全文获取类型
收费全文 | 8451篇 |
免费 | 603篇 |
国内免费 | 311篇 |
专业分类
电工技术 | 187篇 |
综合类 | 398篇 |
化学工业 | 1632篇 |
金属工艺 | 501篇 |
机械仪表 | 241篇 |
建筑科学 | 313篇 |
矿业工程 | 62篇 |
能源动力 | 189篇 |
轻工业 | 3289篇 |
水利工程 | 26篇 |
石油天然气 | 155篇 |
武器工业 | 32篇 |
无线电 | 572篇 |
一般工业技术 | 473篇 |
冶金工业 | 244篇 |
原子能技术 | 133篇 |
自动化技术 | 918篇 |
出版年
2024年 | 36篇 |
2023年 | 130篇 |
2022年 | 283篇 |
2021年 | 268篇 |
2020年 | 247篇 |
2019年 | 245篇 |
2018年 | 232篇 |
2017年 | 268篇 |
2016年 | 309篇 |
2015年 | 330篇 |
2014年 | 453篇 |
2013年 | 606篇 |
2012年 | 689篇 |
2011年 | 709篇 |
2010年 | 489篇 |
2009年 | 504篇 |
2008年 | 444篇 |
2007年 | 536篇 |
2006年 | 448篇 |
2005年 | 347篇 |
2004年 | 290篇 |
2003年 | 262篇 |
2002年 | 250篇 |
2001年 | 200篇 |
2000年 | 152篇 |
1999年 | 89篇 |
1998年 | 82篇 |
1997年 | 78篇 |
1996年 | 59篇 |
1995年 | 43篇 |
1994年 | 37篇 |
1993年 | 39篇 |
1992年 | 28篇 |
1991年 | 16篇 |
1990年 | 28篇 |
1989年 | 20篇 |
1988年 | 20篇 |
1987年 | 10篇 |
1986年 | 8篇 |
1985年 | 13篇 |
1984年 | 9篇 |
1983年 | 7篇 |
1982年 | 6篇 |
1981年 | 7篇 |
1980年 | 7篇 |
1979年 | 8篇 |
1977年 | 7篇 |
1976年 | 3篇 |
1975年 | 4篇 |
1959年 | 2篇 |
排序方式: 共有9365条查询结果,搜索用时 15 毫秒
71.
How to compose existing web services automatically and to guarantee the correctness of the design(e.g. freeness of deadlock and unspecified reception,and temporal constraints) is an important and challenging problem in web services. Most existing approaches require a detailed specification of the desired behaviors of a composite service beforehand and then perform certain formal verification to guarantee the correctness of the design,which makes the composition process both complex and time-consuming. In th... 相似文献
72.
73.
74.
提出了基于蕴涵算子族Lλ0λG的模糊推理的思想,这将有助于提高推理结果的可靠性。针对蕴涵算子族Lλ0λG给出了模糊推理的FMP模型及FMT模型的反向三I支持算法。 相似文献
75.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI. 相似文献
76.
为制备高强轻质泡沫钢吸能材料,本文以430L不锈钢粉为原料、CaCl2为造孔剂,采用粉末冶金烧结-溶解法制备了孔隙率为64%~80%,孔径1~4 mm的泡沫钢.利用SEM和XRD对试样进行微观组织结构分析,并对试样进行轴向准静态压缩测试,分析讨论了孔隙率和孔形对泡沫钢压缩变形行为和吸能特性的影响,以及变形过程中孔结构变形和坍塌机理.研究表明:泡沫钢孔结构呈近球形且分布均匀,孔之间通过孔壁上的微孔形成有效连通.在压缩变形过程中,变形区首先发生在孔形不规则且孔壁较薄处,后诱发周围孔变形并形成多个变形带.泡沫钢试样压缩屈服平台应力随着孔隙率的增加而减小,当孔隙率为64.81%~78.82%时,其对应的屈服平台应力为59.37~17.04 MPa.在孔隙率相同的条件下,孔形为近球形的泡沫试样,其屈服平台应力远高于孔形不规则的试样.当应变量为40%时,孔隙率为64.81%~78.82%的泡沫钢,其单位体积的能量吸收值为23.92~7.32 MJ/m3,约为泡沫铝的5~7倍.4种不同孔隙率泡沫钢样品的理想吸能效率(I)均达0.85以上,表明泡沫钢可以作为一种理想的吸能材料. 相似文献
77.
介绍了无线通信模块NRF24L01的结构和特点,设计无线通信的ABS参数测量系统,系统通过对ABS试验平台轮速进行采集,将轮速转化成频率信号,利用周期测量法测出频率,经无线通信模块NRF24L0将数据发送出去。在终端通信模块与主接收模块之间采用TDMA通信方式进行数据交互,主接收模块接收到数据传送到上位机上显示。 相似文献
78.
Hyunhee Kim Author VitaeJihong KimAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(12):1545-1557
This paper proposes a novel leakage management technique for applications with producer-consumer sharing patterns. Although previous research has proposed leakage management techniques by turning off inactive cache blocks, these techniques can be further improved by exploiting the various run-time characteristics of target applications in CMPs. By exploiting particular access sequences observed in producer-consumer sharing patterns and the spatial locality of shared buffers, our technique enables a more aggressive turn-off of L2 cache blocks of these buffers. Experimental results using a CMP simulator show that our proposed technique reduces the energy consumption of on-chip L2 caches, a shared bus, and off-chip memory by up to 31.3% over the existing cache leakage power management techniques with no significant performance loss. 相似文献
79.
On the convective nature of the instability of a front undergoing a supercritical Turing bifurcation
Fronts are traveling waves in spatially extended systems that connect two different spatially homogeneous rest states. If the rest state behind the front undergoes a supercritical Turing instability, then the front will also destabilize. On the linear level, however, the front will be only convectively unstable since perturbations will be pushed away from the front as it propagates. In other words, perturbations may grow but they can do so only behind the front. It is of interest to show that this behavior carries over to the full nonlinear system. It has been successfully done in a case study by Ghazaryan and Sandstede [A. Ghazaryan, B. Sandstede, Nonlinear convective instability of Turing-unstable fronts near onset: a case study, SIAM J. Appl. Dyn. Syst. 6 (2007) 319–347]. In the present paper, analogous results are obtained for the same system as in Ghazaryan and Sandstede (2007), but for a different parameter regime. 相似文献
80.
General linear methods were introduced as the natural generalizations of the classical Runge–Kutta and linear multistep methods. They have potential applications, especially for stiff problems. This paper discusses stiffness and emphasises the need for efficient implicit methods for the solution of stiff problems. In this context, a survey of general linear methods is presented, including recent results on methods with the inherent RK stability property. 相似文献