theorem of impulsive differential equation and the Lyapunov functional method. Lastly, we compared the effects of two vaccination strategies.  相似文献   
58.
Dimensionality reduction is a big challenge in many areas. A large number of local approaches, stemming from statistics or geometry, have been developed. However, in practice these local approaches are often in lack of robustness, since in contrast to maximum variance unfolding (MVU), which explicitly unfolds the manifold, they merely characterize local geometry structure. Moreover, the eigenproblems that they encounter, are hard to solve. We propose a unified framework that explicitly unfolds the manifold and reformulate local approaches as the semi-definite programs instead of the above-mentioned eigenproblems. Three well-known algorithms, locally linear embedding (LLE), laplacian eigenmaps (LE) and local tangent space alignment (LTSA) are reinterpreted and improved within this framework. Several experiments are presented to demonstrate the potential of our framework and the improvements of these local algorithms.  相似文献   
59.
This paper proposes a new approach, named Card-Aided Firewall (CAF) that combines the simplified firewall and the state-oriented smart card technologies to construct a controllable and accountable Internet access framework. The idea suggests that a client computer, protected by a light-weight firewall, could establish diversified authenticated communication channels, controlled and accounted by “legal” states of the smart card.The program of a smart card is state-oriented or a state machine, which defines a chain of events involving various state transitions. The “legal” states of a smart card program are defined to be legal to communicate with surfing targets. A predefined Access Control List (ACL), stored in the same card, is necessary. An ACL is a sequential list of permit or deny statements that apply to addresses or upper-layer protocols. The proposed firewall decides acceptance or rejection messages by matching the current state of the card program and the ACL. In addition, a complete surfing account for tracing back is recorded. It is a by-product of the smart card authentication.The proposed Card-Aided Firewall framework is implemented to demonstrate its effectiveness. The implementation is done at the driver level. It keeps up with the high line speed. The driver takes 39K bytes and works well with other firewalls. The average packet processing time of the CAF driver is 31.74 μs. On the premise of secure authentication within the smart card, the Card-Aided Firewall would facilitate various rapidly growing applications in campus cards, family cards, and employee cards, etc. that require accurate controllability and accountability in the surfing boundary.  相似文献   
60.
We present a type of single-hidden layer feed-forward wavelet neural networks. First, we give a new and quantitative proof of the fact that a single-hidden layer wavelet neural network with n + 1 hidden neurons can interpolate + 1 distinct samples with zero error. Then, without training, we constructed a wavelet neural network X a (x, A), which can approximately interpolate, with arbitrary precision, any set of distinct data in one or several dimensions. The given wavelet neural network can uniformly approximate any continuous function of one variable.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号