首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   217186篇
  免费   3093篇
  国内免费   746篇
电工技术   3767篇
综合类   177篇
化学工业   32844篇
金属工艺   8578篇
机械仪表   6651篇
建筑科学   5162篇
矿业工程   1347篇
能源动力   6401篇
轻工业   18197篇
水利工程   2438篇
石油天然气   4121篇
武器工业   9篇
无线电   25250篇
一般工业技术   43886篇
冶金工业   38526篇
原子能技术   5240篇
自动化技术   18431篇
  2022年   1878篇
  2021年   2702篇
  2020年   2041篇
  2019年   2470篇
  2018年   3728篇
  2017年   3548篇
  2016年   3638篇
  2015年   2369篇
  2014年   3859篇
  2013年   10328篇
  2012年   5863篇
  2011年   8000篇
  2010年   6360篇
  2009年   7089篇
  2008年   7078篇
  2007年   7028篇
  2006年   5994篇
  2005年   5544篇
  2004年   5241篇
  2003年   5091篇
  2002年   4689篇
  2001年   4810篇
  2000年   4732篇
  1999年   4871篇
  1998年   11632篇
  1997年   8333篇
  1996年   6604篇
  1995年   4821篇
  1994年   4407篇
  1993年   4209篇
  1992年   3306篇
  1991年   3195篇
  1990年   2955篇
  1989年   3030篇
  1988年   2893篇
  1987年   2481篇
  1986年   2375篇
  1985年   2791篇
  1984年   2567篇
  1983年   2407篇
  1982年   2143篇
  1981年   2263篇
  1980年   2073篇
  1979年   2154篇
  1978年   2142篇
  1977年   2391篇
  1976年   3217篇
  1975年   1843篇
  1974年   1768篇
  1973年   1781篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
This paper examines the relationship between self-efficacy and social power (expert and referent) and how the application of this relationship, leads to client adherence and compliance. Referent power is defined, including methods that health care professionals may use to develop and apply referent power. Expert power is defined and addressed in the context of referent power, self-esteem and self-efficacy as a means of promoting adherence. Self-efficacy as a concept is defined and explored in the context of social power. The relationships between self-efficacy and social power (expert and referent) are shown as important determinants of adherence and compliance. The theory of the application of referent and expert power in relationship with self-efficacy has been compared with an effective programme, yielding high compliance, at Western Psychiatric Institute and Clinic, showing the theory's relevance and applicability in determining compliance. Explored are the reasons for non-compliance in the elderly population and how the theory model can remedy these detriments for compliance. The empowerment of elderly patients through the application of this theory to medication compliance is examined. The determination of adherence and compliance is shown by the application of the relationship between self-efficacy and both expert and referent power.  相似文献   
42.
A retrospective study comprising 18 patients with transitional cell renal pelvis tumours (TCPT) was carried out to evaluate the results after two different surgical procedures for nephroureterectomy. The kidney was removed by a flank incision and the lower part of the ureter by either an incision in the lower part of the abdomen or intussusception of the ureter followed by transurethral resection of the ureteral orifice. Eight patients were subjected to nephroureterectomy by means of two incisions and another eight patients underwent a simple nephrectomy followed by ureteral intus-susception and transurethral resection. Two patients received other treatments. After nephroureterectomy with a separate incision for ureterectomy, the average hospital stay was 12 days, compared with 7.5 days in patients operated upon with only one abdominal incision. Recurrence of tumour or survival was not significantly different in the two groups.  相似文献   
43.
UNITY, introduced by Chandy and Misra [ChM88], is a programming logic intended to reason about temporal properties of distributed programs. Despite the fact that UNITY does not have the full power of, for example, linear temporal logic, it enjoys popularity due to its simplicity.There was however a serious problem with the Substitution Rule. The logic is incomplete without the rule, and with the rule it is inconsistent.  相似文献   
44.
Uses a Markov process to model a real-time expert system architecture characterized by message passing and event-driven scheduling. The model is applied to the performance evaluation of rule grouping for real-time expert systems running on this architecture. An optimizing algorithm based on Kernighan-Lin heuristic graph partitioning for the real-time architecture is developed and a demonstration system based on the model and algorithm has been developed and tested on a portion of the advanced GPS receiver (AGR) and manned manoeuvring unit (MMU) knowledge bases  相似文献   
45.
