首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9713篇
  免费   1541篇
  国内免费   1173篇
电工技术   602篇
综合类   1556篇
化学工业   603篇
金属工艺   126篇
机械仪表   615篇
建筑科学   575篇
矿业工程   135篇
能源动力   133篇
轻工业   304篇
水利工程   290篇
石油天然气   254篇
武器工业   170篇
无线电   1531篇
一般工业技术   1529篇
冶金工业   315篇
原子能技术   81篇
自动化技术   3608篇
  2024年   63篇
  2023年   178篇
  2022年   342篇
  2021年   387篇
  2020年   462篇
  2019年   400篇
  2018年   412篇
  2017年   426篇
  2016年   485篇
  2015年   445篇
  2014年   609篇
  2013年   703篇
  2012年   695篇
  2011年   688篇
  2010年   538篇
  2009年   562篇
  2008年   587篇
  2007年   602篇
  2006年   550篇
  2005年   455篇
  2004年   400篇
  2003年   334篇
  2002年   284篇
  2001年   250篇
  2000年   226篇
  1999年   178篇
  1998年   131篇
  1997年   132篇
  1996年   95篇
  1995年   128篇
  1994年   95篇
  1993年   66篇
  1992年   69篇
  1991年   54篇
  1990年   61篇
  1989年   57篇
  1988年   54篇
  1987年   23篇
  1986年   28篇
  1985年   18篇
  1984年   12篇
  1983年   11篇
  1982年   16篇
  1981年   10篇
  1980年   7篇
  1977年   10篇
  1965年   7篇
  1964年   8篇
  1961年   12篇
  1959年   9篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
Reliability based criteria are quite popular for optimal sensor network design. We present a modified definition of system reliability for sensor network design for two applications: reliable estimation of variables in a steady state linear flow process, and reliable fault detection and diagnosis for any process. Unlike the weakest-link based definition of system reliability in the literature, the proposed definition considers the entire system and is consistent with the reliability concept used in classical reliability literature. For each application, dual approaches for defining system reliability are proposed, and their analogy with the reliability problem in the classical reliability literature is established. Using examples and stochastic simulations, the advantage of using the proposed system reliability in contrast to the existing definition is illustrated. Part II of this series of articles presents methods for efficient generation of the system reliability function and its use in optimization-based approaches for designing optimal sensor networks.  相似文献   
2.
Lévy flights have gained prominence for analysis of animal movement. In a Lévy flight, step-lengths are drawn from a heavy-tailed distribution such as a power law (PL), and a large number of empirical demonstrations have been published. Others, however, have suggested that animal movement is ill fit by PL distributions or contend a state-switching process better explains apparent Lévy flight movement patterns. We used a mix of direct behavioural observations and GPS tracking to understand step-length patterns in females of two related butterflies. We initially found movement in one species (Euphydryas editha taylori) was best fit by a bounded PL, evidence of a Lévy flight, while the other (Euphydryas phaeton) was best fit by an exponential distribution. Subsequent analyses introduced additional candidate models and used behavioural observations to sort steps based on intraspecific interactions (interactions were rare in E. phaeton but common in E. e. taylori). These analyses showed a mixed-exponential is favoured over the bounded PL for E. e. taylori and that when step-lengths were sorted into states based on the influence of harassing conspecific males, both states were best fit by simple exponential distributions. The direct behavioural observations allowed us to infer the underlying behavioural mechanism is a state-switching process driven by intraspecific interactions rather than a Lévy flight.  相似文献   
3.
This work presents an engineering method for optimizing structures made of bars, beams, plates, or a combination of those components. Corresponding problems involve both continuous (size) and discrete (topology) variables. Using a branched multipoint approximate function, which involves such mixed variables, a series of sequential approximate problems are constructed to make the primal problem explicit. To solve the approximate problems, genetic algorithm (GA) is utilized to optimize discrete variables, and when calculating individual fitness values in GA, a second-level approximate problem only involving retained continuous variables is built to optimize continuous variables. The solution to the second-level approximate problem can be easily obtained with dual methods. Structural analyses are only needed before improving the branched approximate functions in the iteration cycles. The method aims at optimal design of discrete structures consisting of bars, beams, plates, or other components. Numerical examples are given to illustrate its effectiveness, including frame topology optimization, layout optimization of stiffeners modeled with beams or shells, concurrent layout optimization of beam and shell components, and an application in a microsatellite structure. Optimization results show that the number of structural analyses is dramatically decreased when compared with pure GA while even comparable to pure sizing optimization.  相似文献   
4.
