首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5399篇
  免费   416篇
  国内免费   254篇
电工技术   149篇
综合类   173篇
化学工业   738篇
金属工艺   159篇
机械仪表   439篇
建筑科学   746篇
矿业工程   80篇
能源动力   483篇
轻工业   404篇
水利工程   70篇
石油天然气   119篇
武器工业   55篇
无线电   212篇
一般工业技术   586篇
冶金工业   248篇
原子能技术   229篇
自动化技术   1179篇
  2024年   17篇
  2023年   59篇
  2022年   108篇
  2021年   130篇
  2020年   139篇
  2019年   164篇
  2018年   143篇
  2017年   180篇
  2016年   249篇
  2015年   250篇
  2014年   371篇
  2013年   496篇
  2012年   350篇
  2011年   507篇
  2010年   314篇
  2009年   326篇
  2008年   334篇
  2007年   320篇
  2006年   277篇
  2005年   220篇
  2004年   196篇
  2003年   139篇
  2002年   141篇
  2001年   100篇
  2000年   92篇
  1999年   61篇
  1998年   63篇
  1997年   39篇
  1996年   50篇
  1995年   36篇
  1994年   20篇
  1993年   21篇
  1992年   15篇
  1991年   13篇
  1990年   17篇
  1989年   9篇
  1988年   11篇
  1987年   5篇
  1986年   6篇
  1985年   7篇
  1984年   7篇
  1983年   4篇
  1981年   7篇
  1979年   4篇
  1977年   4篇
  1964年   3篇
  1960年   3篇
  1959年   7篇
  1956年   3篇
  1951年   3篇
排序方式: 共有6069条查询结果,搜索用时 15 毫秒
101.
In this paper we introduce the balanced traveling salesman problem (BTSP), which can be used to model optimization problems where equitable distribution of resources are important. BTSP is obviously NP-hard. Efficient heuristic algorithms are presented to solve the problem along with extensive computational results using benchmark problems from TSPLIB and random instances. Our algorithms produced provably optimal solutions for several test instances. Application of the model in solving the nozzle guide vane assembly problem related to the maintenance of aircraft engines is also discussed.  相似文献   
102.
针对以耦合率为指标之一的C4ISR系统体系结构设计合理性验证评估问题,从功能系统间交互信息的安全性需求出发,通过推理揭示出密钥关系的耦合本质,进而提出并分析了密钥关联耦合的概念及其属性。给出了密钥关联耦合的定量度量方法,采用该方法能在体系结构设计结束后就实施并完成度量,且不必考虑密码算法及密钥长度等细节问题。利用Briand等人提出的准则证明了度量方法的科学性与合理性,并结合案例说明了度量方法的可行性与易操作性。  相似文献   
103.
Software execution processes as an evolving complex network   总被引:2,自引:0,他引:2  
Inspired by the surprising discovery of several recurring structures in various complex networks, in recent years a number of related works treated software systems as a complex network and found that software systems might expose the small-world effects and follow scale-free degree distributions. Different from the research perspectives adopted in these works, the work presented in this paper treats software execution processes as an evolving complex network for the first time. The concept of software mirror graph is introduced as a new model of complex networks to incorporate the dynamic information of software behavior. The experimentation paradigm with statistical repeatability was applied to three distinct subject programs to conduct several software experiments. The corresponding experimental results are analyzed by treating the software execution processes as an evolving directed topological graph as well as an evolving software mirror graph. This results in several new findings. While the software execution processes may demonstrate as a small-world complex network in the topological sense, they no longer expose the small-world effects in the temporal sense. Further, the degree distributions of the software execution processes may follow a power law. However, they may also follow an exponential function or a piecewise power law.  相似文献   
104.
Public key certificates (PKCs) are used nowadays in several security protocols and applications, so as to secure data exchange via transport layer security channels, or to protect data at the application level by means of digital signatures. However, many security applications often fail to manage properly the PKCs, in particular when checking their validity status. These failures are partly due to the lack of experience (or training) of the users who configure these applications or protocols, and partly due to the scarce support offered by some common cryptographic libraries to the application developers. This paper describes the design and implementation of a light middleware dealing with certificate validation in a unified way. Our middleware exploits on one side the libraries that have already been defined or implemented for certificate validation, and it constructs a thin layer, which provides flexibility and security features to the upper layer applications. In our current approach, this layer boasts an integrated approach to support various certificate revocation mechanisms, it protects the applications from some common security attacks, and offers several configuration and performance options to the programmers and to the end users. We describe the architecture of this approach as well as its practical implementation in the form of a library based on the famous OpenSSL security library, and that can be easily integrated with other certificate‐aware security applications. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
105.
