首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23970篇
  免费   2068篇
  国内免费   1298篇
电工技术   1147篇
技术理论   8篇
综合类   1655篇
化学工业   3699篇
金属工艺   585篇
机械仪表   505篇
建筑科学   2047篇
矿业工程   1693篇
能源动力   1936篇
轻工业   1011篇
水利工程   405篇
石油天然气   3841篇
武器工业   75篇
无线电   1551篇
一般工业技术   1293篇
冶金工业   2494篇
原子能技术   136篇
自动化技术   3255篇
  2024年   104篇
  2023年   310篇
  2022年   570篇
  2021年   685篇
  2020年   750篇
  2019年   644篇
  2018年   618篇
  2017年   709篇
  2016年   900篇
  2015年   859篇
  2014年   1481篇
  2013年   1805篇
  2012年   1737篇
  2011年   1917篇
  2010年   1388篇
  2009年   1334篇
  2008年   1224篇
  2007年   1482篇
  2006年   1409篇
  2005年   1191篇
  2004年   983篇
  2003年   916篇
  2002年   789篇
  2001年   645篇
  2000年   494篇
  1999年   450篇
  1998年   327篇
  1997年   276篇
  1996年   257篇
  1995年   234篇
  1994年   153篇
  1993年   118篇
  1992年   91篇
  1991年   70篇
  1990年   67篇
  1989年   51篇
  1988年   31篇
  1987年   32篇
  1986年   25篇
  1985年   37篇
  1984年   28篇
  1983年   17篇
  1982年   17篇
  1981年   12篇
  1980年   8篇
  1979年   10篇
  1975年   7篇
  1966年   6篇
  1956年   5篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
181.
人们在频繁使用存储设备的时候,数据丢失的现象时有发生。该文主要介绍数据丢失的原因,数据丢失的处理以及如何利用软件手段来恢复PC硬盘或U盘的数据。  相似文献   
182.
网络已成为获取各种信息的重要手段,人们在享受着网络带来快乐的同时,也面临着越来越严重和复杂的网络安全威胁和难以规避的风险。该文从网络安全定义入手,全面分析了影响网络安全的因素,从而提出计算机网络安全防范相关措施,以确保网络安全有效运行。  相似文献   
183.
为避免嵌入式操作系统的进程受到恶意软件的修改破坏,提出一种适合于嵌入式操作系统的进程监测器。监测器周期性地对系统进程控制块进行检测恢复,通过设置进程检查点为系统提供恢复操作进程,并在Linux上进行实现,给出主要的数据结构和实现过程。实验结果表明,监测器的运行对系统性能影响小,能对系统进程进行有效的检测恢复。  相似文献   
184.
We consider a multi-retailer system operated on an infinite horizon, in which each retailer faces stochastic demand following a Poisson process and adopts a continuous-review (r, Q) policy for replenishing inventory to satisfy customer demand. The system involves decisions of pricing and inventory management with the goal of maximizing profit, which equals the sales revenue minus the purchase and inventory costs. Taking Cournot competition into account, models are formulated to optimize simultaneously the expected sales volumes and (r, Q) policies of all retailers. An efficient approach is proposed to calculate the approximate inventory cost. Based on this approach, solution methods for centralized and decentralized scenarios are developed. A great number of numerical computations are provided to evaluate the efficiency of the solution methods, and their performance in the two scenarios. Moreover, system performance under sequential decisions (first pricing and then inventory management) is also investigated.  相似文献   
185.
Product recovery involves the recovery of materials and components from returned or end-of-life products. Disassembly, an element of product recovery, is the systematic separation of an assembly into its components, subassemblies or other groupings. Stricter environmental regulations together with dramatic decrease in natural resources and landfills have increased the importance of disassembly as all product recovery options require some level of disassembly. Due to changes made during the lifetime of a product by customers or service personnel, the number and the version of components prior to disassembly is unknown. Customers may also discriminate between and demand different versions of components. The existence of non-functional components further adds to the uncertainty associated with disassembly yield. Sensors implanted into products during their production can address this uncertainty by providing information on the number, condition and version of components prior to disassembly. In this study, we evaluate the impact of sensor embedded products (SEPs) on the various performance measures of a washing machine (WM) disassembly line controlled by a multi-kanban system, which takes into consideration the highly stochastic behavior of the line while managing material and kanban flows. First, separate design of experiments studies based on orthogonal arrays are performed for conventional products and SEPs. In order to observe the response of each experiment, detailed discrete event simulation (DES) models for both types of products are developed considering the precedence relationships among the components of a WM. Then, pair-wise t-tests are conducted to compare the two cases based on different performance measures. According to the results, SEPs provide significant reductions in all costs (viz., backorder, holding, disassembly, disposal, testing and transportation) while increasing revenue and profit.  相似文献   
186.