1-read/1-write (1R1W) register file (RF) is a popular memory configuration in modern feature rich SoCs requiring significant amount of embedded memory. A memory compiler is constructed using the 8T RF bitcell spanning a range of instances from 32 b to 72 Kb. An 8T low-leakage bitcell of 0.106 μm2 is used in a 14 nm FinFET technology with a 70 nm contacted gate pitch for high-density (HD) two-port (TP) RF memory compiler which achieves 5.66 Mb/mm2 array density for a 72 Kb array which is the highest reported density in 14 nm FinFET technology. The density improvement is achieved by using techniques such as leaf-cell optimization (eliminating transistors), better architectural planning, top level connectivity through leaf-cell abutment and minimizing the number of unique leaf-cells. These techniques are fully compatible with memory compiler usage over the required span. Leakage power is minimized by using power-switches without degrading the density mentioned above. Self-induced supply voltage collapse technique is applied for write and a four stack static keeper is used for read Vmin improvement. Fabricated test chips using 14 nm process have demonstrated 2.33 GHz performance at 1.1 V/25 °C operation. Overall Vmin of 550 mV is achieved with this design at 25 °C. The inbuilt power-switch improves leakage power by 12x in simulation. Approximately 8% die area of a leading 14 nm SoC in commercialization is occupied by these compiled RF instances.  相似文献   
5.
王雪梅  倪文波  李芾 《信号处理》2006,22(2):198-202
针对传统的非平稳随机信号时变参数筹分模型算法的不足,论文把非平稳随机信号时变参数差分模型与一种带自适应遗忘因子的RLS算法结合起来,形成一种有效的非平稳随机信号实时建模算法,仿真分析表明该算法不仅能获得快的收敛速度而且能获得高的建模精度。  相似文献   
6.
随机激光器的最新进展   总被引:5,自引:2,他引:3  
综述了近年来随机激光器的最新研究结果,包括随机激光产生的机制,随机增益介质的制备方法,随机激光器的激励与发光特性和随机激光理论。最后,介绍了随机激光器的应用前景。  相似文献   
7.
A review of the literature on the impact of sexual contacts between adults and boys reveals the existence of two principal outcomes: 1) some participants develop various disorders once in adulthood, such as behavioural problems, sexual disorders, or personality problems; 2) some participants do not present with any major disorders in the long run. These different outcomes may be associated with several moderating variables related to the sexual contacts, such as the level of coercion at the time of these contacts, the bond between the child and the adult, or the context of the sexual relation. However, the conclusions relating to the relations between early sexual contacts with adults and subsequent problems of adaptation in adulthood are difficult to determine. This is because of various methodological problems associated with relevant studies (i.e., definition of these contacts, nature of the sample, method evaluation, statistical analyses). In this article, we propose certain avenues of research that may help clarify this problem. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
提出了一种新的计算弹性-粘弹性复合结构随机响应的各阶谱矩的计算方法,它是一种时域复模态分析方法。利用此方法获得了弹性-粘弹性复合结构在白噪声、滤过白噪声等典型平稳随机激励下随机响应的各阶谱矩的解析表达式,分析了粘弹性对各阶谱矩的影响。此计算方法简便、易用,无论单自由度或多自由度系统均适用,为进一步研究弹性-粘弹性复合结构在随机激励下的可靠性打下良好基础。  相似文献   
9.
This article proposes a model of the ways in which dyadic interactions between employees who occupy 1 of 4 archetypal social roles in organizations can lead to either episodic or institutionalized patterns of victimization. The model shows how the occurrence of victimization involving these 4 role types is influenced by organizational variables such as power differences, culture, and access to social capital. The model integrates behavioral and social structural antecedents of victimization to develop a relational perspective on the dynamics of harmful behavior in the workplace. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
10.
A meta-analysis by J. T. Jost, J. Glaser, A. W. Kruglanski, and F. J. Sulloway (2003) concluded that political conservatism is partially motivated by the management of uncertainty and threat. In this reply to J. Greenberg and E. Jonas (2003), conceptual issues are clarified, numerous political anomalies are explained, and alleged counterexamples are incorporated with a dynamic model that takes into account differences between "young" and "old" movements. Studies directly pitting the rigidity-of-the-right hypothesis against the ideological extremity hypothesis demonstrate strong support for the former. Medium to large effect sizes describe relations between political conservatism and dogmatism and intolerance of ambiguity; lack of openness to experience; uncertainty avoidance; personal needs for order, structure, and closure; fear of death; and system threat. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号