首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   335469篇
  免费   3883篇
  国内免费   1632篇
电工技术   6044篇
综合类   389篇
化学工业   48811篇
金属工艺   14500篇
机械仪表   10379篇
建筑科学   7349篇
矿业工程   1541篇
能源动力   7933篇
轻工业   30073篇
水利工程   3115篇
石油天然气   5717篇
武器工业   47篇
无线电   39435篇
一般工业技术   64764篇
冶金工业   68725篇
原子能技术   7181篇
自动化技术   24981篇
  2021年   2722篇
  2019年   2623篇
  2018年   4510篇
  2017年   4412篇
  2016年   4772篇
  2015年   3100篇
  2014年   5278篇
  2013年   14540篇
  2012年   8485篇
  2011年   11807篇
  2010年   9369篇
  2009年   10657篇
  2008年   11144篇
  2007年   11446篇
  2006年   10282篇
  2005年   9112篇
  2004年   8748篇
  2003年   8340篇
  2002年   8090篇
  2001年   8267篇
  2000年   7857篇
  1999年   8091篇
  1998年   21238篇
  1997年   14548篇
  1996年   11261篇
  1995年   8216篇
  1994年   7278篇
  1993年   7138篇
  1992年   5140篇
  1991年   4847篇
  1990年   4980篇
  1989年   4675篇
  1988年   4386篇
  1987年   3674篇
  1986年   3759篇
  1985年   4215篇
  1984年   3955篇
  1983年   3542篇
  1982年   3357篇
  1981年   3450篇
  1980年   3235篇
  1979年   3065篇
  1978年   3062篇
  1977年   3433篇
  1976年   4714篇
  1975年   2636篇
  1974年   2495篇
  1973年   2618篇
  1972年   2151篇
  1971年   1982篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
DNA double-strand breaks are very genotoxic lesions that can result in chromosome aberrations. The current view is that DNA double-strand breaks are repaired most efficiently through homologous recombination in yeast and simple end-joining in mammalian cells. However, recent experiments reveal that both repair pathways are conserved from yeast to mammals, including humans. The challenge ahead is to put the different pieces of the jigsaw together into coherent mechanisms for both pathways and to determine their relative contributions to ionizing-radiation resistance and to the prevention of genetic instability and carcinogenesis.  相似文献   
92.
93.
Photonic networks based on the optical path concept and wavelength division multiplexing (WDM) technology require unique operation, administration, and maintenance (OAM) functions. In order to realize the required OAM functions, the optical path network must support an effective management information transfer method. The method that superimposes a pilot tone on the optical signal appears very interesting for optical path overhead transfer. The pilot tone transmission capacity is determined by the carrier to noise ratio which depends on the power spectral density of the optical signal. The pilot tone transmission capacity of an optical path network employing WDM technology is elucidated; 4.5 kb/s transmission can be realized when the pilot tone modulation index is set at 3%  相似文献   
94.
The capacitive idling converters derived from the Cuk, SEPIC, Zeta, and flyback topologies allow soft commutation of power switches without the need for additional circuitry, making it possible to increase the switching frequency while maintaining high efficiency  相似文献   
95.
96.
A general language for specifying resource allocation and time-tabling problems is presented. The language is based on an expert system paradigm that was developed previously by the authors and that enables the solution of resource allocation problems by using experts' knowledge and heuristics. The language enables the specification of a problem in terms of resources, activities, allocation rules, and constraints, and thus provides a convenient knowledge acquisition tool. The language syntax is powerful and allows the specification of rules and constraints that are very difficult to formulate with traditional approaches, and it also supports the specification of various control and backtracking strategies. We constructed a generalized inference engine that runs compiled resource allocation problem specification language (RAPS) programs and provides all necessary control structures. This engine acts as an expert system shell and is called expert system for resource allocation (ESRA). The performance of RAPS combined with ESRA is demonstrated by analyzing its solution of a typical resource allocation problem  相似文献   
97.
Presents protocols for determining processor membership in asynchronous distributed systems that are subject to processor and communication faults. These protocols depend on the placement of a total order on broadcast messages. The types of systems for which each of these protocols is applicable are characterized by the properties of the communication mechanisms and by the availability of stable storage. In the absence of stable storage or of a mechanism for distinguishing promptly delivered messages, the authors show that no membership protocol can exist. They also discuss their experience in implementing these membership protocols  相似文献   
98.
We present an unified parallel architecture for four of the most important fast orthogonal transforms with trigonometric kernel: Complex Valued Fourier (CFFT), Real Valued Fourier (RFFT), Hartley (FHT), and Cosine (FCT). Out of these, only the CFFT has a data flow coinciding with the one generated by the successive doubling method, which can be transformed on a constant geometry flow using perfect unshuffle or shuffle permutations. The other three require some type of hardware modification to guarantee the constant geometry of the successive doubling method. We have defined a generalized processing section (PS), based on a circular CORDIC rotator, for the four transforms. This PS section permits the evaluation of the CFFT and FCT transforms in n data recirculations and the RFFT and FHT transforms in n-1 data recirculations, with n being the number of stages of a transform of length N=rn. Also, the efficiency of the partitioned parallel architecture is optimum because there is no cycle loss in the systolic computation of all the butterflies for each of the four transforms  相似文献   
99.
Different hierarchical models in pattern analysis and recognition are proposed, based on occurrence probability of patterns. As an important application of recognizing handprinted characters, three typical kinds of hierarchical models such asM 89-89,M 89-36 andM 36-36 have been presented, accompanied by the computer algorithms for computing recognition rates of pattern parts. Moreover, a comparative study of their recognition rates has been conducted theoretically; and numerical experiments have been carried out to verify the analytical conclusions made. Various hierarchical models deliberated in this paper can provide users more or better choices of pattern models in practical application, and lead to a uniform computational scheme (or code). The recognition rates of parts can be improved remarkably by a suitable hierarchical model. For the modelM 89-36 in which case some of the Canadian standard handprinted characters have multiple occurrence probabilities, the total mean recognition rates of the given sample may reach 120% of that by the model proposed by Li et al., and 156% of that obtained from the subjective experiments reported by Suen.  相似文献   
100.
The integration of object-oriented programming concepts with databases is one of the most significant advances in the evolution of database systems. Many aspects of such a combination have been studied, but there are few models to provide security for this richly structured information. We develop an authorization model for object-oriented databases. This model consists of a set of policies, a structure for authorization rules, and algorithms to evaluate access requests against the authorization rules. User access policies are based on the concept of inherited authorization applied along the class structure hierarchy. We propose also a set of administrative policies that allow the control of user access and its decentralization. Finally, we study the effect of class structuring changes on authorization  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号