首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16574篇
  免费   1275篇
  国内免费   855篇
电工技术   102篇
综合类   1010篇
化学工业   1700篇
金属工艺   1125篇
机械仪表   1043篇
建筑科学   2074篇
矿业工程   732篇
能源动力   1307篇
轻工业   81篇
水利工程   195篇
石油天然气   87篇
武器工业   82篇
无线电   1268篇
一般工业技术   5127篇
冶金工业   456篇
原子能技术   176篇
自动化技术   2139篇
  2024年   46篇
  2023年   462篇
  2022年   443篇
  2021年   521篇
  2020年   625篇
  2019年   537篇
  2018年   543篇
  2017年   760篇
  2016年   1065篇
  2015年   1044篇
  2014年   1133篇
  2013年   1174篇
  2012年   1321篇
  2011年   1153篇
  2010年   977篇
  2009年   956篇
  2008年   534篇
  2007年   888篇
  2006年   756篇
  2005年   512篇
  2004年   250篇
  2003年   308篇
  2002年   298篇
  2001年   297篇
  2000年   181篇
  1999年   254篇
  1998年   80篇
  1997年   49篇
  1996年   71篇
  1995年   78篇
  1994年   81篇
  1993年   79篇
  1992年   64篇
  1991年   60篇
  1990年   74篇
  1989年   42篇
  1988年   100篇
  1987年   263篇
  1986年   218篇
  1985年   68篇
  1984年   62篇
  1983年   50篇
  1982年   39篇
  1981年   29篇
  1980年   27篇
  1979年   43篇
  1978年   40篇
  1977年   12篇
  1976年   15篇
  1971年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
The IEEE 802.3az standard provides a new low power mode that Ethernet network interfaces can use to save energy when there is no traffic to transmit. Simultaneously with the final standard approval, several algorithms were proposed to govern the physical interface state transition between the normal active mode and the new low power mode. In fact, the standard leaves this sleeping algorithm unspecified to spur competition among different vendors and achieve the greatest energy savings. In this paper, we try to bring some light to the most well known sleeping algorithms, providing mathematical models for the expected energy savings and the average packet delay inflicted on outgoing traffic. We will then use the models to derive optimum configuration parameters for them under given efficiency constraints.  相似文献   
32.
The Kirchhoff approximation is used to show that the time domain impulse response of an isolated flat crack can be given a simple geometrical interpretation in terms of the derivative of a projected length function. For an elliptical crack, this derivative can be obtained explicitly to yield the two edge-diffracted waves which originate from the flashpoints of the crack. An explicit coordinate invariant expression is obtained from this elliptical crack solution which relates the time difference, t, between the arrival of these edge-diffracted waves and the crack size and orientation. Previously, we have proposed that this expression, together with t measurements in different scattering directions, could be used in a regression analysis as the basis for performing a constrained inversion of crack scattering data (i.e., where we attempt to obtain the best equivalent flat elliptical crack that fits the scattering measurements). Here we will demonstrate some results of applying the proposed algorithm using noisy synthetic data. The sensitivity of the results to both, number of measurements and transducer orientation, will be discussed.  相似文献   
33.
34.
35.
36.
In this paper, it is shown that the Heisenberg model of spin-1 chain can be constructed from the Birman–Wenzl algebra generator while we have got that the Heisenberg model of spin- $\frac{1}{2}$ chain can be constructed from the Temperley–Lieb algebra generator in our previous work (Sun et al. in EPL 94:50001, 2011). Here, we investigate the topological space, we find that the number of topological basis states raise from the previous two to three, and they are also the three eigenstates of a closed four-qubit Heisenberg model of spin-1 chain. Specifically, all the topological basis states are also the spin single states and one of them is the energy single state of the system. It is worth noting that all conclusions we get in this paper are consistent with our previous work (Sun et al. in EPL 94:50001, 2011). These just indicate that the topological basis states have particular properties in the system.  相似文献   
37.
38.
With the models of stress corrosion and pressure solution, by Yasuhara et al., two computation conditions were designed for a hypothetical nuclear waste repository in an unsaturated dual-porosity rock mass: (i) the fracture apertures are changed with the stress corrosion and pressure solution (the porosity of rock matrix is also a function of stress); (ii) the fracture apertures and the porosity of rock matrix are constants. Then the corresponding two-dimensional FEM analyses for the coupled thermohydro-mec...  相似文献   
39.
To fulfill increasingly difficult and demanding tasks in the ever-changing complex world, intelligent industrial products are to be developed with higher flexibility and adaptability. Digital twin (DT) brings about a possible means, due to its ability to provide candidate behavior adjustments based on received “feedbacks” from its physical part. However, such candidate adjustments are deterministic, and thus lack of flexibility and adaptability. To address such problem, in this paper an extended concept – evolutionary digital twin (EDT) and an EDT-based new mode for intelligent industrial product development has been proposed. With our proposed EDT, a more precise approximated model of the physical world could be established through supervised learning, based on which the collaborative exploration for optimal policies via parallel simulation in multiple cyberspaces could be performed through reinforcement learning. Hence, more flexibility and adaptability could be brought to industrial products through machine learning (such as supervised learning and reinforcement learning) based self-evolution. As a primary verification of the effectiveness of our proposed approach, a case study has been carried out. The experimental results have well confirmed the effectiveness of our EDT based development mode.  相似文献   
40.
Product family design and product configuration based on data mining technology is identified as an intelligent and automated means to improve the efficiency of product development. However, few of previous literatures have proposed systematic product family design method based on data mining technology. To make up for this deficiency, this research put forward a systematic data-mining-based method for product family design and product configuration. First, the customer requirement information and product engineering information in the historical order are formatted into structural data. Second, principal component analysis is performed on historical orders to extract the customers' differentiated needs. Third, association rule algorithm is introduced to mine the rules between differentiated needs and module instances in the historical orders, thus obtained the configuration knowledge between customer needs and product engineer. Forth, the mined rules are used to construct association rule-based classifier (CBA) that is employed to sort out the best product configuration schemes as popular product variants. Fifth, sequence alignment technique is employed to identify modules for popular product variants, so that the module instances are divided into optional, common and special module, respectively, thereby the product platform is generated based on common modules. Finally, according to new customer needs, the CBA classifier is used to recommend the best configuration schemes, and then popular product variants are configured based on the product platform. The feasibility of the proposed method is demonstrated by the product family design example of desktop computer hosts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号