首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32263篇
  免费   1643篇
  国内免费   60篇
电工技术   488篇
综合类   81篇
化学工业   6749篇
金属工艺   812篇
机械仪表   702篇
建筑科学   1748篇
矿业工程   174篇
能源动力   680篇
轻工业   3772篇
水利工程   307篇
石油天然气   79篇
武器工业   1篇
无线电   2165篇
一般工业技术   7535篇
冶金工业   3170篇
原子能技术   235篇
自动化技术   5268篇
  2023年   318篇
  2022年   302篇
  2021年   651篇
  2020年   525篇
  2019年   518篇
  2018年   938篇
  2017年   910篇
  2016年   1066篇
  2015年   879篇
  2014年   1181篇
  2013年   2361篇
  2012年   1612篇
  2011年   2029篇
  2010年   1656篇
  2009年   1519篇
  2008年   1727篇
  2007年   1718篇
  2006年   1301篇
  2005年   1118篇
  2004年   947篇
  2003年   849篇
  2002年   932篇
  2001年   666篇
  2000年   600篇
  1999年   489篇
  1998年   492篇
  1997年   453篇
  1996年   389篇
  1995年   423篇
  1994年   342篇
  1993年   337篇
  1992年   286篇
  1991年   188篇
  1990年   235篇
  1989年   208篇
  1988年   195篇
  1987年   202篇
  1986年   154篇
  1985年   305篇
  1984年   310篇
  1983年   198篇
  1982年   186篇
  1981年   213篇
  1980年   158篇
  1979年   139篇
  1978年   142篇
  1977年   113篇
  1976年   128篇
  1975年   112篇
  1974年   92篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
111.
We consider the classes of ⊕-codes and ⊗-codes, which are superclasses of outfix and hyper-codes, respectively. These restrictions are based on the synchronized insertion operation, which serves as a model for the gene rearrangement function in certain unicellular organisms. We investigate the classes of ⊕-codes and ⊗-codes from a theoretical perspective, examine their relationships with traditional code classes and consider related decidability problems.  相似文献   
112.
On the removal of shadows from images   总被引:3,自引:0,他引:3  
This paper is concerned with the derivation of a progression of shadow-free image representations. First, we show that adopting certain assumptions about lights and cameras leads to a 1D, gray-scale image representation which is illuminant invariant at each image pixel. We show that as a consequence, images represented in this form are shadow-free. We then extend this 1D representation to an equivalent 2D, chromaticity representation. We show that in this 2D representation, it is possible to relight all the image pixels in the same way, effectively deriving a 2D image representation which is additionally shadow-free. Finally, we show how to recover a 3D, full color shadow-free image representation by first (with the help of the 2D representation) identifying shadow edges. We then remove shadow edges from the edge-map of the original image by edge in-painting and we propose a method to reintegrate this thresholded edge map, thus deriving the sought-after 3D shadow-free image.  相似文献   
113.
U. Rösler 《Algorithmica》2001,29(1-2):238-261
This paper develops general tools for the analysis of stochastic divide and conquer algorithms. We concentrate on the average performance and the distribution of the running time of the algorithm. As a special example we analyse the average performance and the running time distribution of the (2k + 1)-median version of Quicksort. Online publication October 13, 2000.  相似文献   
114.
For educators, the World Wide Web offers a valuable technology for knowledge sharing. It can complement more traditional approaches to knowledge sharing such as books and lectures. Here, we identify and differentiate three major approaches for Web-based knowledge sharing: course-centered sites, subject-centered sites, and book-centered sites. A rationale for book-centered sites, those developed to facilitate students’ and instructors’ efforts in courses that use the book, is advanced. We introduce an architecture of features that can guide developers of such sites. This is illustrated by a book-centered site implemented according to the architecture. Several sites for introductory business computing books are compared and contrasted in terms of the architecture, suggesting ways in which each can be extended. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   
115.
116.
Simple focusing criterion   总被引:1,自引:0,他引:1  
  相似文献   
117.
    
Summary In casein-containing agarose gels, pepsin and chymosin form radial diffusion zones; the diameters of these zones show rectilinear correlations with the logarithm of the enzyme concentration at constant time. The sensitivity for both enzymes is below 1 g. Addition of the inhibitor pepstatin A to these enzymes causes a reduction of the diameters of the diffusion zones, with large differences for both the enzymes. With this procedure, the pepsin/chymosin ratio in rennet preparations was assayed with an accuracy of ±5%. Identification of the inhibitors allows the determination of amounts in the namomole range. This method is a simple technique for the evaluation of proteinases and their inhibitors in screening systems.
Geldiffusion — eine einfache und empfindliche Technik für den Nachweis von Proteinaseinhibitoren und die Anwendung für die Bestimmung von Proteinasen in Gemischen
Zusammenfassung In caseinhaltigen Agarosegelen erzeugen sowohl Pepsin wie Chymosin radiale Diffusionszonen, deren Durchmesser bei gegebener Zeit dem Logarithmus der Enzymmenge proportional ist. Die Bestimmungsgrenze liegt für beide Enzyme unter 1 g. Bei Zugabe des Inhibitors Pepstatin A zu den Proteinasepräparaten werden die Diffusionszonen beider Proteinasen verkleinert, aber in unterschiedlichem Ausmaße. Auf dieser Basis kann in technischen Labpräparaten das Mengenverhältnis Pepsin/Chymosin mit einer Genauigkeit von ±5% bestimmt werden. Bei Umkehr der Reaktion zum Nachweis des Inhibitors sind Mengen im Bereich von 10–9 Mol sicher erfaßbar. Die Methodik ist verallgemeinerungsfähig als Screening-Test für Proteinaseinhibitoren.
  相似文献   
118.
In this paper we investigate the relation between architectural support for Prolog and performance. We will show that partial support for tags does perform as well as full support, but it only reduces the execution time by approximately 10%. With respect to special addressing modes, auto address modification (post/pre increment, decrement on loads and stores) only yields a cycle reduction of approximately 6% and the introduction of a single shadow register set yields around 8%. Combining these optimizations, a performance gain of 20 to 25% can be achieved, depending on the memory system. Usingvliw techniques, which exploit instruction-level parallelism, the performance can be doubled, using three processing elements. Two processing elements already provide a significant speedup, but the use of four processing elements is not justified if we compare the gain in performance with the cost of the extra hardware. In general we observe only a small performance improvement (around 20%) when moving fromrisc to special-purposerisc architectures, an improvement which can also be achieved by applying advanced compiler technology, such as compiler optimization, optimizations forwam, and optimal scheduling techniques forvliw architectures. Unfortunately these hardware and software effects do not add up, as a better compiler reduces the effect of hardware support. Finally, the cycle time is essential for comparing the performance of different (micro)-architectures, but it is not always clear what the effects of the different tradeoffs are on the maximum achievable cycle time.  相似文献   
119.
120.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号