首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3768篇
  免费   245篇
  国内免费   113篇
电工技术   78篇
技术理论   4篇
综合类   254篇
化学工业   263篇
金属工艺   66篇
机械仪表   122篇
建筑科学   1155篇
矿业工程   68篇
能源动力   53篇
轻工业   445篇
水利工程   101篇
石油天然气   87篇
武器工业   24篇
无线电   214篇
一般工业技术   388篇
冶金工业   138篇
原子能技术   27篇
自动化技术   639篇
  2024年   20篇
  2023年   63篇
  2022年   131篇
  2021年   203篇
  2020年   207篇
  2019年   170篇
  2018年   164篇
  2017年   145篇
  2016年   232篇
  2015年   260篇
  2014年   338篇
  2013年   379篇
  2012年   679篇
  2011年   209篇
  2010年   228篇
  2009年   237篇
  2008年   159篇
  2007年   126篇
  2006年   50篇
  2005年   29篇
  2004年   12篇
  2003年   9篇
  2002年   9篇
  2001年   4篇
  2000年   4篇
  1999年   7篇
  1998年   4篇
  1997年   5篇
  1996年   7篇
  1995年   5篇
  1994年   4篇
  1993年   1篇
  1992年   3篇
  1991年   1篇
  1989年   2篇
  1988年   3篇
  1987年   3篇
  1986年   3篇
  1985年   4篇
  1983年   2篇
  1980年   3篇
  1979年   1篇
  1959年   1篇
排序方式: 共有4126条查询结果,搜索用时 15 毫秒
41.
为解决华安水电站扩建工程引水隧洞施工过程中的塌方问题,对其塌方的特点及成因进行了研究,提出了搞好隧洞初期支护、把握好穿越塌方体施工的过程、采用深层固结灌浆提高围岩稳定性等措施,经过施工期的安全监测和一年运行观测,该洞段围岩稳定,表明措施有效。  相似文献   
42.
43.
This paper revisits the stochastic near-optimal control problem considered in Zhou (1998), where the stochastic system is given by a controlled stochastic differential equation with the control variable taking values in a general control space and entering both the drift and diffusion coefficients. A necessary condition of near-optimality is derived using Ekeland’s variational principle, spike variation techniques, and some delicate estimates for the state and the adjoint processes. We improve the error bound of order from “almost” ε13 in Zhou (1998) to “exactly” ε13.  相似文献   
44.
The decision regarding acceptance or rejection of a lot of products may be considered through variables acceptance sampling plans based on suitable quality characteristics. A variables sampling plan to determine the acceptability of a lot of products based on the lifetime of the products is called reliability acceptance sampling plan (RASP). This work considers the determination of optimum RASP under cost constraint in the framework of hybrid censoring. Weibull lifetime models are considered for illustrations; however, the proposed methodology can be easily extended to any location-scale family of distributions. The proposed method is based on asymptotic results of the estimators of parameters of lifetime distribution. Hence, a Monte Carlo simulation study is conducted in order to show that the sampling plans meet the specified risks for finite sample size.  相似文献   
45.
The plasmodium of Physarum polycephalum is a unicellular and multinuclear giant amoeba that has an amorphous cell body. To clearly observe how the plasmodium makes decisions in its motile and exploratory behaviours, we developed a new experimental system to pseudo-discretize the motility of the organism. In our experimental space that has agar surfaces arranged in a two-dimensional lattice, the continuous and omnidirectional movement of the plasmodium was limited to the stepwise one, and the direction of the locomotion was also limited to four neighbours. In such an experimental system, a cellular automata-like system was constructed using the living cell. We further analysed the exploratory behaviours of the plasmodium by duplicating the experimental results in the simulation models of cellular automata. As a result, it was revealed that the behaviours of the plasmodium are not reproduced by only local state transition rules; and for the reproduction, a kind of historical rule setting is needed.  相似文献   
46.
ContextOrganizations combine agile approach and Distributed Software Development (DSD) in order to develop better quality software solutions in lesser time and cost. It helps to reap the benefits of both agile and distributed development but pose significant challenges and risks. Relatively scanty evidence of research on the risks prevailing in distributed agile development (DAD) has motivated this study.ObjectiveThis paper aims at creating a comprehensive set of risk factors that affect the performance of distributed agile development projects and identifies the risk management methods which are frequently used in practice for controlling those risks.MethodThe study is an exploration of practitioners’ experience using constant comparison method for analyzing in-depth interviews of thirteen practitioners and work documents of twenty-eight projects from thirteen different information technology (IT) organizations. The field experience was supported by extensive research literature on risk management in traditional, agile and distributed development.ResultsAnalysis of qualitative data from interviews and project work documents resulted into categorization of forty-five DAD risk factors grouped under five core risk categories. The risk categories were mapped to Leavitt’s model of organizational change for facilitating the implementation of results in real world. The risk factors could be attributed to the conflicting properties of DSD and agile development. Besides that, some new risk factors have been experienced by practitioners and need further exploration as their understanding will help the practitioners to act on time.ConclusionOrganizations are adopting DAD for developing solutions that caters to the changing business needs, while utilizing the global talent. Conflicting properties of DSD and agile approach pose several risks for DAD. This study gives a comprehensive categorization of the risks faced by the practitioners in managing DAD projects and presents frequently used methods to reduce their impact. The work fills the yawning research void in this field.  相似文献   
47.
针对微博中用户影响力分析这个问题,提出用户影响力的计算方法。该方法首先提出用户自身影响力以及用户被影响力的概念,并根据用户自身特征与用户粉丝情况得出其计算公式,从而可以综合考虑用户在微博中的所有信息,计算出用户影响力。实验结果表明,这种计算方法能比较好地反映用户在其粉丝中的影响力。  相似文献   
48.
In 1980s, Robert Metcalfe, the inventor of Ethernet, proposed a formulation of network value in terms of the network size (the number of nodes of the network), which was later named as Metcalfe’s law. ...  相似文献   
49.
为了对视频的隐私区域进行加密,提出一种基于FMO和骑士巡游思想的H.264视频感兴趣区域加密的算法。首先确定视频中包含的感兴趣区域的范围,之后对感兴趣区域内部宏块的宏块类型参数使用SHA-1生成的流密码异或加密,并对条带组序号使用骑士巡游思想置乱加密。实验分析表明,该算法可以有效地保护视频中的隐私区域,并且可以在安全性、加密效率和编码效率取得较好的折中。  相似文献   
50.
中国女书是具有鲜明民族特色的文字,目前国内还没有公认的女书规范字库。针对手写体文字规范化字体生成过程多采用人工修正方式、效率低下的现状,该文设计了一种女书手写字符规范字自动生成方法。基于手写文字样本,提取其单像素骨架,并结合字符轮廓信息进行骨架畸变点校正;然后提取骨架特征点和笔段,根据笔段连通性和交角情况建立笔段关联矩阵;基于笔段关联矩阵由笔段恢复笔画,获取笔画路径关键点序列;最后基于三次Bezier曲线重绘字符笔画并均匀加粗,形成笔画粗细一致、平滑无毛刺、无畸变的规范字体。实验结果表明,该方法自动便捷,效果良好,效率优于人工方式,经改进后可以推广到其他手写字符的规范化过程。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号