全文获取类型
收费全文 | 32617篇 |
免费 | 2940篇 |
国内免费 | 1696篇 |
专业分类
电工技术 | 1894篇 |
技术理论 | 1篇 |
综合类 | 2381篇 |
化学工业 | 5646篇 |
金属工艺 | 2029篇 |
机械仪表 | 2168篇 |
建筑科学 | 2443篇 |
矿业工程 | 1058篇 |
能源动力 | 851篇 |
轻工业 | 2455篇 |
水利工程 | 647篇 |
石油天然气 | 1804篇 |
武器工业 | 255篇 |
无线电 | 3691篇 |
一般工业技术 | 3714篇 |
冶金工业 | 1311篇 |
原子能技术 | 426篇 |
自动化技术 | 4479篇 |
出版年
2024年 | 147篇 |
2023年 | 537篇 |
2022年 | 1121篇 |
2021年 | 1564篇 |
2020年 | 1204篇 |
2019年 | 993篇 |
2018年 | 1031篇 |
2017年 | 1110篇 |
2016年 | 1077篇 |
2015年 | 1500篇 |
2014年 | 1901篇 |
2013年 | 2163篇 |
2012年 | 2363篇 |
2011年 | 2522篇 |
2010年 | 2157篇 |
2009年 | 2106篇 |
2008年 | 1996篇 |
2007年 | 1782篇 |
2006年 | 1623篇 |
2005年 | 1199篇 |
2004年 | 944篇 |
2003年 | 904篇 |
2002年 | 1076篇 |
2001年 | 909篇 |
2000年 | 649篇 |
1999年 | 645篇 |
1998年 | 422篇 |
1997年 | 331篇 |
1996年 | 316篇 |
1995年 | 262篇 |
1994年 | 196篇 |
1993年 | 145篇 |
1992年 | 79篇 |
1991年 | 61篇 |
1990年 | 52篇 |
1989年 | 48篇 |
1988年 | 37篇 |
1987年 | 20篇 |
1986年 | 12篇 |
1985年 | 11篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 5篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1979年 | 7篇 |
1959年 | 2篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
In this paper, the dynamic behaviors of a class of neural networks with time-varying delays are investigated. Some less weak
sufficient conditions based on p-norm and ∞-norm are obtained to guarantee the existence, uniqueness of the equilibrium point for the addressed neural networks
without impulsive control by applying homeomorphism theory. And then, by utilizing inequality technique, Lyapunov functional
method and the analysis method, some new and useful criteria of the globally exponential stability with respect to the equilibrium
point under impulsive control we assumed are derived based on p-norm and ∞-norm, respectively. Finally, an example with simulation is given to show the effectiveness of the obtained results. 相似文献
32.
The measurement of plant community structure provides an extensive understanding of its function, succession and ecological process. The detection of plant community boundary is rather a challenge despite in situ work. Recent advances in object-based image analysis (OBIA) and machine learning algorithms offer new opportunities to address this challenge. This study presents a multi-scale segmentation approach to accurately identify the boundaries of each vegetation and plant community for mapping plant community structure. Initially, a very high resolution (VHR) Worldview-2 image of a desert area is hierarchically segmented from scale parameter 2 to 500. Afterward, the peak values of the standard deviation of brightness and normalized difference vegetation index (NDVI) across the segmentation scales are detected to determine the optimal segmentation scales of homogeneous single plant and plant community boundaries. A multi-scale classification of vegetation characterization with features of multiple bands, NDVI, grey-level co-occurrence matrix (GLCM) entropy and shape index is performed to identify dryland vegetation types. Finally, the four vegetation structural features on the type, diversity, object size and shape are calculated within the plant community boundaries and composed to plant community structure categories. Comparing the results with the object fitting index (FI) of the reference data, the validation indicates that the optimal segmentations of tree, shrub and plant communities are consistent with the identified peak values. 相似文献
33.
This paper proposes an evolutionary accelerated computational level set algorithm for structure topology optimization. It integrates the merits of evolutionary structure optimization (ESO) and level set method (LSM). Traditional LSM algorithm is largely dependent on the initial guess topology. The proposed method combines the merits of ESO techniques with those of LSM algorithm, while allowing new holes to be automatically generated in low strain energy within the nodal neighboring region during optimization. The validity and robustness of the new algorithm are supported by some widely used benchmark examples in topology optimization. Numerical computations show that optimization convergence is accelerated effectively. 相似文献
34.
35.
Due to the nature of distribution and self-organization, mobile ad hoc networks rely on cooperation between nodes to transfer information. One of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next potential cooperative nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts in social relationships, involving factors such as assumptions, expectations and behaviors. All of the above make it difficult to quantify and forecast trust accurately. In this paper, based on the theories of fuzzy recognition with feedback, SCGM(1, 1) model and Markov chain, we present a pattern of prediction making. The analysis and experimental computation show that this scheme is efficient in trust prediction for ad hoc networks. 相似文献
36.
This paper deals with the theoretical prediction of global buckling loads for carbon fiber composite pyramidal truss core sandwich columns. Different from thin plate structures, transverse shear effect can not be neglected for sandwich structures. In addition, the attributes of the laminated face sheets are considered in the present paper. A zig-zag displacement approximation is made. Based on the principle of minimum potential energy, equilibrium equations and boundary conditions are derived via the variational method. The critical buckling loads under various boundary conditions are presented. In order to validate the reasonableness of the equivalent-core method, the strain energies stored in the actual discrete truss members and the equivalent continuous homogenous core layer are calculated respectively and compared, and a good agreement is obtained. The proposed analytical method is verified by comparing with the published theoretical predictions and experimental results. 相似文献
37.
38.
投资项目财务效果评价指标,按决策目的可分为绝对效果评价指标和相对效果评价指标两大类;按是否考虑资金时间价值可分为静态评价指标和动态评价指标两大类。本文将按后一种分类对项目评价中使用的各种指标的应用作以下的探讨。 相似文献
39.
40.
李加 《网络安全技术与应用》2006,(2):48-50
对于Solaris下综合教务系统的管理和维护,本文从系统的优化调整,备份、恢复策略,系统安全保护措施等三个方面进行了探讨。 相似文献