首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39934篇
  免费   5504篇
  国内免费   3538篇
电工技术   1524篇
综合类   2849篇
化学工业   3339篇
金属工艺   929篇
机械仪表   1354篇
建筑科学   459篇
矿业工程   347篇
能源动力   1593篇
轻工业   414篇
水利工程   158篇
石油天然气   112篇
武器工业   134篇
无线电   8971篇
一般工业技术   3282篇
冶金工业   427篇
原子能技术   139篇
自动化技术   22945篇
  2024年   243篇
  2023年   1845篇
  2022年   1961篇
  2021年   2267篇
  2020年   2355篇
  2019年   1972篇
  2018年   1836篇
  2017年   3263篇
  2016年   3236篇
  2015年   2780篇
  2014年   3712篇
  2013年   2894篇
  2012年   3360篇
  2011年   3108篇
  2010年   2314篇
  2009年   2542篇
  2008年   1177篇
  2007年   2052篇
  2006年   1645篇
  2005年   851篇
  2004年   332篇
  2003年   414篇
  2002年   407篇
  2001年   369篇
  2000年   256篇
  1999年   312篇
  1998年   119篇
  1997年   77篇
  1996年   91篇
  1995年   98篇
  1994年   59篇
  1993年   57篇
  1992年   57篇
  1991年   66篇
  1990年   47篇
  1989年   49篇
  1988年   150篇
  1987年   282篇
  1986年   251篇
  1985年   62篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1978年   1篇
  1977年   2篇
  1959年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
大气污染物排放清单是空气质量模拟和空气污染治理的重要依据.本研究比较分析了两套覆盖江苏省的2017年大气污染物排放清单,即分别由上海市环境科学研究院、江苏省环境科学研究院编制的"长三角清单"和"江苏省清单",并结合区域空气质量模型CMAQ评估不同清单对长三角地区2017年1、4、7、10月的空气质量模拟的影响.清单比较结果表明,除二氧化硫(SO2)以外,江苏省清单估算的各污染物排放量较长三角清单低.通过与观测数据比较,发现两套清单对SO2、氮氧化物(NOx)、臭氧(O3)和细颗粒物(PM2.5)的模型模拟性能均较好.江苏省清单与长三角清单两者的模拟结果空间分布接近,其中江苏省清单模拟的PM2.5和O3在长三角多数地区略低于长三角清单的模拟结果(1月O3除外).江苏省清单与长三角清单均能够用于空气质量模式模拟,可为江苏地区的细颗粒物和光化学烟雾污染的控制策略制定提供参考.  相似文献   
42.
Chaos optimization algorithm (COA) utilizes the chaotic maps to generate the pseudo-random sequences mapped as the decision variables for global optimization applications. A kind of parallel chaos optimization algorithm (PCOA) has been proposed in our former studies to improve COA. The salient feature of PCOA lies in its pseudo-parallel mechanism. However, all individuals in the PCOA search independently without utilizing the fitness and diversity information of the population. In view of the limitation of PCOA, a novel PCOA with migration and merging operation (denoted as MMO-PCOA) is proposed in this paper. Specifically, parallel individuals are randomly selected to be conducted migration and merging operation with the so far parallel solutions. Both migration and merging operation exchange information within population and produce new candidate individuals, which are different from those generated by stochastic chaotic sequences. Consequently, a good balance between exploration and exploitation can be achieved in the MMO-PCOA. The impacts of different one-dimensional maps and parallel numbers on the MMO-PCOA are also discussed. Benchmark functions and parameter identification problems are used to test the performance of the MMO-PCOA. Simulation results, compared with other optimization algorithms, show the superiority of the proposed MMO-PCOA algorithm.  相似文献   
43.
44.
45.
