全文获取类型
收费全文 | 114115篇 |
免费 | 13495篇 |
国内免费 | 7881篇 |
专业分类
电工技术 | 9093篇 |
技术理论 | 3篇 |
综合类 | 13060篇 |
化学工业 | 12958篇 |
金属工艺 | 8847篇 |
机械仪表 | 10861篇 |
建筑科学 | 9152篇 |
矿业工程 | 6366篇 |
能源动力 | 6304篇 |
轻工业 | 3859篇 |
水利工程 | 4957篇 |
石油天然气 | 7205篇 |
武器工业 | 3858篇 |
无线电 | 9027篇 |
一般工业技术 | 9895篇 |
冶金工业 | 4103篇 |
原子能技术 | 1805篇 |
自动化技术 | 14138篇 |
出版年
2024年 | 570篇 |
2023年 | 1658篇 |
2022年 | 3270篇 |
2021年 | 3684篇 |
2020年 | 4057篇 |
2019年 | 3032篇 |
2018年 | 3062篇 |
2017年 | 3985篇 |
2016年 | 4764篇 |
2015年 | 5213篇 |
2014年 | 7695篇 |
2013年 | 7364篇 |
2012年 | 9340篇 |
2011年 | 9972篇 |
2010年 | 7287篇 |
2009年 | 7271篇 |
2008年 | 6726篇 |
2007年 | 8384篇 |
2006年 | 7220篇 |
2005年 | 5875篇 |
2004年 | 4909篇 |
2003年 | 3922篇 |
2002年 | 3149篇 |
2001年 | 2613篇 |
2000年 | 2063篇 |
1999年 | 1662篇 |
1998年 | 1303篇 |
1997年 | 1028篇 |
1996年 | 924篇 |
1995年 | 747篇 |
1994年 | 624篇 |
1993年 | 430篇 |
1992年 | 361篇 |
1991年 | 282篇 |
1990年 | 222篇 |
1989年 | 178篇 |
1988年 | 118篇 |
1987年 | 65篇 |
1986年 | 78篇 |
1985年 | 50篇 |
1984年 | 54篇 |
1983年 | 40篇 |
1982年 | 39篇 |
1981年 | 21篇 |
1980年 | 26篇 |
1979年 | 25篇 |
1977年 | 9篇 |
1976年 | 7篇 |
1959年 | 24篇 |
1951年 | 29篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
102.
Jake Cobb Author Vitae Author Vitae 《Journal of Systems and Software》2008,81(9):1539-1558
Web proxy caches are used to reduce the strain of contemporary web traffic on web servers and network bandwidth providers. In this research, a novel approach to web proxy cache replacement which utilizes neural networks for replacement decisions is developed and analyzed. Neural networks are trained to classify cacheable objects from real world data sets using information known to be important in web proxy caching, such as frequency and recency. Correct classification ratios between 0.85 and 0.88 are obtained both for data used for training and data not used for training. Our approach is compared with Least Recently Used (LRU), Least Frequently Used (LFU) and the optimal case which always rates an object with the number of future requests. Performance is evaluated in simulation for various neural network structures and cache conditions. The final neural networks achieve hit rates that are 86.60% of the optimal in the worst case and 100% of the optimal in the best case. Byte-hit rates are 93.36% of the optimal in the worst case and 99.92% of the optimal in the best case. We examine the input-to-output mappings of individual neural networks and analyze the resulting caching strategy with respect to specific cache conditions. 相似文献
103.
