全文获取类型
收费全文 | 44085篇 |
免费 | 4960篇 |
国内免费 | 2513篇 |
专业分类
电工技术 | 3327篇 |
技术理论 | 3篇 |
综合类 | 5559篇 |
化学工业 | 2253篇 |
金属工艺 | 1558篇 |
机械仪表 | 3238篇 |
建筑科学 | 4850篇 |
矿业工程 | 2220篇 |
能源动力 | 1083篇 |
轻工业 | 4300篇 |
水利工程 | 2189篇 |
石油天然气 | 4372篇 |
武器工业 | 1089篇 |
无线电 | 3383篇 |
一般工业技术 | 2972篇 |
冶金工业 | 1415篇 |
原子能技术 | 306篇 |
自动化技术 | 7441篇 |
出版年
2024年 | 253篇 |
2023年 | 654篇 |
2022年 | 1248篇 |
2021年 | 1504篇 |
2020年 | 1586篇 |
2019年 | 1294篇 |
2018年 | 1285篇 |
2017年 | 1438篇 |
2016年 | 1796篇 |
2015年 | 1831篇 |
2014年 | 3092篇 |
2013年 | 2638篇 |
2012年 | 3542篇 |
2011年 | 3605篇 |
2010年 | 2685篇 |
2009年 | 2724篇 |
2008年 | 2496篇 |
2007年 | 3048篇 |
2006年 | 2651篇 |
2005年 | 2336篇 |
2004年 | 1856篇 |
2003年 | 1557篇 |
2002年 | 1162篇 |
2001年 | 1012篇 |
2000年 | 836篇 |
1999年 | 667篇 |
1998年 | 491篇 |
1997年 | 462篇 |
1996年 | 368篇 |
1995年 | 296篇 |
1994年 | 241篇 |
1993年 | 185篇 |
1992年 | 111篇 |
1991年 | 110篇 |
1990年 | 71篇 |
1989年 | 95篇 |
1988年 | 37篇 |
1987年 | 34篇 |
1986年 | 32篇 |
1985年 | 22篇 |
1984年 | 31篇 |
1983年 | 28篇 |
1982年 | 17篇 |
1981年 | 14篇 |
1979年 | 11篇 |
1978年 | 9篇 |
1977年 | 8篇 |
1975年 | 7篇 |
1963年 | 7篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
221.
222.
在线误码监测方法及其性能 总被引:1,自引:0,他引:1
本文论述了在数字通信中进行在线误码监测的必要性,介绍了几种在线误码监测方法,并对其监测性能进行了理论分析。 相似文献
223.
Oliver W. W. Yang 《Performance Evaluation》1995,23(3):261-284
This paper analyzes and compares the slotted time operation and the non-slotted time operation of a singleserver system with deterministic service time. These two operations are commonly used to model discrete service time systems in computer or digital communications. But due to the similarity in their operations and performance, the two models may be mixed up with each other. This paper examines by means of queueing analysis the performance of a few classes of systems that differ in the service order of their customers. The means and variances of the queue lengths, waiting times and interdeparture times of FCFS systems using the slotted time operations are first obtained from their respective LST and generating function equations. These are then used for comparison with those in non-slotted time systems. The results show that although the slotted time operation in the FCFS systems can be approximated by the non-slotted time operations under heavy traffic condition, the performances under other regions and service disciplines (e.g., the LCFS and the priority systems) may deviate significantly. They must be properly adjusted if one wishes to use the simpler equations of the non-slotted time operations to approximate the slotted time operations. The comparison graphs provided in this paper supply adjustments guidelines for the careful designers. 相似文献
224.
用反应谱理论对三峡左厂房坝导墙3种典型设计断面型式进行了抗震计算分析比较,得出了其自振特性及地震动位移、动应力响应。对选定的设计断面型式Ⅲ进行了抗拉应力强度安全性评价。 相似文献
225.
