首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17736篇
  免费   2432篇
  国内免费   1537篇
电工技术   2731篇
技术理论   3篇
综合类   1974篇
化学工业   485篇
金属工艺   351篇
机械仪表   1991篇
建筑科学   2299篇
矿业工程   414篇
能源动力   307篇
轻工业   133篇
水利工程   396篇
石油天然气   396篇
武器工业   132篇
无线电   2021篇
一般工业技术   1084篇
冶金工业   266篇
原子能技术   117篇
自动化技术   6605篇
  2024年   93篇
  2023年   226篇
  2022年   438篇
  2021年   540篇
  2020年   550篇
  2019年   440篇
  2018年   435篇
  2017年   599篇
  2016年   696篇
  2015年   812篇
  2014年   1140篇
  2013年   1028篇
  2012年   1456篇
  2011年   1456篇
  2010年   1092篇
  2009年   1135篇
  2008年   1157篇
  2007年   1323篇
  2006年   1069篇
  2005年   1028篇
  2004年   861篇
  2003年   708篇
  2002年   595篇
  2001年   498篇
  2000年   440篇
  1999年   315篇
  1998年   253篇
  1997年   245篇
  1996年   197篇
  1995年   187篇
  1994年   149篇
  1993年   112篇
  1992年   110篇
  1991年   52篇
  1990年   43篇
  1989年   45篇
  1988年   43篇
  1987年   25篇
  1986年   20篇
  1985年   20篇
  1984年   18篇
  1983年   12篇
  1982年   5篇
  1981年   6篇
  1980年   11篇
  1979年   6篇
  1977年   4篇
  1976年   4篇
  1975年   3篇
  1973年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
介绍了大型机床地坑移动盖板的一般设计思想,根据机床原有功能和结构特点,设计兼顾防尘防屑和美观大方两大特点的活动盖板,为同类设计提供一些参考。  相似文献   
32.
A new evaluation model for SK combinator expressions is presented and used as a basis for the design of a novel processor. The resulting machine architecture resembles a dataflow ring, but executions are constrained to be fully lazy. An automatic dynamic load sharing mechanism for a distributed multiprocessor architecture is suggested, and initial simulation results are presented.  相似文献   
33.
Precise timing and asynchronous I/O are appealing features for many applications. Unix kernels provide such features on a per‐process basis, using signals to communicate asynchronous events to applications. Per‐process signals and timers are grossly inadequate for complex multithreaded applications that require per‐thread signals and timers that operate at finer granularity. To respond to this need, we present a scheme that integrates asynchronous (Unix) signals with user‐level threads, using the ARIADNE system as a platform. This is done with a view towards support for portable, multithreaded, and multiprotocol distributed applications, namely the CLAM (connectionless, lightweight, and multiway) communications library. In the same context, we propose the use of continuations as an efficient mechanism for reducing thread context‐switching and busy‐wait overheads in multithreaded protocols. Our proposal for integrating timers and signal‐handling mechanisms not only solves problems related to race conditions, but also offers an efficient and flexible interface for timing and signalling threads. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
34.
The concept of combinatorial objects is formalized. It allows strict definition of a combinatorial optimization problem (COP). An efficient metaheuristic method to solve COPs (H-method) is considered. It includes stochastic local search algorithms as a built-in procedure. A parallel implementation of the H-method is set forth and analyzed. The results from a numerical experiment and solution of some well-known COPs on personal computers and on the SKIT cluster supercomputer are presented. The study was supported by INTAS (Project 06-1000017-8909). __________ Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 70–79, November–December 2007.  相似文献   
35.
考虑塑性铰外移的钢框架梁柱连接设计   总被引:16,自引:0,他引:16  
介绍美国联邦突发事件管理局 (FEMA)对 1 994年北岭地震中焊接钢框架节点破坏原因的正式解释 ,说明塑性铰外移的必要性。此外 ,还介绍了塑性铰外移的两种基本形式以及狗骨式 (RBS)连接的有关设计规定和适用条件 ,其设计方法可供我国工程设计人员参考。  相似文献   
36.
分析D.yn11配电变压器低压倒发生不同类型故障时,流过高压侧各相电流的大小及相位,从而比较保护用电流互感器在不同接线方式时过电流保护的灵敏度及可靠性;并提出过电流保护应注意的问题。  相似文献   
37.
A new method of classification for numerical stability of parallel algorithms is proposed based on the theoretical foundation of forward error analysis. It partitions the algorithms according to their asymptotic stability—a measure introduced to relate the limiting behavior of the stability to the size of the problem. Using this method, the stability aspect of the pipelined solution technique for first-order and second-order linear recurrences—the core of a tridiagonal linear equation solver—is studied. In particular, it shows that the pipelined solution method of the first-order linear recurrences has the same degree of stability as the commonly used sequential evaluation algorithms. The stability problems of sequential and pipelined solution methods of the second-order linear recurrences are also studied.  相似文献   
38.
A novel current source inverter system interconnected to the single‐phase grid is proposed. It has the same construction as the conventional three‐phase current source inverter that is interconnected to the single‐phase three‐wire distribution system. Though the proposed circuit has no output transformer, it can be equivalently performed as the single‐phase double cascade inverter by diverting the pole transformer in the utility system. By controlling the appropriate scheme, the output currents can be obtained as the five‐level waveforms and their distortions can be decreased sufficiently. It is applied to the interactive electric energy storage system with batteries and the basic discharging characteristics are discussed experimentally. © 2004 Wiley Periodicals, Inc. Electr Eng Jpn, 150(2): 50–61, 2005; Published online in Wiley InterScience ( www.interscience.wiley.com ). DOI 10.1002/eej.10380  相似文献   
39.
A. Chin 《Algorithmica》1994,12(2-3):170-181
Consider the problem of efficiently simulating the shared-memory parallel random access machine (PRAM) model on massively parallel architectures with physically distributed memory. To prevent network congestion and memory bank contention, it may be advantageous to hash the shared memory address space. The decision on whether or not to use hashing depends on (1) the communication latency in the network and (2) the locality of memory accesses in the algorithm.We relate this decision directly to algorithmic issues by studying the complexity of hashing in the Block PRAM model of Aggarwal, Chandra, and Snir, a shared-memory model of parallel computation which accounts for communication locality. For this model, we exhibit a universal family of hash functions having optimal locality. The complexity of applying these hash functions to the shared address space of the Block PRAM (i.e., by permuting data elements) is asymptotically equivalent to the complexity of performing a square matrix transpose, and this result is best possible for all pairwise independent universal hash families. These complexity bounds provide theoretical evidence that hashing and randomized routing need not destroy communication locality, addressing an open question of Valiant.This work was started when the author was a student at Oxford University, supported by a National Science Foundation Graduate Fellowship and a Rhodes Scholarship. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the National Science Foundation or the Rhodes Trust.  相似文献   
40.
广义de Bruijn多计算机互连网络   总被引:1,自引:0,他引:1  
朱福民 《计算机学报》1995,18(2):106-113
(d,m)de Bruijn多计算机系统互连网络限制网络的规模必须为d^m。本文把(d,m)de Bruijn网络推广到了任意顶点情形,提出了广义de Bruijn网络,研究了广义de Bruijn网络的自路由性质,设计了路由算法,研究了广义de Bruijn网络顶点度的性质和容错特性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号