首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   47143篇
  免费   4043篇
  国内免费   3772篇
电工技术   3872篇
技术理论   5篇
综合类   3755篇
化学工业   3303篇
金属工艺   497篇
机械仪表   1957篇
建筑科学   1836篇
矿业工程   309篇
能源动力   1519篇
轻工业   1567篇
水利工程   401篇
石油天然气   343篇
武器工业   244篇
无线电   3716篇
一般工业技术   4347篇
冶金工业   1206篇
原子能技术   206篇
自动化技术   25875篇
  2024年   186篇
  2023年   709篇
  2022年   584篇
  2021年   952篇
  2020年   1320篇
  2019年   1381篇
  2018年   1327篇
  2017年   1708篇
  2016年   1862篇
  2015年   1682篇
  2014年   2714篇
  2013年   4059篇
  2012年   2414篇
  2011年   2890篇
  2010年   2129篇
  2009年   2646篇
  2008年   2650篇
  2007年   2716篇
  2006年   2363篇
  2005年   2102篇
  2004年   1807篇
  2003年   1725篇
  2002年   1548篇
  2001年   1282篇
  2000年   1259篇
  1999年   1105篇
  1998年   987篇
  1997年   898篇
  1996年   785篇
  1995年   683篇
  1994年   624篇
  1993年   562篇
  1992年   463篇
  1991年   414篇
  1990年   328篇
  1989年   251篇
  1988年   223篇
  1987年   190篇
  1986年   153篇
  1985年   207篇
  1984年   209篇
  1983年   176篇
  1982年   153篇
  1981年   105篇
  1980年   74篇
  1979年   91篇
  1978年   66篇
  1977年   67篇
  1976年   19篇
  1964年   13篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
991.
We consider an M/G/1 queue with different classes of customers and discriminatory random order service (DROS) discipline. The DROS discipline generalizes the random order service (ROS) discipline: when the server selects a customer to serve, all customers waiting in the system have the same selection probability under ROS discipline, whereas customers belonging to different classes may have different selection probabilities under DROS discipline. For the M/G/1 queue with DROS discipline, we derive equations for the joint queue length distributions and for the waiting time distributions of each class. We also obtain the moments of the queue lengths and the waiting time of each class. Numerical results are given to illustrate our results.  相似文献   
992.
We develop a mathematical model to quantitatively analyze a scalable region-based hierarchical group key management protocol integrated with intrusion detection to deal with both outsider and insider security attacks for group communication systems (GCSs) in mobile ad hoc networks (MANETs). Our proposed adaptive intrusion detection technique is based on majority voting by nodes in a geographical region to cope with collusion of compromised nodes, with each node preloaded with anomaly-based or misuse-based intrusion detection techniques to diagnose compromised nodes in the same region. When given a set of parameter values characterizing operational and environmental conditions, we identify the optimal intrusion detection rate and the optimal regional area size under which the mean time to security failure of the system is maximized and/or the total communication cost is minimized for GCSs in MANET environments. The tradeoff analysis in performance versus security is useful in identifying and dynamically applying optimal settings to maximize the system lifetime for scalable mobile group applications while satisfying application-specific performance requirements.  相似文献   
993.
Software systems assembled from a large number of autonomous components become an interesting target for formal verification due to the issue of correct interplay in component interaction. State/event LTL (Chaki et al. (2004, 2005) [1] and [2]) incorporates both states and events to express important properties of component-based software systems.The main contribution of this paper is a partial order reduction technique for verification of state/event LTL properties. The core of the partial order reduction is a novel notion of stuttering equivalence which we call state/event stuttering equivalence. The positive attribute of the equivalence is that it can be resolved with existing methods for partial order reduction. State/event LTL properties are, in general, not preserved under state/event stuttering equivalence. To this end we define a new logic, called weak state/event LTL, which is invariant under the new equivalence.To bring some evidence of the method’s efficiency, we present some of the results obtained by employing the partial order reduction technique within our tool for verification of component-based systems modelled using the formalism of component-interaction automata (Brim et al. (2005) [3]).  相似文献   
994.
This article is an experience report about the application of a top-down strategy to use and embed an architecture reconstruction approach in the incremental software development process of the Philips MRI scanner, a representative large and complex software-intensive system. The approach is an iterative process to construct execution views without being overwhelmed by the system size and complexity. An execution view contains architectural information that describes what the software of a software-intensive system does at runtime and how it does this. The application of the strategy is illustrated with a case study, the construction of an up-to-date execution view for the start-up process of the Philips MRI scanner. The construction of this view helped the development organization to quickly reduce about 30% the start-up time of the scanner, and set up a new system benchmark for assuring the system performance through future evolution steps. The report provides detailed information about the application of the top-down strategy, including how it supports top-down analysis, communication within the development organization, and the aspects that influence the use of the top-down strategy in other contexts.  相似文献   
995.
