首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   46792篇
  免费   5108篇
  国内免费   3455篇
电工技术   2856篇
技术理论   8篇
综合类   5983篇
化学工业   5639篇
金属工艺   2655篇
机械仪表   2528篇
建筑科学   3983篇
矿业工程   1479篇
能源动力   2377篇
轻工业   898篇
水利工程   1283篇
石油天然气   1217篇
武器工业   655篇
无线电   4191篇
一般工业技术   5959篇
冶金工业   2645篇
原子能技术   703篇
自动化技术   10296篇
  2024年   196篇
  2023年   799篇
  2022年   1050篇
  2021年   1343篇
  2020年   1468篇
  2019年   1378篇
  2018年   1445篇
  2017年   1657篇
  2016年   1701篇
  2015年   1734篇
  2014年   2578篇
  2013年   3532篇
  2012年   2913篇
  2011年   3325篇
  2010年   2625篇
  2009年   2797篇
  2008年   2845篇
  2007年   3007篇
  2006年   2778篇
  2005年   2373篇
  2004年   1990篇
  2003年   1666篇
  2002年   1452篇
  2001年   1178篇
  2000年   1057篇
  1999年   896篇
  1998年   727篇
  1997年   644篇
  1996年   553篇
  1995年   534篇
  1994年   434篇
  1993年   373篇
  1992年   334篇
  1991年   275篇
  1990年   239篇
  1989年   253篇
  1988年   187篇
  1987年   102篇
  1986年   114篇
  1985年   109篇
  1984年   98篇
  1983年   63篇
  1982年   77篇
  1981年   55篇
  1980年   42篇
  1979年   37篇
  1978年   36篇
  1977年   29篇
  1964年   26篇
  1955年   35篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
网络入侵危险性评估的云理论实现   总被引:1,自引:1,他引:0       下载免费PDF全文
由于任何网络安全手段都无法完全阻止网络攻击,保护网络的绝对安全,因此对网络入侵危险性进行评估,进而采取相应的防御手段就非常重要。传统的评估方法都无法同时评估网络入侵的不确定性(模糊性和随机性),基于此,利用云模型理论把模糊性和随机性有效集成在一起的优点,提出了一种基于云理论的网络入侵风险评估方法。本文给出了方法的理论基础、设计思想和关键实现技术及评估过程,并提出了一种改进的逆向云生成算法。该模型通过对系统资源监控,并对得到的数据进行处理,然后输入到云控制器,云控制器根据设定的规则做出评估结果。实验结果表明,该方法最大限度地保留了网络入侵评估过程中固有的不确定性,提高了评估结果的科学性和准确性。  相似文献   
992.
基于猜测概率和失误概率的学习诊断模型   总被引:2,自引:0,他引:2  
受测者在测试过程中存在猜测和失误的可能,然而现有的诊断模型并未考虑这两个因素,因此无法在这种情况下对受测者的知识状态进行有效诊断。本文提出了一种知识空间理论中基于猜测概率和失误概率的学习诊断模型,当受测者出现猜测或失误时,该模型仍可对受测者的知识状态进行有效的诊断。模型依据试题的猜测概率和失误概率对答题状态进行转移,以诊断受测者的真实知识状态,并重点分析了这两种概率的计算方法。该模型在实用性、诊断的准确性等方面具有较好的效果。  相似文献   
993.
In this article, with Ehrenfeucht-Fraïssé games we prove that Δ1Δ0 on BFR, which implies ΔΔ0 on BFR, and thus solve an open problem raised by Albert Atserias in his dissertation (Δ0,Δ1,Δ are fragments of first order logic and BFR is a class of finite sets which in essence is equivalent to a class of finite pure arithmetic structures with built-in BIT predicate).  相似文献   
994.
This paper studies a special game with incomplete information, in which the payoffs of the players are both random and fuzzy. Such a game is considered in the context of a Bayesian game with the uncertain types characterized as fuzzy variables. A static fuzzy Bayesian game is then introduced and the decision rules for players are given based on credibility theory. We further prove the existence of the equilibrium of the game. Finally, a Cournot competition model with fuzzy efficiency under asymmetric information is investigated as an application and some results are presented.  相似文献   
995.