Today, due to the availability of free remote sensing data, efficient algorithms for image classification and increased connectivity and computing power, together with international policy initiatives, such as the United Nations Programme on Reducing Emissions from Deforestation and Forest Degradation (UN-REDD), more and more countries are investing in their own national forest monitoring schemes. However, tropical forests remain under threat worldwide. Recently, a citizen science project that enables citizens around the globe to be involved in forest monitoring tasks has been proposed, called “ForestWatchers” (www.forestwatchers.net). Its main goal is to allow volunteers (many of them with no scientific training) around the globe, with their own smartphones, tablets and notebooks, review satellite images of forested regions and confirm whether automatic assignments of forested and deforested regions are correct. Inspected images are then sent to a central database where the results are integrated to generate up-to-date deforestation maps. This approach offers a low-cost way to both strengthen the scientific infrastructure and engage members of the public in science. Here, we describe the methods developed within the scope of the ForestWatchers project to assess the volunteers’ performance. These tools have been evaluated with data of two of the project’s preliminary tasks. The first, called “BestTile”, asks volunteers to select which of several images of the same area has the least cloud cover, while in the second, called “Deforestation”, volunteers draw polygons on satellite images delimiting areas they believe have been deforested. The results from more than 500 volunteers show that using simple statistical tests, it is possible to achieve a triple goal: to increase the overall efficiency of the data collecting tasks by reducing the required number of volunteers per task, to identify malicious behavior and outliers, and to motivate volunteers to continue their contributions.  相似文献   
106.
A medium‐sized domain‐engineering process can contain thousands of features that all have constraint dependency rules between them. Therefore, the validation of the content of domain‐engineering process is vital to produce high‐quality software products. However, it is not feasible to do this manually. This paper aims to improve the quality of the software products generated by the domain‐engineering process by ensuring the validity of the results of that process. We propose rules for two operations: inconsistency detection and inconsistency prevention. We introduce first‐order logic (FOL) rules to detect three types of inconsistency and prevent the direct inconsistency in the domain‐engineering process. Developing FOL rules to detect and prevent inconsistency in the domain‐engineering process directly without the need to the configuration process is our main contribution. We performed some experiments to test the scalability and applicability of our approach on domain‐engineered software product lines containing 1000 assets to 20000 assets. The results show that our approach is scalable and could be utilized to improve the domain‐engineering process.  相似文献   
107.
This paper develops an iterative learning control law that exploits recent results in the area of predictive repetitive control where a priori information about the characteristics of the reference signal is embedded in the control law using the internal model principle. The control law is based on receding horizon control and Laguerre functions can be used to parameterize the future control trajectory if required. Error convergence of the resulting controlled system is analyzed. To evaluate the performance of the design, including comparative aspects, simulation results from a chemical process control problem and supporting experimental results from application to a robot with two inputs and two outputs are given.  相似文献   
108.
《嵌入式系统》课程是一门侧重实践和应用的课程,注重培养学生的实际动手能力。分析《嵌入式系统》课程的特点,指出实验及实践教学在其中的重要性,同时结合实际教学工作,探讨嵌入式实验及实践教学体系的建设,并给出具体的实验和实践教学方案。  相似文献   
109.
深化实验室信息建设对高校创新人才的培养至关重要,计算机管理技术的运用,对构建实验室实践教育教学体系更加趋向科学化。结合多年来进行计算机实验室信息化的工作。介绍利用计算机技术进行实验室教学管理、组织实验教学的方式,希望能为高校机房实验室实践教学工作提供行之有效的方式。  相似文献   
110.
关于仿真模型验证   总被引:14,自引:3,他引:11  
本文对国内外仿真模型的发展进行了述评,陈述了仿真模型验证的定义和有关概念,提出了模型验证的区间假设检验法,介绍了自相关函数检验法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号