全文获取类型
收费全文 | 21690篇 |
免费 | 1775篇 |
国内免费 | 932篇 |
专业分类
电工技术 | 1200篇 |
技术理论 | 2篇 |
综合类 | 1386篇 |
化学工业 | 3646篇 |
金属工艺 | 1181篇 |
机械仪表 | 1388篇 |
建筑科学 | 1980篇 |
矿业工程 | 774篇 |
能源动力 | 578篇 |
轻工业 | 1207篇 |
水利工程 | 359篇 |
石油天然气 | 1530篇 |
武器工业 | 121篇 |
无线电 | 2243篇 |
一般工业技术 | 2604篇 |
冶金工业 | 1071篇 |
原子能技术 | 237篇 |
自动化技术 | 2890篇 |
出版年
2024年 | 107篇 |
2023年 | 437篇 |
2022年 | 644篇 |
2021年 | 898篇 |
2020年 | 741篇 |
2019年 | 624篇 |
2018年 | 664篇 |
2017年 | 754篇 |
2016年 | 635篇 |
2015年 | 823篇 |
2014年 | 1123篇 |
2013年 | 1228篇 |
2012年 | 1406篇 |
2011年 | 1459篇 |
2010年 | 1306篇 |
2009年 | 1172篇 |
2008年 | 1164篇 |
2007年 | 1129篇 |
2006年 | 1181篇 |
2005年 | 1116篇 |
2004年 | 661篇 |
2003年 | 577篇 |
2002年 | 511篇 |
2001年 | 484篇 |
2000年 | 456篇 |
1999年 | 591篇 |
1998年 | 462篇 |
1997年 | 396篇 |
1996年 | 363篇 |
1995年 | 323篇 |
1994年 | 243篇 |
1993年 | 143篇 |
1992年 | 131篇 |
1991年 | 119篇 |
1990年 | 87篇 |
1989年 | 72篇 |
1988年 | 54篇 |
1987年 | 29篇 |
1986年 | 32篇 |
1985年 | 11篇 |
1984年 | 12篇 |
1983年 | 7篇 |
1982年 | 11篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1979年 | 3篇 |
1978年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
针对目前数据库缓存替换算法替换策略单一,无法预测即将执行SQL语句的不足,提出了一种基于访问图优先的缓存替换算法CG-ABR(Call Graph Optimizing Adaptive Buffer Replacement).该算法通过查询优化器获得当前数据访问类型,自动调整缓存替换算法以适应实时变化的访问类型,改进了缓存访问的管理方法,并根据SQL语句的应用逻辑执行顺序来构造访问图Call Graph,基于Call Graph以预测将要执行的SQL语句,替换出未来不会被访问的页面缓存,以达到缓存空间优化的目的.实验结果与分析表明,CG-ABR算法是有效的,对实时变化的访问类型有较好的缓存命中率,具有良好的应用价值. 相似文献
102.
邓杰文 《计算机应用与软件》2010,27(2):247-248,260
经典的Chord模型中为维护Chord环路由信息而周期性执行的Stabilize操作产生了大量的消息转发。提出一种改进的Chord模型,通过使用优化的双向Finger表,使得只在节点加入或离开时才进行路由更新,降低了消息转发的开销,同时优化了路由定位算法。 相似文献
103.
软件程序员的培养是高职软件技术专业的主要培养对象。通过分析IT企业对程序员的需求及程序员必备的素质,结合软件程序员应有的核心能力,建立和完善面向高职院校的软件技术专业的人才培养的课程体系,为适应市场需求的程序员的培养进行了研究与实践。 相似文献
104.
基于蚁群算法的网格资源发现模型研究 总被引:1,自引:0,他引:1
本文通过对传统的网格资源发现存在的问题进行分析,针对其不足,引入蚁群算法,提出基于蚁群算法的网格资源发现模型(AA_GRRM),设计并分析AA_GRRM的体系结构,并对其关键模块分析设计,以提高网格资源发现效率。 相似文献
105.
