全文获取类型
收费全文 | 56253篇 |
免费 | 4957篇 |
国内免费 | 2513篇 |
专业分类
电工技术 | 3437篇 |
技术理论 | 3篇 |
综合类 | 3605篇 |
化学工业 | 9339篇 |
金属工艺 | 2981篇 |
机械仪表 | 3510篇 |
建筑科学 | 5090篇 |
矿业工程 | 1593篇 |
能源动力 | 1591篇 |
轻工业 | 4335篇 |
水利工程 | 1003篇 |
石油天然气 | 2615篇 |
武器工业 | 438篇 |
无线电 | 6586篇 |
一般工业技术 | 6863篇 |
冶金工业 | 2394篇 |
原子能技术 | 746篇 |
自动化技术 | 7594篇 |
出版年
2024年 | 285篇 |
2023年 | 1085篇 |
2022年 | 1908篇 |
2021年 | 2636篇 |
2020年 | 1980篇 |
2019年 | 1606篇 |
2018年 | 1696篇 |
2017年 | 2007篇 |
2016年 | 1799篇 |
2015年 | 2246篇 |
2014年 | 2818篇 |
2013年 | 3350篇 |
2012年 | 3607篇 |
2011年 | 3883篇 |
2010年 | 3462篇 |
2009年 | 3266篇 |
2008年 | 3061篇 |
2007年 | 2871篇 |
2006年 | 2791篇 |
2005年 | 2523篇 |
2004年 | 1634篇 |
2003年 | 1483篇 |
2002年 | 1394篇 |
2001年 | 1226篇 |
2000年 | 1187篇 |
1999年 | 1318篇 |
1998年 | 1071篇 |
1997年 | 932篇 |
1996年 | 960篇 |
1995年 | 785篇 |
1994年 | 656篇 |
1993年 | 468篇 |
1992年 | 361篇 |
1991年 | 284篇 |
1990年 | 206篇 |
1989年 | 182篇 |
1988年 | 161篇 |
1987年 | 110篇 |
1986年 | 79篇 |
1985年 | 57篇 |
1984年 | 44篇 |
1983年 | 29篇 |
1982年 | 23篇 |
1981年 | 20篇 |
1980年 | 20篇 |
1979年 | 19篇 |
1977年 | 6篇 |
1962年 | 42篇 |
1961年 | 41篇 |
1960年 | 16篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
The fast Fourier transform (FFT) is a fundamental kernel of many computation-intensive scientific applications.This paper deals with an implementation of the FFT on the accelerator system,a heterogeneous multi-core architecture to accelerate computation-intensive parallel computing in scientific and engineering applications.The Engineering and Scientific Computation Accelerator (ESCA) consists of a control unit and a single instruction multiple data (SIMD) processing element (PE) array,in which PEs communicate with each other via a hierarchical two-level network-on-chip (NoC) with high bandwidth and low latency.We exploit the architecture features of ESCA to implement a parallel FFT algorithm efficiently.Experimental results show that both the proposed parallel FFT algorithm and the ESCA architecture are scalable.The 16-bit fixed-point parallel FFT performance of ESCA is compared with a published work to prove the superiority of the mapping algorithm and the hardware architecture.The floating-point parallel FFT performances of ESCA are evaluated and compared with those of the IBM Cell processor and GPU to demonstrate the computing power of the ESCA system for high performance applications. 相似文献
62.
Ye. V. Grunicheva G. I. Kurbatova Ye. A. Popova 《Mathematical Models and Computer Simulations》2011,3(6):751-758
This article presents a mathematical model of the shock-free unsteady nonisothermal turbulent flow of a viscous nonideal chemically
inert multicomponent gas mix in the offshore circular cross-section gas pipeline with a rigid multilayer coating. The calculations
of flow characteristics are given for the problem of the pipeline’s shift to the periodic condition under a periodic change
of the consumption rate at the right end. 相似文献
63.
Research on the group decision-making about emergency event based on network technology 总被引:1,自引:1,他引:0
Kefan Xie Gang Chen Qian Wu Yang Liu Pan Wang 《Information Technology and Management》2011,12(2):137-147
In order to improve decision-making efficiency about emergency event, this paper proposes a novel concept, i.e., Agile-Delphi
Method, which is an integration of agile decision and Delphi Method implicating that the decision-makers instantly deliver,
respond, treat, and utilize information via Delphi process while conducting group decision-making about emergency event. The
paper details the mechanism of group decision-making about emergency event based on network technology and Agile-Delphi Method.
Finally, the paper conducts an empiric analysis taking the “111 event”, i.e., the liquid ammonia spill event happened on November
1, 2006 in a phosphorus chemical company in China, as an example. 相似文献
64.
