首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7140篇
  免费   998篇
  国内免费   836篇
电工技术   669篇
综合类   797篇
化学工业   368篇
金属工艺   123篇
机械仪表   305篇
建筑科学   517篇
矿业工程   133篇
能源动力   154篇
轻工业   133篇
水利工程   287篇
石油天然气   191篇
武器工业   84篇
无线电   804篇
一般工业技术   505篇
冶金工业   124篇
原子能技术   66篇
自动化技术   3714篇
  2024年   14篇
  2023年   102篇
  2022年   113篇
  2021年   145篇
  2020年   150篇
  2019年   210篇
  2018年   153篇
  2017年   215篇
  2016年   243篇
  2015年   273篇
  2014年   385篇
  2013年   449篇
  2012年   503篇
  2011年   528篇
  2010年   424篇
  2009年   493篇
  2008年   544篇
  2007年   641篇
  2006年   490篇
  2005年   459篇
  2004年   366篇
  2003年   309篇
  2002年   274篇
  2001年   210篇
  2000年   184篇
  1999年   171篇
  1998年   138篇
  1997年   133篇
  1996年   116篇
  1995年   91篇
  1994年   100篇
  1993年   70篇
  1992年   54篇
  1991年   53篇
  1990年   22篇
  1989年   31篇
  1988年   22篇
  1987年   15篇
  1986年   6篇
  1985年   15篇
  1984年   8篇
  1983年   9篇
  1982年   7篇
  1981年   6篇
  1980年   6篇
  1979年   3篇
  1976年   4篇
  1975年   3篇
  1974年   3篇
  1962年   2篇
排序方式: 共有8974条查询结果,搜索用时 125 毫秒
31.
一种新的基于极大似然估计的系统辨识方法   总被引:1,自引:0,他引:1  
朱幼莲  刘琚 《现代雷达》1998,20(1):33-38
进化计算是一种基于自然选择和自然变异机制的并行随机优化算法。由于递推极大似然估计法难以实现性能指标函数的全局寻优,所以本文提出了将改进的进化计算用于系统参数辨识的方法。计算机仿真结果表明,该算法能够实现似然函数的全局寻优。  相似文献   
32.
The paper proposes and describes several tools enabling their user to estimate the efficiency of Pascal or C-like programs. The approach consists of generating symbolic formulas expressing the efficiency of the programs being analyzed. The formulas are applicable to a variety of compiler-machine configurations. The actual numeric values of the variables in the symbolic formula are determined using linear programming techniques. The proposed approach reduces considerably the amount of benchmarking needed to analyze programs. Several examples are presented showing the applicability of the tools. The effort necessary to implement them is considerably reduced by the combined usage of Prolog and a symbolic formula manipulation package (Maple).  相似文献   
33.
本文提出基于果蝇刚毛分化自组织机理的卫星广播调度新方法,该方法生长出了这种问题的优化解。为增加自组织计算的鲁棒性引入了随机竞争排序技术,对不同大小问题的计算测试表明该方法能快速一致地产生有好的结果。  相似文献   
34.
横流均匀环境中三维线源型正负浮力射流特性研究   总被引:2,自引:2,他引:0  
本文利用混合有限分析法及交错网格。对横流均匀环境中三维线源型正负浮力射流及负浮力射流的特性进行研究,分析了不同工况下流速,温度和湍动能在断面上的分布及影响射流轨迹线的因素,讨论了轨迹线上温度的变化及浮力射流的贴壁现象。对三维长线源型负浮力射流,分析了流速比,喷口弗汝德数对负浮力射流的影响。  相似文献   
35.
本文从实验上测量了单模石英光纤在-50~120℃范围内的损耗。随着温度升高,光纤的损耗随之降低,在常温附近达到最小。其后损耗随着温度的继续升高而增加。损耗的变化主要是由于杂质的吸收和微弯损耗。本文对杂质的吸收以及微弯损耗进行了数值模拟,并且从理论上定性地解释了损耗对温度的依赖关系。  相似文献   
36.
This paper is aimed at presenting a simple yet effective procedure to implement a mesh‐independent p‐orthotropic enrichment in the generalized finite element method. The procedure is based on the observation that shape functions used in the GFEM can be constructed from polynomials defined in any co‐ordinate system regardless of the underlying mesh or type of element used. Numerical examples where the solution possesses boundary or internal layers are solved on coarse tetrahedral meshes with isotropic and the proposed p‐orthotropic enrichment. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   
37.
The paper presents a computational approach and numerical data which facilitate the use of the smeared-tip method for cohesive fracture in large enough structures. In the recently developed K-version of the smeared tip method, the large-size asymptotic profile of the stress intensity factor density along a cohesive crack is considered as a material characteristic, which is uniquely related to the softening stress-displacement law of the cohesive crack. After reviewing the K-version, an accurate and efficient numerical algorithm for the computation of this asymptotic profile is presented. The algorithm is based on solving a singular Abel's integral equation. The profiles corresponding to various typical softening stress-displacement laws of the cohesive crack model are computed, tabulated and plotted. The profiles for a certain range of other typical softening laws can be approximately obtained by interpolation from the tables. Knowing the profile, one can obtain with the smeared-tip method an analytical expression for the large-size solution to fracture problems, including the first two asymptotic terms of the size effect law. Consequently, numerical solutions of the integral equations of the cohesive crack model as well as finite element simulations of the cohesive crack are made superfluous. However, when the fracture process zone is attached to a notch or to the body surface and the cohesive zone ends with a stress jump, the solution is expected to be accurate only for large-enough structures.  相似文献   
38.
Frank G. Pagan 《Software》1988,18(6):509-527
There is an effective and quite general method of manually deriving compilers from programming-language interpreters without dealing directly with machine language. The method is an implementation of the largely theoretical and under-appreciated concept of partial computation, but can be understood on its own terms. It involves the translation of a source program's intermediate form into the interpreter's implementation language. This paper shows how the method can be used to transform both a sample iterative interpreter and a sample recursive interpreter into compilers. The result can be a large gain in program execution speed. Other advantages of the method, including the ease and practicality of applying it, are discussed.  相似文献   
39.
The optimal partition for linear programming is induced by any strictly complementary solution, and this partition is important because it characterizes the optimal set. However, constructing a strictly complementary solution in the presence of degeneracy was not practical until interior point algorithms became viable alternatives to the simplex algorithm. We develop analogs of the optimal partition for linear programming in the case of multiple objectives and show that these new partitions provide insight into the optimal set (both pareto optimality and lexicographic ordering are considered). Techniques to produce these optimal partitions are provided, and examples from the design of radiotherapy plans show that these new partitions are useful. A. Holder. Research conducted at Trinity University, TX, and The University of Mississippi, MS. This research was partially supported by ONR Grant N00014-01-1-0917.  相似文献   
40.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号