全文获取类型
收费全文 | 68566篇 |
免费 | 5711篇 |
国内免费 | 2972篇 |
专业分类
电工技术 | 3889篇 |
技术理论 | 10篇 |
综合类 | 4535篇 |
化学工业 | 11517篇 |
金属工艺 | 3581篇 |
机械仪表 | 3885篇 |
建筑科学 | 5376篇 |
矿业工程 | 1823篇 |
能源动力 | 1915篇 |
轻工业 | 5304篇 |
水利工程 | 1288篇 |
石油天然气 | 3662篇 |
武器工业 | 526篇 |
无线电 | 8236篇 |
一般工业技术 | 8503篇 |
冶金工业 | 3415篇 |
原子能技术 | 715篇 |
自动化技术 | 9069篇 |
出版年
2024年 | 311篇 |
2023年 | 1175篇 |
2022年 | 2086篇 |
2021年 | 2873篇 |
2020年 | 2242篇 |
2019年 | 1781篇 |
2018年 | 2046篇 |
2017年 | 2132篇 |
2016年 | 2084篇 |
2015年 | 2677篇 |
2014年 | 3337篇 |
2013年 | 3890篇 |
2012年 | 4298篇 |
2011年 | 4707篇 |
2010年 | 3880篇 |
2009年 | 3705篇 |
2008年 | 3679篇 |
2007年 | 3440篇 |
2006年 | 3275篇 |
2005年 | 2855篇 |
2004年 | 2133篇 |
2003年 | 1887篇 |
2002年 | 1729篇 |
2001年 | 1546篇 |
2000年 | 1687篇 |
1999年 | 2004篇 |
1998年 | 1707篇 |
1997年 | 1395篇 |
1996年 | 1378篇 |
1995年 | 1143篇 |
1994年 | 1004篇 |
1993年 | 695篇 |
1992年 | 543篇 |
1991年 | 393篇 |
1990年 | 338篇 |
1989年 | 308篇 |
1988年 | 219篇 |
1987年 | 154篇 |
1986年 | 110篇 |
1985年 | 81篇 |
1984年 | 61篇 |
1983年 | 41篇 |
1982年 | 52篇 |
1981年 | 33篇 |
1980年 | 34篇 |
1979年 | 13篇 |
1977年 | 9篇 |
1976年 | 13篇 |
1974年 | 11篇 |
1973年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In holographic algorithms, symmetric signatures have been particularly useful. We give a complete characterization of these symmetric signatures over all bases of size 1. These improve previous results by Cai and Choudhary (ICALP 2006, vol. 4051, pp. 703–714, 2006) where only symmetric signatures over the Hadamard basis (special basis of size 1) were obtained. In particular, we give a complete list of Boolean symmetric signatures over bases of size 1. It is an open problem whether signatures over bases of higher dimensions are strictly more powerful. The recent result by Valiant (FOCS 2006, pp. 509–517, 2006) seems to suggest that bases of size 2 might be indeed more powerful than bases of size 1. This result is with regard to a restrictive counting version of #SAT called #Pl-Rtw-Mon-3CNF. It is known that the problem is #P-hard, and its mod 2 version is ⊕P-hard. Yet its mod 7 version is solvable in polynomial time by holographic algorithms. This was ac complished by a suitable symmetric signature over a basis of size 2. We show that the same unexpected holographic algorithm can be realized over a basis of size 1. Furthermore we prove that 7 is the only modulus for which such an “accidental algorithm” exists. 相似文献
992.
Xiaowei Yang Jie Lu Guangquan Zhang 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2010,14(7):667-680
As a new version of support vector machine (SVM), least squares SVM (LS-SVM) involves equality instead of inequality constraints and works with a least squares cost function. A well-known drawback in the LS-SVM applications is that the sparseness is lost. In this paper, we develop an adaptive pruning algorithm based on the bottom-to-top strategy, which can deal with this drawback. In the proposed algorithm, the incremental and decremental learning procedures are used alternately and a small support vector set, which can cover most of the information in the training set, can be formed adaptively. Using this set, one can construct the final classifier. In general, the number of the elements in the support vector set is much smaller than that in the training set and a sparse solution is obtained. In order to test the efficiency of the proposed algorithm, we apply it to eight UCI datasets and one benchmarking dataset. The experimental results show that the presented algorithm can obtain adaptively the sparse solutions with losing a little generalization performance for the classification problems with no-noises or noises, and its training speed is much faster than sequential minimal optimization algorithm (SMO) for the large-scale classification problems with no-noises. 相似文献
993.
