首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7611篇
  免费   241篇
  国内免费   19篇
电工技术   169篇
综合类   14篇
化学工业   1043篇
金属工艺   253篇
机械仪表   149篇
建筑科学   341篇
矿业工程   38篇
能源动力   608篇
轻工业   295篇
水利工程   185篇
石油天然气   26篇
无线电   1151篇
一般工业技术   1088篇
冶金工业   408篇
原子能技术   65篇
自动化技术   2038篇
  2023年   56篇
  2022年   83篇
  2021年   138篇
  2020年   168篇
  2019年   153篇
  2018年   141篇
  2017年   226篇
  2016年   297篇
  2015年   220篇
  2014年   386篇
  2013年   504篇
  2012年   309篇
  2011年   362篇
  2010年   347篇
  2009年   346篇
  2008年   315篇
  2007年   311篇
  2006年   302篇
  2005年   265篇
  2004年   201篇
  2003年   192篇
  2002年   192篇
  2001年   155篇
  2000年   137篇
  1999年   123篇
  1998年   132篇
  1997年   94篇
  1996年   118篇
  1995年   83篇
  1994年   101篇
  1993年   97篇
  1992年   89篇
  1991年   80篇
  1990年   58篇
  1989年   56篇
  1988年   78篇
  1987年   82篇
  1986年   87篇
  1985年   67篇
  1984年   78篇
  1983年   55篇
  1982年   41篇
  1981年   49篇
  1980年   60篇
  1979年   41篇
  1978年   59篇
  1976年   59篇
  1975年   43篇
  1974年   53篇
  1973年   48篇
排序方式: 共有7871条查询结果,搜索用时 312 毫秒
111.
Experimental investigations have been made in which single crystals of solid explosives such as cyclotrimethylene trinitramine, RDX, pentaerythritol tetranitrate, PETN, AgN3 and Pb(N3)2, were irradiated with a focused laser beam of wavelength 266 nm and duration 5 nsec in an ultra high vacuum system housing a fast and sensitive time-of-flight mass spectrometer. From the mass spectra (both +ve and -ve ions) of the chemical species obtained, possible decomposition schemes of RDX and PETN have been proposed. For silver and lead azides, the laser irradiation did not cause explosions if the power density was sufficiently low, but micrometre size craters were formed. In the mass spectra of AgN3 products N3 and silver cluster ions, Ag n +, have been found for the first time. It has been suggested that such investigations may possibly throw some light on our understanding of the reactions taking place in a deflagration/detonation wave.  相似文献   
112.
This paper presents a method of structuring the free space of a roving robot's environment into a set of overlapping convex regions ideally suited to path planning and navigation tasks. The structure of the free space environment is maintained as a hypergraph with each convex region represented by a hyperedge identifying the boundary walls of the region. A new methodology reveals the structure of free space and constructs the hypergraph representation through a directed search for a set of fundamental circits in an abstract graphical representation of the environment geometry.  相似文献   
113.
Water ingress inside honeycomb sandwich panels during service has been linked to in-flight failure in some aircraft. There is an ongoing effort to develop nondestructive testing methods to detect the presence of water within the panels. Magnetic resonance (MR) represents an attractive approach in that it is sensitive to moisture. Using a unilateral MR sensor, testing can be applied directly to the surface of the panel. The viability of MR is demonstrated through laboratory imaging of both water within sandwich panels, as well as the adhesive itself. The detection of water using a one-sided handheld MR sensor is presented. It is shown that simple detection, as well as spatial localization of water within sandwich panels is possible.  相似文献   
114.
Fatigue growth data has been obtained for part-through thickness cracks in sheet specimens of polymethylmethacrylate subjected to cyclic tension. Statistical techniques are used to examine the usefulness of linear elastic fracture mechanics for correlating this part-through thickness crack growth data with throughthickness data published previously.  相似文献   
115.
In this paper, we investigate the problem of time series forecasting using single hidden layer feedforward neural networks (SLFNs), which is optimized via multiobjective evolutionary algorithms. By utilizing the adaptive differential evolution (JADE) and the knee point strategy, a nondominated sorting adaptive differential evolution (NSJADE) and its improved version knee point-based NSJADE (KP-NSJADE) are developed for optimizing SLFNs. JADE aiming at refining the search area is introduced in nondominated sorting genetic algorithm II (NSGA-II). The presented NSJADE shows superiority on multimodal problems when compared with NSGA-II. Then NSJADE is applied to train SLFNs for time series forecasting. It is revealed that individuals with better forecasting performance in the whole population gather around the knee point. Therefore, KP-NSJADE is proposed to explore the neighborhood of the knee point in the objective space. And the simulation results of eight popular time series databases illustrate the effectiveness of our proposed algorithm in comparison with several popular algorithms.  相似文献   
116.
