首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1563202篇
  免费   25821篇
  国内免费   7903篇
工业技术   1596926篇
  2021年   16116篇
  2020年   12200篇
  2019年   14934篇
  2018年   16563篇
  2017年   15880篇
  2016年   21956篇
  2015年   17976篇
  2014年   29313篇
  2013年   88810篇
  2012年   37866篇
  2011年   51103篇
  2010年   44416篇
  2009年   52418篇
  2008年   47482篇
  2007年   45137篇
  2006年   46988篇
  2005年   41403篇
  2004年   42844篇
  2003年   42564篇
  2002年   41612篇
  2001年   38578篇
  2000年   36927篇
  1999年   36071篇
  1998年   50197篇
  1997年   42571篇
  1996年   37650篇
  1995年   32105篇
  1994年   29959篇
  1993年   29694篇
  1992年   26746篇
  1991年   23865篇
  1990年   24147篇
  1989年   23235篇
  1988年   21879篇
  1987年   19944篇
  1986年   19437篇
  1985年   22773篇
  1984年   22757篇
  1983年   20712篇
  1982年   19515篇
  1981年   19646篇
  1980年   18253篇
  1979年   18834篇
  1978年   17986篇
  1977年   18084篇
  1976年   19824篇
  1975年   16200篇
  1974年   15732篇
  1973年   15799篇
  1972年   13302篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
Modeling and CW operation of a quasi-three-level 946 nm Nd: YAG laser   总被引:18,自引:0,他引:18  
A model is developed for an end-pumped quasi-three-level laser with population in the lower laser level at equilibrium such as for transitions to the manifolds4I9/2in Nd3+,4I15/2in Er3+,5I8in Ho3+and3H6in Tm3+. It is shown that the effect of residual lower laser level population on laser operation can be treated as a saturable loss. Room temperature operation on the4F3/2-4I9/2transition in Nd:YAG under CW dye laser pumping has been demonstrated with a threshold as low as 11.5 mW incident power and a slope efficiency of 7 percent with 0.3 percent output coupling. Performance is limited by the low output coupling and diffraction loss.  相似文献   
992.
A novel typed of hybrid-mode feed horn is presented. It comprises a hollow conical dielectric waveguide whose outer surface is metallized, and whose inner surface is coated with circumferentially oriented conducting strips. It may be designed to have mimimal cross polarization at two arbitrarily separated frequencies, as for a dual depth corrugated horn. Compared to the corrugated horn, it has the potential of lower weight and lower price. Small horns will have some cross polarization due to undesired radiation from the fields transmitted within the dielectric.  相似文献   
993.
An algorithm for construction of the reachability domain by the given time instant ? for a nonlinear third order system under the condition of preliminary approach to a predefined point is proposed. All possible cases of location of this point in the motion plane of the system for different values of the time instant ? are studied.  相似文献   
994.
A study was carried out using simulation to investigate driver responses to lineside signals and signs at various approach speeds. The objectives of the study were: (1) to find out whether train speed would significantly affect signal/sign reading; (2) to examine at which point certain types of signs or signals could be detected or recognised, and (3) to determine a speed cut-off level above which certain types of signs or signals are no longer recognisable or detectable. Fifty-seven train drivers from 12 Train Operating Companies in the UK participated in the trials. Twenty different types of lineside signs and ten types of signals were tested under six different approach speeds ranging from 100 to 350 km/h (62–218 mph). Driver performance measures were ‘time remaining to the signal/sign’ at the point of detection or recognition, and reading error rate. The results showed a significant influence of train speed on driver responses to lineside signals/signs and demonstrated a non-linear relationship between driver responses to signals/signs and approach speed. This has been used to estimate a maximum approach speed limit within which a specific signal or sign can be correctly detected or recognised. The findings and implications of the study are discussed in the paper.  相似文献   
995.
No generally accepted principles and guidelines currently exist to help engineers design local interaction mechanisms that result in a desired global behavior. However, several communities have developed ways of approaching this problem in the context of niched application areas. Because the ideas underlying these approaches are often obscured or underemphasized in technical papers, the authors review the role of self-organization in their work. They provide a better picture of the status of the emerging field of self-organizing systems or autonomic computing.  相似文献   
996.
Computing must become much more human centered--for example, by presenting personalized information to users and by respecting personal preferences when controlling multiple devices or invoking various services. Appropriate representation of the information's semantics and of the functionality of devices and services will be critical to such personalized computing. Symbolic artificial intelligence techniques provide the method of choice for the required semantic-representation and reasoning capabilities.  相似文献   
997.
The authors argued that AI systems must be able to manipulate their own internal representations automatically to deal with an infinitely complex and ever-changing world and to scale up to rich, complex applications. Such manipulation must go beyond changing beliefs and learning new concepts in terms of old concepts; it must be able to change ontology's underlying syntax and semantics. Initial progress has been made, but further progress is urgently needed owing to the demands of autonomous multiagent systems. Understanding and implementing this ability must be a major focus of AI for the next 50 years.  相似文献   
998.
This paper considers the principles of algorithmic and software implementation of the software system NADRA 3D designed to analyze processes in three-dimensional multicomponent soil media. The principles of operation of NADRA 3D are described. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 157–174, November–December 2006.  相似文献   
999.
By nature, cryptographers tend to be extremely cautious and conservative. From their perspective, spending time getting people to use a new cryptographic algorithm is roughly on par with getting involved in a land war in Asia. In some cases, however, the difficulty involved in developing a new algorithm is worth the effort. This is the case with identity-based encryption (IBE), a new type of public-key algorithm  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号