首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16911篇
  免费   1839篇
  国内免费   849篇
电工技术   560篇
技术理论   1篇
综合类   1326篇
化学工业   236篇
金属工艺   131篇
机械仪表   541篇
建筑科学   7811篇
矿业工程   128篇
能源动力   101篇
轻工业   85篇
水利工程   64篇
石油天然气   192篇
武器工业   144篇
无线电   2071篇
一般工业技术   373篇
冶金工业   95篇
原子能技术   25篇
自动化技术   5715篇
  2024年   103篇
  2023年   405篇
  2022年   573篇
  2021年   648篇
  2020年   735篇
  2019年   534篇
  2018年   331篇
  2017年   319篇
  2016年   298篇
  2015年   449篇
  2014年   1104篇
  2013年   839篇
  2012年   1163篇
  2011年   1295篇
  2010年   1025篇
  2009年   1173篇
  2008年   1252篇
  2007年   1335篇
  2006年   1116篇
  2005年   985篇
  2004年   828篇
  2003年   693篇
  2002年   480篇
  2001年   399篇
  2000年   361篇
  1999年   267篇
  1998年   158篇
  1997年   114篇
  1996年   83篇
  1995年   92篇
  1994年   65篇
  1993年   52篇
  1992年   59篇
  1991年   49篇
  1990年   31篇
  1989年   32篇
  1988年   40篇
  1987年   19篇
  1986年   15篇
  1985年   28篇
  1984年   26篇
  1983年   9篇
  1982年   5篇
  1980年   2篇
  1979年   4篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1965年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
杭州绿城·桃花源生态休闲居住区是一个集居住、游憩及生态环境于一体的低密度住宅园区。作者介绍了该项目的规划构思和规划内容,指出项目规划由风景园林为主多专业合作的优势,对发展中的城郊居住区规划具有参考价值。  相似文献   
22.
The development of autonomous mobile machines to perform useful tasks in real work environments is currently being impeded by concerns over effectiveness, commercial viability and, above all, safety. This paper introduces a case study of a robotic excavator to explore a series of issues around system development, navigation in unstructured environments, autonomous decision making and changing the behaviour of autonomous machines to suit the prevailing demands of users. The adoption of the Real-Time Control Systems (RCS) architecture (Albus, 1991) is proposed as a universal framework for the development of intelligent systems. In addition it is explained how the use of Partially Observable Markov Decision Processes (POMDP) (Kaelbling et al., 1998) can form the basis of decision making in the face of uncertainty and how the technique can be effectively incorporated into the RCS architecture. Particular emphasis is placed on ensuring that the resulting behaviour is both task effective and adequately safe, and it is recognised that these two objectives may be in opposition and that the desired relative balance between them may change. The concept of an autonomous system having “values” is introduced through the use of utility theory. Limited simulation results of experiments are reported which demonstrate that these techniques can create intelligent systems capable of modifying their behaviour to exhibit either ‘safety conscious’ or ‘task achieving’ personalities.  相似文献   
23.
阐述智能建筑的电气设计及施工中各电气设计子项的具体解决方案,以及弱电竖井设置中要注意的一些问题。  相似文献   
24.
In this paper, we propose an efficient design method for area optimization in a digital filter. The conventional methods to reduce the number of adders in a filter have the problem of a long critical path delay caused by the deep logic depth of the filter due to adder sharing. Furthermore, there is such a disadvantage that they use the transposed direct form (TDF) filter which needs more registers than those of the direct form (DF) filter. In this paper, we present a hybrid structure of a TDF and DF based on the flattened coefficients method so that it can reduce the number of flip‐flops and full‐adders without additional critical path delay. We also propose a resource sharing method and sharing‐pattern searching algorithm to reduce the number of adders without deepening the logic depth. Simulation results show that the proposed structure can save the number of adders and registers by 22 and 26%, respectively, compared to the best one used in the past.  相似文献   
25.
Fodor and Pylyshyn (1988) have argued that the cognitive architecture is not Connectionist. Their argument takes the following form: (1) the cognitive architecture is Classical; (2) Classicalism and Connectionism are incompatible; (3) therefore the cognitive architecture is not Connectionist. In this essay I argue that Fodor and Pylyshyn's defenses of (1) and (2) are inadequate. Their argument for (1), based on their claim that Classicalism best explains the systematicity of cognitive capacities, is an invalid instance of inference to the best explanation. And their argument for (2) turns out to be question-begging. The upshot is that, while Fodor and Pylyshyn have presented Connectionists with the important empirical challenge of explaining systematicity, they have failed to provide sufficient reason for inferring that the cognitive architecture is Classical and not Connectionist.  相似文献   
26.
数据挖掘是近年来在数据库技术、统计学、人工智能、神经网络等学科的基础上发展起来的一门交叉学科,数据挖掘技术已经成功地应用于商业领域,随之又迅速地扩展到社会保险、医学、电信等领域,探讨和分析数据挖掘技术在有线电视领域的应用,并给出了系统体系结构和挖掘算法。  相似文献   
27.
加快电信管制改革 实现电信健康发展   总被引:1,自引:0,他引:1  
通过对我国电信业市场结构、市场行为及市场绩效进行分析,阐明了在我国进行电信管制的必要性。通过管制,以实现电信企业的有效竞争,使我国电信业得到健康发展。  相似文献   
28.
网格是继Internet和Web技术之后的第三个信息技术浪潮。简述了网格的定义、特点和基本体系结构 ,并且分析了网格技术在广播电视中的应用  相似文献   
29.
1 IntroductionHandoverbetweencellsisplayinganimportantroleincellularcommunicationsystems[1~ 1 2 ] .Thehandoverprocedureanditseffectivenessareseriouslylimitedbythecellulararchitectureasaresultofmar ketplanning .Basedonthehexagonalcellulararchi tecture,manyhandoverprocedureshavebeendis cussedandevaluated ,andmostoftheimprovementproposedonthemleadstotheintroductionofsector ingcellularorlayeredcellularmodel.Otherwise ,abetterhandoverprocedureisessentialinmaintainingacallinprogressbutitreflectshi…  相似文献   
30.
Intelligent methods for automatic protection and restoration are critical in optical transport mesh networks. This paper discusses the problem of quality-of-service (QoS)-based protection in terms of the protection-switching time and availability for end-to-end lightpaths in a WDM mesh network. We analyze the backup lightpath-sharing problem in such networks and study the correlation of the working lightpaths and the impact of the correlation on the sharing of the backup lightpaths. We present a multi-protocol-label-switching (MPLS) control-based fully distributed algorithm to solve the protection problem. The proposed algorithm includes intelligent and automatic procedures to set up, take down, activate, restore, and manage backup lightpaths. It greatly reduces the required resources for protection by allowing the sharing of network resources by multiple backup lightpaths. At the same time, it guarantees, if possible, to satisfy the availability requirement even with resource sharing by taking the correlation of working lightpaths into consideration. A simple analysis of the proposed algorithm in terms of computation time and message complexity indicates that the implementation of the algorithm is practical. The illustrative studies that compare the performance of 1:1, unlimited sharing, and QoS-based backup sharing algorithms indicate that QoS-based sharing achieves comparable performance as unlimited sharing, which is much better than the 1:1 backup scheme in terms of connection blocking probability, average number of connections in the network for a given offered load, and network resource utilization.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号