全文获取类型
收费全文 | 15801篇 |
免费 | 1550篇 |
国内免费 | 1237篇 |
专业分类
电工技术 | 841篇 |
技术理论 | 1篇 |
综合类 | 1935篇 |
化学工业 | 526篇 |
金属工艺 | 423篇 |
机械仪表 | 1141篇 |
建筑科学 | 1481篇 |
矿业工程 | 436篇 |
能源动力 | 200篇 |
轻工业 | 355篇 |
水利工程 | 243篇 |
石油天然气 | 515篇 |
武器工业 | 166篇 |
无线电 | 1613篇 |
一般工业技术 | 1063篇 |
冶金工业 | 1650篇 |
原子能技术 | 187篇 |
自动化技术 | 5812篇 |
出版年
2024年 | 84篇 |
2023年 | 224篇 |
2022年 | 348篇 |
2021年 | 421篇 |
2020年 | 410篇 |
2019年 | 362篇 |
2018年 | 321篇 |
2017年 | 354篇 |
2016年 | 449篇 |
2015年 | 440篇 |
2014年 | 892篇 |
2013年 | 782篇 |
2012年 | 1076篇 |
2011年 | 1186篇 |
2010年 | 1108篇 |
2009年 | 977篇 |
2008年 | 977篇 |
2007年 | 1104篇 |
2006年 | 994篇 |
2005年 | 920篇 |
2004年 | 771篇 |
2003年 | 690篇 |
2002年 | 592篇 |
2001年 | 539篇 |
2000年 | 445篇 |
1999年 | 331篇 |
1998年 | 230篇 |
1997年 | 238篇 |
1996年 | 196篇 |
1995年 | 170篇 |
1994年 | 121篇 |
1993年 | 113篇 |
1992年 | 84篇 |
1991年 | 70篇 |
1990年 | 45篇 |
1989年 | 60篇 |
1988年 | 38篇 |
1987年 | 32篇 |
1986年 | 27篇 |
1985年 | 38篇 |
1984年 | 30篇 |
1979年 | 19篇 |
1975年 | 15篇 |
1966年 | 17篇 |
1965年 | 17篇 |
1964年 | 17篇 |
1963年 | 14篇 |
1958年 | 15篇 |
1956年 | 14篇 |
1955年 | 18篇 |
排序方式: 共有10000条查询结果,搜索用时 265 毫秒
101.
In a change detection paradigm, a target object in a natural scene either rotated in depth, was replaced by another object token, or remained the same. Change detection performance was reliably higher when a target postcue allowed participants to restrict retrieval and comparison processes to the target object (Experiment 1). Change detection performance remained excellent when the target object was not attended at change (Experiment 2) and when a concurrent verbal working memory load minimized the possibility of verbal encoding. (Experiment 3). Together, these data demonstrate that visual representations accumulate in memory from attended objects as the eyes and attention are oriented within a scene and that change blindness derives, at least in part, from retrieval and comparison failure. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
102.
L2-P5三靶点绕障拱型水平井钻井技术 总被引:1,自引:1,他引:0
介绍了胜利油田L2—P5三靶点绕障拱型水平井的设计和施工情况,重点分析了该井直井段和水平段井眼轨迹控制技术,对施工中出现的问题进行了分析并给出了相应的对策,为该区类似井钻井提供了有益的借鉴。 相似文献
103.
Shao Zhiqing 《计算机科学技术学报》1993,8(2):59-65
In this paper we try to introduce a new approach to operational semantics of recursive programsby using ideas in the“priority method”which is a fundamental tool in Recursion Theory.In lieu ofmodelling partial functions by introducing undefined values in a traditional approach,we shall define apriority derivation tree for every term,and by respecting the rule“attacking the subterm of thehighest priority first”we define transition relations,computation sequences etc.directly based on astandard interpretation which includes no undefined value in its domain.Finally,we prove that ournew approach generates the same operational semantics as the traditional one.It is also pointed outthat we can use our strategy to refute a claim of Loeckx and Sieber that the opperational semanticsof recursive programs cannot be built based on predicate logic. 相似文献
104.
在计算机的应用编程中,经常会遇到在FoxBASE环境下使用高级语言的问题。本文通过实例及对数据库结构的分析,介绍了FoxBASE与高级语言接口程序的功能、原理及简单的设计方法。 相似文献
105.
In Part 1 of this two-part series, we introduced Katamic memory—a neural network architecture capable of robust sequence learning and recognition. In Part 2, we introduce the Blobs World taskjdomain for language learning and describe the DETE language learning system, which is composed of over 50 Katamic memory modules. DETE currently learns small subsets of English and Spanish via association with perceptual! motor inputs. In addition to Kaiamic memory, DETE employs several other novel features: (1) use of feature planes, to encode visual shapes, spatial relationships and the motions of objects, (2) phase-locking of neural firing, in order to represent focus of atention and to bind objects across multiple feature planes, and (3) a method for encoding temporal relationships, so that DETE can learn utterances involving the immediate past and future. We compare DETE to related models and discuss the implications of this approach for language-learning research. 相似文献
106.
Martin Sulzmann Kenny Zhuo Ming Lu 《Electronic Notes in Theoretical Computer Science》2006,148(2):239
We consider the problem of integrating XDuce into ML. This is difficult because of incompatible type and value representations. Our solution is a type-driven translation scheme from XDuce to ML based on a structured representation of XDuce values. XDuce type inference guides the insertion of appropriate coercion functions to translate regular expression pattern matching and uses of semantic subtyping. We can extend our translation scheme to include ML function calls and patterns into XDuce. Thus, we can embed XDuce into ML. Our results allow to enrich the ML language with support for dealing with semi-structured data. 相似文献
107.
动态过程监视的最佳显示方式研究 总被引:1,自引:0,他引:1
文中讨论了人机界面的视学工效问题,通过实验评价了用于动态过程监视与控制的三种CRT显示方式的工效,并由此得出人类视学系统反应对图形方式更优于对数字方式,图形与数字的复合方式。 相似文献
108.
本文介绍 IBM-PC 系列机中的定时信息。进而介绍利用这些信息实现各类长、短定时间隔的编程技巧,并以实例说明之。 相似文献
109.
Philippe Meunier Robert Bruce Findler Paul Steckler Mitchell Wand 《Higher-Order and Symbolic Computation》2005,18(3-4):245-269
A set-based program analysis establishes constraints between sets of abstract values for all expressions in a program. Solving
the system of constraints produces a conservative approximation to the program's runtime flow of values.
Some practical set-based analyses use explicit selectors to extract the relevant values from an approximation set. For example,
if the analysis needs to determine the possible return values of a procedure, it uses the appropriate selector to extract
the relevant component from the abstract representation of the procedure.
In this paper, we show that this selector-based approach complicates the constraint solving phase of the analysis too much
and thus fails to scale up to realistic programming languages. We demonstrate this claim with a full-fledged value flow analysis
for case-lambda, a multi-branched version of lambda. We show how both the theoretical underpinnings and the practical implementation become
too complex. In response, we present a variant of set-based closure analysis that computes equivalent results in a much more
efficient manner. 相似文献
110.
Probabilistic Visual Cryptography Schemes 总被引:1,自引:0,他引:1