首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   52506篇
  免费   5048篇
  国内免费   2603篇
电工技术   3522篇
技术理论   1篇
综合类   4252篇
化学工业   6838篇
金属工艺   2031篇
机械仪表   3561篇
建筑科学   7819篇
矿业工程   1076篇
能源动力   3459篇
轻工业   5628篇
水利工程   838篇
石油天然气   2429篇
武器工业   741篇
无线电   3299篇
一般工业技术   5139篇
冶金工业   2391篇
原子能技术   350篇
自动化技术   6783篇
  2024年   352篇
  2023年   1000篇
  2022年   1850篇
  2021年   2187篇
  2020年   2289篇
  2019年   1912篇
  2018年   1857篇
  2017年   2100篇
  2016年   2222篇
  2015年   2256篇
  2014年   3468篇
  2013年   3323篇
  2012年   3930篇
  2011年   4002篇
  2010年   2998篇
  2009年   3024篇
  2008年   2650篇
  2007年   3405篇
  2006年   2860篇
  2005年   2399篇
  2004年   1952篇
  2003年   1620篇
  2002年   1302篇
  2001年   1072篇
  2000年   812篇
  1999年   641篇
  1998年   428篇
  1997年   367篇
  1996年   356篇
  1995年   240篇
  1994年   188篇
  1993年   137篇
  1992年   112篇
  1991年   105篇
  1990年   80篇
  1989年   60篇
  1988年   49篇
  1987年   39篇
  1986年   21篇
  1985年   35篇
  1984年   43篇
  1983年   28篇
  1982年   29篇
  1980年   48篇
  1965年   19篇
  1964年   28篇
  1963年   26篇
  1961年   22篇
  1959年   19篇
  1955年   26篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
This paper concerns the following problem: given a set of multi-attribute records, a fixed number of buckets and a two-disk system, arrange the records into the buckets and then store the buckets between the disks in such a way that, over all possible orthogonal range queries (ORQs), the disk access concurrency is maximized. We shall adopt the multiple key hashing (MKH) method for arranging records into buckets and use the disk modulo (DM) allocation method for storing buckets onto disks. Since the DM allocation method has been shown to be superior to any other allocation methods for allocating an MKH file onto a two-disk system for answering ORQs, the real issue is knowing how to determine an optimal way for organizing the records into buckets based upon the MKH concept.

A performance formula that can be used to evaluate the average response time, over all possible ORQs, of an MKH file in a two-disk system using the DM allocation method is first presented. Based upon this formula, it is shown that our design problem is related to a notoriously difficult problem, namely the Prime Number Problem. Then a performance lower bound and an efficient algorithm for designing optimal MKH files in certain cases are presented. It is pointed out that in some cases the optimal MKH file for ORQs in a two-disk system using the DM allocation method is identical to the optimal MKH file for ORQs in a single-disk system and the optimal average response time in a two-disk system is slightly greater than one half of that in a single-disk system.  相似文献   

82.
Over the years the number of Web users has increased dramatically unfortunately leading to the inherent problem of congestion. This can affect each user's surfing experience. This paper investigates download times associated with a web request, identifies where delays occur, and provides guidelines which can be followed by web developers to enable a faster and more efficient download and service for their users. We conclude that delays in Internet traffic and congestion can often be attributed to poorly developed sites (e.g. excessive image size). Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
83.
A computerised trace method has been developed for determining the relationships of assembly requirements with design dimensions and tolerances of the components in an assembly, and the relationships of design specifications and machining allowance requirements with manufactured dimensions and tolerances of the component in a process plan. This method traces from the proposed components or planned operations only the dimensions and tolerances that affect the given requirement, and therefore the equations for design or for manufacture can be established simultaneously and accurately. Hence it is possible to establish constraints for the optimisation of dimensions and tolerances for design or for manufacture.  相似文献   
84.
