首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8340篇
  免费   1234篇
  国内免费   960篇
电工技术   737篇
综合类   1298篇
化学工业   175篇
金属工艺   87篇
机械仪表   346篇
建筑科学   681篇
矿业工程   184篇
能源动力   189篇
轻工业   105篇
水利工程   353篇
石油天然气   217篇
武器工业   492篇
无线电   1975篇
一般工业技术   795篇
冶金工业   161篇
原子能技术   175篇
自动化技术   2564篇
  2024年   26篇
  2023年   119篇
  2022年   183篇
  2021年   239篇
  2020年   278篇
  2019年   277篇
  2018年   271篇
  2017年   376篇
  2016年   382篇
  2015年   406篇
  2014年   529篇
  2013年   679篇
  2012年   655篇
  2011年   702篇
  2010年   572篇
  2009年   563篇
  2008年   533篇
  2007年   579篇
  2006年   494篇
  2005年   437篇
  2004年   328篇
  2003年   276篇
  2002年   248篇
  2001年   208篇
  2000年   195篇
  1999年   142篇
  1998年   124篇
  1997年   109篇
  1996年   63篇
  1995年   77篇
  1994年   89篇
  1993年   61篇
  1992年   46篇
  1991年   39篇
  1990年   40篇
  1989年   40篇
  1988年   25篇
  1987年   17篇
  1986年   9篇
  1985年   20篇
  1984年   10篇
  1983年   12篇
  1982年   6篇
  1981年   4篇
  1980年   7篇
  1979年   3篇
  1978年   4篇
  1975年   3篇
  1964年   3篇
  1963年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In recent decades, there have been designed and developed passive surface acoustic wave radio frequency identification tags with time position encoding in groups of slots. For such tags identified when the received pulse-burst exceeds a threshold, we specify the generic identification (ID) error probability and optimize the threshold employing the Marcum Q-function of first order. As examples, we estimate the ID errors for the one-group 28-slot tag and Barker encoding. It is shown that, under the ideal conditions of equal SNRs (14.8 dB) in On-pulses and zeroth in Off-pulses, the ID error probability lesser 1% (one slip per 100 readings) can be guarantied with single reading for any reasonable number of slots. It becomes lesser 0.1% (1 slip per 1000 readings) with seven or lesser slots.  相似文献   
992.
企业定额编制中数据真伪检测方法研究   总被引:2,自引:1,他引:1  
李建峰  杨志娟  郑永伟 《山西建筑》2009,35(10):204-205
分析了企业定额编制方法的原理,介绍了通过判断系统误差、剔除粗大误差、检验有效数据数量是否符合要求、利用概率测算法等步骤最终确定企业定额的方法,从而避免由于数据失真造成的企业定额编制失误。  相似文献   
993.
The problem of constructing confidence bands with prescribed width and confidence for an unknown density function is considered. A two stage procedure, based on the confidence bands of Bickel and Rosenblatt (1973), is proposed and shown to achieve the desired goals.Moreover, the procedure is asymptotically efficient with respect to sample size. The possibility of using a fully sequential approach is exploredthe technical difficulties in this case are formidable, and perhaps insurmountable.  相似文献   
994.
In this paper we present analytical expressions for the lower bounds of the error performance of dual-hop amplify-and-forward transmissions over independent and not necessarily identical Generalized-K fading channels. Using a tight upper bound for the end-to-end SNR, a novel expression for the probability density function is derived. Based on the abovementioned formula, tight lower bounds for the average bit error probability for a variety of modulation schemes are derived. In order to validate the accuracy of the proposed mathematical analysis, various numerical and computer simulation results are presented.  相似文献   
995.
In this paper, we propose a methodology which helps customers buy products through the Internet. This procedure takes into account the customer's level of desire in the product attributes, which are normally fuzzy, or in linguistically defined terms. The concept of fuzzy number will be used to measure the degree of similarities of the available products to that of the customer's requirements. The degrees of similarities so obtained over all the attributes give rise to the fuzzy probabilities and hence the fuzzy expected values of availing a product on the Internet as per the customer's requirement. Attribute‐wise the fuzzy expected values are compared with those of the available products on the Internet and the product that is closest to the customer's preference is selected as the best product. The multi‐attribute weighted average method is used here to evaluate and hence to select the best product.  相似文献   
996.
基于TCP/IP信息哄骗技术的研究与实现   总被引:1,自引:1,他引:0  
主要论述了基于TCP/IP进行信息哄骗的设计思想和实现技术,介绍了军队在信息战中对实施信息哄骗的方法和策略。  相似文献   
997.
[Correction Notice: An erratum for this article was reported in Vol 13(2) of Psychological Methods (see record 2008-06808-007). In Figures 3B and 3D, the question marks (?) should read as multiplication signs (×). That is, it should read as β×λ?, β×λ?, and β×λ?? instead of β?λ?, β?λ?, and β?λ?? in Figure 3B and as γ×λ? and γ×λ? instead of γ?λ? and γ?λ? in Figure 3D.] In a recent article, A. Maydeu-Olivares and D. L. Coffman (2006; see record 2006-22258-002) presented a random intercept factor approach for modeling idiosyncratic response styles in questionnaire data and compared this approach with competing confirmatory factor analysis models. Among the competing models was the CT-C(M-1) model (M. Eid, 2000). In an application to the Life Orientation Test (M. F. Scheier & C. S. Carver, 1985), Maydeu-Olivares and Coffman found that results obtained from the CT-C(M-1) model were difficult to interpret. In particular, Maydeu-Olivares and Coffman challenged the asymmetry of the CT-C(M-1) model. In the present article, the authors show that the difficulties faced by Maydeu-Olivares and Coffman rest upon an improper interpretation of the meaning of the latent factors. The authors' aim is to clarify the meaning of the latent variables in the CT-C(M-1) model. The authors explain how to properly interpret the results from this model and introduce an alternative restricted model that is conceptually similar to the CT-C(M-1) model and nested within it. The fit of this model is invariant across different reference methods. Finally, the authors provide guidelines as to which model should be used in which research context. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
998.
Obtaining, by means of microscopy, meaningful measurements pertaining to spatial structures requires methods which allow three-dimensional quantitative information to be derived from the reduced information available on the two-dimensional flat sections of the structure. The most powerful methods to that effect are those of stereology which are based on mathematical principles. This paper reviews the early invention of these methods, which sought to solve practical problems, and their further evolution as more rigorous mathematical foundations were developed. It is demonstrated that stereological methods are essentially sampling methods and that newer trends provide new and sound solutions to old and elusive problems, such as anisotropy or particle number and size.  相似文献   
999.
Incidence Calculus is a technique for associating uncertainty values with logical sentences. These uncertainty values are called incidences and they are sets of points, which may be thought of as representing equivalence classes of situations, Tarskian models, or possible worlds. Incidence Calculus was originally introduced in [1]. Incidence Calculus was designed to overcome various inherent problems with purely numeric mechanisms for uncertain reasoning [2]. In particular, incidences can represent the dependence between sentences, which numbers cannot, and hence Incidence Calculus can provide genuine, probabilistic reasoning. In this paper we prove soundness and completeness results for some algorithms introduced in [1] and hence satisfy some of the correctness criteria for Incidence Calculus. These algorithms can be used for probabilistic reasoning and to check the consistency of the subjective probabilities of sentences.  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号