Since Samuel's work on checkers over thirty years ago, much effort has been devoted to learning evaluation functions. However, all such methods are sensitive to the feature set chosen to represent the examples. If the features do not capture aspects of the examples significant for problem solving, the learned evaluation function may be inaccurate or inconsistent. Typically, good feature sets are carefully handcrafted and a great deal of time and effort goes into refining and tuning them. This paper presents an automatic knowledge-based method for generating features for evaluation functions. The feature set is developed iteratively: features are generated, then evaluated, and this information is used to develop new features in turn. Both the contribution of a feature and its computational expense are considered in determining whether and how to develop it further.
This method has been applied to two problem-solving domains: the Othello board game and the domain of telecommunications network management. Empirical results show that the method is able to generate many known features and several novel features and to improve concept accuracy in both domains. 相似文献
This method has been applied to two problem-solving domains: the Othello board game and the domain of telecommunications network management. Empirical results show that the method is able to generate many known features and several novel features and to improve concept accuracy in both domains. 相似文献
226.
An Extended Replication of an Experiment for Assessing Methods for Software Requirements Inspections 总被引:1,自引:1,他引:0
Kristian Sandahl Ola Blomkvist Joachim Karlsson Christian Krysander Mikael Lindvall Niclas Ohlsson 《Empirical Software Engineering》1998,3(4):327-354
We have performed an extended replication of the Porter-Votta-Basili experiment comparing the Scenario method and the Checklist method for inspecting requirements specifications using identical instruments. The experiment has been conducted in our educational context represented by a more general definition of a defect compared to the original defect list. Our study involving 24 undergraduate students manipulated three independent variables: detection method, requirements specification, and the order of the inspections. The dependent variable measured is the defect detection rate. We found the requirements specification inspected and not the detection method to be the most probable explanation for the variance in defect detection rate. This suggests that it is important to gather knowledge of how a requirements specification can convey an understandable view of the product and to adapt inspection methods accordingly. Contrary to the original experiment, we can not significantly support the superiority of the Scenario method. This is in accordance with a replication conducted by Fusaro, Lanubile and Visaggio, and might be explained by the lack of individual defect detection skill of our less experienced subjects. 相似文献
227.
本文对二十余年来人们在逻辑与数据库相结合领域所作的工作进行了归纳总结,并把它们区分为三类:理论和完全关系结构方法,纯理论方法以及理论和不完全关系结构方法。本文简要介绍了这三种方法的基本思想和关键技术,并讨论了它们各自的特点和适用范围。 相似文献
228.
针对战时装备供应链的特点,以远程精确打击、敌特后方袭扰和恶劣天气等三个因素为主要风险指标,运用修正的模糊信息熵权对TOPSIS法进行改进,提出了一种新的战时装备供应链风险评估方法。首先利用原始数据产生的模糊信息熵权进行客观赋权,并引入专家因素对权重进行主观修正,利用逼近理想解排序方法进行运算,最后通过实例计算与分析,验证该评估方法简便易行,结论合理,有效降低了指挥员决策的主观随意性。 相似文献
229.
如何提升系统的互操作性是当前仿真领域需要着力解决的问题,而理解互操作问题产生的根源则是提升互操作性的前提。从互操作性的概念分析人手,剖析了仿真系统互操作问题产生的原因,将之概括为组织、抽象和实现三个层面,并提出了相应的解决框架。框架通过建立概念模型库和平台无关模型库解决抽象层面的问题,利用模型实现的自动化和服务化解决实现层面的问题,可以作为领域内解决互操作问题的借鉴。最后提出了使用对比法和测试法评估系统互操作性的思路。 相似文献
230.
随着当前世界经济的快速发展,我们已经进入了信息化和数字化的时代,在这种大的背景下,做好信息的安全管理和评估尤为重要,并越来越受到人们的重视。文章就从这一问题出发,其中根据当前信息安全监管过程中出现的相关问题展开分析,并重点探讨了信息技术在安全评估当中的应用问题。 相似文献