首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   101798篇
  免费   8433篇
  国内免费   5652篇
电工技术   4110篇
技术理论   9篇
综合类   11028篇
化学工业   12994篇
金属工艺   6526篇
机械仪表   5744篇
建筑科学   24195篇
矿业工程   3824篇
能源动力   2450篇
轻工业   5146篇
水利工程   2806篇
石油天然气   4608篇
武器工业   954篇
无线电   6057篇
一般工业技术   10389篇
冶金工业   4033篇
原子能技术   577篇
自动化技术   10433篇
  2024年   384篇
  2023年   1351篇
  2022年   2555篇
  2021年   2840篇
  2020年   2864篇
  2019年   2301篇
  2018年   2202篇
  2017年   2789篇
  2016年   2963篇
  2015年   3236篇
  2014年   6427篇
  2013年   5226篇
  2012年   6882篇
  2011年   7795篇
  2010年   6183篇
  2009年   6660篇
  2008年   6073篇
  2007年   7176篇
  2006年   6549篇
  2005年   5538篇
  2004年   4545篇
  2003年   4072篇
  2002年   3483篇
  2001年   2850篇
  2000年   2468篇
  1999年   2045篇
  1998年   1545篇
  1997年   1327篇
  1996年   1028篇
  1995年   860篇
  1994年   807篇
  1993年   540篇
  1992年   497篇
  1991年   404篇
  1990年   326篇
  1989年   220篇
  1988年   175篇
  1987年   101篇
  1986年   79篇
  1985年   91篇
  1984年   58篇
  1983年   58篇
  1982年   75篇
  1981年   22篇
  1980年   64篇
  1979年   14篇
  1978年   11篇
  1976年   9篇
  1975年   11篇
  1959年   12篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
一种新结构的DM-multipath与动态负载平衡   总被引:1,自引:0,他引:1  
阚闯  戚玮玮 《计算机应用》2008,28(2):289-291
对于存储设备,Linux 在多路径 I/O方面主要有两种类型的解决方案:位于I/O调度器之上的顶层方案(BIO映射器)和位于底层的子系统具体方案(如IDE,SCSI)。因为实施它们的所在存储堆栈中的位置不同,每种方案各有优势。通过与第一种方案比较,介绍具体硬件子系统之上的另一种解决方案,新结构中重点实现移动内核当前多路径层——多路径设备映射器 (dm-multipath)到I/O调度层之下,这种方案能够有效地支持动态的负载平衡。  相似文献   
102.
通过化工设备的结构模型、功能模型建立仿真模型,在对仿真模型分析的基础上得到症状与故障之间的数量关系并进行分析计算,推断出潜在的故障模式,为设计化工设备故障诊断专家系统奠定基础。  相似文献   
103.
Different simple solvent models have been implemented in anextended simulated annealing process (ESAP), developed by Higoet al. [(1992) Biopolymers, 32, 33–43] and proven to beable to predict ab initio the conformation of the antigen-combiningloop H2 from FAB McPC603. Hie rationale used here provides auseful new method for testing solvent models in general. Thedifferent solvent models comprise a high dielectric constant,a screened coulomb potential, a dummy water model and a statisticalcontinuum treatment of the solvent effect in which the reactionfield and the solvent accessible area is accounted for. To assessthe effect of the solvent, we tested the ability of simulationsto retain the experimental conformation of loop H2. We comparedthe different structures obtained at the end of the annealingprocess in terms of root mean square deviation (r.m.s.d.), forboth the backbone and for all atoms, root mean square (r.m.s.)fluctuation, solvent accessible surface area (ASA), hydrogenbonding network and - plot distribution. The relationship betweenthe r.m.s.d. and the internal energy of a structure is alsoevaluated in terms of precision and another possible methodfor obtaining the best conformation is discussed. The accuracyof modelling the coarse effect of the solvent and the similaritiesof the resulting structures with respect to the X-ray referencestructure are examined. The possible choice of one of thesesolvent models in the structure determination of an unknownloop structure is discussed  相似文献   
104.
In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating the pathways using multiple criteria and analytics. We present a Group Adaptive Hybrid Routing Algorithm (GAHRA) for gathering portability, which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile situations. Based on this aspect, the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach, with the objectives of enhancing the output of MANET routing computation in each hub. Simulation analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications.  相似文献   
105.
暴力行为容易出现遮挡情况, 识别准确率较低. 目前, 一些算法加入多视角视频输入来解决遮挡问题, 以等量权重将所有视角数据融合, 但是不同视角的视频因拍摄距离和遮挡情况本身就对识别存在差异性. 针对该问题, 本文提出一种基于视角置信度和注意力的暴力行为识别方法, 提高暴力识别的准确率. 本文将时序差分模块TDM的输入扩展成多视角, 将通道注意力机制运用在片段维度来增强TDM中跨段特征提取能力, 通过背景抑制方法突显移动目标的纹理特征并计算出每个视角图像的置信度, 引入双线性池化方法融合多视角视频特征, 根据视角置信度分配每个视角局部特征的权重. 本文在公开数据集CASIA-Action和自制数据集上进行了验证. 实验表明, 本文提出的视角置信度方法优于改进前的双线性池化方法, 暴力行为准确率相较于现有的行为识别方法取得了更好的效果.  相似文献   
106.
The article aims to evaluate the consumer response to a reduction in the electricity tariffs as a hourly economic signal for the case of an electric utility in the state of Rio Grande do Sul, southern Brazil. Using Differences-in-differences method, the results were robust in showing that the change in the economic signal increased up to 81.01% the consumption at the time influenced by the change, improving the way in which the company's assets are used, in addition to reducing fuel oil consumption by users.  相似文献   
107.
Research has extensively investigated the rationale of firm diversity from the economic perspective, but little is known about how such a strategy may affect information security. The present study is the first to examine how firm diversity is relevant to firms’ likelihood to experience data breaches (i.e., data breach risk). Drawing from the strands of literature on information security, diversification, and resource-based view, we propose hypotheses on the relationship between firm diversity and data breach risk, as well as the boundary conditions of this relationship. On the basis of a twelve-year sample of publicly-listed firms, our analysis provides evidence to support the negative association between firm diversity and data breach risk. Our analysis also delineates conditions under which the effects of firm diversity can intervene to reduce the data breach risk invoked, such as under related diversity and when managers are managerially capable. For academics, our research accentuates an intriguing but unexamined benefit of firm diversity because it relates to information security. For practicing professionals, this research highlights the significant impact of firms’ operational structure on information security.  相似文献   
108.
利用应用单元法(AEM法),以含填充墙的某多层框架结构定向爆破拆除为例,进行倒塌过程的数值模拟。结果表明:在框架结构爆破切口形成后,结构由于重力作用逐渐沿横向偏转,并在横向最外侧的一排柱上形成活动铰,产生翻转倒塌,模拟结果与实际倒塌结果基本相符。在倒塌的过程中,结构爆破切口的横向很快进入大变形倒塌,同时引起横向隔墙的平面失去稳定而倒塌。落地的倒塌碎块,在纵向产生150kN左右的峰值冲击力,在横向产生30~50kN的峰值冲击力。基于仿真结果,可以定量设置防护措施,避免安全隐患。  相似文献   
109.
110.
从株洲产业结构的现状与特征出发,对如何进一步调整优化株洲的产业结构进行了探讨,提出了调整优化的产业结构的基本方针和对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号