Several variations of cache-based checkpointing for rollback error recovery from transient errors in shared-memory multiprocessors have been recently developed. By modifying the cache replacement policy, these techniques use the inherent redundancy in the memory hierarchy to periodically checkpoint the computation state. Three schemes, different in the manner in which they avoid rollback propagation, are evaluated in this paper. By simulation with address traces from parallel applications running on an Encore Multimax shared-memory multiprocessor, we evaluate the performance effect of integrating the recovery schemes in the cache coherence protocol. Our results indicate that the cache-based schemes can provide checkpointing capability with low performance overhead, but with uncontrollable high variability in the checkpoint interval  相似文献   
46.
We present new methods for load balancing of unstructured tree computations on large-scale SIMD machines, and analyze the scalability of these and other existing schemes. An efficient formulation of tree search on an SIMD machine consists of two major components: a triggering mechanism, which determines when the search space redistribution must occur to balance the search space over processors, and a scheme to redistribute the search space. We have devised a new redistribution mechanism and a new triggering mechanism. Either of these can be used in conjunction with triggering and redistribution mechanisms developed by other researchers. We analyze the scalability of these mechanisms and verify the results experimentally. The analysis and experiments show that our new load-balancing methods are highly scalable on SIMD architectures. Their scalability is shown to he no worse than that of the best load-balancing schemes on MIMD architectures. We verify our theoretical results by implementing the 15-puzzle problem on a CM-2 SIMD parallel computer  相似文献   
47.
Implementing a neural network on a digital or mixed analog and digital chip yields the quantization of the synaptic weights dynamics. This paper addresses this topic in the case of Kohonen's self-organizing maps. We first study qualitatively how the quantization affects the convergence and the properties, and deduce from this analysis the way to choose the parameters of the network (adaptation gain and neighborhood). We show that a spatially decreasing neighborhood function is far more preferable than the usually rectangular neighborhood function, because of the weight quantization. Based on these results, an analog nonlinear network, integrated in a standard CMOS technology, and implementing this spatially decreasing neighborhood function is then presented. It can be used in a mixed analog and digital circuit implementation.  相似文献   
48.
The integration of object-oriented programming concepts with databases is one of the most significant advances in the evolution of database systems. Many aspects of such a combination have been studied, but there are few models to provide security for this richly structured information. We develop an authorization model for object-oriented databases. This model consists of a set of policies, a structure for authorization rules, and algorithms to evaluate access requests against the authorization rules. User access policies are based on the concept of inherited authorization applied along the class structure hierarchy. We propose also a set of administrative policies that allow the control of user access and its decentralization. Finally, we study the effect of class structuring changes on authorization  相似文献   
49.
We describe a binding environment for the AND and OR parallel execution of logic programs that is suitable for both shared and nonshared memory multiprocessors. The binding environment was designed with a view of rendering a compiler using this binding environment machine independent. The binding environment is similar to closed environments proposed by J. Conery. However, unlike Conery's scheme, it supports OR and independent AND parallelism on both types of machines. The term representation, the algorithms for unification and the join algorithms for parallel AND branches are presented in this paper. We also detail the differences between our scheme and Conery's scheme. A compiler based on this binding environment has been implemented on a platform for machine independent parallel programming called the Chare Kernel  相似文献   
50.
This paper describes several loop transformation techniques for extracting parallelism from nested loop structures. Nested loops can then be scheduled to run in parallel so that execution time is minimized. One technique is called selective cycle shrinking, and the other is called true dependence cycle shrinking. It is shown how selective shrinking is related to linear scheduling of nested loops and how true dependence shrinking is related to conflict-free mappings of higher dimensional algorithms into lower dimensional processor arrays. Methods are proposed in this paper to find the selective and true dependence shrinkings with minimum total execution time by applying the techniques of finding optimal linear schedules and optimal and conflict-free mappings proposed by W. Shang and A.B. Fortes  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号