全文获取类型
收费全文 | 111208篇 |
免费 | 3337篇 |
国内免费 | 1353篇 |
专业分类
电工技术 | 2080篇 |
综合类 | 3332篇 |
化学工业 | 16333篇 |
金属工艺 | 6387篇 |
机械仪表 | 4887篇 |
建筑科学 | 3512篇 |
矿业工程 | 1170篇 |
能源动力 | 2135篇 |
轻工业 | 5656篇 |
水利工程 | 1594篇 |
石油天然气 | 1315篇 |
武器工业 | 116篇 |
无线电 | 13177篇 |
一般工业技术 | 21020篇 |
冶金工业 | 4296篇 |
原子能技术 | 519篇 |
自动化技术 | 28369篇 |
出版年
2024年 | 116篇 |
2023年 | 534篇 |
2022年 | 899篇 |
2021年 | 1316篇 |
2020年 | 977篇 |
2019年 | 839篇 |
2018年 | 15267篇 |
2017年 | 14193篇 |
2016年 | 10861篇 |
2015年 | 1719篇 |
2014年 | 1633篇 |
2013年 | 1960篇 |
2012年 | 4949篇 |
2011年 | 11359篇 |
2010年 | 9879篇 |
2009年 | 7179篇 |
2008年 | 8233篇 |
2007年 | 8944篇 |
2006年 | 1358篇 |
2005年 | 2252篇 |
2004年 | 1966篇 |
2003年 | 1965篇 |
2002年 | 1293篇 |
2001年 | 733篇 |
2000年 | 751篇 |
1999年 | 656篇 |
1998年 | 733篇 |
1997年 | 527篇 |
1996年 | 458篇 |
1995年 | 364篇 |
1994年 | 291篇 |
1993年 | 212篇 |
1992年 | 169篇 |
1991年 | 138篇 |
1990年 | 105篇 |
1989年 | 86篇 |
1988年 | 63篇 |
1987年 | 50篇 |
1986年 | 48篇 |
1985年 | 33篇 |
1968年 | 46篇 |
1967年 | 33篇 |
1966年 | 44篇 |
1965年 | 46篇 |
1959年 | 36篇 |
1958年 | 37篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
This paper designs and analyzes switching fuzzy reduced-order observer and proves that the corresponding separation principle
does hold. A numerical simulation and comparison with smooth fuzzy full-order observer are given to assess switching fuzzy
reduced-order observer and the validity of the separation principles.
Supported by the National Laboratory of Space Intelligent Control and Open Foundation (Grant No. SIC07010202), and the National
Natural Science Foundation of China (Grant Nos. 60604010, 90716021, 60736023) 相似文献
942.
Fotis N. Koumboulis Nikolaos D. Kouvakas Paraskevas N. Paraskevopoulos 《中国科学F辑(英文版)》2009,52(7):1084-1094
In the present paper the problem of disturbance rejection of single input-single output neutral time delay systems with multiple
measurable disturbances is solved via dynamic controllers. In particular, the general form of the controller matrices is presented,
while the necessary and sufficient conditions for the controller to be realizable are offered. The proposed technique is applied
to a test case neutral time delay central heating system. In particular, the nonlinear model of the plant and its linearized
approximation are presented. Based on the linearized model, a two-stage controller is designed in order to regulate the room
temperature and the boiler effluent temperature. The performance of the closed loop system is investigated through computational
experiments. 相似文献
943.
How to compose existing web services automatically and to guarantee the correctness of the design(e.g. freeness of deadlock and unspecified reception,and temporal constraints) is an important and challenging problem in web services. Most existing approaches require a detailed specification of the desired behaviors of a composite service beforehand and then perform certain formal verification to guarantee the correctness of the design,which makes the composition process both complex and time-consuming. In th... 相似文献
944.
LiQiang Zhang ZhiFeng Guo ZhiZhong Kang LiXin Zhang XingMing Zhang Ling Yang 《中国科学F辑(英文版)》2009,52(9):1588-1597
Adaptive rendering large and complex spatial data has become an important research issue in a 3DGIS application. In order to transmit the data to the client efficiently,this paper proposes a node-layer data model to manage the 3D scene. Because the large spatial data and limited network bandwidth are the main bottlenecks of web-based 3DGIS,a client/server architecture including progressive transmission methods and multiresolution representations,together with the spatial index,are developed to improve the p... 相似文献
945.
946.
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode 总被引:1,自引:0,他引:1
CHOO Kim-Kwang Raymond 《中国科学F辑(英文版)》2009,52(8):1358-1370
The majority of existing escrowable identity-based key agreement protocols only provide partial forward secrecy. Such protocols are, arguably, not suitable for many real-word applications, as the latter tends to require a stronger sense of forward secrecy—perfect forward secrecy. In this paper, we propose an efficient perfect forward-secure identity-based key agreement protocol in the escrow mode. We prove the security of our protocol in the random oracle model, assuming the intractability of the Gap Biline... 相似文献
947.
KangWoo Lee 《计算机科学技术学报》2008,23(5):874-884
A common assumption in visual attention is based on the rationale of "limited capacity of information processing". From this view point there is little consideration of how different information channels or modules are cooperating because cells in processing stages are forced to compete for the limited resource. To examine the mechanism behind the cooperative behavior of information channels, a computational model of selective attention is implemented based on two hypotheses. Unlike the traditional view of visual attention, the cooperative behavior is assumed to be a dynamic integration process between the bottom-up and top-down information. Furthermore, top-down information is assumed to provide a contextual cue during selection process and to guide the attentional allocation among many bottom-up candidates. The result from a series of simulation with still and video images showed some interesting properties that could not be explained by the competitive aspect of selective attention alone. 相似文献
948.
Yi-Song Wang 《计算机科学技术学报》2009,24(6):1125-1137
Logic programming under the stable model semantics is proposed as a non-monotonic language for knowledge representation and
reasoning in artificial intelligence. In this paper, we explore and extend the notion of compatibility and the Λ operator, which were first proposed by Zhang to characterize default theories. First, we present a new characterization
of stable models of a logic program and show that an extended notion of compatibility can characterize stable submodels. We further propose the notion of weak auto-compatibility which characterizes the Normal Forward Chaining Construction proposed by Marek, Nerode and Remmel. Previously, this construction was only known to construct the stable models of FC-normal
logic programs, which turn out to be a proper subclass of weakly auto-compatible logic programs. We investigate the properties
and complexity issues for weakly auto-compatible logic programs and compare them with some subclasses of logic programs. 相似文献
949.
950.
Graph drawing and visualization represent structural information as diagrams of abstract graphs and networks. An important subset of graphs is directed acyclic graphs (DAGs). This paper presents a new E-Spring algorithm, extended from the popular spring embedder model, which eliminates node overlaps in clustered DAGs. In this framework, nodes are modeled as non-uniform charged particles with weights, and a final drawing is derived by adjusting the positions of the nodes according to a combination of spring forces and repulsive forces derived from electrostatic forces between the nodes. The drawing process needs to reach a stable state when the average distances of separation between nodes are near optimal. We introduce a stopping condition for such a stable state, which reduces equilibrium distances between nodes and therefore results in a significantly reduced area for DAG visualization. It imposes an upper bound on the repulsive forces between nodes based on graph geometry. The algorithm employs node interleaving to eliminate any residual node overlaps. These new techniques have been validated by visualizing eBay buyer–seller relationships and has resulted in overall area reductions in the range of 45–79%. 相似文献