全文获取类型
收费全文 | 6869篇 |
免费 | 626篇 |
国内免费 | 282篇 |
专业分类
电工技术 | 518篇 |
综合类 | 423篇 |
化学工业 | 1151篇 |
金属工艺 | 354篇 |
机械仪表 | 359篇 |
建筑科学 | 562篇 |
矿业工程 | 309篇 |
能源动力 | 161篇 |
轻工业 | 437篇 |
水利工程 | 178篇 |
石油天然气 | 374篇 |
武器工业 | 32篇 |
无线电 | 829篇 |
一般工业技术 | 883篇 |
冶金工业 | 378篇 |
原子能技术 | 97篇 |
自动化技术 | 732篇 |
出版年
2024年 | 36篇 |
2023年 | 121篇 |
2022年 | 236篇 |
2021年 | 307篇 |
2020年 | 223篇 |
2019年 | 186篇 |
2018年 | 216篇 |
2017年 | 194篇 |
2016年 | 201篇 |
2015年 | 306篇 |
2014年 | 396篇 |
2013年 | 420篇 |
2012年 | 437篇 |
2011年 | 474篇 |
2010年 | 387篇 |
2009年 | 364篇 |
2008年 | 366篇 |
2007年 | 374篇 |
2006年 | 345篇 |
2005年 | 325篇 |
2004年 | 203篇 |
2003年 | 176篇 |
2002年 | 184篇 |
2001年 | 148篇 |
2000年 | 168篇 |
1999年 | 173篇 |
1998年 | 129篇 |
1997年 | 127篇 |
1996年 | 106篇 |
1995年 | 94篇 |
1994年 | 74篇 |
1993年 | 52篇 |
1992年 | 57篇 |
1991年 | 39篇 |
1990年 | 30篇 |
1989年 | 27篇 |
1988年 | 20篇 |
1987年 | 8篇 |
1986年 | 11篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1980年 | 2篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1971年 | 1篇 |
1967年 | 1篇 |
1966年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有7777条查询结果,搜索用时 0 毫秒
91.
干晓鸣 《计算机应用与软件》2010,27(8)
主要从软件自动化测试在工作中的实际经验出发,探讨如何合理应用"软件自动化测试"这一测试手段.同时也简单介绍了软件自动化测试的定义、目的等概念,以及常见的一些自动化测试工具软件.另外从对软件自动化测试的一些认识误区的分析中,让大家意识到软件自动化测试的合理应用是软件开发过程中降本增效的关键. 相似文献
92.
An Efficient Path Planning and Control Algorithm for RUAV’s in Unknown and Cluttered Environments 总被引:1,自引:0,他引:1
Kwangjin Yang Seng Keat Gan Salah Sukkarieh 《Journal of Intelligent and Robotic Systems》2010,57(1-4):101-122
This paper presents an efficient planning and execution algorithm for the navigation of an autonomous rotary wing UAV (RUAV) manoeuvering in an unknown and cluttered environment. A Rapidly-exploring Random Tree (RRT) variant is used for the generation of a collision free path and linear Model Predictive Control(MPC) is applied to follow this path. The guidance errors are mapped to the states of the linear MPC structure by using the nonlinear kinematic equations. The proposed path planning algorithm considers the run time of the planning stage explicitly and generates a continuous curvature path whenever replanning occurs. Simulation results show that the RUAV with the proposed methodology successfully achieves autonomous navigation regardless of its lack of prior information about the environment. 相似文献
93.
目的:了解医学生的上网情况。方法:采用"医学生上网调查问卷",在七个不同专业500名学生中进行问卷调查。结果:有95.16%学生上网,上网学生中30.25%每次上网3h以上;上网目的以聊天、多媒体娱乐和玩游戏为主。结论:青年群体是网上的主力军,应警惕大学生网上迷路,鼓励上网学生要以理智态度控制上网时间,老师和学校应给予学生上网以恰当的引导和教育。 相似文献
94.
