首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12634篇
  免费   1708篇
  国内免费   1358篇
电工技术   759篇
技术理论   5篇
综合类   1799篇
化学工业   179篇
金属工艺   241篇
机械仪表   907篇
建筑科学   759篇
矿业工程   170篇
能源动力   106篇
轻工业   155篇
水利工程   195篇
石油天然气   113篇
武器工业   81篇
无线电   1392篇
一般工业技术   962篇
冶金工业   624篇
原子能技术   30篇
自动化技术   7223篇
  2024年   103篇
  2023年   257篇
  2022年   490篇
  2021年   481篇
  2020年   445篇
  2019年   326篇
  2018年   296篇
  2017年   295篇
  2016年   432篇
  2015年   440篇
  2014年   679篇
  2013年   785篇
  2012年   775篇
  2011年   911篇
  2010年   771篇
  2009年   788篇
  2008年   847篇
  2007年   969篇
  2006年   870篇
  2005年   728篇
  2004年   686篇
  2003年   594篇
  2002年   488篇
  2001年   421篇
  2000年   352篇
  1999年   307篇
  1998年   183篇
  1997年   126篇
  1996年   126篇
  1995年   132篇
  1994年   109篇
  1993年   93篇
  1992年   68篇
  1991年   62篇
  1990年   44篇
  1989年   57篇
  1988年   40篇
  1987年   16篇
  1986年   18篇
  1985年   17篇
  1981年   5篇
  1979年   7篇
  1976年   7篇
  1966年   3篇
  1965年   3篇
  1963年   4篇
  1962年   3篇
  1960年   3篇
  1959年   3篇
  1958年   3篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
81.
对象模型及其模型化方法——一种深知识的表示模型   总被引:6,自引:0,他引:6  
本文介绍了对象模型和深知识等概念,在这些概念的基础上还讨论了基于框架知识表示形式的复杂系统的模型化方法.文中给出的模型化方法是通过 ISA 关系和 PART-OF 关系的相结合而形成的.这种模型化方法可用于基于深知识的设计型、分析型以及控制型等类型的专家系统.  相似文献   
82.
In this paper, we propose an ID-based non-interactive zero-knowledge proof system based on the 1-out-of-2 noninteractive oblivious transfer protocol. This zero-knowledge proof system is secure against a newly discovered cheating attack.  相似文献   
83.
84.
从ZnO电阻的非线性特性出发,对采用ZnO作为灭磁电阻时阀片的均流/均能进行理论论述,指出阀片均能性能的好坏主要依赖于阀片自身的特性;分析比较了ZnO阀片的不同选择方法对均流/均能的影响,指出阀片的均流/均能很大程度上取决于可供选择的阀片的库存量.该研究为发电机励磁系统的安全稳定运行提供了有力的保证.  相似文献   
85.
This paper presents a project undertaken for the European Space Agency (ESA). The project is developing a knowledge based system for planning and scheduling of activities for spacecraft assembly, integration and verification (AIV). The system extends to the monitoring of plan execution and the plan repair phases.

The objectives of the contract are to develop an operational kernel of a planning, scheduling and plan repair tool, called OPTIMUM-AIV, and to provide facilities which will allow individual projects to customize the kernel to suit its specific needs. The kernel shall consist of a set of software functionalities for assistance in the initial specification of the AIV plan, in the verification and generation of valid plans and schedules for the AIV activities, and in interactive monitoring and execution problem recovery for the detailed AIV plans. Embedded in OPTIMUM-AIV are external interfaces which allow integration with alternative scheduling systems and project databases.

The current status of the OPTIMUM-AIV project, as of May 1991, is that the architectural design of the system has been agreed on by ESTEC/ESA and detailed design and implementation is now underway, expecting a final delivery in October of 1991.  相似文献   

86.
Stochastic analysis of file-swarming systems   总被引:1,自引:0,他引:1  
Minghong  Bin  John C.S.  Dah-Ming   《Performance Evaluation》2007,64(9-12):856-875
File swarming (or file sharing) is one of the most important applications in P2P networks. In this paper, we propose a stochastic framework to analyze a file-swarming system under realistic setting: constraints in upload/download capacity, collaboration among peers and incentive for chunk exchange. We first extend the results in the coupon system [L. Massoulie, M. Vojnovic, Coupon replication systems, in: Proc. ACM SIGMETRICS, Banff, Alberta, Canada, 2005] by providing a tighter performance bound. Then we generalize the coupon system by considering peers with limited upload and download capacity. We illustrate the last-piece problem and show the effectiveness of using forward error-correction (FEC) code and/or multiple requests to improve the performance. Lastly, we propose a framework to analyze an incentive-based file-swarming system. The stochastic framework we propose can serve as a basis for other researchers to analyze and design more advanced features of file-swarming systems.  相似文献   
87.
Threshold cryptography based on Asmuth-Bloom secret sharing   总被引:1,自引:0,他引:1  
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography.  相似文献   
88.
Probabilistic Visual Cryptography Schemes   总被引:1,自引:0,他引:1  
  相似文献   
89.
Abstract. Knowledge systems development and use have been significantly encumbered by the difficulties of eliciting and formalizing the expertise upon which knowledge workers rely. This paper approaches the problem from an examination of the knowledge competencies of knowledge workers in order to define a universe of discourse for knowledge elicitation. It outlines two categories and several types of knowledge that could serve as the foundations for the development of a theory of expertise.  相似文献   
90.
PERFECT (Programming EnviRonment For Expert systems Constrained in reasoning Time) is aimed at providing the necessary engineering support in real-time knowledge-based system development. PERFECT bridges the gap between the traditional analysis and design methodologies, and the implementation tools for these systems. It does so by providing the means to construct a knowledge model and to choose a suitable inference strategy. Subsequently the properties of the knowledge model and inference strategy may be analysed. For instance, it may be checked whether the knowledge model contains sufficient knowledge to diagnose a fault in an industrial process. Moreover, it may be checked whether the inference engine is able to provide an answer to a certain problem in time. If not, the analyser of PERFECT proposes an alternative structure of the knowledge model. When the constructed knowledge model and the chosen inference strategy show the required time efficiency, the compiler of PERFECT may translate them to an actual real-time knowledge based system in COGSYS. In addition, guidelines are provided with respect to the design of the human-machine interface. The resulting system is an instrument—a source of information that can be used by the human operator during problem-solving, rather than a prosthesis—a device that solves the entire problem by itself and presents the outcome to the human operator.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号