首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19793篇
  免费   1940篇
  国内免费   1187篇
电工技术   1181篇
技术理论   2篇
综合类   2262篇
化学工业   1020篇
金属工艺   1228篇
机械仪表   1588篇
建筑科学   1653篇
矿业工程   694篇
能源动力   357篇
轻工业   1469篇
水利工程   542篇
石油天然气   696篇
武器工业   238篇
无线电   1788篇
一般工业技术   1191篇
冶金工业   910篇
原子能技术   251篇
自动化技术   5850篇
  2024年   209篇
  2023年   258篇
  2022年   310篇
  2021年   410篇
  2020年   438篇
  2019年   456篇
  2018年   351篇
  2017年   441篇
  2016年   496篇
  2015年   540篇
  2014年   1068篇
  2013年   954篇
  2012年   1317篇
  2011年   1369篇
  2010年   1179篇
  2009年   1154篇
  2008年   1110篇
  2007年   1411篇
  2006年   1259篇
  2005年   1162篇
  2004年   950篇
  2003年   905篇
  2002年   747篇
  2001年   665篇
  2000年   595篇
  1999年   472篇
  1998年   357篇
  1997年   384篇
  1996年   331篇
  1995年   277篇
  1994年   251篇
  1993年   195篇
  1992年   144篇
  1991年   132篇
  1990年   81篇
  1989年   93篇
  1988年   65篇
  1987年   51篇
  1986年   33篇
  1985年   39篇
  1984年   28篇
  1983年   15篇
  1982年   19篇
  1981年   18篇
  1980年   17篇
  1979年   18篇
  1976年   11篇
  1974年   13篇
  1973年   11篇
  1959年   10篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
3.
Bovine spongiform encephalopathy (BSE), or ‘mad cow disease’, is one of several transmissable spongiform encephalopathies (TSEs) known to affect certain mammals and is spread through the ingestion of infected animal tissue. It is believed that the inadvertent contamination of meat and bone meal (MBM) with infected animal tissue and the subsequent use of this material as a feed supplement contributed to the spread of the disease in cattle. As a result, the use of processed animal proteins (PAPs) in animal feeds is regulated in many parts of the world. Although feed testing is the only definitive means to certify compliance, regulatory compliance often relies solely on paper certification. Recently, rapid methods have become available that can be used by regulators to determine compliance during routine inspections. We describe a rapid, immunochromatographic strip test that can detect 0.1% MBM in animal feed. The test takes 15 min to perform and large numbers of samples can be screened for PAPs simultaneously.  相似文献   
4.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit.  相似文献   
5.
以凹凸棒粘土作为高水速凝固化充填材料的悬浮稳定剂,考察了不同制浆机械对凹凸棒粘土制浆率的影响。采用高剪切混合乳化机预制的1%凹凸棒粘土浆配制高水速凝固化充填材料甲、已料单浆可获得满意的悬浮稳定效果。其充填体结石抗压强度早期发展迅速,后期持续增长。采用此工艺,注浆料的材料成本仅增加2%。  相似文献   
6.
添加物对ZrO2系快离子导体烧结性能的影响   总被引:1,自引:0,他引:1  
本文介绍了1320℃下,CaO,Y2O3等稳定剂,低融物组成及1-6价阳离子化合物对ZrO2烧结性能的影响并列举出材料的晶型及某些主要性能。  相似文献   
7.
The modern technological advancement influences the growth of the cyber–physical system and cyber–social system to a more advanced computing system cyber–physical–social system (CPSS). Therefore, CPSS leads the data science revolution by promoting tri-space information resource from a single space. The establishment of CPSSs increases the related privacy concerns. To provide privacy on CPSSs data, various privacy-preserving schemes have been introduced in the recent past. However, technological advancement in CPSSs requires the modifications of previous techniques to suit its dynamics. Meanwhile, differential privacy has emerged as an effective method to safeguard CPSSs data privacy. To completely comprehend the state-of-the-art developments and learn the field’s research directions, this article provides a comprehensive review of differentially private data fusion and deep learning in CPSSs. Additionally, we present a novel differentially private data fusion and deep learning Framework for Cyber–Physical–Social Systems , and various future research directions for CPSSs.  相似文献   
8.
9.
10.
引用优化设计中一维搜索和黄金分割法,针对数控加工中非圆曲线的处理,给出实用、简洁和新颖的宏程序实现方法,解决在数控系统中求解方程组的问题,是数控用户快速解决相关应用问题的有效手段。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号