Kim SJ Zhuo S Deng F Fu CW Brown MS 《IEEE transactions on visualization and computer graphics》2010,16(6):1441-1448
This paper presents an interactive visualization tool to study and analyze hyperspectral images (HSI) of historical documents. This work is part of a collaborative effort with the Nationaal Archief of the Netherlands (NAN) and Art Innovation, a manufacturer of hyperspectral imaging hardware designed for old and fragile documents. The NAN is actively capturing HSI of historical documents for use in a variety of tasks related to the analysis and management of archival collections, from ink and paper analysis to monitoring the effects of environmental aging. To assist their work, we have developed a comprehensive visualization tool that offers an assortment of visualization and analysis methods, including interactive spectral selection, spectral similarity analysis, time-varying data analysis and visualization, and selective spectral band fusion. This paper describes our visualization software and how it is used to facilitate the tasks needed by our collaborators. Evaluation feedback from our collaborators on how this tool benefits their work is included. 相似文献
106.
提出一种基于WEB嵌入式自适应智能控制系统设计方案,提供了各组成模块软硬件的详细设计与具体实现;系统采用主流的S3C2410作为处理器,通过I2C总线实现各硬部件的连接;开发的嵌入式WEB服务器模块,使得用户能够对温度传感器读数进行互联网远程监测和多路数字、模拟量输出智能控制;并且神经网络模块能够自适应地学习和控制温度读数与制冷设备输出数之间的关系。实验结果显示改进后的Hopfield算法的收敛性和记忆性得到了提高,并使该系统具有较大的应用价值。 相似文献
107.
随着企业信息化的快速进展和网络的日益普及,企业实现基于计算机的进销存系统管理是中小企业普遍关注的热点问题.当前该类软件系统普遍基于两层C/S结构,未解决其业务逻辑的不灵活及安全的问题.该系统结构采用基于MVP模式的三层架构,给出了关键的C#程序代码,后台数据库基于SQLServer2008.实践表明系统的可伸缩性强,使用效果可靠稳定,有一定的实用推广价值. 相似文献
108.
Multiple-criteria decision-making (MCDM) is concerned with the ranking of decision alternatives based on preference judgements made on decision alternatives over a number of criteria. First, taking advantage of data fusion technology to comprehensively consider each criterion data is a reasonable idea to solve the MCDM problem. Second, in order to efficiently handle uncertain information in the process of decision making, some well developed mathematical tools, such as fuzzy sets theory and Dempster Shafer theory of evidence, are used to deal with MCDM. Based on the two main reasons above, a new fuzzy evidential MCDM method under uncertain environments is proposed. The rating of the criteria and the importance weight of the criteria are given by experts’ judgments, represented by triangular fuzzy numbers. Then, the weights are transformed into discounting coefficients and the ratings are transformed into basic probability assignments. The final results can be obtained through the Dempster rule of combination in a simple and straight way. A numerical example to select plant location is used to illustrate the efficiency of the proposed method. 相似文献
109.
The frequency shift of the ultra-narrow frequency shift keying (UNFSK) is far less than the ordinary binary frequency shift keying (FSK) method. Because the two frequencies of UNFSK are extremely close, the traditional demodulation method cannot separate them successfully. This study aims to successfully demodulate the UNFSK signals by applying cycle extension and notch filter. The signal processing procedure is as follows: First, the sampling signals have been made cycle extension to enlarge their spectrum difference between signal 0 and 1; secondly, the cycle extension signals have been processed by the notch filter algorithm and finally, we could get the information by sentencing the filtering result. Finally, the method is applied in transportation. The simulation results proved that the algorithm greatly enhanced UNFSK signal demodulation performance, compared to the traditional demodulation method. There can be 2–3 dB improvement in performance, which is very suitable for UNFSK. 相似文献
110.
Contaminant intrusion in a water distribution network is a complex but a commonly observed phenomenon, which depends on three elements – a pathway, a driving force and a contamination source. However, the data on these elements are generally incomplete, non-specific and uncertain. In an earlier work, Sadiq, Kleiner, and Rajani (2006) have successfully applied traditional Dempster–Shafer theory (DST) to estimate the “risk” of contaminant intrusion in a water distribution network based on limited uncertain information. However, the method used for generating basic probability assignment (BPA) was not very flexible, and did not handle and process uncertain information effectively. In this paper, a more pragmatic method is proposed that utilizes “soft” computing flexibility to generate BPAs from uncertain information. This paper compares these two methods through numerical examples, and demonstrates the efficiency and effectiveness of modified method. 相似文献