全文获取类型
收费全文 | 22726篇 |
免费 | 3539篇 |
国内免费 | 2838篇 |
专业分类
电工技术 | 5247篇 |
综合类 | 2494篇 |
化学工业 | 412篇 |
金属工艺 | 220篇 |
机械仪表 | 1209篇 |
建筑科学 | 507篇 |
矿业工程 | 241篇 |
能源动力 | 654篇 |
轻工业 | 149篇 |
水利工程 | 413篇 |
石油天然气 | 161篇 |
武器工业 | 217篇 |
无线电 | 3761篇 |
一般工业技术 | 943篇 |
冶金工业 | 415篇 |
原子能技术 | 203篇 |
自动化技术 | 11857篇 |
出版年
2024年 | 179篇 |
2023年 | 419篇 |
2022年 | 599篇 |
2021年 | 744篇 |
2020年 | 887篇 |
2019年 | 815篇 |
2018年 | 712篇 |
2017年 | 955篇 |
2016年 | 1053篇 |
2015年 | 1132篇 |
2014年 | 1571篇 |
2013年 | 1688篇 |
2012年 | 1688篇 |
2011年 | 1662篇 |
2010年 | 1352篇 |
2009年 | 1444篇 |
2008年 | 1523篇 |
2007年 | 1681篇 |
2006年 | 1318篇 |
2005年 | 1339篇 |
2004年 | 1134篇 |
2003年 | 915篇 |
2002年 | 753篇 |
2001年 | 645篇 |
2000年 | 518篇 |
1999年 | 420篇 |
1998年 | 335篇 |
1997年 | 275篇 |
1996年 | 235篇 |
1995年 | 214篇 |
1994年 | 189篇 |
1993年 | 147篇 |
1992年 | 112篇 |
1991年 | 89篇 |
1990年 | 74篇 |
1989年 | 45篇 |
1988年 | 28篇 |
1987年 | 31篇 |
1986年 | 17篇 |
1985年 | 23篇 |
1984年 | 20篇 |
1983年 | 29篇 |
1982年 | 15篇 |
1981年 | 11篇 |
1980年 | 15篇 |
1979年 | 11篇 |
1978年 | 8篇 |
1977年 | 4篇 |
1964年 | 5篇 |
1958年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
段潇乐 《湖南工业职业技术学院学报》2015,(1):82-84
本研究检测了直接和间接两种修正性反馈与国内高职理科学生写作水平的关系。本实验持续五周,将150名学习者分为直接反馈组、间接反馈组及控制组,共安排了一次预先测试,,一次即时后测和一次延时后测,并分别对各组进行考察,结果显示两个实验组进步显著,且直接反馈效果最明显。 相似文献
2.
The paper considers the problem of stabilization of systems possessing a multiple zero eigenvalue at the origin. The controller that we propose, uses multiple delayed measurements instead of derivative terms. Doing so, we increase the performances of the closed loop in presence of system uncertainties and/or noisy measurements. The problem formulation and the analysis is presented through a classical engineering problem which is the stabilization of an inverted pendulum on a cart moving horizontally. On one hand, we perform a nonlinear analysis of the center dynamics described by a three dimensional system of ordinary differential equations with a codimension-three triple zero bifurcation. On the other hand, we present the complementary stability analysis of the corresponding linear time invariant system with two delays describing the behavior around the equilibrium. The aim of this analysis is to characterize the possible local bifurcations. Finally, the proposed control scheme is numerically illustrated and discussed. 相似文献
3.
根据某面板堆石坝施工期、蓄水初期以及几年来的沉降观测资料,对坝体填筑材料计算参数进行反馈分析,得出了能够反映坝体实际变形的弹塑性应力变形计算参数,有利于今后建立大坝变形预报模型,更准确地把握大坝实时运行状态。 相似文献
4.
Depending on whether bidirectional links or unidirectional links are used for communications, the network topology under a
given range assignment is either an undirected graph referred to as the bidirectional topology, or a directed graph referred
to as the unidirectional topology. The Min-Power Bidirectional (resp., Unidirectional) k-Node Connectivity problem seeks a range assignment of minimum total power subject to the constraint that the produced bidirectional
(resp. unidirectional) topology is k-vertex connected. Similarly, the Min-Power Bidirectional (resp., Unidirectional) k-Edge Connectivity problem seeks a range assignment of minimum total power subject to the constraint the produced bidirectional
(resp., unidirectional) topology is k-edge connected.
