首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   133000篇
  免费   18303篇
  国内免费   11951篇
电工技术   17966篇
技术理论   11篇
综合类   14952篇
化学工业   5175篇
金属工艺   2286篇
机械仪表   6114篇
建筑科学   8795篇
矿业工程   5300篇
能源动力   2839篇
轻工业   2029篇
水利工程   4133篇
石油天然气   5262篇
武器工业   1206篇
无线电   27633篇
一般工业技术   5257篇
冶金工业   2588篇
原子能技术   433篇
自动化技术   51275篇
  2024年   995篇
  2023年   2666篇
  2022年   5022篇
  2021年   5533篇
  2020年   5818篇
  2019年   4196篇
  2018年   3618篇
  2017年   4442篇
  2016年   4743篇
  2015年   5533篇
  2014年   9325篇
  2013年   7968篇
  2012年   10622篇
  2011年   10894篇
  2010年   8327篇
  2009年   8590篇
  2008年   8955篇
  2007年   9842篇
  2006年   8244篇
  2005年   7254篇
  2004年   5956篇
  2003年   5304篇
  2002年   4150篇
  2001年   3505篇
  2000年   2724篇
  1999年   2181篇
  1998年   1548篇
  1997年   1279篇
  1996年   1006篇
  1995年   815篇
  1994年   591篇
  1993年   404篇
  1992年   274篇
  1991年   185篇
  1990年   154篇
  1989年   130篇
  1988年   89篇
  1987年   40篇
  1986年   58篇
  1985年   59篇
  1984年   41篇
  1983年   38篇
  1982年   37篇
  1981年   34篇
  1980年   13篇
  1979年   14篇
  1978年   4篇
  1976年   3篇
  1959年   7篇
  1951年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
Several three-party password authenticated key exchange (3-PAKE) protocols have recently been proposed for heterogeneous wireless sensor networks (HWSN). These are efficient and designed to address security concerns in ad-hoc sensor network applications for a global Internet of Things framework, where a user may request access to sensitive information collected by resource-constrained sensors in clusters managed by gateway nodes. In this paper we first analyze three recently proposed 3-PAKE protocols and discuss their vulnerabilities. Then, based on Radio Frequency Identification technologies we propose a novel 3-PAKE protocol for HWSN applications, with two extensions for additional security features, that is provably secure, efficient and flexible.  相似文献   
22.
In recent years, Internet of Things (IoT) devices are used for remote health monitoring. For remotely monitoring a patient, only the health information at different time points are not sufficient; predicted values of biomarkers (for some future time points) are also important. In this article, we propose a powerful statistical model for an efficient dynamic patient monitoring using wireless sensor nodes through Bayesian Learning (BL). We consider the setting where a set of correlated biomarkers are measured from a patient through wireless sensors, but the sensors only report the ordinal outcomes (say, good, fair, high, or very high) to the sink based on some prefixed thresholds. The challenge is to use the ordinal outcomes for monitoring and predicting the health status of the patient under consideration. We propose a linear mixed model where interbiomarker correlations and intrabiomarker dependence are modeled simultaneously. The estimated and the predicted values of the biomarkers are transferred over the internet so that health care providers and the family members of the patient can remotely monitor the patient. Extensive simulation studies are performed to assess practical usefulness of our proposed joint model, and the performance of the proposed joint model is compared to that of some other traditional models used in the literature.  相似文献   
23.
以电信用户入网协议为切入点,电信用户的携号转网行为应受到《合同法》《消费者权益保护法》等私法规范的保护与限制。该行为引起的格式条款解释、合同终止、违约责任、损失赔偿等问题,不能仅靠《电信条例》等公法规范来调整。应当积极引导广大消费者用户以私法领域相关规定为依据,转变争议解决思维,拓宽纠纷处理途径,合理选择维权手段,以保护自身合法民事权益,与行业监管部门共同推动电信行业有序发展。  相似文献   
24.
结合结构支撑理论,探究节点网络结构支持力的一些性质,提出了社交网络结构中的全网支持力和被支持力的总量一致性,并进一步提出计算节点支持力的方法。谣言作为特殊信息,在支持力不同节点之间的传播特性有所不同,借鉴随机游走模型中的PageRank计算方法,对不同节点支持力的谣言传播以及传播后的辟谣状况进行了仿真模拟,结果表明支持力不同的节点对于谣言传播和辟谣影响明显。  相似文献   
25.
