首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18794篇
  免费   2515篇
  国内免费   1891篇
电工技术   1543篇
综合类   2697篇
化学工业   1155篇
金属工艺   283篇
机械仪表   920篇
建筑科学   784篇
矿业工程   264篇
能源动力   335篇
轻工业   694篇
水利工程   384篇
石油天然气   516篇
武器工业   261篇
无线电   3150篇
一般工业技术   1916篇
冶金工业   571篇
原子能技术   125篇
自动化技术   7602篇
  2024年   101篇
  2023年   322篇
  2022年   529篇
  2021年   591篇
  2020年   676篇
  2019年   698篇
  2018年   626篇
  2017年   733篇
  2016年   840篇
  2015年   896篇
  2014年   1123篇
  2013年   1480篇
  2012年   1309篇
  2011年   1469篇
  2010年   1027篇
  2009年   1157篇
  2008年   1201篇
  2007年   1261篇
  2006年   1055篇
  2005年   898篇
  2004年   761篇
  2003年   662篇
  2002年   569篇
  2001年   501篇
  2000年   441篇
  1999年   378篇
  1998年   303篇
  1997年   257篇
  1996年   213篇
  1995年   212篇
  1994年   144篇
  1993年   134篇
  1992年   107篇
  1991年   76篇
  1990年   76篇
  1989年   63篇
  1988年   42篇
  1987年   38篇
  1986年   18篇
  1985年   20篇
  1984年   29篇
  1983年   27篇
  1982年   13篇
  1981年   15篇
  1980年   14篇
  1979年   12篇
  1978年   8篇
  1977年   7篇
  1976年   12篇
  1963年   7篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
91.
两个基于身份的数字签名方案的安全性改进   总被引:2,自引:0,他引:2  
吕继强  王新梅 《通信学报》2003,24(9):128-131
分析了文献[1]提出的两个基于用户身份的数字签名方案,发现其一般签名方案存在安全性缺陷,在此基础上建立了多重签名方案,但此方案也是不安全的。本文给出了改进的签名和多重签名方案。  相似文献   
92.
本文从紧凑式轧机的轧制变形特点出发,分析了其变形规程设计的主要特点和方法,讨论了限制其道次变形量的基本因素,给出了优化设计的目标函数和约束条件。指出,类似这种具有复杂约束的轧制变形问题采用混合罚函数法处理更为有效,并成功地采用该方法进行了变形规程的试设定。  相似文献   
93.
Two elements enter the choice between 2 and 3SLS for full-system estimation: statistical efficiency and computational cost. 2SLS always has the computational edge, but 3SLS can be more efficient, a relative advantage that increases with the strength of the interrelations among the error terms. A measure of these interrelations is thus helpful in making the choice, and, when there are only two equations, this has suggested using a high pairwise error correlation as an indicator of when to use 3SLS. In larger systems of equations, however, these pairwise correlations can remain small even though more general interrelations give 3SLS the relative advantage. More general indicators are therefore needed, and this paper suggests three such and demonstrates their efficacy.Professor of Economics, Boston College, and Principal Research Associate, Center for Computational Research in Economics and Management Science, MIT. All computation was done on the TROLL system at MIT. My thanks go to Josh Charap for his able research assistance. This research was sponsored in part by the National Science Foundation under grant #IST-8420614.  相似文献   
94.
在多目标优化中,对非支配解集的估计是一项非常重要的工作.本文给出一种序列逼近非支配解集的方法.  相似文献   
95.
This paper concerns the following problem: given a set of multi-attribute records, a fixed number of buckets and a two-disk system, arrange the records into the buckets and then store the buckets between the disks in such a way that, over all possible orthogonal range queries (ORQs), the disk access concurrency is maximized. We shall adopt the multiple key hashing (MKH) method for arranging records into buckets and use the disk modulo (DM) allocation method for storing buckets onto disks. Since the DM allocation method has been shown to be superior to any other allocation methods for allocating an MKH file onto a two-disk system for answering ORQs, the real issue is knowing how to determine an optimal way for organizing the records into buckets based upon the MKH concept.

A performance formula that can be used to evaluate the average response time, over all possible ORQs, of an MKH file in a two-disk system using the DM allocation method is first presented. Based upon this formula, it is shown that our design problem is related to a notoriously difficult problem, namely the Prime Number Problem. Then a performance lower bound and an efficient algorithm for designing optimal MKH files in certain cases are presented. It is pointed out that in some cases the optimal MKH file for ORQs in a two-disk system using the DM allocation method is identical to the optimal MKH file for ORQs in a single-disk system and the optimal average response time in a two-disk system is slightly greater than one half of that in a single-disk system.  相似文献   

96.
坐标旋转法的收敛性,误差估计及扩展   总被引:1,自引:0,他引:1  
本文通过推广正规序列的定义,得到一个不等式,由此证明了统一计算初等函数数值的坐标旋转法的收敛性,作了误差估计,并拓广了所计算的函数范围,成为快速计算所有初等函数的统一算法.  相似文献   
97.
Detection of multiple cracks using frequency measurements   总被引:2,自引:0,他引:2  
A method for detection of multiple open cracks in a slender Euler-Bernoulli beams is presented based on frequency measurements. The method is based on the approach given by Hu and Liang [J. Franklin Inst. 330 (5) (1993) 841], transverse vibration modelling through transfer matrix method and representation of a crack by rotational spring. The beam is virtually divided into a number of segments, which can be decided by the analyst, and each of them is considered to be associated with a damage parameter. The procedure gives a linear relationship explicitly between the changes in natural frequencies of the beam and the damage parameters. These parameters are determined from the knowledge of changes in the natural frequencies. After obtaining them, each is treated in turn to exactly pinpoint the crack location in the segment and determine its size. The forward, or natural frequency determination, problems are examined in the passing. The method is approximate, but it can handle segmented beams, any boundary conditions, intermediate spring or rigid supports, etc. It eliminates the need for any symbolic computation which is envisaged by Hu and Liang [J. Franklin Inst. 330 (5) (1993) 841] to obtain mode shapes of the corresponding uncracked beams. The proposed method gives a clear insight into the whole analysis. Case studies (numerical) are presented to demonstrate the method effectiveness for two simultaneous cracks of size 10% and more of section depth. The differences between the actual and predicted crack locations and sizes are less than 10% and 15% respectively. The numbers of segments into which the beam is virtually divided limits the maximum number of cracks that can be handled. The difference in the forward problem is less than 5%.  相似文献   
98.
Hakan Boyaci 《Sadhana》2006,31(1):1-8
A simply supported damped Euler-Bernoulli beam with immovable end conditions are considered. The concept of non-ideal boundary conditions is applied to the beam problem. In accordance, the boundaries are assumed to allow small deflections and moments. Approximate analytical solution of the problem is found using the method of multiple scales, a perturbation technique.  相似文献   
99.
文中主要针对多爆炸成型弹丸空爆战斗部,在分析区域识别和占空比识别两种不同扫描准则的基础上,应用蒙特卡洛方法计算了战斗部对目标的毁伤概率.通过仿真计算结果对比分析,获得了不同扫描准则对毁伤概率的影响,结果可为多爆炸成型弹丸空爆战斗部设计和选择使用扫描准则提供参考依据.  相似文献   
100.
带有块间串扰MC-CDMA的时域信道估计和多用户检测   总被引:4,自引:0,他引:4  
本文把带有IBI的MC-CDMA系统等效解释为特殊的直接序列码分多址(DS-CDMA)系统,并给出了相应的时域信道估计方法和时域线性最小均方误差(MMSE)多用户检测方法。仿真实验表明了本文方法的性能。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号