The computational bottleneck in all information-based algorithms for simultaneous localization and mapping (SLAM) is the recovery of the state mean and covariance. The mean is needed to evaluate model Jacobians and the covariance is needed to generate data association hypotheses. In general, recovering the state mean and covariance requires the inversion of a matrix with the size of the state, which is computationally too expensive in time and memory for large problems. Exactly sparse state representations, such as that of Pose SLAM, alleviate the cost of state recovery either in time or in memory, but not in both. In this paper, we present an approach to state estimation that is linear both in execution time and in memory footprint at loop closure, and constant otherwise. The method relies on a state representation that combines the Kalman and the information-based approaches. The strategy is valid for any SLAM system that maintains constraints between marginal states at different time slices. This includes both Pose SLAM, the variant of SLAM where only the robot trajectory is estimated, and hierarchical techniques in which submaps are registered with a network of relative geometric constraints.  相似文献   
187.
Hongwei  Bailing   《Computers & Security》2009,28(7):557-565
Automated trust negotiation (ATN) is an approach establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. The digital credentials themselves are usually sensitive, so they have corresponding access control policies to control their disclosure. Therefore, an ATN strategy must be adopted to determine the search for a successful negotiation based on the access control policies. Previously proposed negotiation strategies are either not complete, disclosing irrelevant credentials, or not efficient enough. In this paper, we propose a novel ATN strategy, that is, Deterministic Finite Automaton Negotiation Strategy (DFANS). DFANS is complete and ensures that no irrelevant credentials are disclosed during the negotiation. Furthermore, DFANS is highly efficient. In the worst case, its communication complexity is O(n), where n is the total number of credentials requested, and its computational complexity is O(m) when not involving the cyclic dependencies, where m is the total size of the both sides' policies looked up during the negotiation. When cyclic dependencies exist, a reasonable additional cost of running OSBE protocol that is a provably secure and quite efficient scheme will be added to the computational cost of DFANS to guarantee the negotiation success whenever possible.  相似文献   
188.
Topological sensitivity analysis is performed for the piecewise constant Mumford-Shah functional. Topological and shape derivatives are combined in order to derive an algorithm for image segmentation with fully automatized initialization. Segmentation of 2D and 3D data is presented. Further, a generalized Mumford-Shah functional is proposed and numerically investigated for the segmentation of images modulated due to, e.g., coil sensitivities.
M. HintermüllerEmail:
  相似文献   
189.
In the recent years, industrial clusters have received considerable attention from economists and industrial analysts, because they are seen as the main reason for economic growth and success of certain economic region. This study systematically reviews past researches of industrial cluster. The purpose of this paper is to contribute to the understanding of this issue regarding the driving forces for the growth of industrial cluster and find out the priority among these cluster policies. Taiwan HsinChu Science Park is a prime example for this paper, and its connection with the innovative participators. We begin with an examination of the literature on cluster about its driving forces and policies upon which we propose a conceptual framework. In doing so, we explore the cluster-based industrial system. Then this research adopts the Fuzzy Analytic Hierarchy Process as the analytical tool. The Fuzzy Analytic Hierarchy Process method is used to determine the weightings for evaluation dimension among decision makers. From our research results, the Factor Conditions is the most important driving force for advancing the industrial cluster performance. Moreover, the promotion of international linkages policy and broader framework policies rank the first two priorities for cluster policy. Overall, this paper concludes with some simulations of cluster policy alternatives confronting the industry and the Taiwanese government.  相似文献   
190.
卫星通信系统QOS管理的策略提炼   总被引:1,自引:0,他引:1       下载免费PDF全文
针对基于策略的DVB—RCS卫星通信系统服务质量管理,提出一种策略提炼模型,结合实例给出目标提炼过程。该模型以线性时态逻辑为基础,在提炼模式的辅助下从高层目标中提取出低层策略,可以有效保证策略提炼过程的正确性、合理性及一致性。在系统设计阶段,该模型用于指导系统功能规划与设计,在系统运行阶段,该模型为网络管理人员提供高层策略向系统设备行为的映射方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号