全文获取类型
收费全文 | 6571篇 |
免费 | 396篇 |
国内免费 | 307篇 |
专业分类
电工技术 | 184篇 |
技术理论 | 3篇 |
综合类 | 346篇 |
化学工业 | 1423篇 |
金属工艺 | 454篇 |
机械仪表 | 221篇 |
建筑科学 | 494篇 |
矿业工程 | 151篇 |
能源动力 | 197篇 |
轻工业 | 390篇 |
水利工程 | 65篇 |
石油天然气 | 365篇 |
武器工业 | 29篇 |
无线电 | 707篇 |
一般工业技术 | 1158篇 |
冶金工业 | 256篇 |
原子能技术 | 74篇 |
自动化技术 | 757篇 |
出版年
2024年 | 26篇 |
2023年 | 141篇 |
2022年 | 285篇 |
2021年 | 304篇 |
2020年 | 228篇 |
2019年 | 134篇 |
2018年 | 152篇 |
2017年 | 151篇 |
2016年 | 193篇 |
2015年 | 279篇 |
2014年 | 346篇 |
2013年 | 352篇 |
2012年 | 332篇 |
2011年 | 526篇 |
2010年 | 385篇 |
2009年 | 373篇 |
2008年 | 390篇 |
2007年 | 399篇 |
2006年 | 305篇 |
2005年 | 289篇 |
2004年 | 239篇 |
2003年 | 233篇 |
2002年 | 148篇 |
2001年 | 172篇 |
2000年 | 213篇 |
1999年 | 106篇 |
1998年 | 86篇 |
1997年 | 60篇 |
1996年 | 43篇 |
1995年 | 51篇 |
1994年 | 42篇 |
1993年 | 41篇 |
1992年 | 43篇 |
1991年 | 35篇 |
1990年 | 21篇 |
1989年 | 18篇 |
1988年 | 22篇 |
1987年 | 26篇 |
1986年 | 26篇 |
1985年 | 11篇 |
1984年 | 4篇 |
1983年 | 8篇 |
1982年 | 2篇 |
1981年 | 7篇 |
1980年 | 8篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 6篇 |
1976年 | 2篇 |
1975年 | 2篇 |
排序方式: 共有7274条查询结果,搜索用时 15 毫秒
71.
Elections are a central model in a variety of areas. This paper studies parameterized computational complexity of five control problems in the Maximin election. We obtain the following results: constructive control by adding candidates is W[2]-hard with respect to the parameter “number of added candidates”; both constructive and destructive control by adding/deleting voters are W[1]-hard with respect to the parameter “number of added/deleted voters”. 相似文献
72.
Marco Riani 《Computational statistics & data analysis》2010,54(12):3300-3312
The forward search provides data-driven flexible trimming of a Cp statistic for the choice of regression models that reveals the effect of outliers on model selection. An informed robust model choice follows. Even in small samples, the statistic has a null distribution indistinguishable from an F distribution. Limits on acceptable values of the Cp statistic follow. Two examples of widely differing size are discussed. A powerful graphical tool is the generalized candlestick plot, which summarizes the information on all forward searches and on the choice of models. A comparison is made with the use of M-estimation in robust model choice. 相似文献
73.
An obnoxious facility is to be located inside a polygonal region of the plane, maximizing the sum of the k smallest weighted Euclidean distances to n given points, each protected by some polygonal forbidden region. For the unweighted case and k fixed an O(n2logn) time algorithm is presented. For the weighted case a thorough study of the relevant structure of the multiplicatively weighted order-k-Voronoi diagram leads to the design of an O(kn3+n3logn) time algorithm for finding an optimal solution to the anti-t-centrum problem for every t=1,…,k, simultaneously. 相似文献
74.
姜莹 《数码设计:surface》2010,(8):116-118
装饰图案以多种形式,广泛的应用于上海世博会展馆外墙。新材料、新工艺、新技术促进装饰图案以更加新颖的形式出现。未来装饰图案应用呈现多元化趋势。 相似文献
75.
