首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56253篇
  免费   4957篇
  国内免费   2513篇
电工技术   3437篇
技术理论   3篇
综合类   3605篇
化学工业   9339篇
金属工艺   2981篇
机械仪表   3510篇
建筑科学   5090篇
矿业工程   1593篇
能源动力   1591篇
轻工业   4335篇
水利工程   1003篇
石油天然气   2615篇
武器工业   438篇
无线电   6586篇
一般工业技术   6863篇
冶金工业   2394篇
原子能技术   746篇
自动化技术   7594篇
  2024年   285篇
  2023年   1085篇
  2022年   1908篇
  2021年   2636篇
  2020年   1980篇
  2019年   1606篇
  2018年   1696篇
  2017年   2007篇
  2016年   1799篇
  2015年   2246篇
  2014年   2818篇
  2013年   3350篇
  2012年   3607篇
  2011年   3883篇
  2010年   3462篇
  2009年   3266篇
  2008年   3061篇
  2007年   2871篇
  2006年   2791篇
  2005年   2523篇
  2004年   1634篇
  2003年   1483篇
  2002年   1394篇
  2001年   1226篇
  2000年   1187篇
  1999年   1318篇
  1998年   1071篇
  1997年   932篇
  1996年   960篇
  1995年   785篇
  1994年   656篇
  1993年   468篇
  1992年   361篇
  1991年   284篇
  1990年   206篇
  1989年   182篇
  1988年   161篇
  1987年   110篇
  1986年   79篇
  1985年   57篇
  1984年   44篇
  1983年   29篇
  1982年   23篇
  1981年   20篇
  1980年   20篇
  1979年   19篇
  1977年   6篇
  1962年   42篇
  1961年   41篇
  1960年   16篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
The fast Fourier transform (FFT) is a fundamental kernel of many computation-intensive scientific applications.This paper deals with an implementation of the FFT on the accelerator system,a heterogeneous multi-core architecture to accelerate computation-intensive parallel computing in scientific and engineering applications.The Engineering and Scientific Computation Accelerator (ESCA) consists of a control unit and a single instruction multiple data (SIMD) processing element (PE) array,in which PEs communicate with each other via a hierarchical two-level network-on-chip (NoC) with high bandwidth and low latency.We exploit the architecture features of ESCA to implement a parallel FFT algorithm efficiently.Experimental results show that both the proposed parallel FFT algorithm and the ESCA architecture are scalable.The 16-bit fixed-point parallel FFT performance of ESCA is compared with a published work to prove the superiority of the mapping algorithm and the hardware architecture.The floating-point parallel FFT performances of ESCA are evaluated and compared with those of the IBM Cell processor and GPU to demonstrate the computing power of the ESCA system for high performance applications.  相似文献   
62.
This article presents a mathematical model of the shock-free unsteady nonisothermal turbulent flow of a viscous nonideal chemically inert multicomponent gas mix in the offshore circular cross-section gas pipeline with a rigid multilayer coating. The calculations of flow characteristics are given for the problem of the pipeline’s shift to the periodic condition under a periodic change of the consumption rate at the right end.  相似文献   
63.
In order to improve decision-making efficiency about emergency event, this paper proposes a novel concept, i.e., Agile-Delphi Method, which is an integration of agile decision and Delphi Method implicating that the decision-makers instantly deliver, respond, treat, and utilize information via Delphi process while conducting group decision-making about emergency event. The paper details the mechanism of group decision-making about emergency event based on network technology and Agile-Delphi Method. Finally, the paper conducts an empiric analysis taking the “111 event”, i.e., the liquid ammonia spill event happened on November 1, 2006 in a phosphorus chemical company in China, as an example.  相似文献   
64.