The weak signal concept according to Ansoff has the aim to advance strategic early warning. It enables to predict the appearance of events in advance that are relevant for an organization. An example is to predict the appearance of a new and relevant technology for a research organization. Existing approaches detect weak signals based on an environmental scanning procedure that considers textual information from the internet. This is because about 80% of all data in the internet are textual information. The texts are processed by a specific clustering approach where clusters that represent weak signals are identified. In contrast to these related approaches, we propose a new methodology that investigates a sequence of clusters measured at successive points in time. This enables to trace the development of weak signals over time and thus, it enables to identify relevant weak signal developments for organization’s decision making in strategic early warning environment.  相似文献   
117.
We propose a uniform method to encode various types of trees succinctly. These families include ordered (ordinal), k-ary (cardinal), and unordered (free) trees. We will show the approach is intrinsically suitable for obtaining entropy-based encodings of trees (such as the degree-distribution entropy). Previously-existing succinct encodings of trees use ad hoc techniques to encode each particular family of trees. Additionally, the succinct encodings obtained using the uniform approach improve upon the existing succinct encodings of each family of trees; in the case of ordered trees, it simplifies the encoding while supporting the full set of navigational operations. It also simplifies the implementation of many supported operations. The approach applied to k-ary trees yields a succinct encoding that supports both cardinal-type operations (e.g. determining the child label i) as well as the full set of ordinal-type operations (e.g. reporting the number of siblings to the left of a node). Previous work on succinct encodings of k-ary trees does not support both types of operations simultaneously (Benoit et al. in Algorithmica 43(4):275–292, 2005; Raman et al. in ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 233–242, 2002). For unordered trees, the approach achieves the first succinct encoding. The approach is based on two recursive decompositions of trees into subtrees. Recursive decomposition of a structure into substructures is a common technique in succinct encodings and has even been used to encode (ordered) trees (Geary et al. in ACM Trans. Algorithms 2(4):510–534, 2006; He et al. in ICALP, pp. 509–520, 2007) and dynamic binary trees (Munro et al. in ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 529–536, 2001; Storm in Representing dynamic binary trees succinctly, Master’s thesis, 2000). The main distinction of the approach in this paper is that a tree is decomposed into subtrees in a manner that the subtrees are maximally isolated from each other. This intermediate decomposition result is interesting in its own right and has proved useful in other applications (Farzan et al. in ICALP (1), pp. 451–462, 2009; Farzan and Munro in ICALP (1), pp. 439–450, 2009; Farzan and Kamali in ICALP, 2011).  相似文献   
118.
Reactor blends of polyethylene/poly(ethylene-co-1-octene) resins with bimodal molecular weight and bimodal short chain branching distributions were synthesized in a two-step polymerization process. The compositions of these blends range from low molecular weight (LMW) homopolymer to high molecular weight (HMW) copolymer and vice versa HMW homopolymer to LMW copolymer. The shear flow characteristics of these polymers in the typical processing range mostly depend on the molecular weight and MWD of the polymer and are independent of the short chain branch content. From oscillatory shear measurements, it was observed that the viscosity of HMW polymers was reduced with the addition of LMW material. For the polymers produced with this two-step polymerization process, the LMW homopolymer and HMW copolymer blends and HMW homopolymer and LMW copolymer blends were melt miscible, despite the large viscosity differences of the pure components.  相似文献   
119.
In this paper we consider the problem of adaptively stabilizing, and providing step tracking for, an uncertain linear time-varying system. We propose an adaptive pole placement controller which solves the problem for a single-input single-output plant whose parameters switch at a moderate rate among the elements of a compact set. The output feedback controller incorporates an integrator, and its action emulates the behaviour of a pole placement state feedback compensator; the controller is periodic and mildly nonlinear, is easy to implement, is noise tolerant, and tolerates a degree of unmodelled dynamics.  相似文献   
120.
A wireless sensor network (WSN) commonly whilst a body sensor network (BSN) must be secured with requires lower level security for public information gathering, strong authenticity to protect personal health information. In this paper, some practical problems with the message authentication codes (MACs), which were proposed in the popular security architectures for WSNs, are reconsidered. The analysis shows that the recommended MACs for WSNs, e.g., CBC- MAC (TinySec), OCB-MAC (MiniSec), and XCBC-MAC (SenSee), might not be exactly suitable for BSNs. Particularly an existential forgery attack is elaborated on XCBC-MAC. Considering the hardware limitations of BSNs, we propose a new family of tunable lightweight MAC based on the PRESENT block cipher. The first scheme, which is named TukP, is a new lightweight MAC with 64-bit output range. The second scheme, which is named TuLP-128, is a 128-bit variant which provides a higher resistance against internal collisions. Compared with the existing schemes, our lightweight MACs are both time and resource efficient on hardware-constrained devices.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号