全文获取类型
收费全文 | 283155篇 |
免费 | 22576篇 |
国内免费 | 12167篇 |
专业分类
电工技术 | 16077篇 |
技术理论 | 25篇 |
综合类 | 19756篇 |
化学工业 | 47321篇 |
金属工艺 | 15976篇 |
机械仪表 | 17571篇 |
建筑科学 | 21836篇 |
矿业工程 | 8894篇 |
能源动力 | 7638篇 |
轻工业 | 20625篇 |
水利工程 | 4803篇 |
石油天然气 | 18485篇 |
武器工业 | 2201篇 |
无线电 | 30929篇 |
一般工业技术 | 32455篇 |
冶金工业 | 14775篇 |
原子能技术 | 2774篇 |
自动化技术 | 35757篇 |
出版年
2024年 | 1266篇 |
2023年 | 4635篇 |
2022年 | 8275篇 |
2021年 | 11326篇 |
2020年 | 8844篇 |
2019年 | 7401篇 |
2018年 | 8150篇 |
2017年 | 9174篇 |
2016年 | 8303篇 |
2015年 | 11063篇 |
2014年 | 14273篇 |
2013年 | 16697篇 |
2012年 | 18157篇 |
2011年 | 19847篇 |
2010年 | 17545篇 |
2009年 | 16610篇 |
2008年 | 16358篇 |
2007年 | 15555篇 |
2006年 | 15786篇 |
2005年 | 13519篇 |
2004年 | 9242篇 |
2003年 | 7818篇 |
2002年 | 7101篇 |
2001年 | 6272篇 |
2000年 | 6475篇 |
1999年 | 7149篇 |
1998年 | 5892篇 |
1997年 | 4780篇 |
1996年 | 4517篇 |
1995年 | 3765篇 |
1994年 | 2995篇 |
1993年 | 2097篇 |
1992年 | 1634篇 |
1991年 | 1306篇 |
1990年 | 992篇 |
1989年 | 797篇 |
1988年 | 591篇 |
1987年 | 366篇 |
1986年 | 300篇 |
1985年 | 213篇 |
1984年 | 150篇 |
1983年 | 123篇 |
1982年 | 131篇 |
1981年 | 100篇 |
1980年 | 87篇 |
1979年 | 45篇 |
1978年 | 27篇 |
1977年 | 20篇 |
1976年 | 39篇 |
1973年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Register allocation for write activity minimization on non-volatile main memory for embedded systems
Yazhi Huang Author VitaeTiantian Liu Author Vitae Chun Jason XueAuthor Vitae 《Journal of Systems Architecture》2012,58(1):13-23
Non-volatile memories are good candidates for DRAM replacement as main memory in embedded systems and they have many desirable characteristics. Nevertheless, the disadvantages of non-volatile memory co-exist with its advantages. First, the lifetime of some of the non-volatile memories is limited by the number of erase operations. Second, read and write operations have asymmetric speed or power consumption in non-volatile memory. This paper focuses on the embedded systems using non-volatile memory as main memory. We propose register allocation technique with re-computation to reduce the number of store instructions. When non-volatile memory is applied as the main memory, reducing store instructions will reduce write activities on non-volatile memory. To re-compute the spills effectively during register allocation, a novel potential spill selection strategy is proposed. During this process, live range splitting is utilized to split certain long live ranges such that they are more likely to be assigned into registers. In addition, techniques for re-computation overhead reduction is proposed on systems with multiple functional units. With the proposed approach, the lifetime of non-volatile memory is extended accordingly. The experimental results demonstrate that the proposed technique can efficiently reduce the number of store instructions on systems with non-volatile memory by 33% on average. 相似文献
992.
Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things 总被引:2,自引:2,他引:0
The effective strategy of Internet of Things (IoT) can help firms to grasp the emerging opportunities from the IoT and then improve their competitive advantage. In this article, based on organizational capability perspective, we provide a theoretical framework which classifies IoT strategies into four archetypes from two dimensions of managers’ strategic intent and industrial driving force, and propose that market-based exploratory capabilities play a more important role for firms adopting get-ahead strategy, and market-based exploitative capabilities play a more important role for firms adopting catch-up strategy in market. The technology-based exploratory capabilities play a more important role for firms adopting get-ahead strategy in technology, and technology-based exploitative capabilities play a more important role for firms adopting catch-up strategy in technology. Especially, external industry information sharing more efficiently contributes to the enhancement of both market-based and technology-based exploratory capabilities, and internal industry information sharing more efficiently contributes to the enhancement of both market-based and technology-based exploitative capabilities. 相似文献
993.
Given a directed graph, the problem of blackhole mining is to identify groups of nodes, called blackhole patterns, in a way such that the average in-weight of this group is significantly larger than the average out-weight of the same group. The problem of finding volcano patterns is a dual problem of mining blackhole patterns. Therefore, we focus on discovering the blackhole patterns. Indeed, in this article, we develop a generalized blackhole mining framework. Specifically, we first design two pruning schemes for reducing the computational cost by reducing both the number of candidate patterns and the average computation cost for each candidate pattern. The first pruning scheme is to exploit the concept of combination dominance to reduce the exponential growth search space. Based on this pruning approach, we develop the gBlackhole algorithm. Instead, the second pruning scheme is an approximate approach, named approxBlackhole, which can strike a balance between the efficiency and the completeness of blackhole mining. Finally, experimental results on real-world data show that the performance of approxBlackhole can be several orders of magnitude faster than gBlackhole, and both of them have huge computational advantages over the brute-force approach. Also, we show that the blackhole mining algorithm can be used to capture some suspicious financial fraud patterns. 相似文献
994.
Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services. In terms of efficiency, our scheme does not involve any database lookup or public key cryptography. In terms of deployability, our scheme can be easily deployed on existing web services, and it does not require any change to the Internet cookie specification. We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side.A notable adoption of our scheme in industry is that our cookie scheme has been used by Wordpress since version 2.4. Wordpress is a widely used open source content management system. 相似文献
995.
Fuzzy local maximal marginal embedding for feature extraction 总被引:1,自引:0,他引:1
Cairong Zhao Zhihui Lai Chuancai Liu Xingjian Gu Jianjun Qian 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(1):77-87
In graph-based linear dimensionality reduction algorithms, it is crucial to construct a neighbor graph that can correctly
reflect the relationship between samples. This paper presents an improved algorithm called fuzzy local maximal marginal embedding
(FLMME) for linear dimensionality reduction. Significantly differing from the existing graph-based algorithms is that two
novel fuzzy gradual graphs are constructed in FLMME, which help to pull the near neighbor samples in same class nearer and
nearer and repel the far neighbor samples of margin between different classes farther and farther when they are projected
to feature subspace. Through the fuzzy gradual graphs, FLMME algorithm has lower sensitivities to the sample variations caused
by varying illumination, expression, viewing conditions and shapes. The proposed FLMME algorithm is evaluated through experiments
by using the WINE database, the Yale and ORL face image databases and the USPS handwriting digital databases. The results
show that the FLMME outperforms PCA, LDA, LPP and local maximal marginal embedding. 相似文献
996.
Huixia Liu Keyi Xing Feng Wang Libin Han Xiaojing Sun 《Asian journal of control》2012,14(4):1141-1149
A set of elementary siphons plays a key role in the development of deadlock prevention policies for automated manufacturing systems. This paper addresses the computation problem for elementary siphons in a subclass of Petri nets which are basic systems of simple sequential processes with resources (BS3PR) and can model many automated manufacturing systems. An algorithm for enumerating elementary siphons is established by the one‐to‐one relationship between maximal perfect resource‐transition circuits (MPCs) and strict minimal siphons. A set of MPCs is first computed, followed by a set of elementary siphons in a BS3PR. The presented algorithm is proved to have polynomial‐time complexity. An example is used to illustrate the algorithm. 相似文献
997.