A commonly used model for fault-tolerant computation is that of cellular automata. The essential difficulty of fault-tolerant computation is present in the special case of simply remembering a bit in the presence of faults, and that is the case we treat in this paper. We are concerned with the degree (the number of neighboring cells on which the state transition function depends) needed to achieve fault tolerance when the fault rate is high (nearly 1/2). We consider both the traditional transient fault model (where faults occur independently in time and space) and a recently introduced combined fault model which also includes manufacturing faults (which occur independently in space, but which affect cells for all time). We also consider both a purely probabilistic fault model (in which the states of cells are perturbed at exactly the fault rate) and an adversarial model (in which the occurrence of a fault gives control of the state to an omniscient adversary). We show that there are cellular automata that can tolerate a fault rate 1/2−ξ (with ξ>0) with degree O((1/ξ2)log(1/ξ)), even with adversarial combined faults. The simplest such automata are based on infinite regular trees, but our results also apply to other structures (such as hyperbolic tessellations) that contain infinite regular trees. We also obtain a lower bound of Ω(1/ξ2), even with only purely probabilistic transient faults.  相似文献   
996.
997.
998.
Quantitative performance modeling of complex information systems is of immense importance for designing enterprise e-business infrastructures and applications. In this paper, we present a traffic model of a server node in a typical transaction processing middleware system as well as a quantitative framework to model and analyze its performance. A multi-class open queueing network model is presented in which multi-class jobs are admitted to a number of server processes sharing hardware resources including the CPU and the disk. We have developed a viable approximation method, which decomposes the dependent components into their independent counterparts while preserving their relevant characteristics. We have conducted queueing-theoretic delay analyses and verified the approach using simulation. Results demonstrate the strength of our approach in predicting delays, elapsed times and other system performance measures.  相似文献   
999.
A risk assessment model for water shortage is constructed using a risk analysis method based on the information diffusion theory. The application of this model is demonstrated in the city of Yiwu in Zhejiang Province, China. Based on the analytical results from a small sample, this study indicates that the present model is more stable and effective than the traditional model. Risk assessment results are used to analyze the carrying capacity of water resources from an ecological angle. For this study, the carrying capacity of water resources is defined as the maximum volume of water suitable for supporting human activity in certain stages of social development that can be borne by water resources under favorable ecological conditions. Further study on Yiwu is also performed, with results indicating that water shortages in this city are not related to types of water source, but can be classified in terms of water quality and conservation. To verify the results of theoretical investigation in this paper, the authors simulate changes in the carrying capacity of water resources under the conditions of future water management policies. This simulation uses the system dynamics (SD) model, based on the historical data collected by the city over the past 20 years and governmental plans to raise inhabitants’ living standards between the present and 2020. The paper simultaneously indicates that both singularly pursuing fast economic development at the expense of the environment and promoting environmental protection via reduced economic development are undesirable for Yiwu. Simultaneously giving consideration to both the economic development and environmental protection is likely to produce better overall results. However, if the present water supply level is maintained but does not increase in the near future, Yiwu's water supply will be unable to satisfy requirements even under this scheme. In this case, the carrying capacity of water resources in the region can only be effectively improved by promoting more efficient use of water and water conservation schemes, as well as strengthening long-term investment in environmental protection.  相似文献   
1000.
In this paper, we propose a new class of high-order accurate methods for solving the two-dimensional unsteady convection–diffusion equation. These techniques are based on the method of lines approach. We apply a compact finite difference approximation of fourth order for discretizing spatial derivatives and a boundary value method of fourth order for the time integration of the resulted linear system of ordinary differential equations. The proposed method has fourth-order accuracy in both space and time variables. Also this method is unconditionally stable due to the favorable stability property of boundary value methods. Numerical results obtained from solving several problems include problems encounter in many transport phenomena, problems with Gaussian pulse initial condition and problems with sharp discontinuity near the boundary, show that the compact finite difference approximation of fourth order and a boundary value method of fourth order give an efficient algorithm for solving such problems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号