全文获取类型
收费全文 | 5127篇 |
免费 | 765篇 |
国内免费 | 555篇 |
专业分类
电工技术 | 183篇 |
综合类 | 518篇 |
化学工业 | 895篇 |
金属工艺 | 215篇 |
机械仪表 | 149篇 |
建筑科学 | 154篇 |
矿业工程 | 61篇 |
能源动力 | 159篇 |
轻工业 | 321篇 |
水利工程 | 73篇 |
石油天然气 | 202篇 |
武器工业 | 34篇 |
无线电 | 760篇 |
一般工业技术 | 691篇 |
冶金工业 | 136篇 |
原子能技术 | 35篇 |
自动化技术 | 1861篇 |
出版年
2024年 | 16篇 |
2023年 | 56篇 |
2022年 | 107篇 |
2021年 | 137篇 |
2020年 | 190篇 |
2019年 | 196篇 |
2018年 | 148篇 |
2017年 | 198篇 |
2016年 | 235篇 |
2015年 | 241篇 |
2014年 | 330篇 |
2013年 | 386篇 |
2012年 | 406篇 |
2011年 | 391篇 |
2010年 | 298篇 |
2009年 | 348篇 |
2008年 | 325篇 |
2007年 | 316篇 |
2006年 | 285篇 |
2005年 | 250篇 |
2004年 | 174篇 |
2003年 | 162篇 |
2002年 | 164篇 |
2001年 | 144篇 |
2000年 | 113篇 |
1999年 | 109篇 |
1998年 | 110篇 |
1997年 | 105篇 |
1996年 | 94篇 |
1995年 | 59篇 |
1994年 | 50篇 |
1993年 | 43篇 |
1992年 | 49篇 |
1991年 | 26篇 |
1990年 | 30篇 |
1989年 | 33篇 |
1988年 | 19篇 |
1987年 | 12篇 |
1986年 | 11篇 |
1985年 | 12篇 |
1984年 | 15篇 |
1983年 | 14篇 |
1982年 | 8篇 |
1981年 | 4篇 |
1980年 | 5篇 |
1979年 | 6篇 |
1977年 | 3篇 |
1975年 | 2篇 |
1973年 | 4篇 |
1951年 | 2篇 |
排序方式: 共有6447条查询结果,搜索用时 15 毫秒
81.
82.
文章在分析形式化验证/综合系统VIS 的基础上,改进了该电子系统中的关键技术——二叉判定图(BDD),使BDD能表示电路的定时性质,这样就为VIS系统能够进行电路的时间特性验证和实时模型检验打下了基础。 相似文献
83.
大幅图像的分块细化加速算法 总被引:8,自引:0,他引:8
文章在分析大规模二值图像特点和细化算法基本原理的基础上,提出一种分块细化大幅图像的算法。该算法首先将大幅图像分割成若干子块,然后分别对各子块进行细化,最后将子块细化的结果拼接成原图的骨架。算法有效地解决了大幅图像细化处理的时空矛盾,提高了大幅图像的细化速度。 相似文献
84.
数据在计算机中是以器件的物理状态来实现的,因此研究数据之间的进制转换非常重要。基于计算机器的小数位进制转换方法能够克服一般转换方法的繁琐,用计算器快速实现包含有小数部分的数据的进制之间的转换。 相似文献
85.
应急物资的调度是一个非常重要而实际的研究课题,首要条件是时间最短,在时间最短的基础上要求费用最低。在此基础上,建立了时间最短、成本最低的多目标带约束的数学模型,并利用理想点法将此多目标问题转化为单目标问题,而后利用粒子群算法中的罚函数法将此蒂约束的问题转化为不带约束的问题,最后用离散的粒子群算法求解。实验表明,用粒子群算法求解应急物资调度问题有效可行。 相似文献
86.
The paper offers a new kind of neural network for classifying binary patterns. Given the dimensionality of patterns, the memory
capacity of the network grows exponentially with free parameter s. The paper considers the limitations for parameter s caused by the fact that greater values of demand large computer memory and decrease the basin of attraction we have. In contrast
to similar models, the network enjoys larger memory capacity and better recognition capabilities—it can distinguish heavily
distorted patterns and even cope with pattern correlation. The negative effect of the latter can be easily suppressed by taking
a large enough value of s. A perceptron recognition system is considered to demonstrate the efficiency of the algorithm, yet the method is quite applicable
in fully connected associative-memory networks.
The article is published in the original. 相似文献
87.
There is a potential server bottleneck problem when the Kerberos model is applied in large-scale networks because the model uses centralized management. To enlarge its application scope, researchers must consider how to build a trust relation among those Kerberos servers located on different isolated domains, but have not provided a way to prevent the potential bottleneck that can occur with Kerberos servers. With the development of across-domain authentication techniques, the local server bottleneck problem has not been alleviated; in fact, it has become more serious.Adopting the rigorous binary tree code algorithm, we present an authentication model based on Kerberos. Compared with similar models, our model has several advantages. First, it overcomes the potential server bottleneck problem and can balance the load automatically. Second, it can process across-domain authentication and enlarge the authentication boundary. Finally, its authentication path is short, with no more than two Kerberos servers being involved when authenticating a user. 相似文献
88.
89.
The study of the computational power of randomized computations is one of the central tasks of complexity theory. The main goal of this paper is the comparison of the power of Las Vegas computation and deterministic respectively nondeterministic computation. We investigate the power of Las Vegas computation for the complexity measures of one-way communication, ordered binary decision diagrams, and finite automata.(i) For the one-way communication complexity of two-party protocols we show that Las Vegas communication can save at most one half of the deterministic one-way communication complexity. We also present a language for which this gap is tight.(ii) The result (i) is applied to show an at most polynomial gap between determinism and Las Vegas for ordered binary decision diagrams.(iii) For the size (i.e., the number of states) of finite automata we show that the size of Las Vegas finite automata recognizing a language L is at least the square root of the size of the minimal deterministic finite automaton recognizing L. Using a specific language we verify the optimality of this lower bound. 相似文献
90.
A Comparison of Free BDDs and Transformed BDDs 总被引:2,自引:0,他引:2
Ordered binary decision diagrams (OBDDs) introduced by Bryant (IEEE Trans. on Computers, Vol. 35, pp. 677–691, 1986) have found a lot of applications in verification and CAD. Their use is limited if the OBDD size of the considered functions is too large. Therefore, a variety of generalized BDD models has been presented, among them FBDDs (free BDDs) and TBDDs (transformed BDDs). Here the quite tight relations between these models are revealed and their advantages and disadvantages are discussed. 相似文献