首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8825篇
  免费   336篇
  国内免费   37篇
电工技术   119篇
综合类   22篇
化学工业   1979篇
金属工艺   167篇
机械仪表   230篇
建筑科学   571篇
矿业工程   31篇
能源动力   171篇
轻工业   768篇
水利工程   53篇
石油天然气   4篇
武器工业   1篇
无线电   584篇
一般工业技术   1438篇
冶金工业   1519篇
原子能技术   70篇
自动化技术   1471篇
  2023年   51篇
  2022年   34篇
  2021年   139篇
  2020年   104篇
  2019年   119篇
  2018年   168篇
  2017年   110篇
  2016年   191篇
  2015年   191篇
  2014年   249篇
  2013年   562篇
  2012年   397篇
  2011年   544篇
  2010年   410篇
  2009年   389篇
  2008年   432篇
  2007年   420篇
  2006年   363篇
  2005年   312篇
  2004年   291篇
  2003年   221篇
  2002年   227篇
  2001年   173篇
  2000年   165篇
  1999年   157篇
  1998年   258篇
  1997年   190篇
  1996年   150篇
  1995年   137篇
  1994年   117篇
  1993年   134篇
  1992年   127篇
  1991年   72篇
  1990年   90篇
  1989年   75篇
  1988年   91篇
  1987年   65篇
  1986年   53篇
  1985年   79篇
  1984年   92篇
  1983年   59篇
  1982年   66篇
  1981年   83篇
  1980年   67篇
  1979年   85篇
  1978年   67篇
  1977年   67篇
  1976年   56篇
  1975年   58篇
  1973年   47篇
排序方式: 共有9198条查询结果,搜索用时 515 毫秒
91.
Much of what has been written in Australia about the protection of computer programs has been inspired by high profile cases concerning the boundaries of copyright protection. The Australian law firm Clayton Utz says that there has been little discussion about other types of legal protection for computer programs, and as a consequence, other intellectual property laws should not be overlooked.  相似文献   
92.
Background, prime influences upon present day methods and current trends in United Kingdom tendering practices are reviewed. Significant weaknesses are identified, confirming the need for some revision of existing contractor selection methods. The findings compliment recommendations of the recent government/industry review of the construction sector headed by Sir Michael Latham. Specifically, that tendering procedure should embrace investigation of contractors' potential to deliver a service of acceptable standard, on time, within budget. Present selection methods often fail in this objective, being inclined to discriminate predominantly on cost.  相似文献   
93.
94.
A robustness analysis and synthesis for incomplete nonlinear decoupling for a class of nonlinear systems is discussed. Rigid and elastic-joint robot models belong to this class. For the elastic case, a transformation facilitates the robustness analysis under a weak assumption. Charts with H 1- and H - norms of closed-loop disturbance transfer functions of the nonlinear-decoupled system are presented for a robust pole assignment.  相似文献   
95.
Neural Computing and Applications - In the medical imaging domain, nonlinear warping has enabled pixel-by-pixel mapping of one image dataset to a reference dataset. This co-registration of data...  相似文献   
96.
Phan  Alex  Truong  Phuong  Schade  Christoph  Vasan  Aditya  Friend  James  Talke  Frank E. 《Microsystem Technologies》2021,27(6):2473-2479
Microsystem Technologies - “Zero drift” behavior of an optical intraocular pressure sensor is studied using an analytical model based on the deflection of a circular membrane. Results...  相似文献   
97.
In this paper, we present a digital library system for managing heterogeneous music collections. The heterogeneity refers to various document types and formats as well as to different modalities, e. g., CD-audio recordings, scanned sheet music, and lyrics. The system offers a full-fledged, widely automated document processing chain: digitization, indexing, annotation, access, and presentation. Our system is implemented as a generic and modular music repository based on a service-oriented software architecture. As a particular strength of our approach, the various documents representing aspects of a piece of music are jointly considered in all stages of the document processing chain. Our user interfaces allow for a multimodal and synchronized presentation of documents (WYSIWYH: what you see is what you hear), a score- or lyrics-based navigation in audio, as well as a cross- and multimodal retrieval. Hence, our music repository may be called a truly cross-modal library system. In our paper, we describe the system components, outline the techniques of the document processing chain, and illustrate the implemented functionalities for user interaction. We describe how the system is put into practice at the Bavarian State Library (BSB) Munich as a part of the German PROBADO Digital Library Initiative (PDLI).  相似文献   
98.