Khalida Inayat Noor Sarfraz Nawaz Malik 《Computers & Mathematics with Applications》2011,62(1):367-375
The aim of this paper is to generalize the conic domain defined by Kanas and Wisniowska, and define the class of functions which map the open unit disk E onto this generalized conic domain. A brief comparison between these conic domains is the main motivation of this paper. A correction is made in selecting the range interval of order of conic domain. 相似文献
76.
77.
The satisfiability problem is a basic core NP-complete problem. In recent years, a lot of heuristic algorithms have been developed to solve this problem, and many experiments have evaluated and compared the performance of different heuristic algorithms. However, rigorous theoretical analysis and comparison are rare. This paper analyzes and compares the expected runtime of three basic heuristic algorithms: RandomWalk, (1+1) EA, and hybrid algorithm. The runtime analysis of these heuristic algorithms on two 2-SAT instances shows that the expected runtime of these heuristic algorithms can be exponential time or polynomial time. Furthermore, these heuristic algorithms have their own advantages and disadvantages in solving different SAT instances. It also demonstrates that the expected runtime upper bound of RandomWalk on arbitrary k-SAT (k?3) is O(n(k−1)), and presents a k-SAT instance that has Θ(n(k−1)) expected runtime bound. 相似文献
78.
Observer-based networked control for continuous-time systems with random sensor delays 总被引:3,自引:0,他引:3
This paper is concerned with the networked control system design for continuous-time systems with random measurement, where the measurement channel is assumed to subject to random sensor delay. A design scheme for the observer-based output feedback controller is proposed to render the closed-loop networked system exponentially mean-square stable with H∞ performance requirement. The technique employed is based on appropriate delay systems approach combined with a matrix variable decoupling technique. The design method is fulfilled through solving linear matrix inequalities. A numerical example is used to verify the effectiveness and the merits of the present results. 相似文献
79.
We revisit in this paper the concept of decoding binary cyclic codes with Gröbner bases. These ideas were first introduced by Cooper, then Chen, Reed, Helleseth and Truong, and eventually by Orsini and Sala. We discuss here another way of putting the decoding problem into equations: the Newton identities. Although these identities have been extensively used for decoding, the work was done manually, to provide formulas for the coefficients of the locator polynomial. This was achieved by Reed, Chen, Truong and others in a long series of papers, for decoding quadratic residue codes, on a case-by-case basis. It is tempting to automate these computations, using elimination theory and Gröbner bases.Thus, we study in this paper the properties of the system defined by the Newton identities, for decoding binary cyclic codes. This is done in two steps, first we prove some facts about the variety associated with this system, then we prove that the ideal itself contains relevant equations for decoding, which lead to formulas.Then we consider the so-called online Gröbner basis decoding, where the work of computing a Gröbner basis is done for each received word. It is much more efficient for practical purposes than preprocessing and substituting into the formulas. Finally, we conclude with some computational results, for codes of interesting length (about one hundred). 相似文献
80.
This paper presents a novel quadratic optimal neural fuzzy control for synchronization of uncertain chaotic systems via H∞ approach. In the proposed algorithm, a self-constructing neural fuzzy network (SCNFN) is developed with both structure and parameter learning phases, so that the number of fuzzy rules and network parameters can be adaptively determined. Based on the SCNFN, an uncertainty observer is first introduced to watch compound system uncertainties. Subsequently, an optimal NFN-based controller is designed to overcome the effects of unstructured uncertainty and approximation error by integrating the NFN identifier, linear optimal control and H∞ approach as a whole. The adaptive tuning laws of network parameters are derived in the sense of quadratic stability technique and Lyapunov synthesis approach to ensure the network convergence and H∞ synchronization performance. The merits of the proposed control scheme are not only that the conservative estimation of NFN approximation error bound is avoided but also that a suitable-sized neural structure is found to sufficiently approximate the system uncertainties. Simulation results are provided to verify the effectiveness and robustness of the proposed control method. 相似文献