首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14088篇
  免费   1395篇
  国内免费   743篇
电工技术   368篇
综合类   938篇
化学工业   2262篇
金属工艺   963篇
机械仪表   355篇
建筑科学   775篇
矿业工程   409篇
能源动力   290篇
轻工业   4445篇
水利工程   287篇
石油天然气   831篇
武器工业   218篇
无线电   512篇
一般工业技术   943篇
冶金工业   971篇
原子能技术   102篇
自动化技术   1557篇
  2024年   99篇
  2023年   250篇
  2022年   419篇
  2021年   456篇
  2020年   529篇
  2019年   504篇
  2018年   456篇
  2017年   543篇
  2016年   523篇
  2015年   544篇
  2014年   759篇
  2013年   831篇
  2012年   959篇
  2011年   1054篇
  2010年   804篇
  2009年   793篇
  2008年   717篇
  2007年   946篇
  2006年   739篇
  2005年   658篇
  2004年   555篇
  2003年   429篇
  2002年   390篇
  2001年   330篇
  2000年   335篇
  1999年   264篇
  1998年   189篇
  1997年   183篇
  1996年   181篇
  1995年   155篇
  1994年   136篇
  1993年   91篇
  1992年   90篇
  1991年   65篇
  1990年   54篇
  1989年   39篇
  1988年   27篇
  1987年   26篇
  1986年   23篇
  1985年   19篇
  1984年   15篇
  1983年   8篇
  1982年   9篇
  1981年   5篇
  1980年   2篇
  1979年   4篇
  1977年   3篇
  1976年   2篇
  1975年   4篇
  1961年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
22.
The aim of this study was to bring to the surface the strategic use of imitative processes in the context of a 2-route model: (a) direct imitation, used in reproducing new, meaningless actions, and (b) imitation based on stored semantic knowledge of familiar meaningful actions. Three experiments were carried out with healthy participants who reproduced meaningful and meaningless actions within an established time limit. The study investigated 3 factors that could potentially affect the selection of processes used for imitation: (a) the composition of the experimental list (blocked or mixed presentation), (b) the presence-absence of instructions (Experiments 1 and 2), and (c) the relative proportions of the stimuli (Experiment 3). Overall, the results suggest that each of these factors influences the selection of imitative strategies in healthy individuals with temporarily reduced capacities, as happens in the case of brain-damaged patients. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
23.
Passivity Analysis of Dynamic Neural Networks with Different Time-scales   总被引:1,自引:0,他引:1  
Dynamic neural networks with different time-scales include the aspects of fast and slow phenomenons. Some applications require that the equilibrium points of the designed networks are stable. In this paper, the passivity-based approach is used to derive stability conditions for dynamic neural networks with different time-scales. Several stability properties, such as passivity, asymptotic stability, input-to-state stability and bounded input bounded output stability, are guaranteed in certain senses. A numerical example is also given to demonstrate the effectiveness of the theoretical results.  相似文献   
24.
In this study, a single unit of planar micro-solid-oxide fuel cell (μSOFC) is investigated numerically to evaluate the influences of flow channel design, oxygen composition, and thermal operating conditions on cell performance. Four flow channel designs are examined under the co-flow configuration: serpentine, double serpentine, rod bundle, and oblique rib. For all designs, the contacts areas of interconnect to electrodes are kept consistent to maintain the ohmic losses at the same level. To characterize the mass transport effects, there are three different compositions, 100% O2, 50% O2/50% N2 and air, fed to the cathode inlet. Different thermal conditions, adiabatic and isothermal, are applied to the outer boundary of the μSOFC and the results are compared. The outcomes suggest that both thermal conditions and oxidant composition show remarkable influences on μSOFC performance. Under adiabatic conditions, the rise of cell temperature causes a decrease in reversible voltage, deteriorating the overall cell competence. When oxygen is diluted with nitrogen, local gas diffusion becomes dominant to the cathode reaction. Bulk flow, on the other hand, plays a minor role in cell performance since there is little deviation in the polarization curves for all flow channel designs, even at high current densities. For comparison, the flow visualization technique is employed to observe the transport phenomena in various flow channel designs. The flow patterns are found to resemble the concentration distribution, providing a useful tool to design μSOFCs.  相似文献   
25.
The effect of hydrogen heat treatment on impurity contents in aluminum nitride powder of different fineness is studied. Thermodynamic calculations are provided pointing to the possibility of forming gaseous hydrogen compounds with impurity elements. It is established that as a result of treatment the contents of impurity elements, i.e. oxygen, carbon, sulfur, are reduced by a factor of 3-13. The optimum hydrogen heat treatment regime is determined: a temperature of 1323 K and an exposure time of 30 min.  相似文献   
26.
CH_4、CO_2与O_2制合成气的研究 Ⅱ工艺条件的影响   总被引:1,自引:0,他引:1  
在固定床反应器中考察了12%Ni-5%RE-2%Cu-2%Li/Al2O3(mass)催化剂在CH4、CO2与O2催化氧化重整制合成气反应中催化剂粒径、工艺操作条件(空速与温度)及原料气配比对反应的影响,确定了较佳的操作条件:催化剂粒径20~40目,反应最佳温度为800℃,SV=4×104ml/(g·h)。同时看到在不同的原料气配比的条件下该催化剂的活性亦很稳定,不仅达到了反应平衡,且产物V(CO)/V(H2)比有很强的调变性。  相似文献   
27.
文章阐述了建设一支适合本企业IT运维的专业队伍,通过应用IT技术掌控运维队伍,使IT运维业务正常、有序、高效开展的思路,为生产管理服务,提供一个安全、可靠、高效、快捷的信息网络平台。  相似文献   
28.
提出了一种新的图像分割与合成方法。对于图像的分割,提出了新的分割算法,先是手工将一些明显属于物体和明显属于背景的像素分割出来,然后创建一个小矩形区域进行像素拓展迭代,迭代到图像边界为止。对于图像的合成,采用平均法,设计了新的算法,使物体的基本颜色保持不变的同时,降低了合成图像中从源图像分割的物体与新背景的差异,并使得其饱和度、色度、强度更加自然真实。  相似文献   
29.
指出了高职计算机文化课程教学面临的诸多问题,这些问题的存在严重制约了课程教学效果的提高.为此,在深入企业调研和对教学对象调查的基础上,结合各专业类别特点及其对计算机基本操作技能的不同需求,选取不同专业的班级作为研究对象,采用“横向分专业,纵向分层次”的教学方法进行了实践教学.实践结果表明,分专业分层次教学方法能有效解决高职“计算机文化”课程教学中存在的主要问题.  相似文献   
30.
Iba  Glenn A. 《Machine Learning》1989,3(4):285-317
This paper describes a heuristic approach to the discovery of useful macro-operators (macros) in problem solving. The approach has been implemented in a program, MACLEARN, that has three parts: macro-proposer, static filter, and dynamic filter. Learning occurs during problem solving, so that performance improves in the course of a single problem trial. Primitive operators and macros are both represented within a uniform representational framework that is closed under composition. This means that new macros can be defined in terms of others, which leads to a definitional hierarchy. The representation also supports the transfer of macros to related problems. MACLEARN is embedded in a supporting system that carries out best-first search. Experiments in macro learning were conducted for two classes of problems: peg solitaire (generalized Hi-Q puzzle), and tile sliding (generalized Fifteen puzzle). The results indicate that MACLEARN'S filtering heuristics all improve search performance, sometimes dramatically. When the system was given practice on simpler training problems, it learned a set of macros that led to successful solutions of several much harder problems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号