全文获取类型
收费全文 | 17736篇 |
免费 | 2432篇 |
国内免费 | 1537篇 |
专业分类
电工技术 | 2731篇 |
技术理论 | 3篇 |
综合类 | 1974篇 |
化学工业 | 485篇 |
金属工艺 | 351篇 |
机械仪表 | 1991篇 |
建筑科学 | 2299篇 |
矿业工程 | 414篇 |
能源动力 | 307篇 |
轻工业 | 133篇 |
水利工程 | 396篇 |
石油天然气 | 396篇 |
武器工业 | 132篇 |
无线电 | 2021篇 |
一般工业技术 | 1084篇 |
冶金工业 | 266篇 |
原子能技术 | 117篇 |
自动化技术 | 6605篇 |
出版年
2024年 | 93篇 |
2023年 | 226篇 |
2022年 | 438篇 |
2021年 | 540篇 |
2020年 | 550篇 |
2019年 | 440篇 |
2018年 | 435篇 |
2017年 | 599篇 |
2016年 | 696篇 |
2015年 | 812篇 |
2014年 | 1140篇 |
2013年 | 1028篇 |
2012年 | 1456篇 |
2011年 | 1456篇 |
2010年 | 1092篇 |
2009年 | 1135篇 |
2008年 | 1157篇 |
2007年 | 1323篇 |
2006年 | 1069篇 |
2005年 | 1028篇 |
2004年 | 861篇 |
2003年 | 708篇 |
2002年 | 595篇 |
2001年 | 498篇 |
2000年 | 440篇 |
1999年 | 315篇 |
1998年 | 253篇 |
1997年 | 245篇 |
1996年 | 197篇 |
1995年 | 187篇 |
1994年 | 149篇 |
1993年 | 112篇 |
1992年 | 110篇 |
1991年 | 52篇 |
1990年 | 43篇 |
1989年 | 45篇 |
1988年 | 43篇 |
1987年 | 25篇 |
1986年 | 20篇 |
1985年 | 20篇 |
1984年 | 18篇 |
1983年 | 12篇 |
1982年 | 5篇 |
1981年 | 6篇 |
1980年 | 11篇 |
1979年 | 6篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1975年 | 3篇 |
1973年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
介绍了大型机床地坑移动盖板的一般设计思想,根据机床原有功能和结构特点,设计兼顾防尘防屑和美观大方两大特点的活动盖板,为同类设计提供一些参考。 相似文献
32.
A new evaluation model for SK combinator expressions is presented and used as a basis for the design of a novel processor. The resulting machine architecture resembles a dataflow ring, but executions are constrained to be fully lazy. An automatic dynamic load sharing mechanism for a distributed multiprocessor architecture is suggested, and initial simulation results are presented. 相似文献
33.
Precise timing and asynchronous I/O are appealing features for many applications. Unix kernels provide such features on a per‐process basis, using signals to communicate asynchronous events to applications. Per‐process signals and timers are grossly inadequate for complex multithreaded applications that require per‐thread signals and timers that operate at finer granularity. To respond to this need, we present a scheme that integrates asynchronous (Unix) signals with user‐level threads, using the ARIADNE system as a platform. This is done with a view towards support for portable, multithreaded, and multiprotocol distributed applications, namely the CLAM (connectionless, lightweight, and multiway) communications library. In the same context, we propose the use of continuations as an efficient mechanism for reducing thread context‐switching and busy‐wait overheads in multithreaded protocols. Our proposal for integrating timers and signal‐handling mechanisms not only solves problems related to race conditions, but also offers an efficient and flexible interface for timing and signalling threads. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
34.
The concept of combinatorial objects is formalized. It allows strict definition of a combinatorial optimization problem (COP).
An efficient metaheuristic method to solve COPs (H-method) is considered. It includes stochastic local search algorithms as
a built-in procedure. A parallel implementation of the H-method is set forth and analyzed. The results from a numerical experiment
and solution of some well-known COPs on personal computers and on the SKIT cluster supercomputer are presented.
