首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   92711篇
  免费   11929篇
  国内免费   9010篇
电工技术   8065篇
技术理论   5篇
综合类   12817篇
化学工业   5156篇
金属工艺   2394篇
机械仪表   6219篇
建筑科学   4418篇
矿业工程   1936篇
能源动力   2273篇
轻工业   3465篇
水利工程   2131篇
石油天然气   1924篇
武器工业   1046篇
无线电   14040篇
一般工业技术   7285篇
冶金工业   2135篇
原子能技术   749篇
自动化技术   37592篇
  2024年   674篇
  2023年   1883篇
  2022年   3186篇
  2021年   3501篇
  2020年   3605篇
  2019年   2900篇
  2018年   2573篇
  2017年   2984篇
  2016年   3186篇
  2015年   3463篇
  2014年   5002篇
  2013年   5533篇
  2012年   6175篇
  2011年   6747篇
  2010年   5279篇
  2009年   5916篇
  2008年   6236篇
  2007年   6894篇
  2006年   5984篇
  2005年   5273篇
  2004年   4425篇
  2003年   3710篇
  2002年   3135篇
  2001年   2687篇
  2000年   2365篇
  1999年   1999篇
  1998年   1606篇
  1997年   1340篇
  1996年   1138篇
  1995年   966篇
  1994年   774篇
  1993年   545篇
  1992年   438篇
  1991年   313篇
  1990年   270篇
  1989年   220篇
  1988年   150篇
  1987年   97篇
  1986年   70篇
  1985年   79篇
  1984年   70篇
  1983年   70篇
  1982年   65篇
  1981年   15篇
  1980年   18篇
  1979年   15篇
  1978年   9篇
  1977年   7篇
  1976年   9篇
  1959年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Device-to-Device (D2D) communication can reduce the mobile devices' energy consumption and increase the spectral efficiency in D2D underlaid cellular networks. However, D2D users will interfere with co-channel cellular users, which can lead to cellular communication access failures. There are two reasons for cellular communication access failures: (1)D2D interference and (2)insufficient spectrum resources. To address the absence of research on the performance of cellular services' access in D2D underlaid cellular networks, this paper defines the new services' access failure probability and handoff services' access failure probability to evaluate the effect of both D2D interference and limited resources on cellular communication access. Based on the stochastic geometry and stochastic process, a random network model is presented to estimate the access failure probabilities, which can provide guidelines for network design to ensure cellular services' access. The accuracy of the estimated access failure probability is validated through extensive simulations.  相似文献   
82.
In order to measure the correlation propeties of two Boolean functions,the global avalanche characteristics of Boolean functions constructed by concatenation are discussed,i.e.,f_1‖f_2and f_1‖f_2‖f_3‖f_4.Firstly,for the function f = f_1‖f_2,the cross-correlation function of f_1,f_2 in the special condition are studied.In this case,f,f_1,f_2 must be in desired form.By computing their sum-of-squares indicators,the crosscorrelation function between f_1,f_2 is obtained.Secondly,for the function g = f_1‖f_2‖f_3‖f_4,by analyzing the relation among their auto-correlation functions,their sum-of-squares indicators are investigated.Based on them,the sum-of-squares indicators of functions obtained by Canteaut et al.are investigated.The results show that the correlation property of g is good when the correlation properties of Boolean functions f_1,f_2,f_3,f_4 are good.  相似文献   
83.
目前,我国正处在改革发展的关键时期,深入贯彻落实科学发展观,加快各级各类人才培养,全面推进经济社会转型发展,实现中华民族伟大复兴,成为全民族的共同使命。在此背景下,各行业的技能大师工作室应运而生。文章对技能大师的概念、技能大师工作室的构成要素、技能大师工作室的功能作用进行了深入探讨。  相似文献   
84.
射线检测中运动模糊图像的恢复   总被引:3,自引:0,他引:3  
赵晓敏  蔡慧  路宏年 《无损检测》2005,27(8):423-426
X射线实时成像检测中,若曝光时间内工件和X射线图像采集设备有相对线性运动,会造成图像运动模糊降质。提出利用运动模糊点扩展函数的频域特征和Hough变换得到模糊图像的运动方向,并将之旋转到水平轴方向,利用差分法求解运动模糊点扩展函数的长度。并用Wiener滤波的方法,恢复降质的图像,取得了较好的效果。  相似文献   
85.
INFORMATIONDESIGNOFUNIVERSALADJUSTMENTPROGRAMOFPLANECONTROLNETWORKSINFORMATIONDESIGNOFUNIVERSALADJUSTMENTPROGRAMOFPLANECONTRO...  相似文献   
86.
The useful life of a cutting tool and its operating conditions largely control the economics of the machining operations. Hence, it is imperative that the condition of the cutting tool, particularly some indication as to when it requires changing, to be monitored. The drilling operation is frequently used as a preliminary step for many operations like boring, reaming and tapping, however, the operation itself is complex and demanding.

Back propagation neural networks were used for detection of drill wear. The neural network consisted of three layers input, hidden and output. Drill size, feed, spindle speed, torque, machining time and thrust force are given as inputs to the ANN and the flank wear was estimated. Drilling experiments with 8 mm drill size were performed by changing the cutting speed and feed at two different levels. The number of neurons in the hidden layer were selected from 1, 2, 3, …, 20. The learning rate was selected as 0.01 and no smoothing factor was used. The estimated values of tool wear were obtained by statistical analysis and by various neural network structures. Comparative analysis has been done between statistical analysis, neural network structures and the actual values of tool wear obtained by experimentation.  相似文献   

87.
Programmers build large‐scale systems with multiple languages to leverage legacy code and languages best suited to their problems. For instance, the same program may use Java for ease of programming and C to interface with the operating system. These programs pose significant debugging challenges, because programmers need to understand and control code across languages, which often execute in different environments. Unfortunately, traditional multilingual debuggers require a single execution environment. This paper presents a novel composition approach to building portable mixed‐environment debuggers, in which an intermediate agent interposes on language transitions, controlling and reusing single‐environment debuggers. We implement debugger composition in Blink, a debugger for Java, C, and the Jeannie programming language. We show that Blink is (i) simple: it requires modest amounts of new code; (ii) portable: it supports multiple Java virtual machines, C compilers, operating systems, and component debuggers; and (iii) powerful: composition eases debugging, while supporting new mixed‐language expression evaluation and Java native interface bug diagnostics. To demonstrate the generality of interposition, we build prototypes and demonstrate debugger language transitions with C for five of six other languages (Caml, Common Lisp, C#, Perl 5, Python, and Ruby) without modifications to their debuggers. Using real‐world case studies, we show that diagnosing language interface errors require prior single‐environment debuggers to restart execution multiple times, whereas Blink directly diagnoses them with one execution. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
88.
89.
90.
为分析云计算数据中心网络中的TCP Incast问题的产生原因并探讨缓解该问题的有效途径,采用基于NS2仿真实验的方法,通过改变TCP协议类型、交换机缓冲区大小、服务请求单元大小及重传超时RTO值等影响因素,分析传输吞吐率性能的变化。分析结果表明,通过改变这些影响因素有助于缓解TCP Incast问题,但同时也存在各种缺点和局限性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号