Jiang Wang Chunlei Liu Christian LeinenbachUlrich E. Klotz Peter J. UggowitzerJörg F. Löffler 《Calphad》2011,35(1):82-94
The Cu-Sn-Ti ternary system has been studied via experiments and thermodynamic modelling. In the experimental section, the composition of the alloys was selected based on the preliminary calculations and available literature data. Metallography, scanning electron microscopy and electron probe microanalysis were employed to analyse alloy samples prepared by arc-melting after annealing at 800 °C for 760 h. Solid phase relations at 800 °C were established. In contrast to earlier reports, the CuSn3Ti5 phase was interpreted as a binary intermetallic compound (Sn3Ti5) with extended Cu solubility. In the modelling section, three binary sub-systems were critically evaluated and updated according to the new experimental data and theoretical calculations reported in literature. According to their crystal structures and homogeneity ranges, appropriate sublattice models were proposed for SnTi3,SnTi2,Sn3Ti5 and Sn5Ti6. A set of self-consistent thermodynamic parameters for the Cu-Sn-Ti ternary system was obtained by considering the present experimental results and reported experimental information. The calculated results compare with the available experimental data to validate the present thermodynamic assessment. 相似文献
95.
We present a type of single-hidden layer feed-forward wavelet neural networks. First, we give a new and quantitative proof
of the fact that a single-hidden layer wavelet neural network with n + 1 hidden neurons can interpolate n + 1 distinct samples with zero error. Then, without training, we constructed a wavelet neural network X
a
(x, A), which can approximately interpolate, with arbitrary precision, any set of distinct data in one or several dimensions. The
given wavelet neural network can uniformly approximate any continuous function of one variable. 相似文献
96.
97.
This paper identifies a property of delay-robustness in distributed supervisory control of discrete-event systems (DES) with communication delays. In previous work a distributed supervisory control problem has been investigated on the assumption that inter-agent communications take place with negligible delay. From an applications viewpoint it is desirable to relax this constraint and identify communicating distributed controllers which are delay-robust, namely logically equivalent to their delay-free counterparts. For this we introduce inter-agent channels modeled as 2-state automata, compute the overall system behavior, and present an effective computational test for delay-robustness. From the test it typically results that the given delay-free distributed control is delay-robust with respect to certain communicated events, but not for all, thus distinguishing events which are not delay-critical from those that are. The approach is illustrated by a workcell model with three communicating agents. 相似文献
98.
Junliu Zhong Yanfen Gan Janson Young Lian Huang Peiyu Lin 《Multimedia Tools and Applications》2017,76(13):14887-14903
Copy move forgery detection (CMFD) is one of the most active subtopic in forgery scheme. The methods of CMFD are divided into to block-based method and keypoint-based method in general. Compared with keypoint-based method, block-based method can detect undetectable detail without morphology segmentation. But many block-based methods detect the plain copy-move forgeries only. They have been incompetent to detect the post-processing operations such as various geometrical distortions, and then fail to detect the forgery regions accurately. Therefore, this paper presents an improved block-based efficient method for CMFD. Firstly, after pre-processing, an auxiliary overlapped circular block is presented to divide the forged image into overlapped circular blocks. The local and inner image feature is extracted by the Discrete Radial Harmonic Fourier Moments (DRHFMs) with the overlapped circular block from the suspicious image. Then, the similar feature vectors of blocks are searched by 2 Nearest Neighbors (2NN) test. Euclidean distance and correlation coefficient is employed to filter these features and then remove the false matches. Morphologic operation is employed to delete the isolated pixels. A series of experiments are done to analyze the performance for CMFD. Experimental results show that the new DRHFMs can obtain outstanding performance even under image geometrical distortions. 相似文献
99.
目前云计算数据中心规模大,网络设备多,手动配置设备地址不但耗时耗力,而且容易出错。已有自动配置工作未能充分利用数据中心网络拓扑结构特征,导致从规划设计到实际设备配置的映射过程回溯步骤多,效率低。为此,提出了一种基于支点的数据中心网络地址快速自动配置方法PFAC(Pivot-based Fast Automatic Configuration)。PFAC通过预处理分析数据中心网络拓扑层次关系,依据拓扑特征优选支点完成快速匹配,并基于支点缩小配置映射节点的候选集,有效提高了配置效率。基于FatTree结构的模拟实验表明,PFAC能够根据数据中心网络规划蓝图,自动快速地为物理设备分配地址。与经典数据中心网络地址配置方法相比,PFAC算法平均耗时缩短了35%。 相似文献
100.
以我国社会转型为背景,探讨转型期中西部新闻传播教师队伍建设方面的缺失,并提出中西部新闻传播教师培养的有效方法,进而达到优化中西部新闻传播教师队伍、提高中西部新闻传播学整体教学质量、增强学科影响力的目的。 相似文献