基于HLA的卫星协同仿真系统研究与实现 总被引:1,自引:0,他引:1
基于HLA体系规范,研究协同仿真软件体系结构,设计了一个卫星协同仿真系统CSS(Coordinated Simulation System).首先简要介绍了系统研究的意义,以系统功能以及系统要素为基础分析了系统的需求、提出了基于"协同"的设计原则以及系统性能评估指标,然后介绍了实现CSS的关键技术--使命空间的任务体现结构和多分辨率建模技术 ,以及CSS的分层设计的系统结构,并以仿真任务管理成员和卫星成员为例分析了设计CSS联邦成员的设计思路,最后提出了一个原型系统.该系统仿真了卫星侦查、数据通信、数据评估等整个过程对大型复杂系统的仿真具有很好的借鉴意义. 相似文献
65.
企业办公自动化系统的应用十分广泛,随着互联网的高速发展,WEB应用成为主流,OA系统在互联网上的延伸成为大趋势,本文阐述在WEB应用中如何保障数据和系统安全的手段和方法。 相似文献
66.
潘春平 《数值计算与计算机应用》2011,32(4):267-273
为了改善古典迭代法的收敛速度,本文提出一种带参数的新预条件方法,并对参数的选择给出必要条件,证明了对于非奇异不可约M一矩阵,新预条件方法收敛且可以加速Gauss—Seidel迭代法的收敛速度,数值例子表明新预条件方法是有效的. 相似文献
67.
The defect of process equipments is a major factor that impairs the yields in the mass production of semiconductor wafer fabrication and it is a main supervision means to use high-resolution defect inspection tools to detect and monitor the defect damage. Due to the high investment costs of these inspection tools and the resulting decrease in the throughput, how to improve the sampling rate is an important issue for the associated inspection strategy. This paper proposes a new concept and implementation of virtual inspection (VI) to enhance the detection and monitoring of defect in semiconductor production process. The underlying theory of the VI concept is that the state variables identifications (SVIDs) of process equipments can reflect the process quality effectively and loyally. The approach of VI is to combine the application of the fault detection and classification (FDC), and the defect library and the re-engineering of inspection procedure to reach the full-scope of strategic objective. VI enables the defect monitoring to enter a new era by promoting the monitoring level of defect inspection from the previous lot-sampling basis to the wafer-sampling level, and hence upgrades the sampling strategy from random-sampling to full and right-sampling. In this study, various typical defect cases are utilized to illustrate how to create VI models and verify the reliability of the proposed approach. Furthermore, a feasible architecture of the VI implementation for mass production in semiconductor factory is presented in the paper. 相似文献
68.
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity 总被引:1,自引:0,他引:1 下载免费PDF全文
This paper presents a construction for a class of 1-resilient functions with optimal algebraic immunity on an even number
of variables. The construction is based on the concatenation of two balanced functions in associative classes. For some n, a part of 1-resilient functions with maximum algebraic immunity constructed in the paper can achieve almost optimal nonlinearity.
Apart from their high nonlinearity, the functions reach Siegenthaler's upper bound of algebraic degree. Also a class of 1-resilient
functions on any number n > 2 of variables with at least sub-optimal algebraic immunity is provided. 相似文献
69.
Lei Ye Zhijun Wang Hao Che Henry B.C. Chan Constantino M. Lagoa 《Computer Communications》2009,32(5):800-805
Understanding the TCP congestion control mechanism from a global optimization point of view is not only important in its own right, but also crucial to the design of other transport layer traffic control protocols with provable properties. In this paper, we derive a global utility function and the corresponding optimal control law, known as TCP control law, which maximizes the global utility. The TCP control law captures the essential behaviors of TCP, including slow start, congestion avoidance, and the binary nature of congestion feedback in TCP. We find that the utility function of TCP is linear in the slow start phase and is proportional to the additive increase rate and approaches the well-known logarithm function as the data rate becomes large in the congestion avoidance phase. We also find that understanding the slow start phase with a fixed threshold is critical to the design of new transport layer control protocols to enable quality of service features. Finally, as an application, we design a Minimum Rate Guaranteed (MRG) traffic control law that shares the same utility function as the TCP control law. Our simulation study of the MRG control law indicates that it is indeed TCP friendly and can provide minimum rate guarantee as long as the percentage of network resource consumed by the MRG flows is moderately small. 相似文献
70.
Wei-Hung Lin Yuh-Rau Wang Shi-Jinn Horng Tzong-Wann Kao Yi Pan 《Expert systems with applications》2009,36(9):11509-11516
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks. 相似文献