首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   300530篇
  免费   7099篇
  国内免费   2773篇
电工技术   6686篇
技术理论   5篇
综合类   2783篇
化学工业   50040篇
金属工艺   12300篇
机械仪表   9065篇
建筑科学   8474篇
矿业工程   2118篇
能源动力   6599篇
轻工业   32358篇
水利工程   3559篇
石油天然气   6780篇
武器工业   381篇
无线电   30635篇
一般工业技术   54174篇
冶金工业   51314篇
原子能技术   5885篇
自动化技术   27246篇
  2022年   2629篇
  2021年   3996篇
  2020年   2898篇
  2019年   3242篇
  2018年   4732篇
  2017年   4765篇
  2016年   5054篇
  2015年   4370篇
  2014年   6663篇
  2013年   14396篇
  2012年   10642篇
  2011年   13315篇
  2010年   10753篇
  2009年   11149篇
  2008年   11821篇
  2007年   11720篇
  2006年   10106篇
  2005年   8644篇
  2004年   7627篇
  2003年   6943篇
  2002年   6841篇
  2001年   6759篇
  2000年   6283篇
  1999年   6276篇
  1998年   14071篇
  1997年   10354篇
  1996年   7811篇
  1995年   5853篇
  1994年   5328篇
  1993年   5228篇
  1992年   4062篇
  1991年   3871篇
  1990年   3914篇
  1989年   3859篇
  1988年   3612篇
  1987年   3105篇
  1986年   3129篇
  1985年   3497篇
  1984年   3369篇
  1983年   3111篇
  1982年   2756篇
  1981年   2972篇
  1980年   2703篇
  1979年   2867篇
  1978年   2768篇
  1977年   2936篇
  1976年   3853篇
  1975年   2471篇
  1974年   2309篇
  1973年   2333篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
A preliminary report presenting the results of fibular strut grafting in the severely resorbed mandibular and maxillary region is presented. Thirteen patients were treated due to severe resorption of alveolar and basilar bone of 49 segments of the mandible and the maxilla. Two patients additionally had pathological fractures of the mandible. In 10 cases the strut graft was harvested by means of a new minimally invasive technique. After modelling the fibular bone it was fixed to the recipient site by miniscrews or implants. After a mean follow-up period of 20 months (max. 31, min. 11 months) a retrospective analysis of clinical and radiological findings was carried out. It showed that a mean augmentation of 16 mm was achieved. Compared to other studies the fibular strut graft was resorbed less, and due to the primary stability it could be used for the treatment of fractures of the mandible. No more than natural resorption was observed when the patients received their prostheses fixed to dental implants.  相似文献   
122.
The biased percolation model is proposed for investigating device degradation and failure associated with the generation of defects due to local Joule heating. The degradation processes of a thin conducting or semiconducting film is monitored by a set of relevant indicators, such as: the evolution of damage pattern, the current distribution, the film resistance and its fluctuations, the defect concentration, the film lifetime, etc. The conductor-insulator (CI) and conductor-superconductor (CS) like degradation processes are considered. The results can be used to propose non-destructive indicators to test the reliability of samples and to interpret the corresponding experiments.  相似文献   
123.
Uses a Markov process to model a real-time expert system architecture characterized by message passing and event-driven scheduling. The model is applied to the performance evaluation of rule grouping for real-time expert systems running on this architecture. An optimizing algorithm based on Kernighan-Lin heuristic graph partitioning for the real-time architecture is developed and a demonstration system based on the model and algorithm has been developed and tested on a portion of the advanced GPS receiver (AGR) and manned manoeuvring unit (MMU) knowledge bases  相似文献   
124.
