首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7141篇
  免费   1001篇
  国内免费   838篇
电工技术   670篇
综合类   797篇
化学工业   371篇
金属工艺   123篇
机械仪表   305篇
建筑科学   517篇
矿业工程   133篇
能源动力   154篇
轻工业   133篇
水利工程   287篇
石油天然气   191篇
武器工业   85篇
无线电   805篇
一般工业技术   505篇
冶金工业   124篇
原子能技术   66篇
自动化技术   3714篇
  2024年   15篇
  2023年   102篇
  2022年   116篇
  2021年   147篇
  2020年   150篇
  2019年   210篇
  2018年   153篇
  2017年   215篇
  2016年   243篇
  2015年   273篇
  2014年   385篇
  2013年   449篇
  2012年   503篇
  2011年   528篇
  2010年   424篇
  2009年   493篇
  2008年   544篇
  2007年   641篇
  2006年   490篇
  2005年   459篇
  2004年   366篇
  2003年   309篇
  2002年   274篇
  2001年   210篇
  2000年   184篇
  1999年   171篇
  1998年   138篇
  1997年   133篇
  1996年   116篇
  1995年   91篇
  1994年   100篇
  1993年   70篇
  1992年   54篇
  1991年   53篇
  1990年   22篇
  1989年   31篇
  1988年   22篇
  1987年   15篇
  1986年   6篇
  1985年   15篇
  1984年   8篇
  1983年   9篇
  1982年   7篇
  1981年   6篇
  1980年   6篇
  1979年   3篇
  1976年   4篇
  1975年   3篇
  1974年   3篇
  1962年   2篇
排序方式: 共有8980条查询结果,搜索用时 15 毫秒
51.
P2P系统在构建覆盖网络时未考虑到与物理网络的结合,导致逻辑拓扑结构与物理拓扑结构严重不匹配问题,增加P2P相邻节点间的延迟。本文提出一种基于区域划分的超级节点选取机制,将P2P网络中的节点按照物理位置划分成若干区域,保证区域内节点在物理位置上是相近的。利用MATLAB进行仿真实验,仿真实验表明使用这种机制能降低半分布式P2P网络的信息检索延迟,有效地提高检索的效率,并且具有较好的可扩展性。  相似文献   
52.
针对空间信息网络(space information network,SIN)中卫星节点缓存容量有限,且卫星高速移动使得星间链路时变,导致地面用户内容访问延迟增大的问题,提出一种基于人工蜂群算法的空间信息网络缓存决策策略(satellite improved artificial bee colony,SIABC)。首先根据低轨卫星节点链路切换的周期性和可预知性,建立网络分区模型,对空间信息网络的卫星节点进行分区,在此基础上,建立区域节点协作缓存模型,使得整个网络区域内的卫星节点有选择性地缓存不同流行度的内容,同时兼顾区域内节点的协作缓存,从而流行度高的内容缓存在网络边缘。仿真结果表明,与现有缓存机制相比,该缓存策略能够明显提高内容的平均缓存命中率,并显著降低用户的内容访问时延。  相似文献   
53.
Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost and can be integrated into the ubiquitous EPCglobal Class 1 Generation 2 tag protocol (C1G2) are still needed and being investigated. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-ofth-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the EPCglobal C1G2 tag protocol, which assures low implementation cost. We also present a successful implementation of our protocol on real-world components such as the INTEL WISP UHF RFID tag and a C1G2 compliant reader.  相似文献   
54.
Design of optimal plans for environmental planning and management applications should ideally consider the multiple quantitative and qualitative criteria relevant to the problem. For example, in ground water monitoring design problems, qualitative criteria such as acceptable spatial extent and shape of the contaminant plume predicted from the monitored locations can be equally important as the typical quantitative criteria such as economic costs and contaminant prediction accuracy. Incorporation of qualitative criteria in the problem-solving process is typically done in one of two ways: (a) quantifying approximate representations of the qualitative criteria, which are then used as additional criteria during the optimization process, or (b) post-optimization analysis of designs by experts to evaluate the overall performance of the optimized designs with respect to the qualitative criteria. These approaches, however, may not adequately represent all of the relevant qualitative information that affect a human expert involved in design (e.g. engineers, stakeholders, regulators, etc.), and do not necessarily incorporate the effect of the expert's own learning process on the suitability of the final design. The Interactive Genetic Algorithm with Mixed Initiative Interaction (IGAMII) is a novel approach that addresses these limitations by using a collaborative human-computer search strategy to assist users in designing optimized solutions to their applications, while also learning about their problem. The algorithm adaptively learns from the expert's feedback, and explores multiple designs that meet her/his criteria using both the human expert and a simulated model of the expert's responses in a collaborative fashion. The algorithm provides an introspection-based learning framework for the human expert and uses the human's subjective confidence measures to adjust the optimization search process to the transient learning process of the user. This paper presents the design and testing of this computational framework, and the benefits of using this approach for solving groundwater monitoring design problems.  相似文献   
55.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit.  相似文献   
56.
