全文获取类型
收费全文 | 37400篇 |
免费 | 4079篇 |
国内免费 | 2974篇 |
专业分类
电工技术 | 2767篇 |
技术理论 | 1篇 |
综合类 | 3584篇 |
化学工业 | 2756篇 |
金属工艺 | 814篇 |
机械仪表 | 1475篇 |
建筑科学 | 2051篇 |
矿业工程 | 634篇 |
能源动力 | 770篇 |
轻工业 | 732篇 |
水利工程 | 971篇 |
石油天然气 | 439篇 |
武器工业 | 262篇 |
无线电 | 7421篇 |
一般工业技术 | 2720篇 |
冶金工业 | 776篇 |
原子能技术 | 193篇 |
自动化技术 | 16087篇 |
出版年
2024年 | 209篇 |
2023年 | 702篇 |
2022年 | 1048篇 |
2021年 | 1194篇 |
2020年 | 1221篇 |
2019年 | 1070篇 |
2018年 | 974篇 |
2017年 | 1197篇 |
2016年 | 1427篇 |
2015年 | 1595篇 |
2014年 | 2368篇 |
2013年 | 2415篇 |
2012年 | 2566篇 |
2011年 | 2789篇 |
2010年 | 2130篇 |
2009年 | 2565篇 |
2008年 | 2576篇 |
2007年 | 2616篇 |
2006年 | 2147篇 |
2005年 | 1803篇 |
2004年 | 1489篇 |
2003年 | 1341篇 |
2002年 | 1204篇 |
2001年 | 1070篇 |
2000年 | 908篇 |
1999年 | 718篇 |
1998年 | 625篇 |
1997年 | 526篇 |
1996年 | 437篇 |
1995年 | 346篇 |
1994年 | 270篇 |
1993年 | 214篇 |
1992年 | 148篇 |
1991年 | 92篇 |
1990年 | 72篇 |
1989年 | 55篇 |
1988年 | 42篇 |
1987年 | 24篇 |
1986年 | 24篇 |
1985年 | 54篇 |
1984年 | 43篇 |
1983年 | 41篇 |
1982年 | 45篇 |
1981年 | 5篇 |
1980年 | 6篇 |
1979年 | 10篇 |
1978年 | 4篇 |
1959年 | 8篇 |
1958年 | 2篇 |
1956年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
62.
63.
何明一 《电子科学学刊(英文版)》1994,11(1):1-10
A new concept, the generalized inverse group (GIG) of signal, is firstly proposed and its properties, leaking coefficients and implementation with neural networks are presented. Theoretical analysis and computational simulation have shown that (1) there is a group of finite length of generalized inverse signals for any given finite signal, which forms the GIG; (2) each inverse group has different leaking coefficients, thus different abnormal states; (3) each GIG can be implemented by a grouped and improved single-layer perceptron which appears with fast convergence. When used in deconvolution, the proposed GIG can form a new parallel finite length of filtering deconvolution method. On off-line processing, the computational time is reduced to O(N) from O(N2). And the less the leaking coefficient is, the more reliable the deconvolution will be. 相似文献
64.
65.
Energy minimization and design for testability 总被引:6,自引:0,他引:6
Srimat T. Chakradhar Vishwani D. Agrawal Michael L. Bushnell 《Journal of Electronic Testing》1994,5(1):57-66
The problem of fault detection in general combinational circuits is NP-complete. The only previous result on identifying easily testable circuits is due to Fujiwara who gave a polynomial time algorithm for detecting any single stuck fault inK-bounded circuits. Such circuits may only contain logic blocks with no more thanK input lines and the blocks are so connected that there is no reconvergent fanout among them. We introduce a new class of combinational circuits called the (k, K)-circuits and present a polynomial time algorithm to detect any single or multiple stuck fault in such circuits. We represent the circuit as an undirected graphG with a vertex for each gate and an edge between a pair of vertices whenever the corresponding gates have a connection. For a (k, K)-circuit,G is a subgraph of ak-tree, which, by definition, cannot have a clique of size greater thank+1. Basically, this is a restriction on gate interconnections rather than on the function of gates comprising the circuit. The (k, K)-circuits are a generalization of Fujiwara'sK-bounded circuits. Using the bidirectional neural network model of the circuit and the energy function minimization formulation of the fault detection problem, we present a test generation algorithm for single and multiple faults in (k, K)-circuits. This polynomial time aggorithm minimizes the energy function by recursively eliminating the variables. 相似文献
66.
