首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   327572篇
  免费   3634篇
  国内免费   830篇
电工技术   5097篇
综合类   2570篇
化学工业   50828篇
金属工艺   14044篇
机械仪表   10431篇
建筑科学   7707篇
矿业工程   1959篇
能源动力   6312篇
轻工业   28672篇
水利工程   3765篇
石油天然气   5440篇
武器工业   32篇
无线电   34612篇
一般工业技术   61102篇
冶金工业   49682篇
原子能技术   6224篇
自动化技术   43559篇
  2021年   2151篇
  2019年   2079篇
  2018年   17714篇
  2017年   16583篇
  2016年   13498篇
  2015年   2852篇
  2014年   4170篇
  2013年   10536篇
  2012年   9297篇
  2011年   17633篇
  2010年   14705篇
  2009年   12723篇
  2008年   14282篇
  2007年   15394篇
  2006年   7129篇
  2005年   7328篇
  2004年   7015篇
  2003年   6821篇
  2002年   6272篇
  2001年   5731篇
  2000年   5630篇
  1999年   5460篇
  1998年   13060篇
  1997年   9209篇
  1996年   7078篇
  1995年   5501篇
  1994年   4900篇
  1993年   4779篇
  1992年   3757篇
  1991年   3470篇
  1990年   3673篇
  1989年   3553篇
  1988年   3375篇
  1987年   2965篇
  1986年   2996篇
  1985年   3447篇
  1984年   3283篇
  1983年   2945篇
  1982年   2780篇
  1981年   2859篇
  1980年   2763篇
  1979年   2678篇
  1978年   2728篇
  1977年   3016篇
  1976年   3945篇
  1975年   2405篇
  1974年   2275篇
  1973年   2408篇
  1972年   1999篇
  1971年   1883篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
DNA double-strand breaks are very genotoxic lesions that can result in chromosome aberrations. The current view is that DNA double-strand breaks are repaired most efficiently through homologous recombination in yeast and simple end-joining in mammalian cells. However, recent experiments reveal that both repair pathways are conserved from yeast to mammals, including humans. The challenge ahead is to put the different pieces of the jigsaw together into coherent mechanisms for both pathways and to determine their relative contributions to ionizing-radiation resistance and to the prevention of genetic instability and carcinogenesis.  相似文献   
92.
93.
The capacitive idling converters derived from the Cuk, SEPIC, Zeta, and flyback topologies allow soft commutation of power switches without the need for additional circuitry, making it possible to increase the switching frequency while maintaining high efficiency  相似文献   
94.
95.
Presuppositions of utterances are the pieces of information you convey with an utterance no matter whether your utterance is true or not. We first study presupposition in a very simple framework of updating propositional information, with examples of how presuppositions of complex propositional updates can be calculated. Next we move on to presuppositions and quantification, in the context of a dynamic version of predicate logic, suitably modified to allow for presupposition failure. In both the propositional and the quantificational case, presupposition failure can be viewed as error abortion of procedures. Thus, a dynamic assertion logic which describes the preconditions for error abortion is the suitable tool for analysing presupposition.  相似文献   
96.
97.
A general language for specifying resource allocation and time-tabling problems is presented. The language is based on an expert system paradigm that was developed previously by the authors and that enables the solution of resource allocation problems by using experts' knowledge and heuristics. The language enables the specification of a problem in terms of resources, activities, allocation rules, and constraints, and thus provides a convenient knowledge acquisition tool. The language syntax is powerful and allows the specification of rules and constraints that are very difficult to formulate with traditional approaches, and it also supports the specification of various control and backtracking strategies. We constructed a generalized inference engine that runs compiled resource allocation problem specification language (RAPS) programs and provides all necessary control structures. This engine acts as an expert system shell and is called expert system for resource allocation (ESRA). The performance of RAPS combined with ESRA is demonstrated by analyzing its solution of a typical resource allocation problem  相似文献   
98.
Presents protocols for determining processor membership in asynchronous distributed systems that are subject to processor and communication faults. These protocols depend on the placement of a total order on broadcast messages. The types of systems for which each of these protocols is applicable are characterized by the properties of the communication mechanisms and by the availability of stable storage. In the absence of stable storage or of a mechanism for distinguishing promptly delivered messages, the authors show that no membership protocol can exist. They also discuss their experience in implementing these membership protocols  相似文献   
99.
We present an unified parallel architecture for four of the most important fast orthogonal transforms with trigonometric kernel: Complex Valued Fourier (CFFT), Real Valued Fourier (RFFT), Hartley (FHT), and Cosine (FCT). Out of these, only the CFFT has a data flow coinciding with the one generated by the successive doubling method, which can be transformed on a constant geometry flow using perfect unshuffle or shuffle permutations. The other three require some type of hardware modification to guarantee the constant geometry of the successive doubling method. We have defined a generalized processing section (PS), based on a circular CORDIC rotator, for the four transforms. This PS section permits the evaluation of the CFFT and FCT transforms in n data recirculations and the RFFT and FHT transforms in n-1 data recirculations, with n being the number of stages of a transform of length N=rn. Also, the efficiency of the partitioned parallel architecture is optimum because there is no cycle loss in the systolic computation of all the butterflies for each of the four transforms  相似文献   
100.
The integration of object-oriented programming concepts with databases is one of the most significant advances in the evolution of database systems. Many aspects of such a combination have been studied, but there are few models to provide security for this richly structured information. We develop an authorization model for object-oriented databases. This model consists of a set of policies, a structure for authorization rules, and algorithms to evaluate access requests against the authorization rules. User access policies are based on the concept of inherited authorization applied along the class structure hierarchy. We propose also a set of administrative policies that allow the control of user access and its decentralization. Finally, we study the effect of class structuring changes on authorization  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号