基于HLA的卫星协同仿真系统研究与实现   总被引:1,自引:0,他引:1  
基于HLA体系规范,研究协同仿真软件体系结构,设计了一个卫星协同仿真系统CSS(Coordinated Simulation System).首先简要介绍了系统研究的意义,以系统功能以及系统要素为基础分析了系统的需求、提出了基于"协同"的设计原则以及系统性能评估指标,然后介绍了实现CSS的关键技术--使命空间的任务体现结构和多分辨率建模技术 ,以及CSS的分层设计的系统结构,并以仿真任务管理成员和卫星成员为例分析了设计CSS联邦成员的设计思路,最后提出了一个原型系统.该系统仿真了卫星侦查、数据通信、数据评估等整个过程对大型复杂系统的仿真具有很好的借鉴意义.  相似文献   
65.
企业办公自动化系统的应用十分广泛,随着互联网的高速发展,WEB应用成为主流,OA系统在互联网上的延伸成为大趋势,本文阐述在WEB应用中如何保障数据和系统安全的手段和方法。  相似文献   
66.
为了改善古典迭代法的收敛速度,本文提出一种带参数的新预条件方法,并对参数的选择给出必要条件,证明了对于非奇异不可约M一矩阵,新预条件方法收敛且可以加速Gauss—Seidel迭代法的收敛速度,数值例子表明新预条件方法是有效的.  相似文献   
67.
The defect of process equipments is a major factor that impairs the yields in the mass production of semiconductor wafer fabrication and it is a main supervision means to use high-resolution defect inspection tools to detect and monitor the defect damage. Due to the high investment costs of these inspection tools and the resulting decrease in the throughput, how to improve the sampling rate is an important issue for the associated inspection strategy. This paper proposes a new concept and implementation of virtual inspection (VI) to enhance the detection and monitoring of defect in semiconductor production process. The underlying theory of the VI concept is that the state variables identifications (SVIDs) of process equipments can reflect the process quality effectively and loyally. The approach of VI is to combine the application of the fault detection and classification (FDC), and the defect library and the re-engineering of inspection procedure to reach the full-scope of strategic objective. VI enables the defect monitoring to enter a new era by promoting the monitoring level of defect inspection from the previous lot-sampling basis to the wafer-sampling level, and hence upgrades the sampling strategy from random-sampling to full and right-sampling. In this study, various typical defect cases are utilized to illustrate how to create VI models and verify the reliability of the proposed approach. Furthermore, a feasible architecture of the VI implementation for mass production in semiconductor factory is presented in the paper.  相似文献   
68.
This paper presents a construction for a class of 1-resilient functions with optimal algebraic immunity on an even number of variables. The construction is based on the concatenation of two balanced functions in associative classes. For some n, a part of 1-resilient functions with maximum algebraic immunity constructed in the paper can achieve almost optimal nonlinearity. Apart from their high nonlinearity, the functions reach Siegenthaler's upper bound of algebraic degree. Also a class of 1-resilient functions on any number n > 2 of variables with at least sub-optimal algebraic immunity is provided.  相似文献   
69.
Understanding the TCP congestion control mechanism from a global optimization point of view is not only important in its own right, but also crucial to the design of other transport layer traffic control protocols with provable properties. In this paper, we derive a global utility function and the corresponding optimal control law, known as TCP control law, which maximizes the global utility. The TCP control law captures the essential behaviors of TCP, including slow start, congestion avoidance, and the binary nature of congestion feedback in TCP. We find that the utility function of TCP is linear in the slow start phase and is proportional to the additive increase rate and approaches the well-known logarithm function as the data rate becomes large in the congestion avoidance phase. We also find that understanding the slow start phase with a fixed threshold is critical to the design of new transport layer control protocols to enable quality of service features. Finally, as an application, we design a Minimum Rate Guaranteed (MRG) traffic control law that shares the same utility function as the TCP control law. Our simulation study of the MRG control law indicates that it is indeed TCP friendly and can provide minimum rate guarantee as long as the percentage of network resource consumed by the MRG flows is moderately small.  相似文献   
70.
A blind watermarking method using maximum wavelet coefficient quantization   总被引:3,自引:0,他引:3  
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号