《Ceramics International》2015,41(7):8768-8772
Neodymium doped bismuth ferrite (BiFeO3, BFO) nanoparticles were successfully synthesized by a facile sol–gel route. The influence of annealing temperature, time, Bi content and solvent on the crystal structure of BFO was studied. Results indicated that the optimum processing condition of BFO products was 550–600 °C/1.5 h with excess 3–6% Bi and ethylene glycol as solvent. On the other hand, Nd3+ ion was introduced into the BFO system and the effect of Nd3+ concentration on the structure, magnetic and dielectric properties of BFO were investigated. It was found that the magnetization of BFO was enhanced significantly with Nd3+ substitution, being attributed to the suppression of the spiral cycloidal magnetic structure led by the crystal structure transition. Furthermore, with increasing Nd3+ content, the dielectric constant was found to decrease while the dielectric loss was enhanced, which was mainly due to the hoping conduction mechanism with the reduction of oxygen vacancies.  相似文献   
46.
Fault detection and isolation in water distribution networks is an active topic due to the nonlinearities of flow propagation and recent increases in data availability due to sensor deployment. Here, we propose an efficient two-step data driven alternative: first, we perform sensor placement taking the network topology into account; second, we use incoming sensor data to build a network model through online dictionary learning. Online learning is fast and allows tackling large networks as it processes small batches of signals at a time. This brings the benefit of continuous integration of new data into the existing network model, either in the beginning for training or in production when new data samples are gathered. The proposed algorithms show good performance in our simulations on both small and large-scale networks.  相似文献   
47.
Microstructural and thermo-mechanical analyses using the finite element method (FEM) were performed on the welded joint of 347H boiler tubes in a coal-fired power plant after 3600 h of operation. The cracks in the failed tube started on the inner surface of the heat-affected zone (HAZ). This area had a high hardness value and volume fraction of strain-induced martensite. The plastic deformation around the crack was concentrated near the grain boundaries. This failure occurred as the stabilizing effect disappeared due to carbide dissolution in the heat-affected zone, and plastic deformation and tensile residual stress were formed at the inner side due to the solidification contraction of the outer bead.  相似文献   
48.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
49.
Though modeling and verifying Multi-Agent Systems (MASs) have long been under study, there are still challenges when many different aspects need to be considered simultaneously. In fact, various frameworks have been carried out for modeling and verifying MASs with respect to knowledge and social commitments independently. However, considering them under the same framework still needs further investigation, particularly from the verification perspective. In this article, we present a new technique for model checking the logic of knowledge and commitments (CTLKC+). The proposed technique is fully-automatic and reduction-based in which we transform the problem of model checking CTLKC+ into the problem of model checking an existing logic of action called ARCTL. Concretely, we construct a set of transformation rules to formally reduce the CTLKC+ model into an ARCTL model and CTLKC+ formulae into ARCTL formulae to get benefit from the extended version of NuSMV symbolic model checker of ARCTL. Compared to a recent approach that reduces the problem of model checking CTLKC+ to another logic of action called GCTL1, our technique has better scalability and efficiency. We also analyze the complexity of the proposed model checking technique. The results of this analysis reveal that the complexity of our reduction-based procedure is PSPACE-complete for local concurrent programs with respect to the size of these programs and the length of the formula being checked. From the time perspective, we prove that the complexity of the proposed approach is P-complete with regard to the size of the model and length of the formula, which makes it efficient. Finally, we implement our model checking approach on top of extended NuSMV and report verification results for the verification of the NetBill protocol, taken from business domain, against some desirable properties. The obtained results show the effectiveness of our model checking approach when the system scales up.  相似文献   
50.
The proposed work involves the multiobjective PSO based adaption of optimal neural network topology for the classification of multispectral satellite images. It is per pixel supervised classification using spectral bands (original feature space). This paper also presents a thorough experimental analysis to investigate the behavior of neural network classifier for given problem. Based on 1050 number of experiments, we conclude that following two critical issues needs to be addressed: (1) selection of most discriminative spectral bands and (2) determination of optimal number of nodes in hidden layer. We propose new methodology based on multiobjective particle swarm optimization (MOPSO) technique to determine discriminative spectral bands and the number of hidden layer node simultaneously. The accuracy with neural network structure thus obtained is compared with that of traditional classifiers like MLC and Euclidean classifier. The performance of proposed classifier is evaluated quantitatively using Xie-Beni and β indexes. The result shows the superiority of the proposed method to the conventional one.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号