994.
Xiaojun Yang Hongxin Zou Fang Lu Jian-jiang Ding Zhijie Zhou Daizhi Liu 《Simulation Modelling Practice and Theory》2010,18(3):304-316
With the merits such as hiding receiving, easy-deploying and high security, passive location has attracted more and more attention and plays an important role in fields as diverse as navigation, location, and tracking, etc. However, the current filters models for passive location methods are most under the framework of the probability theory, thus they can not estimate the state in some passive location with fuzzy uncertainty accurately. Although the fuzzy extended Kalman filter (FEKF) can deal with the fuzzy uncertainty, it unavoidably introduces truncation error. In this paper, based on the FEKF and the iterated extended Kalman filter (IEKF) principle, a new fuzzy passive location model is built, and moreover, an iterated fuzzy extended Kalman filter (IFEKF) is proposed for estimating the target state. Compared to the FEKF and the IEKF, the proposed algorithm can not only reduce the truncation error, but also deal with fuzzy uncertainty. Moreover, it is proved that the IFEKF update is an application of the Gauss–Newton method. Then, a fuzzy passive location algorithm is proposed. Simulation results demonstrate that the proposed approach has better estimation precision than the traditional fuzzy extended Kalman filter. 相似文献
995.
Generating gas/liquid/liquid three-phase microdispersed systems in double T-junctions microfluidic device 总被引:1,自引:0,他引:1
This article describes the generation of microdispersed bubbles and droplets in a double T-junctions microfluidic device to
form immiscible gas/liquid/liquid three-phase flowing systems. Segmented gas plugs are controllably prepared in water at the
first T-junction to form gas/liquid two-phase fluid with the perpendicular flow cutting method. Then using this two-phase
fluid as the cross-shearing fluid for the oil phase at the second T-junction, the gas/liquid/liquid three-phase flowing systems
are prepared. Interestingly, it is found that the break-up of the oil droplets is mainly dominated by the cutting effect of
the gas/liquid interface or the pressure drop across the emerging droplet, but independent with the viscous shearing effect
of the continuous phase, even at the capillary number (Ca = u
wμw/γow) higher than 0.01. The size laws and the distributions of the bubbles and droplets are investigated carefully, and a mathematical
model has been developed to relating the operating conditions with the dispersed sizes. 相似文献
996.
介绍了机车涂装线控制系统的原理,根据系统设计要求提出控制方案,设计了基于三菱FX2N可编程控制器和三菱AG-OT900触摸屏的涂装线控制系统,完成控制系统的硬件设计和软件设计,系统实现对机车涂装生产线过程的手动和自动控制,与PLC可编程控制机器人对话,实现机车涂装生产线自动排风、自动控制温度,遇到故障系统自动停止运行,完成对涂装生产现场的实时监控和报警;该设备现场运行情况表明,排风和温度控制精度高,运行可靠,满足系统各项要求. 相似文献
997.
考虑直升机在飞行包线内模型参数的变化及不确定性影响,设计了鲁棒保性能控制律;根据直升机一个标称状态点构造出了参数不确定性矩阵,利用Lyapunov稳定性定理和线性矩阵不等式方法给出了控制器存在的充分条件及参数化设计方法,进行直升机三轴姿态稳定保性能控制律的设计;仿真结果表明,所设计的控制器满足三轴姿态稳定要求且具有很好的鲁棒性。 相似文献
998.
在理论分析刚形体垂直撞水动力特性的基础上,分别推导出基于von Karman理论和通用Wagner理论的圆球底返回舱撞水冲击过载公式.然后借助ANSYS/LS-DYNA动力显式程序中ALE算法的优势,进行返回舱海向垂直撞水动力数值仿真;针对数值仿真结果和理论分析预报结果的比较分析来验证数值仿真的可行性,同时给出数值计算弹性体模型垂直撞水的撞水冲击过载;结果表明:采用ANSYS/LS-DYNA的ALE算法可以有效地数值模拟返回舱撞水动力特性,为进一步控制返回舱海面回收以及数值分析撞水动力特性提供有力的技术支持,且大大节约了试验经费. 相似文献
999.
1000.
计算机上机实验课程质量保障方式探讨 总被引:1,自引:0,他引:1
计算机实验教学是深化理论教学、培养学生动手能力和提高学生素质的重要环节。本文对当前计算机实验教学中存在的问题进行了分析,提出建立文件存储服务器、上机实时监控软件和实验成绩评定数据库系统的方法,以此提高保障上机实验课程教学质量的能力。 相似文献