全文获取类型
收费全文 | 71010篇 |
免费 | 15312篇 |
国内免费 | 8751篇 |
专业分类
电工技术 | 9117篇 |
技术理论 | 1篇 |
综合类 | 9359篇 |
化学工业 | 1356篇 |
金属工艺 | 1467篇 |
机械仪表 | 5955篇 |
建筑科学 | 1327篇 |
矿业工程 | 1028篇 |
能源动力 | 1499篇 |
轻工业 | 713篇 |
水利工程 | 1252篇 |
石油天然气 | 902篇 |
武器工业 | 1248篇 |
无线电 | 13221篇 |
一般工业技术 | 4633篇 |
冶金工业 | 519篇 |
原子能技术 | 283篇 |
自动化技术 | 41193篇 |
出版年
2024年 | 1224篇 |
2023年 | 1625篇 |
2022年 | 2593篇 |
2021年 | 2807篇 |
2020年 | 3048篇 |
2019年 | 2564篇 |
2018年 | 2574篇 |
2017年 | 2956篇 |
2016年 | 3400篇 |
2015年 | 3940篇 |
2014年 | 5108篇 |
2013年 | 4865篇 |
2012年 | 6175篇 |
2011年 | 6381篇 |
2010年 | 5225篇 |
2009年 | 5359篇 |
2008年 | 5573篇 |
2007年 | 6058篇 |
2006年 | 4773篇 |
2005年 | 3925篇 |
2004年 | 3163篇 |
2003年 | 2511篇 |
2002年 | 1863篇 |
2001年 | 1462篇 |
2000年 | 1240篇 |
1999年 | 967篇 |
1998年 | 793篇 |
1997年 | 626篇 |
1996年 | 491篇 |
1995年 | 333篇 |
1994年 | 303篇 |
1993年 | 222篇 |
1992年 | 213篇 |
1991年 | 113篇 |
1990年 | 143篇 |
1989年 | 95篇 |
1988年 | 69篇 |
1987年 | 33篇 |
1986年 | 41篇 |
1985年 | 33篇 |
1984年 | 31篇 |
1983年 | 22篇 |
1982年 | 26篇 |
1981年 | 16篇 |
1980年 | 21篇 |
1979年 | 9篇 |
1978年 | 11篇 |
1977年 | 9篇 |
1975年 | 9篇 |
1959年 | 10篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
72.
Hypersonic vehicles (HSVs) offer great advantages over airplanes and satellites, owing to their hypersonic speeds and flexible trajectories. However, HSV-borne radar may suffer from performance degradation if traditional target integration methods with stop-and-go (SAG) approximation are applied; this is especially true for high resolution radar and applications that utilize long-time coherent integration. In this paper, we consider the effects of moving-in-pulse duration (MPD) to derive an HSV-borne radar signal model without SAG approximation by specifically characterizing platform motion during the transmission and reception of a pulse. An explicit formula for wavenumber domain echo is derived using the 2-D joint stationary phase method. To mitigate the pulse-dependent echo distortion induced by the MPD effect, a target integration method based on the omega-K algorithm is proposed; this method employs revised filters for bulk focusing and revised Stolt interpolation for differential focusing to improve the overall focusing quality. The paper discusses the ambiguity functions of in-range MPD echo models, and describes the performance metrics for the integration results in both dimensions, including impulse response width (IRW), peak sidelobe ratio (PSLR), and integrated sidelobe ratio (ISLR). Simulation results have verified the effectiveness of the proposed method in MPD circumstances. 相似文献
73.
张书锋 《电脑编程技巧与维护》2013,(22):81-83
软件测试对于软件系统的性能以及功能都有很重要的意义,是保证软件可靠运行的关键.在软件测试的实践应用中,对于软件故障定位时,提出了基于谓词统计故障定位的算法,也就是FDI频率差异积分算法.在软件测试实践中采用基于FDI频率差异积分算法,可以很好地监控软件程序,测试软件的覆盖率以及执行时间等内存占用情况,并找到软件的故障瓶颈,以便采取更好的方法改进软件性能.探讨了实践中基于FDI频率差异积分算法在软件测试内的应用. 相似文献
74.
Li-Vang Lozada-Chang 《Information Sciences》2011,181(11):2340-2355
In this paper, we introduce a mathematical model for analyzing the dynamics of the univariate marginal distribution algorithm (UMDA) for a class of parametric functions with isolated global optima. We prove a number of results that are used to model the evolution of UMDA probability distributions for this class of functions. We show that a theoretical analysis can assess the effect of the function parameters on the convergence and rate of convergence of UMDA. We also introduce for the first time a long string limit analysis of UMDA. Finally, we relate the results to ongoing research on the application of the estimation of distribution algorithms for problems with unitation constraints. 相似文献
75.
We consider the following problem: Given a finite set of straight line segments in the plane, find a set of points of minimum size, so that every segment contains at least one point in the set. This problem can be interpreted as looking for a minimum number of locations of policemen, guards, cameras or other sensors, that can observe a network of streets, corridors, tunnels, tubes, etc. We show that the problem is strongly NP-complete even for a set of segments with a cubic graph structure, but in P for tree structures. 相似文献
76.
77.
Comparison of image reconstruction by using near‐field and far‐field data for an imperfect conductor
Image reconstruction by using near‐field and far‐field data for an imperfectly conducting cylinder is investigated. A conducting cylinder of unknown shape and conductivity scatters the incident wave in free space and the scattered near and far fields are measured. By using measured fields, the imaging problem is reformulated into an optimization problem and solved by the genetic algorithm. Numerical results show that the convergence speed and final reconstructed results by using near‐field data are better than those obtained by using far‐field data. This work provides both comparative and quantitative information. © 2001 John Wiley & Sons, Inc. Int J RF and Microwave CAE 11: 69–73, 2001. 相似文献
78.
To deal with the planarization problem widely used in many applications including routing very-large-scale integration (VLSI) circuits, this paper points out that only when its vertices are arranged in some specific order in a line can a planar graph be embedded on a line without any cross connections or cross edges. Energy function is proposed to meet the need of embedding a graph on a single line and route it correctly. A Hopfield network is designed according to the proposed energy function for such embedding and routing. The advantage of the proposed method is that it not only can detect if a graph is a planar one or not, but also can embed a planar graph or the maximal planar subgraph of a non-planar graph on a single line. In addition, simulated annealing is employed for helping the network to escape from local minima during the running of the Hopfield network. Experiments of the proposed method and its comparison with some existent conventional methods were performed and the results indicate that the proposed method is of great feasibility and effectiveness especially for the planarization problem of large graphs. 相似文献
79.
BAI Hong-yi 《数字社区&智能家居》2008,(29)
该文在对常用内排序算法基本思想分析的基础上,从算法的稳定性;算法在最好情况下、最坏情况下的交换次数和移动次数;算法的时间复杂度等方面进行了详细的比较分析。 相似文献
80.
从数据库安全需求着手,提出数据库加密要实现的目标,分析了数据库加密技术中几项关键技术并进行比较,最后对加密后系统产生的影响进行总结。 相似文献