This paper is concerned with the neutral‐delay‐dependent and discrete‐delay‐dependent stability for uncertain neutral systems with mixed delays and norm‐bounded uncertainties. Through constructing a new augmented Lyapunov‐Krasovskii functional and proving its positive definiteness, introducing some slack matrices and using integral inequality, the improved delay‐dependent stability criteria are derived in terms of linear matrix inequalities. Numerical examples are given to illustrate the significant improvement on the conservatism of the delay bound over some existing results. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
998.
In this paper, a feedback model predictive control method is presented to tackle control problems with constrained multivariables for uncertain discrete‐time nonlinear Markovian jump systems. An uncertain Markovian jump fuzzy system (MJFS) is obtained by employing the Takagi‐Sugeno (T‐S) fuzzy model to represent a discrete‐time nonlinear system with norm bounded uncertainties and Markovain jump parameters. To achieve more generality, the transition probabilities of the Markov chain are assumed to be partly unknown and partly accessible. The predictive formulation adopts an on‐line optimization paradigm that utilizes the closed‐loop state feedback controller and is solved using the standard semi‐definite programming (SDP). To reduce the on‐line computational burden, a mode independent control move is calculated at every sampling time based on a stochastic fuzzy Lyapunov function (FLF) and a parallel distributed compensation (PDC) scheme. The robust mean square stability, performance minimization and constraint satisfaction properties are guaranteed under the control move for all admissible uncertainties. A numerical example is given to show the efficiency of the developed approach. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
999.
Qishi Wu Mengxia Zhu Yi Gu Patrick Brown Xukang Lu Wuyin Lin Yangang Liu 《Journal of Grid Computing》2012,10(3):367-393
Next-generation scientific applications feature complex workflows comprised of many computing modules with intricate inter-module dependencies. Supporting such scientific workflows in wide-area networks especially Grids and optimizing their performance are crucial to the success of collaborative scientific discovery. We develop a Scientific Workflow Automation and Management Platform (SWAMP), which enables scientists to conveniently assemble, execute, monitor, control, and steer computing workflows in distributed environments via a unified web-based user interface. The SWAMP architecture is built entirely on a seamless composition of web services: the functionalities of its own are provided and its interactions with other tools or systems are enabled through web services for easy access over standard Internet protocols while being independent of different platforms and programming languages. SWAMP also incorporates a class of efficient workflow mapping schemes to achieve optimal end-to-end performance based on rigorous performance modeling and algorithm design. The performance superiority of SWAMP over existing workflow mapping schemes is justified by extensive simulations, and the system efficacy is illustrated by large-scale experiments on real-life scientific workflows for climate modeling through effective system implementation, deployment, and testing on the Open Science Grid. 相似文献
1000.
The research of adaptive sliding mode controller for motor servo system using fuzzy upper bound on disturbances 总被引:1,自引:0,他引:1
Xiaodong Liu Yunjie Wu Baiting Liu 《International Journal of Control, Automation and Systems》2012,10(5):1064-1069
Considering sliding mode control (SMC) method using the estimation of upper bound on disturbances in motor servo system, if the upper bound is underestimated, the position tracking precision is poor. Contrarily, the control input is overlarge and even chatters violently. To solve the above problems, an adaptive sliding mode controller (ASMC) is proposed. It utilizes a fuzzy decision maker (FDM), which exports the estimation of upper bound on disturbances according to the information of position tracking error and control input. The computer simulations on a dc motor present that the proposed method guarantees satisfactory position tracking accuracy and the chattering at control input is evidently suppressed. Moreover, the output of FDM is sensitive to the changes of disturbances realtimely and precisely. Subsequently, the proposed scheme possesses strong robust performance against disturbances in motor servo system. 相似文献