首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41802篇
  免费   4231篇
  国内免费   2871篇
电工技术   2429篇
技术理论   1篇
综合类   3904篇
化学工业   6221篇
金属工艺   3104篇
机械仪表   1787篇
建筑科学   2902篇
矿业工程   1918篇
能源动力   1799篇
轻工业   3315篇
水利工程   1203篇
石油天然气   2505篇
武器工业   603篇
无线电   4523篇
一般工业技术   4472篇
冶金工业   3087篇
原子能技术   1015篇
自动化技术   4116篇
  2024年   171篇
  2023年   545篇
  2022年   1101篇
  2021年   1322篇
  2020年   1522篇
  2019年   1264篇
  2018年   1285篇
  2017年   1632篇
  2016年   1769篇
  2015年   1774篇
  2014年   2696篇
  2013年   2956篇
  2012年   3239篇
  2011年   3289篇
  2010年   2442篇
  2009年   2375篇
  2008年   2176篇
  2007年   2660篇
  2006年   2227篇
  2005年   1922篇
  2004年   1650篇
  2003年   1433篇
  2002年   1213篇
  2001年   1037篇
  2000年   884篇
  1999年   716篇
  1998年   612篇
  1997年   527篇
  1996年   486篇
  1995年   405篇
  1994年   304篇
  1993年   233篇
  1992年   218篇
  1991年   167篇
  1990年   145篇
  1989年   101篇
  1988年   67篇
  1987年   46篇
  1986年   44篇
  1985年   35篇
  1984年   30篇
  1983年   19篇
  1982年   17篇
  1981年   13篇
  1980年   16篇
  1975年   10篇
  1964年   9篇
  1960年   10篇
  1959年   12篇
  1956年   9篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
121.
122.
在影响粘土砂旧砂再生效果的诸多因素中,旧砂中水分含量是最重要的因素。本文就水分含量对再生效果的影响规律、再生效果最佳的水分含量等进行了研究和分析,得出了如下结论:并非含水量越低再生效果就越好,而是存在一个去泥率低谷区;再生效果最佳的适宜水分含量为1~2%。  相似文献   
123.
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme.  相似文献   
124.
This paper presents a class of dual–primal proximal point algorithms (PPAs) for extended convex programming with linear constraints. By choosing appropriate proximal regularization matrices, the application of the general PPA to the equivalent variational inequality of the extended convex programming with linear constraints can result in easy proximal subproblems. In theory, the sequence generated by the general PPA may fail to converge since the proximal regularization matrix is asymmetric sometimes. So we construct descent directions derived from the solution obtained by the general PPA. Different step lengths and descent directions are chosen with the negligible additional computational load. The global convergence of the new algorithms is proved easily based on the fact that the sequences generated are Fejér monotone. Furthermore, we provide a simple proof for the O(1/t) convergence rate of these algorithms.  相似文献   
125.
Although mobile purchase is convenient in the age of mobile commerce, many consumers still do not utilize mobile purchase to its full potential. From the mobile vendor’s perspective, retaining current customers and facilitating their continued purchase are crucial to create profitability and achieve a sustainable development. An understanding of the continuance intention towards mobile purchase can provide insights into mobile vendors’ marketing campaigns. Therefore, it is important to examine the determinants that impact continuance intentions of consumers for mobile purchase. Drawing upon information success model, flow theory and trust, this study proposed and empirically tested an integrated model to better understand the determinants of consumers’ continued intention to purchase on mobile sites. Empirical data from 462 users who had experience with mobile purchase were tested against the proposed research model by using structural equation modelling (SEM). The results indicated that information quality, and privacy and security concerns are the main factors affecting trust, whereas service quality is the main factor affecting flow. System quality, and privacy and security concerns affect satisfaction. Trust affects flow, which in turn affects satisfaction. These three factors together affect continued intention towards mobile purchase. The findings of this study provide several important implications for mobile commerce research and practice.  相似文献   
126.
The prediction of the production rate of the hematite ore beneficiation process is important to plant-wide optimization. This paper presents a data-based multi-model approach to predict the production rate with multiple operating modes. The inputs of the predictive model are the performance indices of each unit process, and the output is the global production index (the production rate) of the hematite ore beneficiation process. The multiple models are developed by integrating the fuzzy clustering algorithm and machine learning algorithm. A global model, Takagi–Sugeno–Kang fuzzy model, and multiple neural network model were compared using the data obtained from a practical industrial process, and the effectiveness of the proposed algorithm was proven.  相似文献   
127.
针对异构Hadoop环境下仍采用均等的数据分配方法将严重降低MapReduce的性能,提出比例数据分配策略。通过计算异构集群中各节点的计算比率,将已经分割好的数据块重新进行组合,形成数个按比例划分的数据块。每个节点根据自身性能来选择所分配和存储的数据块,从而使异构Hadoop集群中各节点处理数据的时间大致相同,降低节点之间数据的移动量。实验验证了提出的比例数据分配方法可以有效地提高MapReduce的性能,并使数据负载均衡。  相似文献   
128.
电子产品在生产过程中需进行产品检测,以故障指示器的检测为例,结合深度信念网络(DBN)技术实现了自动检测.深度信念网络由于其具有无监督预训练的优势,将其应用于实际系统,对现场的故障指示器视频图像的动作状态进行了分类实验.实验结果表明:深度信念网络分类算法相比于支持向量机(SVM)分类算法和BP分类算法有明显的优势,正确识别率达到了100%.该算法在产品检验的应用中满足生产测试的要求,且降低了人工测试的劳动强度,缓解了视觉疲劳问题.  相似文献   
129.
针对加权质心定位算法( WCLA)对锚节点数量要求较高和定位精度较低的缺陷,提出一种基于次锚节点的改进加权质心定位算法( IWCLA-SAN)。该算法在加权因子中引入修正系数,以提高定位精度;同时,将基于粒子群优化( PSO)的定位算法的未知节点升级为次锚节点,在锚节点数量有限的情况下,以提高定位精度和定位覆盖率。仿真结果表明:该算法能有效提高定位精度和定位覆盖率。  相似文献   
130.

城市交通流具有复杂的非线性动态特性, 在交通控制中难以对其进行精确的数学建模; 同时, 以天为周期, 宏观交通流又呈现出明显的周期性特征. 鉴于此, 提出一种基于迭代学习的城市区域交通信号控制策略, 通过对交通信号的迭代控制, 使路段的平均占有率收敛于期望占有率, 从而使绿灯时间得到充分利用并防止交通拥堵的发生, 保证了交通流在路网中的高效平稳运行. 严格的理论推导证明了该方法的收敛性, 仿真结果验证了该方法的有效性.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号