全文获取类型
收费全文 | 16911篇 |
免费 | 1839篇 |
国内免费 | 849篇 |
专业分类
电工技术 | 560篇 |
技术理论 | 1篇 |
综合类 | 1326篇 |
化学工业 | 236篇 |
金属工艺 | 131篇 |
机械仪表 | 541篇 |
建筑科学 | 7811篇 |
矿业工程 | 128篇 |
能源动力 | 101篇 |
轻工业 | 85篇 |
水利工程 | 64篇 |
石油天然气 | 192篇 |
武器工业 | 144篇 |
无线电 | 2071篇 |
一般工业技术 | 373篇 |
冶金工业 | 95篇 |
原子能技术 | 25篇 |
自动化技术 | 5715篇 |
出版年
2024年 | 103篇 |
2023年 | 405篇 |
2022年 | 573篇 |
2021年 | 648篇 |
2020年 | 735篇 |
2019年 | 534篇 |
2018年 | 331篇 |
2017年 | 319篇 |
2016年 | 298篇 |
2015年 | 449篇 |
2014年 | 1104篇 |
2013年 | 839篇 |
2012年 | 1163篇 |
2011年 | 1295篇 |
2010年 | 1025篇 |
2009年 | 1173篇 |
2008年 | 1252篇 |
2007年 | 1335篇 |
2006年 | 1116篇 |
2005年 | 985篇 |
2004年 | 828篇 |
2003年 | 693篇 |
2002年 | 480篇 |
2001年 | 399篇 |
2000年 | 361篇 |
1999年 | 267篇 |
1998年 | 158篇 |
1997年 | 114篇 |
1996年 | 83篇 |
1995年 | 92篇 |
1994年 | 65篇 |
1993年 | 52篇 |
1992年 | 59篇 |
1991年 | 49篇 |
1990年 | 31篇 |
1989年 | 32篇 |
1988年 | 40篇 |
1987年 | 19篇 |
1986年 | 15篇 |
1985年 | 28篇 |
1984年 | 26篇 |
1983年 | 9篇 |
1982年 | 5篇 |
1980年 | 2篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1965年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
山重水碧桃花源——杭州绿城·桃花源生态休闲居住区规划 总被引:1,自引:0,他引:1
杭州绿城·桃花源生态休闲居住区是一个集居住、游憩及生态环境于一体的低密度住宅园区。作者介绍了该项目的规划构思和规划内容,指出项目规划由风景园林为主多专业合作的优势,对发展中的城郊居住区规划具有参考价值。 相似文献
22.
The development of autonomous mobile machines to perform useful tasks in real work environments is currently being impeded
by concerns over effectiveness, commercial viability and, above all, safety. This paper introduces a case study of a robotic
excavator to explore a series of issues around system development, navigation in unstructured environments, autonomous decision
making and changing the behaviour of autonomous machines to suit the prevailing demands of users. The adoption of the Real-Time
Control Systems (RCS) architecture (Albus, 1991) is proposed as a universal framework for the development of intelligent systems. In addition it is explained how the use
of Partially Observable Markov Decision Processes (POMDP) (Kaelbling et al., 1998) can form the basis of decision making in the face of uncertainty and how the technique can be effectively incorporated into
the RCS architecture. Particular emphasis is placed on ensuring that the resulting behaviour is both task effective and adequately
safe, and it is recognised that these two objectives may be in opposition and that the desired relative balance between them
may change. The concept of an autonomous system having “values” is introduced through the use of utility theory. Limited simulation
results of experiments are reported which demonstrate that these techniques can create intelligent systems capable of modifying
their behaviour to exhibit either ‘safety conscious’ or ‘task achieving’ personalities. 相似文献
23.
24.
In this paper, we propose an efficient design method for area optimization in a digital filter. The conventional methods to reduce the number of adders in a filter have the problem of a long critical path delay caused by the deep logic depth of the filter due to adder sharing. Furthermore, there is such a disadvantage that they use the transposed direct form (TDF) filter which needs more registers than those of the direct form (DF) filter. In this paper, we present a hybrid structure of a TDF and DF based on the flattened coefficients method so that it can reduce the number of flip‐flops and full‐adders without additional critical path delay. We also propose a resource sharing method and sharing‐pattern searching algorithm to reduce the number of adders without deepening the logic depth. Simulation results show that the proposed structure can save the number of adders and registers by 22 and 26%, respectively, compared to the best one used in the past. 相似文献
25.
Michael V. Antony 《Minds and Machines》1991,1(3):321-341
Fodor and Pylyshyn (1988) have argued that the cognitive architecture is not Connectionist. Their argument takes the following form: (1) the cognitive architecture is Classical; (2) Classicalism and Connectionism are incompatible; (3) therefore the cognitive architecture is not Connectionist. In this essay I argue that Fodor and Pylyshyn's defenses of (1) and (2) are inadequate. Their argument for (1), based on their claim that Classicalism best explains the systematicity of cognitive capacities, is an invalid instance of inference to the best explanation. And their argument for (2) turns out to be question-begging. The upshot is that, while Fodor and Pylyshyn have presented Connectionists with the important empirical challenge of explaining systematicity, they have failed to provide sufficient reason for inferring that the cognitive architecture is Classical and not Connectionist. 相似文献
26.
27.
加快电信管制改革 实现电信健康发展 总被引:1,自引:0,他引:1
通过对我国电信业市场结构、市场行为及市场绩效进行分析,阐明了在我国进行电信管制的必要性。通过管制,以实现电信企业的有效竞争,使我国电信业得到健康发展。 相似文献
28.
29.
Research on the Handover of a Novel Cellular Architecture in Wireless Personal Communication Systems
ZHANG Zu-fan~ 《中国邮电高校学报(英文版)》2003,10(4)
1 IntroductionHandoverbetweencellsisplayinganimportantroleincellularcommunicationsystems[1~ 1 2 ] .Thehandoverprocedureanditseffectivenessareseriouslylimitedbythecellulararchitectureasaresultofmar ketplanning .Basedonthehexagonalcellulararchi tecture,manyhandoverprocedureshavebeendis cussedandevaluated ,andmostoftheimprovementproposedonthemleadstotheintroductionofsector ingcellularorlayeredcellularmodel.Otherwise ,abetterhandoverprocedureisessentialinmaintainingacallinprogressbutitreflectshi… 相似文献
30.
Intelligent methods for automatic protection and restoration are critical in optical transport mesh networks. This paper discusses the problem of quality-of-service (QoS)-based protection in terms of the protection-switching time and availability for end-to-end lightpaths in a WDM mesh network. We analyze the backup lightpath-sharing problem in such networks and study the correlation of the working lightpaths and the impact of the correlation on the sharing of the backup lightpaths. We present a multi-protocol-label-switching (MPLS) control-based fully distributed algorithm to solve the protection problem. The proposed algorithm includes intelligent and automatic procedures to set up, take down, activate, restore, and manage backup lightpaths. It greatly reduces the required resources for protection by allowing the sharing of network resources by multiple backup lightpaths. At the same time, it guarantees, if possible, to satisfy the availability requirement even with resource sharing by taking the correlation of working lightpaths into consideration. A simple analysis of the proposed algorithm in terms of computation time and message complexity indicates that the implementation of the algorithm is practical. The illustrative studies that compare the performance of 1:1, unlimited sharing, and QoS-based backup sharing algorithms indicate that QoS-based sharing achieves comparable performance as unlimited sharing, which is much better than the 1:1 backup scheme in terms of connection blocking probability, average number of connections in the network for a given offered load, and network resource utilization. 相似文献