全文获取类型
收费全文 | 18799篇 |
免费 | 574篇 |
国内免费 | 360篇 |
专业分类
电工技术 | 847篇 |
综合类 | 1131篇 |
化学工业 | 2023篇 |
金属工艺 | 1483篇 |
机械仪表 | 2061篇 |
建筑科学 | 1202篇 |
矿业工程 | 609篇 |
能源动力 | 1000篇 |
轻工业 | 288篇 |
水利工程 | 276篇 |
石油天然气 | 404篇 |
武器工业 | 328篇 |
无线电 | 1042篇 |
一般工业技术 | 1228篇 |
冶金工业 | 996篇 |
原子能技术 | 218篇 |
自动化技术 | 4597篇 |
出版年
2024年 | 8篇 |
2023年 | 97篇 |
2022年 | 185篇 |
2021年 | 246篇 |
2020年 | 273篇 |
2019年 | 201篇 |
2018年 | 216篇 |
2017年 | 266篇 |
2016年 | 294篇 |
2015年 | 519篇 |
2014年 | 908篇 |
2013年 | 928篇 |
2012年 | 958篇 |
2011年 | 1409篇 |
2010年 | 938篇 |
2009年 | 1035篇 |
2008年 | 1113篇 |
2007年 | 1590篇 |
2006年 | 1410篇 |
2005年 | 1313篇 |
2004年 | 1083篇 |
2003年 | 1039篇 |
2002年 | 755篇 |
2001年 | 516篇 |
2000年 | 428篇 |
1999年 | 376篇 |
1998年 | 310篇 |
1997年 | 224篇 |
1996年 | 210篇 |
1995年 | 146篇 |
1994年 | 135篇 |
1993年 | 102篇 |
1992年 | 68篇 |
1991年 | 89篇 |
1990年 | 56篇 |
1989年 | 54篇 |
1988年 | 41篇 |
1987年 | 26篇 |
1986年 | 19篇 |
1985年 | 22篇 |
1984年 | 20篇 |
1983年 | 9篇 |
1982年 | 13篇 |
1981年 | 8篇 |
1980年 | 6篇 |
1979年 | 11篇 |
1978年 | 8篇 |
1977年 | 9篇 |
1976年 | 13篇 |
1974年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
51.
基于粒子系统和音频系统的烟花模拟 总被引:2,自引:1,他引:1
针对模糊物体的模拟方法存在着粒子数量绘制巨大、粒子运动状态复杂、计算耗时、实时性及逼真性不够等问题,提出了一种基于粒子系统和音频系统的烟花模拟方法,以三角形格作为绘制烟花粒子的基本图元,结合纹理映射,色彩融合技术来绘制烟花粒子,在显示列表中生成纹理,再结合FMOD引擎技术,加入音频系统,实验结果表明提出的方法增强了模拟的逼真性. 相似文献
52.
Ralf Steinmetz Author VitaeAndré KönigAuthor Vitae 《Performance Evaluation》2011,68(9):750-767
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments. 相似文献
53.
54.
55.
LI Zhi 《数字社区&智能家居》2008,(26)
当网络以难以想象的高速发展的时候,由于各行各业的人们加入网络语言逐渐形成了自己的风格。作为一种新兴的媒体语言,网络语言具有经济、直接、生动、活泼等特点。该文从修辞的视角对大量的网站名称实例进行分析,并介绍网站名称的构成特点、翻译及修辞效果。 相似文献
56.
一体化水下航行器仿真系统软件设计 总被引:5,自引:1,他引:4
文章研究了水下自动航行器仿真系统的一体化软件设计原则和方法,给出了仿真系统的软件结构及其关键的设计技术。 相似文献
57.
探索了一种在多媒体环境下进行计算机及外部设备维修教学、训练的新方法 ,介绍了计算机维修模拟训练系统的设计与实现 ,给出了主要的设计思想、总体结构及关键技术。 相似文献
58.
An accurate acceptance-rejection algorithm is devised and tested. The procedure requires an average of less than 3 uniform deviates whenever the standard deviation of the distribution is at least 4, and this number decreases monotonically to 2.63 as . Variable parameters are permitted, and no subroutines for sampling from other statistical distributions are needed.This research was supported by the Austrian Research Council (Fonds zur Förderung der wissenschaftlichen Forschung). 相似文献
59.
Operational risk is commonly analyzed in terms of the distribution of aggregate yearly losses. Risk measures can then be computed as statistics of this distribution that focus on the region of extreme losses. Assuming independence among the operational risk events and between the likelihood that they occur and their magnitude, separate models are made for the frequency and for the severity of the losses. These are then combined to estimate the distribution of aggregate losses. While the detailed form of the frequency distribution does not significantly affect the risk analysis, the choice of model for the severity often has a significant impact on operational risk measures. For heavy-tailed distributions these measures are dominated by extreme losses, whose probability cannot be reliably extrapolated from the available data. With limited empirical evidence, it is difficult to distinguish among alternative models that produce very different values of the risk measures. Furthermore, the estimates obtained can be unstable and overly sensitive to the presence or absence of single extreme events. Setting a bound on the maximum amount that can be lost in a single event reduces the dependence on the distributional assumptions and improves the robustness and stability of the risk measures, while preserving their sensitivity to changes in the risk profile. This bound should be determined by expert assessment on the basis of economic arguments and validated by the regulator, so that it can be used as a control parameter in the risk analysis. 相似文献
60.
Nguyen Quoc Dinh Author VitaeDong-Sung KimAuthor Vitae 《Computer Standards & Interfaces》2012,34(1):117-123
The International Society of Automation recently released ISA100.11a as an open standard for reliable wireless networks for industrial automation. ISA100.11a uses the TDMA scheme in the medium access layer to provide deterministic services. However, ISA100.11a adopts the CSMA-CA mechanism with priorities for retransmission from failure on dedicated links, sporadic data, and network configuration.This paper evaluates ISA100.11a CSMA-CA by simulation, considering the effects of backoff procedures and priority settings to probability of collision and successful use of slots. It's demonstrated that a high number of priority classes enable better network utilization resulting in less number of packets exceeding their lifetime. 相似文献