全文获取类型
收费全文 | 11784篇 |
免费 | 1984篇 |
国内免费 | 1525篇 |
专业分类
电工技术 | 794篇 |
综合类 | 1406篇 |
化学工业 | 650篇 |
金属工艺 | 309篇 |
机械仪表 | 613篇 |
建筑科学 | 351篇 |
矿业工程 | 227篇 |
能源动力 | 215篇 |
轻工业 | 323篇 |
水利工程 | 154篇 |
石油天然气 | 296篇 |
武器工业 | 177篇 |
无线电 | 1692篇 |
一般工业技术 | 816篇 |
冶金工业 | 135篇 |
原子能技术 | 94篇 |
自动化技术 | 7041篇 |
出版年
2024年 | 29篇 |
2023年 | 150篇 |
2022年 | 286篇 |
2021年 | 326篇 |
2020年 | 418篇 |
2019年 | 354篇 |
2018年 | 350篇 |
2017年 | 418篇 |
2016年 | 493篇 |
2015年 | 538篇 |
2014年 | 792篇 |
2013年 | 780篇 |
2012年 | 1022篇 |
2011年 | 995篇 |
2010年 | 802篇 |
2009年 | 909篇 |
2008年 | 914篇 |
2007年 | 1005篇 |
2006年 | 774篇 |
2005年 | 739篇 |
2004年 | 545篇 |
2003年 | 448篇 |
2002年 | 363篇 |
2001年 | 310篇 |
2000年 | 253篇 |
1999年 | 199篇 |
1998年 | 141篇 |
1997年 | 145篇 |
1996年 | 136篇 |
1995年 | 102篇 |
1994年 | 88篇 |
1993年 | 73篇 |
1992年 | 74篇 |
1991年 | 38篇 |
1990年 | 43篇 |
1989年 | 32篇 |
1988年 | 20篇 |
1987年 | 18篇 |
1986年 | 14篇 |
1985年 | 16篇 |
1984年 | 23篇 |
1983年 | 19篇 |
1982年 | 17篇 |
1981年 | 11篇 |
1980年 | 15篇 |
1979年 | 12篇 |
1978年 | 5篇 |
1977年 | 10篇 |
1976年 | 7篇 |
1975年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
A. Kaveh M. A. Sayarinejad 《International journal for numerical methods in engineering》2006,67(7):1012-1043
Recently, four canonical forms have been developed and applied to the dynamics and stability analysis of symmetric frames. In this paper, hyper‐symmetric matrices and specially structured matrices are defined and efficient methods are proposed for the eigensolution of such matrices. Applications are extended to hyper‐graphs and specially structured graphs. Simple methods are developed for calculating the eigenvalues of the Laplacian matrices of such graphs. The developments presented in this paper can also be considered as generalization of Form II and Form III symmetry, previously defined by the authors. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
62.
Eddie Cheng 《Information Sciences》2007,177(22):4877-4882
We prove that when linearly many vertices are deleted in a Cayley graph generated by a transposition tree, the resulting graph has a large connected component containing almost all remaining vertices. 相似文献
63.
64.
65.
Shao Zhiqing 《计算机科学技术学报》1993,8(2):59-65
In this paper we try to introduce a new approach to operational semantics of recursive programsby using ideas in the“priority method”which is a fundamental tool in Recursion Theory.In lieu ofmodelling partial functions by introducing undefined values in a traditional approach,we shall define apriority derivation tree for every term,and by respecting the rule“attacking the subterm of thehighest priority first”we define transition relations,computation sequences etc.directly based on astandard interpretation which includes no undefined value in its domain.Finally,we prove that ournew approach generates the same operational semantics as the traditional one.It is also pointed outthat we can use our strategy to refute a claim of Loeckx and Sieber that the opperational semanticsof recursive programs cannot be built based on predicate logic. 相似文献
66.
形态学边缘检测的新算法及其应用 总被引:3,自引:0,他引:3
刘岚岚 《红外与毫米波学报》1998,17(5):386-390
提出了一种基于数学形态学的边缘检测的所算法,该算法具有简便和灵活可编程控制等优点,比原来主算法更国完善,在实际应用中有着很好的前景,并给出了实验结果。 相似文献
67.
An algorithm for reconstructing a binary array of size N sx N from its forest of quadtree representation is presented. The algorithm traverses each tree of the forest in preorder and maps each ‘black’ node into the spatial domain. The time complexity in mapping is O(log N × Bn + Bp), where Bn is the number of black nodes in the forest and Bp is the number of black pixels in the N × N array. The algorithm has been implemented on an Apple II. 相似文献
68.
基于语法的元程序设计系统的自动生成技术 总被引:4,自引:0,他引:4
本文提出一种基于语法的元程序设计系统的自动生成技术,并开发了一个元程序设计系统的自动生成系统A-MPS。元程序设计系统是一种以程序作为操作对象的有效的程序设计工具,并具有广泛的应用。 相似文献
69.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
70.
本文应用故障树分析方法,对快中子零功率堆(DF-Ⅵ)在启动过程中发生临界事故的可能性做了初步的定量估计。结果表明,该堆每次启动发生临界事故的概率约为10~(-6)量级,得出确保装置启动安全的首要因素是选配合格的操作人员的结论,并对设备的改进提出了一些建议. 相似文献