The study was supported by INTAS (Project 06-1000017-8909).
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 70–79, November–December 2007. 相似文献
35.
考虑塑性铰外移的钢框架梁柱连接设计 总被引:16,自引:0,他引:16
介绍美国联邦突发事件管理局 (FEMA)对 1 994年北岭地震中焊接钢框架节点破坏原因的正式解释 ,说明塑性铰外移的必要性。此外 ,还介绍了塑性铰外移的两种基本形式以及狗骨式 (RBS)连接的有关设计规定和适用条件 ,其设计方法可供我国工程设计人员参考。 相似文献
36.
分析D.yn11配电变压器低压倒发生不同类型故障时,流过高压侧各相电流的大小及相位,从而比较保护用电流互感器在不同接线方式时过电流保护的灵敏度及可靠性;并提出过电流保护应注意的问题。 相似文献
37.
Guang R. Gao 《Parallel Computing》1987,4(3):305-321
A new method of classification for numerical stability of parallel algorithms is proposed based on the theoretical foundation of forward error analysis. It partitions the algorithms according to their asymptotic stability—a measure introduced to relate the limiting behavior of the stability to the size of the problem. Using this method, the stability aspect of the pipelined solution technique for first-order and second-order linear recurrences—the core of a tridiagonal linear equation solver—is studied. In particular, it shows that the pipelined solution method of the first-order linear recurrences has the same degree of stability as the commonly used sequential evaluation algorithms. The stability problems of sequential and pipelined solution methods of the second-order linear recurrences are also studied. 相似文献
38.
A novel current source inverter system interconnected to the single‐phase grid is proposed. It has the same construction as the conventional three‐phase current source inverter that is interconnected to the single‐phase three‐wire distribution system. Though the proposed circuit has no output transformer, it can be equivalently performed as the single‐phase double cascade inverter by diverting the pole transformer in the utility system. By controlling the appropriate scheme, the output currents can be obtained as the five‐level waveforms and their distortions can be decreased sufficiently. It is applied to the interactive electric energy storage system with batteries and the basic discharging characteristics are discussed experimentally. © 2004 Wiley Periodicals, Inc. Electr Eng Jpn, 150(2): 50–61, 2005; Published online in Wiley InterScience ( www.interscience.wiley.com ). DOI 10.1002/eej.10380 相似文献
39.
A. Chin 《Algorithmica》1994,12(2-3):170-181
Consider the problem of efficiently simulating the shared-memory parallel random access machine (PRAM) model on massively parallel architectures with physically distributed memory. To prevent network congestion and memory bank contention, it may be advantageous to hash the shared memory address space. The decision on whether or not to use hashing depends on (1) the communication latency in the network and (2) the locality of memory accesses in the algorithm.We relate this decision directly to algorithmic issues by studying the complexity of hashing in the Block PRAM model of Aggarwal, Chandra, and Snir, a shared-memory model of parallel computation which accounts for communication locality. For this model, we exhibit a universal family of hash functions having optimal locality. The complexity of applying these hash functions to the shared address space of the Block PRAM (i.e., by permuting data elements) is asymptotically equivalent to the complexity of performing a square matrix transpose, and this result is best possible for all pairwise independent universal hash families. These complexity bounds provide theoretical evidence that hashing and randomized routing need not destroy communication locality, addressing an open question of Valiant.This work was started when the author was a student at Oxford University, supported by a National Science Foundation Graduate Fellowship and a Rhodes Scholarship. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the National Science Foundation or the Rhodes Trust. 相似文献
40.
广义de Bruijn多计算机互连网络 总被引:1,自引:0,他引:1
(d,m)de Bruijn多计算机系统互连网络限制网络的规模必须为d^m。本文把(d,m)de Bruijn网络推广到了任意顶点情形,提出了广义de Bruijn网络,研究了广义de Bruijn网络的自路由性质,设计了路由算法,研究了广义de Bruijn网络顶点度的性质和容错特性。 相似文献