首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30528篇
  免费   1257篇
  国内免费   1113篇
电工技术   3327篇
技术理论   2篇
综合类   2622篇
化学工业   1236篇
金属工艺   1491篇
机械仪表   4463篇
建筑科学   1469篇
矿业工程   1604篇
能源动力   365篇
轻工业   776篇
水利工程   455篇
石油天然气   689篇
武器工业   196篇
无线电   2373篇
一般工业技术   969篇
冶金工业   1550篇
原子能技术   227篇
自动化技术   9084篇
  2024年   31篇
  2023年   96篇
  2022年   199篇
  2021年   296篇
  2020年   336篇
  2019年   251篇
  2018年   246篇
  2017年   444篇
  2016年   522篇
  2015年   611篇
  2014年   1685篇
  2013年   1252篇
  2012年   2060篇
  2011年   2531篇
  2010年   2324篇
  2009年   2432篇
  2008年   2063篇
  2007年   2424篇
  2006年   2362篇
  2005年   1994篇
  2004年   1488篇
  2003年   1602篇
  2002年   1215篇
  2001年   904篇
  2000年   725篇
  1999年   547篇
  1998年   355篇
  1997年   303篇
  1996年   247篇
  1995年   204篇
  1994年   161篇
  1993年   135篇
  1992年   106篇
  1991年   87篇
  1990年   54篇
  1989年   65篇
  1988年   44篇
  1987年   36篇
  1986年   29篇
  1985年   45篇
  1984年   40篇
  1983年   32篇
  1982年   36篇
  1981年   31篇
  1980年   33篇
  1979年   43篇
  1978年   15篇
  1976年   20篇
  1975年   13篇
  1973年   13篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
2.
以可编程控制器课程为例,介绍"任务驱动"教学法在教学过程中的具体应用,并探讨了实施过程中存在的问题与解决方法。  相似文献   
3.
Transportation demand of shipping container fluctuates due to the seasonality of international trade, thus, every 3–6 months, the liner company has to alter its current liner shipping service network, redeploy ships and design cargo routes with the objective of minimizing the total cost. To solve the problem, the paper presents a mixed integer linear program model. The proposed model incorporates several relevant constraints, such as weekly frequency, the transshipment of cargo between two or more service routes, and transport time. Extensive numerical experiments based on realistic date of Asia–Europe–Oceania shipping operations show that the proposed model can solve real-case problems efficiently by CPLEX. The results demonstrate that the model can reduce ship’s capacity consumption and raise ships’ capacity utilization.  相似文献   
4.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
5.
郭建  丁继政  朱晓冉 《软件学报》2020,31(5):1353-1373
"如何构造高可信的软件系统"已成为学术界和工业界的研究热点.操作系统内核作为软件系统的基础组件,它的安全可靠是构造高可信软件系统的重要环节.为了确保操作系统内核的安全可靠,将形式化方法引入到操作系统内核验证中,提出了一个自动化验证操作系统内核的框架.该验证框架包括:(1)分别对C语言程序和混合语言程序(C语言和汇编语言)进行验证;(2)在混合语言程序验证中,为汇编程序建立抽象模型,并将C语言程序和抽象模型粘合形成基于C语言验证工具可接收的验证模型;(3)从规范中提取性质,基于该自动验证工具,对性质完成自动验证;(4)该框架不限于特定的硬件架构.成功地运用该验证框架对两种不同硬件平台的嵌入式实时操作系统内核μC/OS-II进行了验证.结果显示:利用该框架在对两个不同的硬件平台上内核验证时,框架的可重复利用率很高,高达到88%,虽然其抽象模型需要根据不同的硬件平台进行重构.在对基于这两种平台的操作系统内核验证中,分别发现了10~12处缺陷.其中,在ARM平台上两处与硬件相关的问题被发现.实验表明,该方法对不同硬件平台的同一个操作系统分析验证具有一定的通用性.  相似文献   
6.
The pharmacy service requires that some pharmacies are always available and shifts have to be organized: a shift corresponds to a subset of pharmacies that must be open 24 hours a day on a particular week. Under the requirement that each pharmacy belongs to exactly one shift and the assumption that users minimize the distance to the closest open pharmacy during each shift, we want to determine a partition of the pharmacies into a given number of shifts, such that the total distance covered by users is minimized. It may be also required that shift cardinalities are balanced. We discuss different versions and the related computational complexity, showing that the problem is NP-hard in general. A set packing formulation is presented and solved by branch-and-price, together with a fast solution technique based on a tabu search. They have been applied to real and random instances showing that (i) the set packing formulation is very tight and often exhibits no integrality gap; (ii) the branch-and-price solves problems of practical relevance to optimality in a reasonable amount of time (order of minutes); (iii) the tabu search finds optimal or near-optimal solutions in order of seconds.  相似文献   
7.
针对目前量子私有信息检索不能适用与云存储的多数据库问题,基于现在成熟的量子密钥分发方法,提出了一种适合在多数据库环境下,实用的量子私有信息检索协议。对于不同大小的数据库,协议可通过调节参数θ和k,在保证数据库安全及用户隐私的情况下,完成信息的检索。性能分析结果表明,协议的通信复杂度低,检索成功率高、易于实施。  相似文献   
8.
该文建立了由数据采集、主排水控制以及地面监控三个部分组成的煤矿主排水系统。对以西门子S7-300 PLC作为中央处理器的硬件系统进行了简单分析,并绘制了软件流程图。该系统的运行充分考虑了井下排水要求和节能要求,根据供电的不同时段进行水泵的不同控制。因此,该系统对于煤矿的安全生产和绿色生产具有一定的实践意义。  相似文献   
9.
The present study investigates the impact of different key solutions of mobile phones on users' effectiveness and efficiency using the devices. In the first experiment, 36 children (9 - 14 years) and in the second experiment 45 young adults (19 - 33 years) completed four common phone tasks twice consecutively on three simulated phones that had identical menus, but different key solutions. An approach was undertaken to quantify the complexity of keys in three models, incorporating different factors contributing to the keys' complexity (number of key options, number of modes and number of modes with a semantically dissimilar meaning), in order to predict users' performance decrements. As a further main factor, the degree of the users' locus of control (LOC) was measured and interactions with performance outcomes were studied. As dependent measures, the number of inefficient keystrokes, the number of tasks solved and the processing time were determined. Results showed a significant effect of control key solutions on users' efficiency and effectiveness for both children and young adults. Moreover, children's LOC values significantly interacted with performance: children with low LOC values showed the lowest performance and no learnability, especially when using keys with a high complexity. From the three factors contributing to the complexity of keys, keys exerting different functions with semantically inconsistent meanings had the worst effect on performance. It is concluded that in mobile user interface design keys with semantically inconsistent meanings should be generally avoided.  相似文献   
10.
谈立成 《信息技术》2006,30(4):140-142
针对我国机电企业的现状,研究并完成了机电制造企业的物流监控信息系统的典型设计,建立了质量跟踪体系软件结构,进行计算机仿真,并应用于现场。研究涉及计算机控制技术、信息处理技术、工业以太网通讯技术、现场总线通讯技术、最优化策略等多学科技术。该系统可以大幅度提高生产效率、降低生产成本、减少库存和资金占用,减少日益昂贵的生产和库存用地。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号