首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   25705篇
  免费   2689篇
  国内免费   2178篇
电工技术   1491篇
技术理论   1篇
综合类   2260篇
化学工业   1521篇
金属工艺   329篇
机械仪表   814篇
建筑科学   607篇
矿业工程   197篇
能源动力   435篇
轻工业   201篇
水利工程   224篇
石油天然气   156篇
武器工业   106篇
无线电   5768篇
一般工业技术   1555篇
冶金工业   380篇
原子能技术   45篇
自动化技术   14482篇
  2024年   111篇
  2023年   449篇
  2022年   542篇
  2021年   623篇
  2020年   747篇
  2019年   663篇
  2018年   606篇
  2017年   794篇
  2016年   944篇
  2015年   1098篇
  2014年   1510篇
  2013年   1740篇
  2012年   1677篇
  2011年   1930篇
  2010年   1499篇
  2009年   1839篇
  2008年   1926篇
  2007年   1853篇
  2006年   1475篇
  2005年   1267篇
  2004年   1086篇
  2003年   951篇
  2002年   854篇
  2001年   738篇
  2000年   679篇
  1999年   552篇
  1998年   488篇
  1997年   424篇
  1996年   345篇
  1995年   266篇
  1994年   207篇
  1993年   170篇
  1992年   120篇
  1991年   69篇
  1990年   53篇
  1989年   37篇
  1988年   30篇
  1987年   21篇
  1986年   16篇
  1985年   43篇
  1984年   37篇
  1983年   35篇
  1982年   40篇
  1981年   2篇
  1980年   3篇
  1979年   6篇
  1978年   3篇
  1977年   1篇
  1976年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
131.
Energy minimization and design for testability   总被引:6,自引:0,他引:6  
The problem of fault detection in general combinational circuits is NP-complete. The only previous result on identifying easily testable circuits is due to Fujiwara who gave a polynomial time algorithm for detecting any single stuck fault inK-bounded circuits. Such circuits may only contain logic blocks with no more thanK input lines and the blocks are so connected that there is no reconvergent fanout among them. We introduce a new class of combinational circuits called the (k, K)-circuits and present a polynomial time algorithm to detect any single or multiple stuck fault in such circuits. We represent the circuit as an undirected graphG with a vertex for each gate and an edge between a pair of vertices whenever the corresponding gates have a connection. For a (k, K)-circuit,G is a subgraph of ak-tree, which, by definition, cannot have a clique of size greater thank+1. Basically, this is a restriction on gate interconnections rather than on the function of gates comprising the circuit. The (k, K)-circuits are a generalization of Fujiwara'sK-bounded circuits. Using the bidirectional neural network model of the circuit and the energy function minimization formulation of the fault detection problem, we present a test generation algorithm for single and multiple faults in (k, K)-circuits. This polynomial time aggorithm minimizes the energy function by recursively eliminating the variables.  相似文献   
132.
应用改进的BP神经网络预测导弹的研制费用   总被引:3,自引:0,他引:3  
结合导弹武器系统研制的特点,分析并确定了影响导弹武器系统研制费用的主要因素,并在前人研究的基础上,提出了基于改进的BP神经网络的费用预测模型。该模型不仅克服了以往由于专家主观因素而造成的负面影响,而且提高了算法的运行效率和模型的预测精度。通过具体的实例分析比较,充分证明了利用该方法的科学合理性。最后探讨了利用BP神经网络进行数值预测的方法和应该注意的问题,并给出了一些有益的建议。  相似文献   
133.
BP网络过拟合问题研究及应用   总被引:2,自引:0,他引:2  
通过类比信息传递过程中的一般测不准关系式,研究BP网络出现过拟合现象时,代表网络学习能力的权值改变量与反映网络推广能力的未参与训练的检验样本的辨识误差之间的关系.在该关系式中引入一个过拟合参数P,通过对岷江流域紫坪埔站的流量预报,说明在判断网络是否出现过拟合现象时,计算过拟合参数P是一种有研究意义的参考.  相似文献   
134.
1 Introduction The calling dwell time characteristic is critical for the user network planning and deployment, e.g., global system for mobile communications (GSM), as well as the next generation wireless multimedia networks, such as, the currently standar…  相似文献   
135.
Liu  Derong  Zhang  Yi  Hu  Sanqing 《Wireless Networks》2004,10(4):473-483
In this paper, we develop call admission control algorithms for SIR-based power-controlled DS-CDMA cellular networks. We consider networks that handle both voice and data services. When a new call (or a handoff call) arrives at a base station requesting for admission, our algorithms will calculate the desired power control setpoints for the new call and all existing calls. We will provide necessary and sufficient conditions under which the power control algorithm will have a feasible solution. These conditions are obtained through deriving the inverse of the matrix used in the calculation of power control setpoints. If there is no feasible solution to power control or if the desired power levels to be received at the base station for some calls are larger than the maximum allowable power limits, the admission request will be rejected. Otherwise, the admission request will be granted. When higher priority is desired for handoff calls, we will allow different thresholds (i.e., different maximum allowable power limits) for new calls and handoff calls. We will develop an adaptive algorithm that adjusts these thresholds in real-time as environment changes. The performance of our algorithms will be shown through computer simulation and compared with existing algorithms.  相似文献   
136.
