首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   37738篇
  免费   1317篇
  国内免费   63篇
电工技术   389篇
综合类   29篇
化学工业   7520篇
金属工艺   737篇
机械仪表   767篇
建筑科学   2029篇
矿业工程   126篇
能源动力   1099篇
轻工业   3033篇
水利工程   440篇
石油天然气   123篇
武器工业   5篇
无线电   2537篇
一般工业技术   6342篇
冶金工业   6987篇
原子能技术   280篇
自动化技术   6675篇
  2023年   218篇
  2022年   446篇
  2021年   692篇
  2020年   474篇
  2019年   628篇
  2018年   793篇
  2017年   705篇
  2016年   841篇
  2015年   767篇
  2014年   1055篇
  2013年   2445篇
  2012年   1699篇
  2011年   2126篇
  2010年   1678篇
  2009年   1586篇
  2008年   1847篇
  2007年   1813篇
  2006年   1642篇
  2005年   1475篇
  2004年   1208篇
  2003年   1155篇
  2002年   1084篇
  2001年   717篇
  2000年   570篇
  1999年   633篇
  1998年   674篇
  1997年   629篇
  1996年   590篇
  1995年   596篇
  1994年   551篇
  1993年   537篇
  1992年   517篇
  1991年   297篇
  1990年   439篇
  1989年   412篇
  1988年   342篇
  1987年   381篇
  1986年   330篇
  1985年   440篇
  1984年   448篇
  1983年   340篇
  1982年   316篇
  1981年   307篇
  1980年   299篇
  1979年   292篇
  1978年   263篇
  1977年   247篇
  1976年   233篇
  1975年   212篇
  1974年   187篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
161.
Slightly modified versions of an early Hebbian/anti-Hebbian neural network are shown to be capable of extracting the sparse, independent linear components of a prefiltered natural image set. An explanation for this capability in terms of a coupling between two hypothetical networks is presented. The simple networks presented here provide alternative, biologically plausible mechanisms for sparse, factorial coding in early primate vision.  相似文献   
162.
    
It has recently been proposed that classical music has a fractal nature. A reanalysis of this proposal reveals some logical flaws in the argument. Chaos, fractals, time series and Schenkerian analysis are contrasted and inter-related. Further consideration of Bach's Invention No 1 (BWV772) leads to the conclusion that there is no inherent fractal nature in classical music; although the converse is not true. In other words, it is feasible to use fractal ideas to compose musical pieces — an area of much interest in recent years. Brian Henderson-Sellers is Associate Professor in the School of Information Systems at the University of New South Wales. His research interests span object-oriented information systems and environmental simulation modelling. Over the last three years, he has begun to integrate his software and musical interests in a collaboration, supported by the Australia Council for the Arts, with Greg White in the compositional use of object technology and strange attractors. Their first composition together was premiered in October 1992. He has, amongst other books, published A Book of Object-oriented Knowledge,Prentice Hall. David Cooper is a lecturer and director of the electronic studio in the Music Department of the University of Leeds. He is a composer with a special interest in the music of Bela Bartok. He has recently been appointed technical director of the English University Funding Council Teaching and Learning Technology project in music which is producing multi-media computer-based learning packages. Publications include A Pascal MIDI Library for the Atari ST, Musicus,1, 2 (1989), and A Computationally Non-intensive Algorithm for Pitch Recognition, Array,12, 2 (1992).  相似文献   
163.
We present our experience withEuLisp as a teaching language, focussing on the level of the language which was specifically designed for this purpose (level-0).EuLisp has been used in undergraduate and postgraduate teaching since 1990, in lectures and laboratories, where in many cases it has replaced Scheme or Common Lisp. It has been used extensively in programming courses, parallelism courses, as a vehicle for advanced courses in symbolic computing and programming language design; it has also been used as a platform for final year undergraduate projects. This experience has demonstrated thatEuLisp is well suited to teaching and far reaching in its capabilities: it supports the relevant concepts in a consistent and versatile framework, so that the language serves to facilitate the educational process. The discussion is illustrated with examples, and where appropriate we draw a comparison with the Lisp dialects used previously in these courses.  相似文献   
164.
Database systems for real-time applications must satisfy timing constraints associated with transactions in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multi-level security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that, due to the conflicting goals of each requirement, tradeoffs need to be made between security and timeliness. We first define mutual information, a measure of the degree to which security is being satisfied by a system. A secure two-phase locking protocol is then described and a scheme is proposed to allow partial violations of security for improved timeliness. Analytical expressions for the mutual information of the resultant covert channel are derived, and a feedback control scheme is proposed that does not allow the mutual information to exceed a specified upper bound. Results showing the efficacy of the scheme obtained through simulation experiments are also discussed  相似文献   
165.
