首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38387篇
  免费   4246篇
  国内免费   2934篇
工业技术   45567篇
  2024年   96篇
  2023年   582篇
  2022年   750篇
  2021年   993篇
  2020年   1159篇
  2019年   1074篇
  2018年   1094篇
  2017年   1263篇
  2016年   1365篇
  2015年   1434篇
  2014年   2187篇
  2013年   2651篇
  2012年   2482篇
  2011年   2867篇
  2010年   2252篇
  2009年   2396篇
  2008年   2487篇
  2007年   2654篇
  2006年   2437篇
  2005年   2136篇
  2004年   1721篇
  2003年   1426篇
  2002年   1263篇
  2001年   1025篇
  2000年   860篇
  1999年   749篇
  1998年   574篇
  1997年   499篇
  1996年   415篇
  1995年   404篇
  1994年   329篇
  1993年   278篇
  1992年   251篇
  1991年   177篇
  1990年   146篇
  1989年   174篇
  1988年   130篇
  1987年   65篇
  1986年   91篇
  1985年   68篇
  1984年   66篇
  1983年   47篇
  1982年   53篇
  1981年   41篇
  1980年   32篇
  1979年   31篇
  1978年   29篇
  1977年   26篇
  1964年   26篇
  1955年   35篇
排序方式: 共有10000条查询结果,搜索用时 187 毫秒
81.
This paper describes the nature of mathematical discovery (including concept definition and exploration, example generation, and theorem conjecture and proof), and considers how such an intelligent process can be simulated by a machine. Although the material is drawn primarily from graph theory, the results are immediately relevant to research in mathematical discovery and learning.The thought experiment, a protocol paradigm for the empirical study of mathematical discovery, highlights behavioral objectives for machine simulation. This thought experiment provides an insightful account of the discovery process, motivates a framework for describing mathematical knowledge in terms of object classes, and is a rich source of advice on the design of a system to perform discovery in graph theory. The evaluation criteria for a discovery system, it is argued, must include both a set of behavior to display (behavioral objectives) and a target set of facts to be discovered (factual knowledge).Cues from the thought experiment are used to formulate two hierarchies of representational languages for graphy theory. The first hierarchy is based on the superficial terminology and knowledge of the thought experiment. Generated by formal grammars with set-theoretic semantics, this eminently reasonable approach ultimately fails to meet the factual knowledge criteria. The second hierarchy uses declarative expressions, each of which has a semantic interpretation as a stylized, recursive algorithm that defines a class by generating it correctly and completely. A simple version of one such representation is validated by a successful, implemented system called Graph Theorist (GT) for mathematical research in graph theory. GT generates correct examples, defines and explores new graph theory properties, and conjectures and proves theorems.Several themes run through this paper. The first is the dual goals, behavioral objectives and factural knowledge to be discovered, and the multiplicity of their demands on a discovery system. The second theme is the central role of object classes to knowledge representation. The third is the increased power and flexibility of a constructive (generator) definition over the more traditional predicate (tester) definition. The final theme is the importance of examples and recursion in mathematical knowledge. The results provide important guidance for further research in the simulation of mathematical discovery.  相似文献   
82.
A lubrication-flow model for a free film in a corner is presented. The model, written in the hyperbolic coordinate system ξ = x 2y 2, η = 2xy, applies to films that are thin in the η-direction. The lubrication approximation yields two coupled evolution equations for the film thickness and the velocity field which, to lowest order, describes plug flow in the hyperbolic coordinates. A free film in a corner evolving under surface tension and gravity is investigated. The rate of thinning of a free film is compared to that of a film evolving over a solid substrate. Viscous shear and normal stresses are both captured in the model and are computed for the entire flow domain. It is shown that normal stress dominates over shear stress in the far field, while shear stress dominates close to the corner. This revised version was published online in October 2005 with corrected page numbers.  相似文献   
83.
吴茂康 《计算机学报》1991,14(12):942-945
缺省理论△=(D,W)中的缺省规则集D,是该理论的不确定因素.如果能去掉一些缺省规则而又不影响该理论的延伸,则就在一定程度上简化了该理论.本文证明了关于规范缺省理论的延伸的若干性质,利用这些性质,我们可以把某些规范缺省理论在一定条件下得以化简,有的甚至可以把它们化为一阶逻辑理论.  相似文献   
84.