Certain tasks, such as formal program development and theorem proving, fundamentally rely upon the manipulation of higher-order objects such as functions and predicates. Computing tools intended to assist in performing these tasks are at present inadequate in both the amount of knowledge they contain (i.e., the level of support they provide) and in their ability to learn (i.e., their capacity to enhance that support over time). The application of a relevant machine learning technique—explanation-based generalization (EBG)—has thus far been limited to first-order problem representations. We extend EBG to generalize higher-order values, thereby enabling its application to higher-order problem encodings.Logic programming provides a uniform framework in which all aspects of explanation-based generalization and learning may be defined and carried out. First-order Horn logics (e.g., Prolog) are not, however, well suited to higher-order applications. Instead, we employ Prolog, a higher-order logic programming language, as our basic framework for realizing higher-order EBG. In order to capture the distinction between domain theory and training instance upon which EBG relies, we extend Prolog with the necessity operator of modal logic. We develop a meta-interpreter realizing EBG for the extended language, Prolog, and provide examples of higher-order EBG.  相似文献   
99.
Conventional access methods cannot be effectively used in large Scientific/Statistical Database (SSDB) applications. A file structure (called bit transposed file (BTF)) is proposed which offers several attractive features that are better suited for the special characteristics that SSDBs exhibit. This file structure is an extreme version of the (attribute) transposed file. The data are stored by vertical bit partitions. The bit patterns of attributes are assigned using one of several data encoding methods. Each of these encoding methods is appropriate for different query types. The bit partitions can also be compressed using a version of the run length encoding scheme. Efficient operators on compressed bit vectors have been developed and form the basis of a query language. Because of the simplicity of the file structure and query language, optimization problems for database design, query evaluation, and common subexpression removal can be formalized and efficient exact solution or near optimal solution can be achieved. In addition to selective power with low overheads for SSDBs, the BTF is also amenable to special parallel hardware. Results from experiments with the file structure suggest that this approach may be a reasonable alternative file structure for large SSDBs.  相似文献   
100.
Asymmetrically cracked specimens fail with considerably less ductility than symmetrically cracked ones, due to the crack progressing along a shear band into pre-damaged material. A formulation for the accumulation of damage ahead of an asymmetric crack is presented, based on strain increments following a power law relation. These results are integrated both numerically and approximately.The crack growth per unit displacement increases approximately as the logarithm of the total crack advance per inclusion spacing , and varies inversely as the critical fracture strain c. This provides a basis for predicting large-scale, fully plastic fracture from asymmetric weld defects, using small-scale laboratory specimens.
Résumé Les éprouvettes fissurées de manière asymétrique se rompent avec beaucoup moins de ductilité que celles qui sont fissurées de manières symétrique, en raison du fait que la fissure se développe suivant une bande de cisaillement dans un matériau préendommagé. On Présente une formulation de l'accumulation du dommage en avant d'une fissure asymétrique, en se basant sur des gradients de déformations répartis selon une loi quadratique. L'interprétation des résultats est effectuée par voie numérique et par approximation.On constate que le croissance d'une fissure par unité de déplacement est sensiblement proportionnelle au logarithme de l'avancement total de la fissure rapporté à l'espacement entre deux inclusions , et en raison inverse de la déformation critique à la rupture c. Ceci fournt une base pour prédire une rupture à plus grande échelle et en conditions tout à fait plastiques, qui résulteront de défauts de soudage asymétriques, et ce en utilisant des éprouvettes réduites de laboratoire.
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号