BP网络过拟合问题研究及应用 总被引:2,自引:0,他引:2
通过类比信息传递过程中的一般测不准关系式,研究BP网络出现过拟合现象时,代表网络学习能力的权值改变量与反映网络推广能力的未参与训练的检验样本的辨识误差之间的关系.在该关系式中引入一个过拟合参数P,通过对岷江流域紫坪埔站的流量预报,说明在判断网络是否出现过拟合现象时,计算过拟合参数P是一种有研究意义的参考. 相似文献
67.
ZHANG Zu-fan DU Hui-ping JIANG Ze Chongqing University of Posts Telecommunications Chongqing China University of Electronic Science Technology of China Chengdu China 《中国邮电高校学报(英文版)》2006,13(4):29-33
1 Introduction The calling dwell time characteristic is critical for the user network planning and deployment, e.g., global system for mobile communications (GSM), as well as the next generation wireless multimedia networks, such as, the currently standar… 相似文献
68.
Christine Di Massimo Paul A. Lant Aidan Saunders Gary A. Montague Ming T. Tham A. Julian Morris 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》1992,53(3):265-277
The last decade has seen the development of a number of approaches for estimating those variables which are difficult to measure on-line in industrial process situations. Whilst a range of techniques is available, a common element is the use of process knowledge in the form of a system model. In the case of bioprocess systems, although a large range of models has been presented in the literature, their use in estimation schemes on an industrial scale has been limited. A number of reasons can be identified for their low level of utilisation. Of particular significance is the uncertainty which exists in quantifying system performance and the process-model mismatch which inevitably results. The level of ‘pre-defined model’ uncertainty, together with the knowledge gained during the course of the fermentation, serves to dictate estimator structure. The paper considers a range of estimation strategies and contrasts, through industrial applications, their performance characteristics and utility. 相似文献
69.
创业资源是创业的基础,创业过程的规律性和市场配置资源的基础作用影响和决定中小企业创业资源的内在功能和形成方式。对中小企业资源的形成机制进行了分析探讨,并分析了它们之间的内在关系。 相似文献
70.
Dynamic Survivability in WDM Mesh Networks Under Dynamic Traffic 总被引:3,自引:0,他引:3
Network survivability is a crucial requirement in WDM mesh networks. In this paper, we systematically consider the problem of dynamic survivability with dynamic single link failure in WDM networks under dynamic traffic demands. Specifically, we investigate various protection schemes, such as dedicated path protection (DPP), shared path protection (SPP), dedicated link protection (DLP), shared link protection (SLP), and two restoration schemes, path restoration (PR) and link restoration (LR). Moreover, two new shared protection methods are proposed, i.e., SRLG-based shared link protection (SRLG-SLP) and SRLG-based shared path protection (SRLG-SPP). The SRLG (shared risk link group) constraint defines the availability of protection resources to a working path, which requires that any two working paths sharing the same risk of failure (or in the same SRLG) cannot share the same protection resources. Furthermore, in our study, we consider a more practical dynamic single-link failure model, in which the link-failure-interarrival time and link-failure-holding time are considered as two independent parameters. Based on this link-failure model, extensive simulations are done to analyze and compare the dynamic survivable performance of various protection and restoration schemes. Resource utilization, protection efficiency, restoration efficiency, and service disruption ratio are employed as survivable performance metrics versus traffic load, link-failure frequency, and link-failure reparation time to evaluate the survivable performance. Many meaningful results are given. In addition, we show that the developed SRLG-SLP and SRLG-SPP protection schemes perform very well in terms of protection efficiency and service disruption ratio, while sacrificing some performance in terms of resource utilization. 相似文献