The Min-Power Bidirectional Biconnectivity problem and the Min-Power Bidirectional Edge-Biconnectivity problem have been studied
by Lloyd et al. [23]. They show that range assignment based the approximation algorithm of Khuller and Raghavachari [18],
which we refer to as Algorithm KR, has an approximation ratio of at most 2(2 – 2/n)(2 + 1/n) for Min-Power Bidirectional Biconnectivity, and range assignment based on the approximation algorithm of Khuller and Vishkin [19],
which we refer to as Algorithm KV, has an approximation ratio of at most 8(1 – 1/n) for Min-Power Bidirectional Edge-Biconnectivity.
In this paper, we first establish the NP-hardness of Min-Power Bidirectional (Edge-) Biconnectivity. Then we show that Algorithm KR has an approximation ratio of at most 4 for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity,
and Algorithm KV has an approximation ratio of at most 2k for both Min-Power Bidirectional k-Edge Connectivity and Min-Power Unidirectional k-Edge Connectivity. We also propose a new simple constant-approximation algorithm for both Min-Power Bidirectional Biconnectivity
and Min-Power Unidirectional Biconnectivity. This new algorithm applies only to Euclidean instances, but is best suited for
distributed implementation.
A preliminary version of this work appeared in the proceedings of the 2nd International Conference on AD-HOC Network and Wireless
(Adhoc-Now 2003).
Research performed in part while visiting the Max-Plank-Institut fur Informatik.
Gruia Calinescu is an Assistant Professor of Computer Science at the Illinois Institute of Technology since 2000. He held postdoc or visiting
researcher positions at DIMACS, University of Waterloo, and Max-Plank Institut fur Informatik. Gruia has a Diploma from University
of Bucharest and a Ph.D. from Georgia Insitute of Technology. His research interests are in the area of algorithms.
Peng-Jun Wan has joined the Computer Science Department at Illinois Institute of Technology in 1997 and has been an Associate Professor
since 2004. He received his Ph.D. in Computer Science from University of Minnesota in 1997, M.S. in Operations Research and
Control Theory from Chinese Academy of Science in 1993, and B.S. in Applied Mathematics from Tsinghua University in 1990.
His research interests include optical networks and wireless networks. 相似文献
5.
Kruk Menno R.; Halász József; Meelis Wout; Haller József 《Canadian Metallurgical Quarterly》2004,118(5):1062
Aggressive behavior induces an adrenocortical stress response, and sudden stressors often precipitate violent behavior. Experiments in rats revealed a fast, mutual, positive feedback between the adrenocortical stress response and a brain mechanism controlling aggression. Stimulation of the aggressive area in the hypothalamus rapidly activated the adrenocortical response, even in the absence of an opponent and fighting. Hypothalamic aggression, in turn, was rapidly facilitated by a corticosterone injection in rats in which the natural adrenocortical stress response was prevented by adrenalectomy. The rapidity of both effects points to a fast, mutual, positive feedback of the controlling mechanisms within the time frame of a single conflict. Such a mutual facilitation may contribute to the precipitation and escalation of violent behavior under stressful conditions. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
6.
7.
Javier Ramírez Antonio García Uwe Meyer-Bäse Fred Taylor Antonio Lloris 《The Journal of VLSI Signal Processing》2003,33(1-2):171-190
Currently there are design barriers inhibiting the implementation of high-precision digital signal processing (DSP) objects with field programmable logic (FPL) devices. This paper explores overcoming these barriers by fusing together the popular distributed arithmetic (DA) method with the residue number system (RNS) for use in FPL-centric designs. The new design paradigm is studied in the context of a high-performance filter bank and a discrete wavelet transform (DWT). The proposed design paradigm is facilitated by a new RNS accumulator structure based on a carry save adder (CSA). The reported methodology also introduces a polyphase filter structure that results in a reduced look-up table (LUT) budget. The 2C-DA and RNS-DA are compared, in the context of a FPL implementation strategy, using a discrete wavelet transform (DWT) filter bank as a common design theme. The results show that the RNS-DA, compared to a traditional 2C-DA design, enjoys a performance advantage that increases with precision (wordlength). 相似文献
8.
9.
一种新的线性分布参数系统辨识方法 总被引:1,自引:0,他引:1
本文应用块脉冲函数(BPF)将含有未知参数的线性分布参数系统偏微分方程转换为矩阵方程,通过最小二乘法辨识线性分布参数系统的参数,辨识结果表明,BPF辨识法具有原理简捷,实现方便,辨识精度高等优点。 相似文献
10.
The requirements on an object-oriented DBMS for management of information in a large, complex enterprise are presented. These requirements aid in the achievement of an environment characterized by data sharing, open architectures, application and data portability, and assurance of data integrity. They were defined from the point of view of a user of the DBMS; therefore they describe the expected functionality of the DBMS and do not specify the method of implementation to achieve this functionality. They encompass requirements on the data model, query and data manipulation languages, the system architecure, interfaces to the system, change management, and transaction management. 相似文献