A method capable of estimating the hydrograph from a prescribed storm for a practical mild slope upstream catchment is proposed. This method makes use of two new characteristic parameters, andS, in conjunction with the kinematic wave equation to compute lateral inflows of the main stream of the catchment. The depth profile of overland flow at any instant within the catchment and hydrograph at any location can be easily found. Lag times for individual lateral inflows are then considered and are linearly combined to obtain the hydrograph at the outlet of the catchment or depth profile of the main stream at any instant. The validity of the excess rainfall-surface runoff linear relationship in this study has also been verified with Tatsunokuchiyama catchment, and it shows good results for this computed runoff.  相似文献   
57.
This paper extends the algorithms which were developed in Part I to cases in which there is no affine schedule, i.e. to problems whose parallel complexity is polynomial but not linear. The natural generalization is to multidimensional schedules with lexicographic ordering as temporal succession. Multidimensional affine schedules, are, in a sense, equivalent to polynomial schedules, and are much easier to handle automatically. Furthermore, there is a strong connection between multidimensional schedules and loop nests, which allows one to prove that a static control program always has a multidimensional schedule. Roughly, a larger dimension indicates less parallelism. In the algorithm which is presented here, this dimension is computed dynamically, and is just sufficient for scheduling the source program. The algorithm lends itself to a divide and conquer strategy. The paper gives some experimental evidence for the applicability, performances and limitations of the algorithm.  相似文献   
58.
The two basic performance parameters that capture the complexity of any VLSI chip are the area of the chip,A, and the computation time,T. A systematic approach for establishing lower bounds onA is presented. This approach relatesA to the bisection flow, . A theory of problem transformation based on , which captures bothAT 2 andA complexity, is developed. A fundamental problem, namely, element uniqueness, is chosen as a computational prototype. It is shown under general input/output protocol assumptions that any chip that decides ifn elements (each with (1+)lognbits) are unique must have =(nlogn), and thus, AT2=(n 2log2 n), andA= (nlogn). A theory of VLSI transformability reveals the inherentAT 2 andA complexity of a large class of related problems.This work was supported in part by the Semiconductor Research Corporation under contract RSCH 84-06-049-6.  相似文献   
59.
Engineering the surfaces of components to improve the life and performance of parts used in automotive and aerospace engineering is the active area of research. Suitable Thermal/Mechanical/Thermo mechanical surface engineering treatments will produce extensive rearrangement of atoms in metals and alloys and corresponding marked variations in Physical, Chemical and Mechanical properties. Among the more important of these treatments are heat treatment processes such as hardening by Quenching, Induction hardening and Case Carburizing which rely on phase transformations to produce desired changes in mechanical properties. Other processes where phase transformation occur are casting, welding and machining etc. [1] Phase transformation may be homogeneous or heterogeneous. Homogeneous involves rearrangements in the structure of the material taking place simultaneously in all parts of the solid, while the heterogeneous transformation involves structural changes which are more localized. Alternatively they could be called as Isothermal and Nonisothermal transformation. But irrespective of the classification, these transformations alter the structure of the material giving rise to changes in the mechanical and physical properties of the processed material. It is of interest to review some consequences of surface modification in isothermal (Normalizing) and nonisothermal transformations (Machining) of low carbon steels.  相似文献   
60.
针对国际上普遍采用的基于回归几何二分的分区方法的缺陷,提出了基于模糊均值聚类的均匀模糊均值聚类分区算法。采用该方法对不同类型的无网格几何模型进行了分区,并根据分区信息对三维实体模型进行了并行计算。通过与基于回归几何二分法的比较,充分验证该算法的有效性和可行性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号