首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16413篇
  免费   2886篇
  国内免费   1449篇
电工技术   2078篇
技术理论   3篇
综合类   1845篇
化学工业   438篇
金属工艺   268篇
机械仪表   1915篇
建筑科学   570篇
矿业工程   281篇
能源动力   298篇
轻工业   136篇
水利工程   365篇
石油天然气   314篇
武器工业   167篇
无线电   2149篇
一般工业技术   1090篇
冶金工业   208篇
原子能技术   139篇
自动化技术   8484篇
  2024年   244篇
  2023年   279篇
  2022年   342篇
  2021年   435篇
  2020年   484篇
  2019年   473篇
  2018年   429篇
  2017年   577篇
  2016年   660篇
  2015年   741篇
  2014年   936篇
  2013年   1019篇
  2012年   1327篇
  2011年   1230篇
  2010年   926篇
  2009年   1023篇
  2008年   1065篇
  2007年   1256篇
  2006年   1031篇
  2005年   965篇
  2004年   843篇
  2003年   698篇
  2002年   582篇
  2001年   472篇
  2000年   430篇
  1999年   339篇
  1998年   278篇
  1997年   296篇
  1996年   236篇
  1995年   210篇
  1994年   198篇
  1993年   141篇
  1992年   134篇
  1991年   84篇
  1990年   57篇
  1989年   61篇
  1988年   54篇
  1987年   36篇
  1986年   19篇
  1985年   29篇
  1984年   21篇
  1983年   14篇
  1982年   8篇
  1981年   11篇
  1980年   10篇
  1979年   8篇
  1977年   6篇
  1976年   6篇
  1975年   4篇
  1974年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
With the growing size and complexity of power systems, system analysis—such as transients calculation—takes much time. Hence, fast calculation methods are required. Although parallel processing is a hopeful method, there have been difficulties in the parallel solution of linear equations which appear in power-flow calculations by the Newton-Raphson method. This paper aims at the fast calculation of the power-flow problem by means of parallel processing. In order to improve the suitability to the parallel solution of the differential equation in transients calculation, we assume the use of a direct-mapping parallel processing machine to map directly the network of a power system onto a network of processors. Under this assumption, we propose a new parallel-processing-oriented method in which the linear equation is solved by linear iterations between nodes with Aitken acceleration. We simulate the method on three model power systems and compare this Parallel Iterative Method (PIN) with a Parallel Direct Method (PDM) which uses the banded matrix according to the number of operations required. As a result, we can expect that PIM may solve linear equations faster than PDM with m processors, although the PIM might be inferior to the PDM with m × m processors, where m denotes the half-band width of the banded matrix.  相似文献   
2.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
3.
广义de Bruijn多计算机互连网络   总被引:1,自引:0,他引:1  
朱福民 《计算机学报》1995,18(2):106-113
(d,m)de Bruijn多计算机系统互连网络限制网络的规模必须为d^m。本文把(d,m)de Bruijn网络推广到了任意顶点情形,提出了广义de Bruijn网络,研究了广义de Bruijn网络的自路由性质,设计了路由算法,研究了广义de Bruijn网络顶点度的性质和容错特性。  相似文献   
4.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit.  相似文献   
5.
密集平行束孔落矿的底盘漏斗采矿方案的特点是:用密集严行束孔落矿;凿岩与出矿水平合二为一;实行“掘井、劈漏、落矿三位一体”的回采工艺。该方案结构简单、采切比低、工人劳动强度低,适于开采缓倾斜顶底围岩不稳固的中厚以上矿体。  相似文献   
6.
In this work a simple method to solve the forward displacement analysis of the general 6-6 fully parallel manipulator is applied. The method is based on generating closure equations upon the unknown coordinates of three points embedded to the moving platform. The method is easy to follow and it is available for both, planar and three-dimensional moving platforms. Numerical examples are included with the purpose to show the application of the method.  相似文献   
7.
This paper mainly studies an extended discrete singular fuzzy model incorporating the multiple difference matrices in the rules and discusses its stability and design issues. By embracing additional algebraic constraint, traditional discrete Takagi-Sugeno (T-S) fuzzy model can be extended to a generalised discrete singular Takagi-Sugeno (GDST-S) model with individual difference matrices Ei in the locally singular models, where it can describe a larger class of physical or non-linear systems. Based on the linear matrix inequality (LMI) approach, we focus on deriving some explicit stability and design criteria expressed by the LMIs for the regarded system. Thus, the stability verification and controller synthesis can be performed by the current LMI tools. Finally, some illustrative examples are given to illustrate the effectiveness and validity of the proposed approach.  相似文献   
8.
在双筐并流氨合成塔中使用了A110-1-H/A110-1型氨合成催化剂,使用寿命达1740天,累计产氨438378t.该催化剂组合具有低温活性好、易还原、高催化活性、高抗毒能力、良好的热稳定性与破碎强度等优点.  相似文献   
9.
分析了大变幅扬程下灌溉泵站并联运行水泵机组性能,提出了提高泵站装置效率的方法。  相似文献   
10.
The modern technological advancement influences the growth of the cyber–physical system and cyber–social system to a more advanced computing system cyber–physical–social system (CPSS). Therefore, CPSS leads the data science revolution by promoting tri-space information resource from a single space. The establishment of CPSSs increases the related privacy concerns. To provide privacy on CPSSs data, various privacy-preserving schemes have been introduced in the recent past. However, technological advancement in CPSSs requires the modifications of previous techniques to suit its dynamics. Meanwhile, differential privacy has emerged as an effective method to safeguard CPSSs data privacy. To completely comprehend the state-of-the-art developments and learn the field’s research directions, this article provides a comprehensive review of differentially private data fusion and deep learning in CPSSs. Additionally, we present a novel differentially private data fusion and deep learning Framework for Cyber–Physical–Social Systems , and various future research directions for CPSSs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号