Molecular dynamics simulations are used to investigate polymer networks made by either end-linking or randomly crosslinking a melt of linear precursor chains. The resulting network structures are very different, since end-linking leads to nearly ideal monodisperse networks, while random crosslinking leads to polydisperse networks, characterized by an exponential strand length distribution. Networks with average strand length 20 and 100 were generated. These networks were used to study the effects of disorder in the network connectivity on observables averaged either over the entire network or selected sub-structures. Heterogeneities in the randomly crosslinked networks cause significant differences in the localization of monomers, however, neither the localization of crosslinks nor the microscopic strain response are significantly affected. Compared to end-linked networks, randomly crosslinked networks have a slightly increased tube diameter, and as a result a slightly decreased shear modulus, but otherwise identical stress-strain behavior. For the investigated systems, we conclude that the microscopic strain response, tube diameter, and stress-strain relation are all insensitive to the heterogeneities due to the linking process by which the network were made.  相似文献   
85.
One of the problems encountered by automatic feeding devices, such as vibratory bowl feeders, in robotic assembly systems is nesting which leads to inseparability of parts and jamming. In this paper, we describe a design evaluation procedure to determine whether a part is prone to nesting and to quantify the degree of nesting. The proposed methodology reduces the 3-D protrusion-hole polyhedral containment problem of nesting to a 2-D polygon containment problem by employing a loop-based feature recognition scheme. Subsequently, the 3-D containment configuration is reconstructed from that of the 2-D by using a strategy calleddrop, pull and push. In this context, we introduce the notion of axis as a characteristic direction of a feature that facilitates the analysis of generalized 3-D polyhedral containment. The algorithms are applicable to generic B-Rep CAD data, and their time and space complexities are polynomial.  相似文献   
86.
Some approximate solutions for predicting the stress intensity factor of a short crack penetrating an inclusion of arbitrary shape have been developed under mode I and mode II loading conditions. The derivation of the fundamental formula is based on the transformation toughening theory. The transformation strains in the inclusion are induced by the crack-tip field and remotely applied stresses, and approximately evaluated by the Eshelby equivalent inclusion theory. As validated by detailed finite element (FE) analyses, the developed solutions have good accuracy for different inclusion shape and for a wide range of modulus ratio between inclusion and matrix material.  相似文献   
87.
We propose a general modeling framework to evaluate the performance of cache consistency algorithms. In addition to the usual hit rate, we introduce the hit* rate as a consistency measure, which captures the fraction of non-stale downloads from the cache. We apply these ideas to the analysis of the fixed TTL consistency algorithm in the presence of network delays. The hit and hit* rates are evaluated when requests and updates are modeled by renewal processes. Classical results on the renewal function lead to various bounds.  相似文献   
88.
Three applications of sampling-based sensitivity analysis in conjunction with evidence theory representations for epistemic uncertainty in model inputs are described: (i) an initial exploratory analysis to assess model behavior and provide insights for additional analysis; (ii) a stepwise analysis showing the incremental effects of uncertain variables on complementary cumulative belief functions and complementary cumulative plausibility functions; and (iii) a summary analysis showing a spectrum of variance-based sensitivity analysis results that derive from probability spaces that are consistent with the evidence space under consideration.  相似文献   
89.
提出了一种考虑分布电容的故障测距新算法。该算法基于微分方程描述的线路数学模型,利用单端信息对高压输电线路进行故障测距,保留了解微分方程算法的简单可靠、现实可行、不必考虑衰减直流分量和谐波及电网频率波动影响的特点,同时考虑过渡电阻和分布电容的影响,克服了传统解微分方程法中在经高阻接地故障时测距误差过大和忽略分布电容引起的故障定位不准确的缺点。为了检验算法的精度,进行了大量的动模实验。结果表明,算法原理正确并具有较高的测距精度。  相似文献   
90.
Provides the biography of David W. Johnson and announces that he has won the Award for Distinguished Contributions of Applications of Psychology to Education and Training for programmatic research, comprehensive research reviews, and revision of theory over four decades of persistence that have provided the knowledge foundation for cooperative learning, constructive controversy, conflict resolution, and peer mediation training. A selected bibliography is also provided. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号