全文获取类型
收费全文 | 4595篇 |
免费 | 479篇 |
国内免费 | 195篇 |
专业分类
电工技术 | 276篇 |
综合类 | 287篇 |
化学工业 | 788篇 |
金属工艺 | 272篇 |
机械仪表 | 264篇 |
建筑科学 | 401篇 |
矿业工程 | 157篇 |
能源动力 | 125篇 |
轻工业 | 318篇 |
水利工程 | 74篇 |
石油天然气 | 288篇 |
武器工业 | 24篇 |
无线电 | 562篇 |
一般工业技术 | 603篇 |
冶金工业 | 271篇 |
原子能技术 | 59篇 |
自动化技术 | 500篇 |
出版年
2024年 | 13篇 |
2023年 | 72篇 |
2022年 | 123篇 |
2021年 | 180篇 |
2020年 | 156篇 |
2019年 | 139篇 |
2018年 | 141篇 |
2017年 | 147篇 |
2016年 | 151篇 |
2015年 | 190篇 |
2014年 | 268篇 |
2013年 | 297篇 |
2012年 | 309篇 |
2011年 | 280篇 |
2010年 | 256篇 |
2009年 | 238篇 |
2008年 | 266篇 |
2007年 | 212篇 |
2006年 | 271篇 |
2005年 | 234篇 |
2004年 | 143篇 |
2003年 | 157篇 |
2002年 | 136篇 |
2001年 | 117篇 |
2000年 | 140篇 |
1999年 | 108篇 |
1998年 | 96篇 |
1997年 | 65篇 |
1996年 | 56篇 |
1995年 | 74篇 |
1994年 | 43篇 |
1993年 | 34篇 |
1992年 | 30篇 |
1991年 | 27篇 |
1990年 | 14篇 |
1989年 | 16篇 |
1988年 | 20篇 |
1987年 | 18篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1976年 | 6篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有5269条查询结果,搜索用时 31 毫秒
91.
如何将计算任务分配到合适的边缘计算资源上进行计算,以满足边缘计算环境下用户的计算需求、提高用户任务请求
的服务质量,是边缘计算中面临的关键问题。 本文提出一种基于人工鱼群搜索的边缘计算任务调度方法(AFETSA)。 将人工
鱼群搜索算法和边缘计算任务调度模型相结合,采用非线性递减函数动态地调整人工鱼的视野范围和步长,以提高启发式任务
调度算法的全局搜索能力,降低任务的计算时延;同时与禁忌搜索算法进行融合,通过引入忌禁表,在每一次迭代中防止算法陷
入局部最优,提高算法的寻优能力。 CloudSim3. 0 仿真平台实验评测结表明,本文所提 AFETSA 方法和已有的 AFSA、ACO 和
PSO 这 3 种调度算法相比,在任务执行时间、算法稳定性、负载均衡方面都有明显的提升,可充分利用边缘服务器计算资源,提
升计算任务的计算性能,有效解决边缘计算中任务调度不均导致的时延过高和负载不均衡问题。 相似文献
92.
Control of the Metal–Insulator Transition at Complex Oxide Heterointerfaces through Visible Light
下载免费PDF全文
![点击此处可从《Advanced materials (Deerfield Beach, Fla.)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
93.
Tumor Cell Phenotyping: Circulating Tumor Cell Phenotyping via High‐Throughput Acoustic Separation (Small 32/2018)
下载免费PDF全文
![点击此处可从《Small (Weinheim an der Bergstrasse, Germany)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
94.
Zibo Wang Chaobin Huo Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li Bailing Wang 《计算机、材料和连续体(英文)》2023,75(2):2957-2979
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy. 相似文献
95.
介绍了齿条位移反馈控制器的设计,包括开环系统性能分析、系统建模和控制参数整定。设计的直接数字式PI控制器使得闭环控制系统的静、动态特性满足柴油机喷油电控的要求。 相似文献
96.
通过实例分析说明了零序功率方向原理和零序电流最大原理等传统的漏电保护原理无法实现长短线悬殊和不平衡电流大情况下的选择性漏电保护;提出了一种采用零序电流突变量法实现长短线悬殊和不平衡电流大情况下的选择性漏电保护方案。该方案通过比较各支路零序电流和对应支路固有电容电流来判断是否发生漏电,即如果某一支路的零序电流与固有电容电流相比发生突变,则该支路为漏电支路;如果所有支路的零序电流与固有电容电流相比都没有发生突变,则为总线漏电。实践证明了该方案的有效性。 相似文献
97.
武器发射时产生的脉冲噪声对人员和仪器会造成很大的危害,因此噪声测试在武器勤务性能考核巾具有重要意义,针对脉冲噪声信号特性,开发了一套基于VXI总线的噪声测试系统;详细介绍了系统硬件结构设计、基于LabWindows/CVI虚拟仪器开发平台的软件设计和系统功能;设计的系统具有存储容量大、采样率高和软件功能强等特点,能够用于各种武器单发或连发射击时的噪声测试,也可以用于武器非行驶状态下的稳态噪声测试;通过在试验中的应用,表明本系统操作简便,工作可靠. 相似文献
98.
The quality of plane layout design of the disc cutters for the full-face rock tunnel boring machine (TBM) directly affects the balance of force distribution on the cutter head during the excavating. Various layout patterns have been adopted in practice during the layout design of the disc cutters. Considering the engineering technical requirements and the corresponding structure design requirements of the cutter head, this study formulates a nonlinear multi-objective mathematical model with multiple constraints for the disc cutters plane layout design, and analyses the characteristics of a multi-spiral layout pattern, a dynamic star layout pattern and a stochastic layout pattern. And then a genetic algorithm is employed to solve a disc cutters’ multi-spiral layout problem, and a cooperative co-evolutionary genetic algorithm (CCGA) is utilized to solve a disc cutters’ star or stochastic layout problems. The emphasis was put on the study of superiority of three different layout patterns. Finally, an instance of the disc cutters’ plane layout design was solved by the proposed methods using three different kinds of layout patterns. Experimental results showed the effectiveness of the method of combining the mathematical model with the algorithms, and the pros and cons of the three layout patterns. 相似文献
99.
Ning-Hui Sun Jing Xing Zhi-Gang Huo Guang-Ming Tan Jin Xiong Bo Li Can Ma 《计算机科学技术学报》2011,26(3):352-362
Dawning Nebulae is a heterogeneous system composed of 9280 multi-core x86 CPUs and 4640 NVIDIA Fermi GPUs. With a Linpack
performance of 1.271 petaFLOPS, it was ranked the second in the TOP500 List released in June 2010. In this paper, key issues
in the system design of Dawning Nebulae are introduced. System tuning methodologies aiming at petaFLOPS Linpack result are
presented, including algorithmic optimization and communication improvement. The design of its file I/O subsystem, including
HVFS and the underlying DCFS3, is also described. Performance evaluations show that the Linpack efficiency of each node reaches
69.89%, and 1024-node aggregate read and write bandwidths exceed 100 GB/s and 70GB/s respectively. The success of Dawning
Nebulae has demonstrated the viability of CPU/GPU heterogeneous structure for future designs of supercomputers. 相似文献
100.