首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30149篇
  免费   2805篇
  国内免费   2414篇
电工技术   1743篇
技术理论   1篇
综合类   2470篇
化学工业   1551篇
金属工艺   382篇
机械仪表   1152篇
建筑科学   793篇
矿业工程   233篇
能源动力   457篇
轻工业   248篇
水利工程   234篇
石油天然气   171篇
武器工业   158篇
无线电   6838篇
一般工业技术   1608篇
冶金工业   527篇
原子能技术   60篇
自动化技术   16742篇
  2024年   142篇
  2023年   499篇
  2022年   604篇
  2021年   675篇
  2020年   845篇
  2019年   720篇
  2018年   688篇
  2017年   882篇
  2016年   1029篇
  2015年   1189篇
  2014年   1718篇
  2013年   1889篇
  2012年   1927篇
  2011年   2221篇
  2010年   1691篇
  2009年   2022篇
  2008年   2130篇
  2007年   2184篇
  2006年   1754篇
  2005年   1567篇
  2004年   1339篇
  2003年   1194篇
  2002年   1064篇
  2001年   894篇
  2000年   793篇
  1999年   684篇
  1998年   603篇
  1997年   511篇
  1996年   419篇
  1995年   328篇
  1994年   249篇
  1993年   221篇
  1992年   152篇
  1991年   96篇
  1990年   78篇
  1989年   65篇
  1988年   42篇
  1987年   29篇
  1986年   20篇
  1985年   46篇
  1984年   41篇
  1983年   38篇
  1982年   44篇
  1981年   5篇
  1980年   7篇
  1979年   8篇
  1978年   3篇
  1977年   3篇
  1975年   9篇
  1974年   2篇
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
51.
52.
A graph G is panconnected if each pair of distinct vertices u,vV(G) are joined by a path of length l for all dG(u,v)?l?|V(G)|-1, where dG(u,v) is the length of a shortest path joining u and v in G. Recently, Fan et. al. [J. Fan, X. Lin, X. Jia, Optimal path embedding in crossed cubes, IEEE Trans. Parall. Distrib. Syst. 16 (2) (2005) 1190-1200, J. Fan, X. Jia, X. Lin, Complete path embeddings in crossed cubes, Inform. Sci. 176 (22) (2006) 3332-3346] and Xu et. al. [J.M. Xu, M.J. Ma, M. Lu, Paths in Möbius cubes and crossed cubes, Inform. Proc. Lett. 97 (3) (2006) 94-97] both proved that n-dimensional crossed cube, CQn, is almost panconnected except the path of length dCQn(u,v)+1 for any two distinct vertices u,vV(CQn). In this paper, we give a necessary and sufficient condition to check for the existence of paths of length dCQn(u,v)+1, called the nearly shortest paths, for any two distinct vertices u,v in CQn. Moreover, we observe that only some pair of vertices have no nearly shortest path and we give a construction scheme for the nearly shortest path if it exists.  相似文献   
53.
Modeling wine preferences by data mining from physicochemical properties   总被引:4,自引:0,他引:4  
We propose a data mining approach to predict human wine taste preferences that is based on easily available analytical tests at the certification step. A large dataset (when compared to other studies in this domain) is considered, with white and red vinho verde samples (from Portugal). Three regression techniques were applied, under a computationally efficient procedure that performs simultaneous variable and model selection. The support vector machine achieved promising results, outperforming the multiple regression and neural network methods. Such model is useful to support the oenologist wine tasting evaluations and improve wine production. Furthermore, similar techniques can help in target marketing by modeling consumer tastes from niche markets.  相似文献   
54.
This paper investigates the use of artificial intelligent models as virtual sensors to predict relevant emissions such as carbon dioxide, carbon monoxide, unburnt hydrocarbons and oxides of nitrogen for a hydrogen powered car. The virtual sensors are developed by means of application of various Artificial Intelligent (AI) models namely; AI software built at the University of Tasmania, back-propagation neural networks with Levenberg–Marquardt algorithm, and adaptive neuro-fuzzy inference systems. These predictions are based on the study of qualitative and quantitative effects of engine process parameters such as mass airflow, engine speed, air-to-fuel ratio, exhaust gas temperature and engine power on the harmful exhaust gas emissions. All AI models show good predictive capability in estimating the emissions. However, excellent accuracy is achieved when using back-propagation neural networks with Levenberg–Marquardt algorithm in estimating emissions for various hydrogen engine operating conditions with the predicted values less than 6% of percentage average root mean square error.  相似文献   
55.
This paper addresses the explicit synchronisation of heterogeneous dynamics networks via three-layer communication framework. The main contribution is to propose an explicit synchronisation algorithm, in which the synchronisation errors of all the agents are decoupled. By constructing a three-layer node model, the proposed algorithm removes the assumptions that the topology is fixed and the synchronisation process is coupled. By introducing appropriate assumptions, the algorithm leads to a class of explicit synchronisation protocols based on the states of agents in different layers. It is proved in the sense of Lyapunov that, if the dwell time is larger than a threshold, the explicit synchronisation can be achieved for closed-loop heterogeneous dynamics networks under switching topologies. The results are further extended to the cases in which the switching topologies are only frequently but not always connected. Simulation results are presented with four single-link manipulators to verify the theoretical analysis.  相似文献   
56.
The purpose of the present study was to examine the prevalence of cyber-bullying through Facebook in a sample of 226 Greek university undergraduates, and to explore whether big five personality characteristics, narcissism, as well as attitudes toward Facebook, technological knowledge and skills were predictive of such behavior. Participants completed a self-report questionnaire measuring the above constructs. Results indicated that almost one third of the sample reported Facebook bullying engagement at least once during the past month, with male students reporting more frequent involvement than females. Bullying through Facebook was predicted by low Agreeableness and more time spent on Facebook only for males, whereas for females none of the studied variables predicted engagement in Facebook bullying. Findings are discussed in terms of prevention and intervention strategies.  相似文献   
57.
The objective of this study is to provide a framework for relocating or reconfiguring existing pollution monitoring station networks by using feature selection and data mining techniques. This methodology enables a partial redesign based on the maximization of the available information that is gathered by the pollution networks by the optimal data mining technique. It also considers requirements of the decision makers, like potential target places, etc.Since this methodology is based on the quality of forecasting, it can also be useful for auditing and forecasting. A case study is included in this paper. In light of the prediction results, a new way to relocate the existing monitoring station is proposed.  相似文献   
58.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed.  相似文献   
59.
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments.  相似文献   
60.
This paper investigates packet scheduling in the context of Self-Optimizing Networks, and demonstrates how to improve coverage dynamically by adjusting the scheduling strategy. We focus on α-fair schedulers, and we provide methods for calculating the scheduling gain, including several closed form formulas. Scheduling gain is analyzed for different fading models, with a particular focus on the frequency-selective channel. We then propose a coverage-capacity self-optimization algorithm based on α-fair schedulers. A use case illustrates the implementation of the algorithm and simulation results show that important coverage gains are achieved at the expense of very little computing power.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号