A general topology-based framework for adaptive insertion of cohesive elements in finite element meshes 总被引:1,自引:1,他引:0
Glaucio?H.?PaulinoEmail author Waldemar?Celes Rodrigo?Espinha Zhengyu??Zhang 《Engineering with Computers》2008,24(1):59-78
Large-scale simulation of separation phenomena in solids such as fracture, branching, and fragmentation requires a scalable
data structure representation of the evolving model. Modeling of such phenomena can be successfully accomplished by means
of cohesive models of fracture, which are versatile and effective tools for computational analysis. A common approach to insert
cohesive elements in finite element meshes consists of adding discrete special interfaces (cohesive elements) between bulk
elements. The insertion of cohesive elements along bulk element interfaces for fragmentation simulation imposes changes in
the topology of the mesh. This paper presents a unified topology-based framework for supporting adaptive fragmentation simulations,
being able to handle two- and three-dimensional models, with finite elements of any order. We represent the finite element
model using a compact and “complete” topological data structure, which is capable of retrieving all adjacency relationships
needed for the simulation. Moreover, we introduce a new topology-based algorithm that systematically classifies fractured
facets (i.e., facets along which fracture has occurred). The algorithm follows a set of procedures that consistently perform
all the topological changes needed to update the model. The proposed topology-based framework is general and ensures that
the model representation remains always valid during fragmentation, even when very complex crack patterns are involved. The
framework correctness and efficiency are illustrated by arbitrary insertion of cohesive elements in various finite element
meshes of self-similar geometries, including both two- and three-dimensional models. These computational tests clearly show
linear scaling in time, which is a key feature of the present data-structure representation. The effectiveness of the proposed
approach is also demonstrated by dynamic fracture analysis through finite element simulations of actual engineering problems.
相似文献
Glaucio H. PaulinoEmail: |
104.
We present a formal approach to study the evolution of biological networks. We use the Beta Workbench and its BlenX language to model and simulate networks in connection with evolutionary algorithms. Mutations are done on the structure of BlenX programs and networks are selected at any generation by using a fitness function. The feasibility of the approach is illustrated with a simple example. 相似文献
105.
A residual-based moving block bootstrap procedure for testing the null hypothesis of linear cointegration versus cointegration with threshold effects is proposed. When the regressors and errors of the models are serially and contemporaneously correlated, our test compares favourably with the Sup LM test proposed by Gonzalo and Pitarakis. Indeed, shortcomings of the former motivated the development of our test. The small sample performance of the bootstrap test is investigated by Monte Carlo simulations, and the results show that the test performs better than the Sup LM test. 相似文献
106.
郭雅 《数字社区&智能家居》2009,5(7):5179-5181
高校强调培养动手能力强、生产一线的技术型人才,很多高校瞄准市场对网络人才的需求,纷纷开办网络专业,但目前很多学校网络专业没有很好的实训条件的支撑,导致毕业的学生动手能力不强,不受市场欢迎的尴尬局面.针对这种现象文章论述了建设网络实验室的意义.提出建设的原则。给出满足当前网络技术需求的网络实验室典型解决方案,在此方案基础上设计了网络实验的内容. 相似文献
107.
马甲林 《数字社区&智能家居》2009,(26)
近年来,随着虚拟实验在教学中的应用越来越广泛,虚拟实验已经成为用现代教育技术来辅助教学的重要手段。该文通过实例来说明几种典型实现教学虚拟实验的技术,并对每种技术的优缺点以及适用性做出分析和说明。 相似文献
108.
实验教学是高职计算机网络课程的重要组成部分,目前高职计算机网络实验课程开展困难,效果不明显。该文结合当前高职计算机网络课程实验教学的现状,谈一谈如何利用Packet Tracer模拟软件提高《网络互联技术》课程的实验教学效果。 相似文献
109.
本文在分析5阶锁相环基本原理和线性化数学模型的基础上,给出了一种实用的4阶环路滤波器的设计方法,用Matlab编程计算锁相环的参数;用ADS工具对系统性能进行仿真,仿真结果与预期结果相吻合;比较了具有相同环路带宽和相位裕度下的高阶锁相环的杂散性能。这对5阶电荷泵锁相环的系统设计和仿真有一定的指导意义。 相似文献
110.
为提高无刷直流电动机(BLDCM)控制系统的精度,本文根据电机的数学模型,基于Matlab仿真平台构建了BLDCM电流、转速模糊PI复合控制的双闭环控制系统的仿真模型。该模型采用了一种基于分段线性化的思想,利用Simulink中的Look-Up Table对梯形波感应电动势和电磁转矩进行快速建模的方法。仿真结果表明,该模型准确易行、控制精度高,为实际BLDCM控制系统的设计和调试提供了有效的工具。 相似文献