首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19911篇
  免费   2339篇
  国内免费   1908篇
电工技术   1312篇
综合类   2632篇
化学工业   1254篇
金属工艺   1036篇
机械仪表   972篇
建筑科学   837篇
矿业工程   450篇
能源动力   485篇
轻工业   377篇
水利工程   438篇
石油天然气   459篇
武器工业   254篇
无线电   2141篇
一般工业技术   1733篇
冶金工业   1178篇
原子能技术   99篇
自动化技术   8501篇
  2024年   64篇
  2023年   239篇
  2022年   402篇
  2021年   523篇
  2020年   630篇
  2019年   614篇
  2018年   541篇
  2017年   681篇
  2016年   699篇
  2015年   783篇
  2014年   1142篇
  2013年   1392篇
  2012年   1270篇
  2011年   1404篇
  2010年   1153篇
  2009年   1243篇
  2008年   1234篇
  2007年   1460篇
  2006年   1234篇
  2005年   1107篇
  2004年   934篇
  2003年   806篇
  2002年   736篇
  2001年   593篇
  2000年   480篇
  1999年   449篇
  1998年   355篇
  1997年   320篇
  1996年   266篇
  1995年   232篇
  1994年   233篇
  1993年   160篇
  1992年   138篇
  1991年   91篇
  1990年   109篇
  1989年   85篇
  1988年   63篇
  1987年   42篇
  1986年   23篇
  1985年   21篇
  1984年   33篇
  1983年   27篇
  1982年   25篇
  1981年   16篇
  1980年   16篇
  1979年   16篇
  1978年   9篇
  1977年   7篇
  1966年   7篇
  1955年   7篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
51.
预期回报对决策具有决定性的影响。基于行为经济模型,认为创业决策依赖于预期回报和欲望水平之间的相互作用,并通过计量分析验证了预期回报对创业决策的影响。  相似文献   
52.
Existing neutron cross section libraries such as EAF-2003 contain a large number of reactions. Of these only a small proportion are significant in the production of the nuclides that dominate activation quantities such as activity or γ-dose rate at various decay times. These reactions were identified in a recent extensive set of calculations on all the elements and reported in the ‘Activation Handbook’. These 1340 reactions are considered here and the set of reactions with no differential or integral data are listed and prioritised. A set of 339 reactions with very limited possibility of measurement are given; these require further study by theoretical calculations. A set of 100 reactions with either discrepant or no data, that might be measurable are listed and are recommended to be the subject of future experimental work.  相似文献   
53.
The paper presents a case study of the development of an expert decision support system which uses simple heuristic methods for fast determination of routes for simultaneous signals in a transmission network of limited capacity. It illustrates how heuristic solutions can be embodied in a model-based DSS and how the standard decision support literature, although intuitively appealing, provides little practical assistance in system construction or classification  相似文献   
54.
现场地质预测与决策技术   总被引:1,自引:1,他引:0  
油气的生成、运移、分布、成藏、保存具有规律性,技术人员可以依据其规律性对地下地质情况进行推理、预测和决策。钻井过程的现场地质预测技术方法主要是外推法、因果法和直观法三大类。外推法是常用的预测方法,包含了岩性、沉积旋回、标志层、标准层、重矿物等岩石地层学对比方法和生物地层学方法及地球物理方法。现场地质预测与决策是通过确定预测目标、收集相关资料、进行对比分析、形成地质预测结果、拟定地质决策方案、方案优选、方案实施等环节来完成。该技术是现场地质监督的核心技术,在实践中取得显著成效。  相似文献   
55.
Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis does not provide an analytical means to determine the importance of the identified factors or the ability to assess decision alternatives according to these factors. Although the analysis successfully pinpoints the factors, individual factors are usually described briefly and very generally. For this reason, SWOT analysis possesses deficiencies in the measurement and evaluation steps. Although the analytic hierarchy process (AHP) technique removes these deficiencies, it does not allow for measurement of the possible dependencies among the factors. The AHP method assumes that the factors presented in the hierarchical structure are independent; however, this assumption may be inappropriate in light of certain internal and external environmental effects. Therefore, it is necessary to employ a form of SWOT analysis that measures and takes into account the possible dependency among the factors. This paper demonstrates a process for quantitative SWOT analysis that can be performed even when there is dependence among strategic factors. The proposed algorithm uses the analytic network process (ANP), which allows measurement of the dependency among the strategic factors, as well as AHP, which is based on the independence between the factors. Dependency among the SWOT factors is observed to effect the strategic and sub-factor weights, as well as to change the strategy priorities.  相似文献   
56.
简介了关系模型、键、完整性规则、E-R模型、函数依赖、模式分解和关系模式的范式等数据库技术基础和规范化设计理论,从键和完整性规则的实现、数据冗余的特殊情况和字典设计等方面论述了在实际设计工作中如何灵活运用关系数据库设计理论。  相似文献   
57.
An actor-critic algorithm for constrained Markov decision processes   总被引:2,自引:0,他引:2  
An actor-critic type reinforcement learning algorithm is proposed and analyzed for constrained controlled Markov decision processes. The analysis uses multiscale stochastic approximation theory and the envelope theorem' of mathematical economics.  相似文献   
58.
The infrastructure renewal program at MIT consists of a large number of projects with an estimated budget that could approach $1 billion. Infrastructure renewal at the Massachusetts Institute of Technology (MIT) is the process of evaluating and investing in the maintenance of facility systems and basic structure to preserve existing campus buildings. The selection and prioritization of projects must be addressed with a systematic method for the optimal allocation of funds and other resources. This paper presents a case study of a prioritization method utilizing multi-attribute utility theory. This method was developed at MIT's Department of Nuclear Engineering and was deployed by the Department of Facilities after appropriate modifications were implemented to address the idiosyncrasies of infrastructure renewal projects and the competing criteria and constraints that influence the judgment of the decision-makers. Such criteria include minimization of risk, optimization of economic impact, and coordination with academic policies, programs, and operations of the Institute. A brief overview of the method is presented, as well as the results of its application to the prioritization of infrastructure renewal projects. Results of workshops held at MIT with the participation of stakeholders demonstrate the feasibility of the prioritization method and the usefulness of this approach.  相似文献   
59.
双抽机组热-电负荷关系非常复杂,运行人员难于分配。介绍一种较精确的工况图画法,可以为电厂运行人员提供可靠的基础。  相似文献   
60.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号