Efficient algorithms for processing large volumes of data are very important both for relational and new object-oriented database systems. Many query-processing operations can be implemented using sort- or hash-based algorithms, e.g. intersections, joins, and duplicate elimination. In the early relational database systems, only sort-based algorithms were employed. In the last decade, hash-based algorithms have gained acceptance and popularity, and are often considered generally superior to sort-based algorithms such as merge-join. In this article, we compare the concepts behind sort- and hash-based query-processing algorithms and conclude that (1) many dualities exist between the two types of algorithms, (2) their costs differ mostly by percentages rather than by factors, (3) several special cases exist that favor one or the other choice, and (4) there is a strong reason why both hash- and sort-based algorithms should be available in a query-processing system. Our conclusions are supported by experiments performed using the Volcano query execution engine  相似文献   
125.
Presents protocols for determining processor membership in asynchronous distributed systems that are subject to processor and communication faults. These protocols depend on the placement of a total order on broadcast messages. The types of systems for which each of these protocols is applicable are characterized by the properties of the communication mechanisms and by the availability of stable storage. In the absence of stable storage or of a mechanism for distinguishing promptly delivered messages, the authors show that no membership protocol can exist. They also discuss their experience in implementing these membership protocols  相似文献   
126.
We present an unified parallel architecture for four of the most important fast orthogonal transforms with trigonometric kernel: Complex Valued Fourier (CFFT), Real Valued Fourier (RFFT), Hartley (FHT), and Cosine (FCT). Out of these, only the CFFT has a data flow coinciding with the one generated by the successive doubling method, which can be transformed on a constant geometry flow using perfect unshuffle or shuffle permutations. The other three require some type of hardware modification to guarantee the constant geometry of the successive doubling method. We have defined a generalized processing section (PS), based on a circular CORDIC rotator, for the four transforms. This PS section permits the evaluation of the CFFT and FCT transforms in n data recirculations and the RFFT and FHT transforms in n-1 data recirculations, with n being the number of stages of a transform of length N=rn. Also, the efficiency of the partitioned parallel architecture is optimum because there is no cycle loss in the systolic computation of all the butterflies for each of the four transforms  相似文献   
127.
Multicast communication, in which the same message is delivered from a source node to an arbitrary number of destination nodes, is being increasingly demanded in parallel computing. System supported multicast services can potentially offer improved performance, increased functionality, and simplified programming, and may in turn be used to support various higher-level operations for data movement and global process control. This paper presents efficient algorithms to implement multicast communication in wormhole-routed direct networks, in the absence of hardware multicast support, by exploiting the properties of the switching technology. Minimum-time multicast algorithms are presented for n-dimensional meshes and hypercubes that use deterministic, dimension-ordered routing of unicast messages. Both algorithms can deliver a multicast message to m-1 destinations in [log 2 m] message passing steps, while avoiding contention among the constituent unicast messages. Performance results of implementations on a 64-node nCUBE-2 hypercube and a 168-node Symult 2010 2-D mesh are given  相似文献   
128.
in the above paper Yu (IEEE Trans. Neural Networks, vol.3, no.6, p.1019-21 (1992)) claims to prove that local minima do not exist in the error surface of backpropagation networks being trained on data with t distinct input patterns when the network is capable of exactly representing arbitrary mappings on t input patterns. The commenter points out that the proof presented is flawed, so that the resulting claims remain unproved. In reply, Yu points out that the undesired phenomenon that was sited can be avoided by simply imposing the arbitrary mapping capacity of the network on lemma 1 in the article.  相似文献   
129.
130.
We describe a binding environment for the AND and OR parallel execution of logic programs that is suitable for both shared and nonshared memory multiprocessors. The binding environment was designed with a view of rendering a compiler using this binding environment machine independent. The binding environment is similar to closed environments proposed by J. Conery. However, unlike Conery's scheme, it supports OR and independent AND parallelism on both types of machines. The term representation, the algorithms for unification and the join algorithms for parallel AND branches are presented in this paper. We also detail the differences between our scheme and Conery's scheme. A compiler based on this binding environment has been implemented on a platform for machine independent parallel programming called the Chare Kernel  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号