The GIAO-SCF method for calculating isotropic nuclear magnetic shielding values has been utilized to explain certain features in the 1H-NMR spectrum of 2-methylene-8,8-dimethyl-1,4,6,10-tetraoxaspiro[4.5] decane. Population distributions of the low-energy conformers based on their ab initio energies were used to produce weighting factors for the individual calculated shielding values to calculate the weighted average of the shielding values for a complete set of conformers. The differences in 1H chemical shifts between the hydrogens of the two methyl groups and between the axial and equatorial hydrogens in 2-methylene-8,8-dimethyl-1,4,6,10-tetraoxaspiro[4.5] decane were shown to be due to energy differences between the chair and boat orientations of the six-membered ring and contribution from a twist-boat conformation. Results suggest a hypothesis that intramolecular differences in chemical shift might be calculated to a greater degree of accuracy than chemical shifts calculated relative to a standard.  相似文献   
166.
The identification problem for linear stochastic systems may be stated roughly as follows: given observations on two stochastic processes which are the input and output of some unknown linear system, determine some estimate of the parameters of the system. A set of candidate linear systems which contains the “true” system is introduced, and probabilistic assumptions on the two stochastic processes turn the identification problem into the deterministic problem of minimizing some objective function over this candidate model set. If this set is a manifold, the existence of globally convergent identification algorithms hinges on the critical point behavior of the objective functions which it carries. By way of Morse Theory, the critical point behavior of objective functions on a manifold has implications with regard to the topology of the manifold. This paper analyzes the topology and critical point behavior of objective functions on a specific manifold of linear systems which appears frequently as the candidate model set in identification problems. This manifold is the set Σ of allm-input,p-output linear systems of fixed McMillan degree with real or complex coefficients. Over this manifold sits the principal bundle \(\tilde \Sigma\) of minimal realizations of systems in Σ It is shown that there exist three natural analytic metrics on the associated vector bundle. It is also shown that, in the real case, the first Stiefel-Whitney class of the bundle \(\tilde \Sigma\) has min(m, p)-1 nonvanishing powers; the same conclusion is drawn about the first Chern class of \(\tilde \Sigma\) in the complex case. These results, which follow from Morse Theory and some elementary homotopy and homology theory, imply that the category of the bundle \(\tilde \Sigma\) is at least min(m, p), and hence that the Lusternik-Schnirelmann category of Σ is at least min(m, p). It follows that canonical forms (i.e. sections of \(\tilde \Sigma\) ) may exist only when min(m, p) = 1 and that any objective function on Σ with compact sublevel sets has at least min(m, p) critical points. In particular, there exist on Σ no globally convergent gradient algorithms when min(m, p) > 1.  相似文献   
167.
Cable response to X-rays is linear with incident fluence, provided the deposited charge in cable dielectrics is directly proportional to the X-ray flux. To estimate the level at which the linear region ends, we discuss three nonlinear processes that modify the deposited charge profile in a hypothetical cable model: field-limiting in vacuum gaps, ionization effects in air-filled gaps, and radiation-induced dielectric conductivity. The exact level at which limiting of the Norton driver in an elemental length of cable begins depends on the cable geometry and the X-ray source. Estimates of the onset of nonlinearities caused by field-limiting and by dielectric conductivity are found in terms of cable and source parameters. With air-filled gaps, the Norton driver is always nonlinear. In addition to limiting of the Norton drivers, the load response of a long cable may be limited because propagating currents are attenuated by the induced conductivity of the bulk of the dielectric.  相似文献   
168.
Summary A weak logic of programs is a formal system in which statements that mean the program halts cannot be expressed. In order to prove termination, we would usually have to use a stronger logical system. In this paper we show how we can prove termination of both iterative and recursive programs within a weak logic by augmenting the programs with counters and adding bound assertions on the counters as loop invariants and entry conditions. Thus, most of the existing verifiers which are based on a weak logic of programs can be used to prove termination of programs without any modification. We give examples of proofs of termination and of upper bounds on computation time that were obtained using a Pascal program verifier. The use of the method to locate causes of non-termination is also illustrated.This research was supported inpart by the Advanced Research Agency of the Office of the Secretary of Defence under contract DAHC 15-73-C-0435  相似文献   
169.
This is the second paper of a series which begins by treating the perception of pitch relations in musical contexts and the perception of timbre and speech. The first paper discusses in some detail those properties of musical scales required in order for them to function as reference frames which provide for the measurement of intervals such that ([1], p. 270),Every melodic phrase, every chord, which can be executed at any pitch, can be also executed at any other pitch in such a way that we immediately perceive the characteristic marks of their similarity. Here we continue this discussion by developing quantitative measures of the degree to which different scales possess the above properties. Then that property of musical scales which permits a listener to code the pitches of which it is constituted into degrees is examined and a corresponding quantitative measure developed. Musical scales are shown to be optimal choices with respect to both the former and latter measures, and a theory limiting those scales which are musically useful to a small fraction of possible sets of pitches is proposed. Existing scales which have been examined fall within the theory, which links the techniques of composition which may be used (i.e., those which produce perceptible relations between musical segments) to the above properties of the scale structures. This paper is not self-contained—reading of the previous paper in this series is required.This research was supported in part by grants and contracts AF-AFOSR 881-65, AF 49(638)-1738 and AF-AFOSR 68-1596.  相似文献   
170.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号