A new method of estimating flutter derivatives using artificial neural networks is proposed. Unlike other computational fluid dynamics based numerical analyses, the proposed method estimates flutter derivatives utilizing previously measured experimental data. One of the advantages of the neural networks approach is that they can approximate a function of many dimensions. An efficient method has been developed to quantify the geometry of deck sections for neural network input. The output of the neural network is flutter derivatives. The flutter derivatives estimation network, which has been trained by the proposed methodology, is tested both for training sets and novel testing sets. The network shows reasonable performance for the novel sets, as well as outstanding performance for the training sets. Two variations of the proposed network are also presented, along with their estimation capability. The paper shows the potential of applying neural networks to wind force approximations.  相似文献   
137.
The last decade has seen the development of a number of approaches for estimating those variables which are difficult to measure on-line in industrial process situations. Whilst a range of techniques is available, a common element is the use of process knowledge in the form of a system model. In the case of bioprocess systems, although a large range of models has been presented in the literature, their use in estimation schemes on an industrial scale has been limited. A number of reasons can be identified for their low level of utilisation. Of particular significance is the uncertainty which exists in quantifying system performance and the process-model mismatch which inevitably results. The level of ‘pre-defined model’ uncertainty, together with the knowledge gained during the course of the fermentation, serves to dictate estimator structure. The paper considers a range of estimation strategies and contrasts, through industrial applications, their performance characteristics and utility.  相似文献   
138.
Nodes in a mobile ad hoc network are often vulnerable to failures. The failures could be either due to fading effects, battery drainage, or as a result of compromised nodes that do not participate in network operations. Intermittent node failures can disrupt routing functionalities. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. In line with this objective, we first propose a modified version of the widely studied ad hoc on-demand distance vector routing protocol to facilitate the discovery of multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network to support efficient routing operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases tremendously even with a small number of reliable nodes when we use our algorithm to appropriately position these reliable nodes.  相似文献   
139.
Dynamic Survivability in WDM Mesh Networks Under Dynamic Traffic   总被引:3,自引:0,他引:3  
Network survivability is a crucial requirement in WDM mesh networks. In this paper, we systematically consider the problem of dynamic survivability with dynamic single link failure in WDM networks under dynamic traffic demands. Specifically, we investigate various protection schemes, such as dedicated path protection (DPP), shared path protection (SPP), dedicated link protection (DLP), shared link protection (SLP), and two restoration schemes, path restoration (PR) and link restoration (LR). Moreover, two new shared protection methods are proposed, i.e., SRLG-based shared link protection (SRLG-SLP) and SRLG-based shared path protection (SRLG-SPP). The SRLG (shared risk link group) constraint defines the availability of protection resources to a working path, which requires that any two working paths sharing the same risk of failure (or in the same SRLG) cannot share the same protection resources. Furthermore, in our study, we consider a more practical dynamic single-link failure model, in which the link-failure-interarrival time and link-failure-holding time are considered as two independent parameters. Based on this link-failure model, extensive simulations are done to analyze and compare the dynamic survivable performance of various protection and restoration schemes. Resource utilization, protection efficiency, restoration efficiency, and service disruption ratio are employed as survivable performance metrics versus traffic load, link-failure frequency, and link-failure reparation time to evaluate the survivable performance. Many meaningful results are given. In addition, we show that the developed SRLG-SLP and SRLG-SPP protection schemes perform very well in terms of protection efficiency and service disruption ratio, while sacrificing some performance in terms of resource utilization.  相似文献   
140.
Solid polymer electrolytes (SPEs) synthesized by the sol-gel process and designated as di-ureasils have been prepared through the incorporation of lithium perchlorate, LiClO4, into the d-U(2000) organic-inorganic hybrid network. Electrolytes with lithium salt compositions of n (where n indicates the number of oxyethylene units per Li+ ion) between ∞ and 0.5 were characterized by conductivity measurements, cyclic voltammetry at a gold microelectrode, thermal analysis and Fourier transform Raman (FT-Raman) spectroscopy. The conductivity results obtained suggest that this system offers a quite significant improvement over previously characterized analogues doped with lithium triflate [S.C. Nunes, V. de Zea Bermudez, D. Ostrovskii, M.M. Silva, S. Barros, M.J. Smith, R.A. Sá Ferreira, L.D. Carlos, J. Rocha, E. Morales, J. Electrochem. Soc. 152 (2) (2005), A429]. “Free” perchlorate ions, detected in all the samples examined, are identified as the main charge carriers in the sample that yields the highest room temperature conductivity (n = 20). In the di-ureasils with n ≤ 10 ionic association is favoured and the ionic conductivity drops.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号