The discovery of meaningful parts of a shape is required for many geometry processing applications, such as parameterization, shape correspondence, and animation. It is natural to consider primitives such as spheres, cylinders and cones as the building blocks of shapes, and thus to discover parts by fitting such primitives to a given surface. This approach, however, will break down if primitive parts have undergone almost‐isometric deformations, as is the case, for example, for articulated human models. We suggest that parts can be discovered instead by finding intrinsic primitives, which we define as parts that posses an approximate intrinsic symmetry. We employ the recently‐developed method of computing discrete approximate Killing vector fields (AKVFs) to discover intrinsic primitives by investigating the relationship between the AKVFs of a composite object and the AKVFs of its parts. We show how to leverage this relationship with a standard clustering method to extract k intrinsic primitives and remaining asymmetric parts of a shape for a given k. We demonstrate the value of this approach for identifying the prominent symmetry generators of the parts of a given shape. Additionally, we show how our method can be modified slightly to segment an entire surface without marking asymmetric connecting regions and compare this approach to state‐of‐the‐art methods using the Princeton Segmentation Benchmark.  相似文献   
996.
In this article, a new model predictive control approach to nonlinear stochastic systems will be presented. The new approach is based on particle filters, which are usually used for estimating states or parameters. Here, two particle filters will be combined, the first one giving an estimate for the actual state based on the actual output of the system; the second one gives an estimate of a control input for the system. This is basically done by adopting the basic model predictive control strategies for the second particle filter. Later in this paper, this new approach is applied to a CSTR (continuous stirred-tank reactor) example and to the inverted pendulum. These two examples show that our approach is also real-time-capable.  相似文献   
997.
A Faà di Bruno type Hopf algebra is developed for a group of integral operators known as Fliess operators, where operator composition is the group product. Such operators are normally written in terms of generating series over a noncommutative alphabet. Using a general series expansion for the antipode, an explicit formula for the generating series of the compositional inverse operator is derived. The result is applied to analytic nonlinear feedback systems to produce an explicit formula for the feedback product, that is, the generating series for the Fliess operator representation of the closed-loop system written in terms of the generating series of the Fliess operator component systems. This formula is employed to provide a proof that local convergence is preserved under feedback.  相似文献   
998.
This paper examines prioritization in a service system and analyzes whether, in the presence of heterogeneous customers who have different needs and a costly sorting process, it pays to prioritize. In particular, in our model, sorting is costly because the task of gathering information to prioritize jobs consumes resources. We investigate a stylized model in which there are two classes of jobs — one whose waiting cost is high, called urgent, and the other whose waiting cost is low, called non-urgent. There are two types of employees, sorters, who collect information on a job and then decide whether it is urgent or non-urgent, and processors, who execute the job or provide the service. We begin by assuming that sorters categorize customers perfectly, and we relax this assumption later in the paper. We optimize two performance metrics, waiting costs (under a given budget) and total costs, and find the conditions under which prioritization is beneficial for these two metrics.  相似文献   
999.
A framework for dynamic multiple-criteria decision making   总被引:1,自引:0,他引:1  
The classic multiple-criteria decision making (MCDM) model assumes that, when taking a decision, the decision maker has defined a fixed set of criteria and is presented with a clear picture of all available alternatives. The task then reduces to computing the score of each alternative, thus producing a ranking, and choosing the one that maximizes this value.However, most real-world decisions take place in a dynamic environment, where the final decision is only taken at the end of some exploratory process. Exploration of the problem is often beneficial, in that it may unveil previously unconsidered alternatives or criteria, as well as render some of them unnecessary.In this paper we introduce a flexible framework for dynamic MCDM, based on the classic model, that can be applied to any dynamic decision process and which is illustrated by means of a small helicopter landing example. In addition, we outline a number of possible applications in very diverse fields, to highlight its versatility.  相似文献   
1000.
With the increasing interdependence among supply chain members, bankruptcy of a supply chain member may be caused by operational decisions of other members. To investigate how bankruptcy occurs and propagates in supply chain networks, we build a multi-agent simulation model for a two-stage supply chain that consists of multiple upstream manufacturers and multiple downstream retailers. Based on the developed simulation model, we study impacts of various operational parameters and decisions, such as horizontal competition among retailers, order allocation strategies of retailers, wholesale price of manufacturers, characteristics of market demand and number of retailers, on bankruptcy propagation. Since many operational decisions of a firm are made under financial constraints, we also investigate the linkage between firm's operational risks and financial decisions (e.g., the maximal risk of cash flow that a member is willing to take, and the up-front payment proportion of retailers in a two-period payment policy). Experimental results reveal that operational interactions between supply chain members and operational decisions made by supply chain members are important causes of bankruptcy propagation, but impacts of these operational parameters and decisions depend on financial decisions. These observations indicate that supply chain members can moderately hedge their operational risk through financial decisions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号