首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14472篇
  免费   1879篇
  国内免费   1819篇
电工技术   999篇
技术理论   4篇
综合类   913篇
化学工业   127篇
金属工艺   93篇
机械仪表   310篇
建筑科学   244篇
矿业工程   92篇
能源动力   212篇
轻工业   36篇
水利工程   120篇
石油天然气   86篇
武器工业   62篇
无线电   2632篇
一般工业技术   525篇
冶金工业   80篇
原子能技术   62篇
自动化技术   11573篇
  2024年   132篇
  2023年   379篇
  2022年   486篇
  2021年   604篇
  2020年   675篇
  2019年   497篇
  2018年   493篇
  2017年   612篇
  2016年   709篇
  2015年   847篇
  2014年   1377篇
  2013年   1132篇
  2012年   1273篇
  2011年   1252篇
  2010年   823篇
  2009年   780篇
  2008年   959篇
  2007年   1025篇
  2006年   858篇
  2005年   758篇
  2004年   563篇
  2003年   456篇
  2002年   307篇
  2001年   266篇
  2000年   178篇
  1999年   158篇
  1998年   103篇
  1997年   89篇
  1996年   78篇
  1995年   52篇
  1994年   60篇
  1993年   29篇
  1992年   37篇
  1991年   22篇
  1990年   17篇
  1989年   16篇
  1988年   16篇
  1987年   8篇
  1986年   11篇
  1985年   5篇
  1984年   3篇
  1983年   6篇
  1982年   2篇
  1980年   3篇
  1979年   4篇
  1978年   1篇
  1977年   4篇
  1976年   1篇
  1972年   2篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
中国爆破安全网   总被引:1,自引:1,他引:0  
曲广建  李健  黄新法 《工程爆破》2003,9(3):69-71,51
中国爆破安全网是由中国工程爆破协会主办的涉爆行业信息专业网 ,开通于 2 0 0 3年 4月。该网是民爆器材生产流通主管部门、使用部门和公安机关实施联网监控和规范化管理的有力工具 ,最主要的功能是为涉爆行业管理部门和从业单位提供一个功能完善的管理和办公平台。该网的开通 ,有利于民爆器材生产、销售、购买、使用流向监控制度的贯彻实行。文章介绍了网络的组成、建设原则 ,并给出了中国爆破安全网网络拓扑图  相似文献   
12.
The development of renewable technologies in the last decade has been exceptional. In photovoltaic (PV) for example, efforts were not only limited to merely improving their efficiency but also to the reduction of the cost of cells and modules via volume production for commercial markets. There are many national schemes promoting the use of PV technology and regional targets for a share of renewable energy production. This paper attempts to relay to the reader a journey, based on experience, approaches for enhancing the prospect of utilising solar energy within the society we live in. The issue of expansion or enhancing the utilisation of solar energy can be undertaken by individuals, groups, institutions and governments. The aim of this paper is to provide some examples, which could serve as a framework in which action could be taken to promote solar technology.  相似文献   
13.
路径规划是机器人技术中的重要组成部分,分全局路径规划和局部路径规划。本文将栅格法与模拟退火法结合,采用栅格法表示环境信息。局部路径规划主要基于模拟退火法,使路径跳出局部极小点,到达目标位置。  相似文献   
14.
Interactive key frame selection model   总被引:1,自引:0,他引:1  
Video summarization can provide a fine representation of the content of video stream and reduce a large amount of data involved in video indexing, browsing, and retrieval. Moreover, Key frame selection is an important step in the research of content-based video analysis and retrieval. Although there exist a variety of methods for key frame selection, they are heuristic and closed systems, which cannot dynamically generate video summary with user’s preference. In this paper, an M-estimator and epipolar line distance constraint camera motion estimation algorithm is introduced as camera parameters is an important motion feature for key frame selection, and Broyden-Fletcher-Goldfarb-Shanno (BFGS) method is applied to optimize estimated parameters. Moreover, since Interactive Computing is a novel-computing model that represents the transition of algorithm to interaction, an interactive model of key frame selection (IKFS) is presented as a result of improving the model of key frame selection (KFS). The model of KFS and IKFS are proved to satisfy the criterion of induction and coinduction, respectively. Experimental results show that the processing scheme generates flexible and desirable summarizations whose distortion rate is lower than current method. Above all, IKFS is an extension to KFS.  相似文献   
15.
A three-dimensional (3D) computational fluid dynamics (CFD) model of a contact tank is presented in this paper. The model results are compared against 3D velocities and flow through curve (FTC) data, representing a tracer concentration profile, from a 1:8 scale physical model. The objective is to demonstrate that CFD models can simulate both the FTC and the 3D velocity field quite well. Simultaneous validation of velocities and FTC is important in ascertaining the predictive capabilities of CFD models, as physical model studies indicate that different baffle arrangements can lead to similar FTCs. Therefore, a good prediction of only FTC, as presented in previous 3D CFD model studies, does not necessarily imply a correct simulation of the flow field.  相似文献   
16.
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection.  相似文献   
17.
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution.  相似文献   
18.
The Grid shows itself as a globally distributed computing environment, in which hardware and software resources are virtualized to transparently provide applications with vast capabilities. Just like the electrical power grid, the Grid aims at offering a powerful yet easy‐to‐use computing infrastructure to which applications can be easily ‘plugged’ and efficiently executed. Unfortunately, it is still very difficult to Grid‐enable applications, since current tools force users to take into account many details when adapting applications to run on the Grid. In this paper, we survey some of the recent efforts in providing tools for easy gridification of applications and propose several taxonomies to identify approaches followed in the materialization of such tools. We conclude this paper by describing common features among the proposed approaches, and by pointing out open issues and future directions in the research and development of gridification methods. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
19.
面向智能计算的记忆结构理论综述   总被引:5,自引:0,他引:5  
本文从智能计算角度出发,对记忆的总体结构、信息表征及记忆模型等方面的理论作一综述。并在分析、比较了这些理论与AI中的相关理论差异的基础上,对面向智能计算的记忆理论研究方法与方向作了扼要讨论。  相似文献   
20.
本文主要是利用电子光学静电透镜原理,研究栅网对栅控电子枪的影响,以及如何消除这种影响。结果表明,理论分析的结果与实验相符,对实际栅控电子枪的设计具有一定的指导意义。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号