In this paper, novel computing approach using three different models of feed-forward artificial neural networks (ANNs) are presented for the solution of initial value problem (IVP) based on first Painlevé equation. These mathematical models of ANNs are developed in an unsupervised manner with capability to satisfy the initial conditions exactly using log-sigmoid, radial basis and tan-sigmoid transfer functions in hidden layers to approximate the solution of the problem. The training of design parameters in each model is performed with sequential quadratic programming technique. The accuracy, convergence and effectiveness of the proposed schemes are evaluated on the basis of the results of statistical analyses through sufficient large number of independent runs with different number of neurons in each model as well. The comparisons of these results of proposed schemes with standard numerical and analytical solutions validate the correctness of the design models.  相似文献   
26.
Although greedy algorithms possess high efficiency, they often receive suboptimal solutions of the ensemble pruning problem, since their exploration areas are limited in large extent. And another marked defect of almost all the currently existing ensemble pruning algorithms, including greedy ones, consists in: they simply abandon all of the classifiers which fail in the competition of ensemble selection, causing a considerable waste of useful resources and information. Inspired by these observations, an interesting greedy Reverse Reduce-Error (RRE) pruning algorithm incorporated with the operation of subtraction is proposed in this work. The RRE algorithm makes the best of the defeated candidate networks in a way that, the Worst Single Model (WSM) is chosen, and then, its votes are subtracted from the votes made by those selected components within the pruned ensemble. The reason is because, for most cases, the WSM might make mistakes in its estimation for the test samples. And, different from the classical RE, the near-optimal solution is produced based on the pruned error of all the available sequential subensembles. Besides, the backfitting step of RE algorithm is replaced with the selection step of a WSM in RRE. Moreover, the problem of ties might be solved more naturally with RRE. Finally, soft voting approach is employed in the testing to RRE algorithm. The performances of RE and RRE algorithms, and two baseline methods, i.e., the method which selects the Best Single Model (BSM) in the initial ensemble, and the method which retains all member networks of the initial ensemble (ALL), are evaluated on seven benchmark classification tasks under different initial ensemble setups. The results of the empirical investigation show the superiority of RRE over the other three ensemble pruning algorithms.  相似文献   
27.
This paper provides a fundamental analysis of a power supply and rectifiers for wireless power transfer using magnetic resonant coupling (MRC). MRC enables efficient wireless power transfer over middle‐range transfer distances. MRC for wireless power transfer should operate at a high frequency in the industry science medical band, such as 13.56 MHz, because the size of the transfer device decreases at higher transfer frequencies. Therefore, the output frequency of the power supply on the transmitting side should be 13.56 MHz. In addition, the rectifier on the receiving side is operated at a high frequency. This paper focuses on the reflected power in the power supply and rectifiers. Thus, the parametric design method is clarified for the power supply, including a low‐pass filter to match the output, the impedance of the power supply with the characteristic impedance of the transmission line. In addition, the effects on the rectifiers of silicon carbide and gallium nitride diodes are confirmed by performing an experiment and a loss analysis.  相似文献   
28.
An integrated approach to measure the cost efficiency of the postal network of Universal Service Provider is proposed. An integrated approach enables the measurement of cost efficiency for delivery and non-delivery postal network units. The proposed approach is verified and tested on the postal network of the selected provider and the results were derived by using Data Envelopment Analysis (DEA). The results show that the main sources of inefficiency are inadequate allocation of resources relative to the network units. In addition, the study indicates that economies of scale have a positive impact on the efficiency of postal network units.  相似文献   
29.
Heat exchanger network synthesis (HENS) has progressed by using mathematical programming-based simultaneous methodology. Although various considerations such as non-isothermal mixing and bypass streams are applied to consider real world alternatives in modeling phase, many challenges are faced because of its properties within non-convex mixed-integer nonlinear programming (MINLP). We propose a modified superstructure, which contains a utility substage for use in considering multiple utilities in a simultaneous MINLP model. To improve model size and convergence, fixed utility locations according to temperature and series connections between utilities are suggested. The numbers of constraints, discrete, and continuous variables show that overall model size decreases compared with previous research. Thus, it is possible to expand the feasible search area for reaching the nearest global solution. The model's effectiveness and applications are exemplified by several literature problems, where it is used to deduce a network superior to that of any other reported methodology.  相似文献   
30.
CAN-BUS系统自问世以来,已将近30年,当代各品牌车辆纷纷采用,但大部分技术人员对CAN总线系统既熟悉又陌生。经常能听到,但具体操作又显得有些力不从心。本文通过对奇瑞A3品牌轿车CAN总线的巧妙应用,引导大家进一步理解和应用CAN总线。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号