首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13067篇
  免费   1924篇
  国内免费   1411篇
电工技术   1079篇
综合类   1418篇
化学工业   437篇
金属工艺   395篇
机械仪表   619篇
建筑科学   430篇
矿业工程   200篇
能源动力   259篇
轻工业   191篇
水利工程   180篇
石油天然气   235篇
武器工业   148篇
无线电   1616篇
一般工业技术   1207篇
冶金工业   560篇
原子能技术   49篇
自动化技术   7379篇
  2024年   113篇
  2023年   246篇
  2022年   368篇
  2021年   396篇
  2020年   468篇
  2019年   445篇
  2018年   398篇
  2017年   573篇
  2016年   615篇
  2015年   714篇
  2014年   883篇
  2013年   1025篇
  2012年   1045篇
  2011年   1097篇
  2010年   825篇
  2009年   882篇
  2008年   932篇
  2007年   929篇
  2006年   753篇
  2005年   662篇
  2004年   518篇
  2003年   414篇
  2002年   412篇
  2001年   333篇
  2000年   278篇
  1999年   158篇
  1998年   130篇
  1997年   138篇
  1996年   98篇
  1995年   89篇
  1994年   78篇
  1993年   66篇
  1992年   48篇
  1991年   44篇
  1990年   29篇
  1989年   28篇
  1988年   21篇
  1987年   17篇
  1986年   11篇
  1985年   11篇
  1984年   9篇
  1983年   12篇
  1982年   16篇
  1981年   13篇
  1980年   17篇
  1979年   6篇
  1978年   6篇
  1976年   5篇
  1975年   8篇
  1972年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。  相似文献   
2.
A cohort of 2nd-grade students provided comparisons of academic and social competence based on school retention/promotion decisions. Sample groups were (a) retained, (b) at risk for retention, (c) special education, and (d) promoted. Findings suggested most children with academic deficiencies are identified by schools early and are sorted into educational treatments differing in intensity that represent a continuum of competence. The authors provide empirical evidence counter to the assumptions that retained students have the requisite ability to catch up and have more problem behaviors than other low-achieving students. The relevance of high-stakes test scores for promotion/retention decisions and the parallels between schools' implementation of retention policy and implementation of regulations for identifying children with disabilities are included in the discussion. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
4.
本文介绍了一种在微机上实现的印制板自动布线方法──多级线探索法及其编程方法。这种方法是基于完备布线算法的概念,通过分析李氏算法和传统线探索法的不足之处而得到的。虽然它也是一种线探索法,但有较传统线探索法更强的探索能力,不需要结合李氏算法而能单独完成布线任务,是一种较理想的算法,通过实验获得了较为满意的效果。  相似文献   
5.
An efficient algorithm for the random packing of spheres can significantly save the cost of the preparation of an initial configuration often required in discrete element simulations. It is not trivial to generate such random packing at a large scale, particularly when spheres of various sizes and geometric domains of different shapes are present. Motivated by the idea of compression complemented by an efficient physical process to increase packing density, shaking, a new approach, termed compression algorithm, is proposed in this work to randomly fill any arbitrary polyhedral or cylindrical domains with spheres of various sizes. The algorithm features both simplicity and high efficiency. Tests show that it takes 181 s on a 1.4-GHz PC to complete the filling of a cylindrical domain with a total number of 26,787 spheres, achieving a packing density of 52.89%.  相似文献   
6.
The acquisition of new skills over a life span is a remarkable human ability. This ability, however, is constrained by age of acquisition (AoA); that is, the age at which learning occurs significantly affects the outcome. This is most clearly reflected in domains such as language, music, and athletics. This article provides a perspective on the neural and computational mechanisms underlying AoA in language acquisition. The authors show how AoA modulates both monolingual lexical processing and bilingual language acquisition. They consider the conditions under which syntactic processing and semantic processing may be differentially sensitive to AoA effects in second-language acquisition. The authors conclude that AoA effects are pervasive and that the neural and computational mechanisms underlying learning and sensorimotor integration provide a general account of these effects. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
Across 2 experiments, a new experimental procedure was used to investigate attentional capture by animal fear-relevant stimuli. In Experiment 1 (N = 34), unselected participants were slower to detect a neutral target animal in the presence of a spider than a cockroach distractor and in the presence of a snake than a large lizard distractor. This result confirms that phylogenetically fear-relevant animals capture attention specifically and to a larger extent than do non-fear-relevant animals. In Experiment 2 (N = 86), detection of a neutral target animal was slowed more in the presence of a feared fear-relevant distractor (e.g., a snake for snake-fearful participants) than in presence of a not-feared fear-relevant distractor (e.g., a spider for snake-fearful participants). These results indicate preferential attentional capture that is specific to phylogenetically fear-relevant stimuli and is selectively enhanced in individuals who fear these animals. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
This study examined whether objects are attended in serial or in parallel during a demanding visual search task. A component of the event-related potential waveform, the N2pc wave, was used as a continuous measure of the allocation of attention to possible targets in the search arrays. Experiment 1 demonstrated that the relative allocation of attention shifts rapidly, favoring one item and then another. In Experiment 2, a paradigm was used that made it possible to track the absolute allocation of attention to individual items. This experiment showed that attention was allocated to one object for 100-150 ms before attention began to be allocated to the next object. These findings support models of attention that posit serial processing in demanding visual search tasks. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
9.
We study the application of the geographic nearest neighbor approach to two problems. The first problem is the construction of an approximately minimum length rectilinear Steiner tree for a set ofn points in the plane. For this problem, we introduce a variation of a subgraph of sizeO(n) used by YaO [31] for constructing minimum spanning trees. Using this subgraph, we improve the running times of the heuristics discussed by Bern [6] fromO(n 2 log n) toO(n log2 n). The second problem is the construction of a rectilinear minimum spanning tree for a set ofn noncrossing line segments in the plane. We present an optimalO(n logn) algorithm for this problem. The rectilinear minimum spanning tree for a set of points can thus be computed optimally without using the Voronoi diagram. This algorithm can also be extended to obtain a rectilinear minimum spanning tree for a set of nonintersecting simple polygons.The results in this paper are a part of Y. C. Yee's Ph.D. thesis done at SUNY at Albany. He was supported in part by NSF Grants IRI-8703430 and CCR-8805782. S. S. Ravi was supported in part by NSF Grants DCI-86-03318 and CCR-89-05296.  相似文献   
10.
介绍了二次盐水及离子膜电解工序的主要设备和流程,对二次盐水及离子膜电解工序运行中出现的问题进行了分析,并提出了解决措施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号