Pointing tasks in human–computer interaction obey certain speed–accuracy tradeoff rules. In general, the more accurate the task to be accomplished, the longer it takes and vice versa. Fitts’ law models the speed–accuracy tradeoff effect in pointing as imposed by the task parameters, through Fitts’ index of difficulty (Id) based on the ratio of the nominal movement distance and the size of the target. Operating with different speed or accuracy biases, performers may utilize more or less area than the target specifies, introducing another subjective layer of speed–accuracy tradeoff relative to the task specification. A conventional approach to overcome the impact of the subjective layer of speed–accuracy tradeoff is to use the a posteriori “effective” pointing precision We in lieu of the nominal target width W. Such an approach has lacked a theoretical or empirical foundation. This study investigates the nature and the relationship of the two layers of speed–accuracy tradeoff by systematically controlling both Id and the index of target utilization Iu in a set of four experiments. Their results show that the impacts of the two layers of speed–accuracy tradeoff are not fundamentally equivalent. The use of We could indeed compensate for the difference in target utilization, but not completely. More logical Fitts’ law parameter estimates can be obtained by the We adjustment, although its use also lowers the correlation between pointing time and the index of difficulty. The study also shows the complex interaction effect between Id and Iu, suggesting that a simple and complete model accommodating both layers of speed–accuracy tradeoff may not exist.  相似文献   
85.
Dynamic Survivability in WDM Mesh Networks Under Dynamic Traffic   总被引:3,自引:0,他引:3  
Network survivability is a crucial requirement in WDM mesh networks. In this paper, we systematically consider the problem of dynamic survivability with dynamic single link failure in WDM networks under dynamic traffic demands. Specifically, we investigate various protection schemes, such as dedicated path protection (DPP), shared path protection (SPP), dedicated link protection (DLP), shared link protection (SLP), and two restoration schemes, path restoration (PR) and link restoration (LR). Moreover, two new shared protection methods are proposed, i.e., SRLG-based shared link protection (SRLG-SLP) and SRLG-based shared path protection (SRLG-SPP). The SRLG (shared risk link group) constraint defines the availability of protection resources to a working path, which requires that any two working paths sharing the same risk of failure (or in the same SRLG) cannot share the same protection resources. Furthermore, in our study, we consider a more practical dynamic single-link failure model, in which the link-failure-interarrival time and link-failure-holding time are considered as two independent parameters. Based on this link-failure model, extensive simulations are done to analyze and compare the dynamic survivable performance of various protection and restoration schemes. Resource utilization, protection efficiency, restoration efficiency, and service disruption ratio are employed as survivable performance metrics versus traffic load, link-failure frequency, and link-failure reparation time to evaluate the survivable performance. Many meaningful results are given. In addition, we show that the developed SRLG-SLP and SRLG-SPP protection schemes perform very well in terms of protection efficiency and service disruption ratio, while sacrificing some performance in terms of resource utilization.  相似文献   
86.
Multiple forms of a symbol-digit substitution task were used to provide a componential analysis of age differences in coding task performance. The results demonstrated age differences in feature encoding, memory, and visual search. A 2nd experiment was conducted with young adults to investigate a sensory deficit as a locus of age differences. The spatial contrast sensitivity deficit of older adults was simulated on forms by applying a digital filter. Persons in the age-simulated contrast condition performed worse than those in the normal contrast condition. The stimulus degradation effect was linked to visual search speed. The study illustrates the utility of componential analysis and offers direct support for the hypothesis that sensory deficits affect performance on tasks used to assess intelligence (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
87.
88.
孔祥强  李瑛  胡松涛  王如竹 《暖通空调》2004,34(11):10-14,130
对不同地板结构和不同导线间距下发热电缆地面辐射供暖系统的热工性能进行了测试分析,考察了系统的稳定性和可靠性,给出了综合比较结果,分析了影响发热电缆地面辐射供暖系统热工性能的主要因素及其影响规律。  相似文献   
89.
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号