全文获取类型
收费全文 | 16303篇 |
免费 | 1267篇 |
国内免费 | 1200篇 |
专业分类
电工技术 | 613篇 |
技术理论 | 1篇 |
综合类 | 2265篇 |
化学工业 | 716篇 |
金属工艺 | 192篇 |
机械仪表 | 800篇 |
建筑科学 | 1511篇 |
矿业工程 | 340篇 |
能源动力 | 383篇 |
轻工业 | 394篇 |
水利工程 | 435篇 |
石油天然气 | 284篇 |
武器工业 | 69篇 |
无线电 | 923篇 |
一般工业技术 | 1835篇 |
冶金工业 | 745篇 |
原子能技术 | 86篇 |
自动化技术 | 7178篇 |
出版年
2024年 | 33篇 |
2023年 | 106篇 |
2022年 | 180篇 |
2021年 | 235篇 |
2020年 | 333篇 |
2019年 | 335篇 |
2018年 | 325篇 |
2017年 | 435篇 |
2016年 | 517篇 |
2015年 | 522篇 |
2014年 | 1111篇 |
2013年 | 1131篇 |
2012年 | 1271篇 |
2011年 | 1129篇 |
2010年 | 953篇 |
2009年 | 1117篇 |
2008年 | 1112篇 |
2007年 | 1158篇 |
2006年 | 1017篇 |
2005年 | 916篇 |
2004年 | 720篇 |
2003年 | 652篇 |
2002年 | 519篇 |
2001年 | 505篇 |
2000年 | 426篇 |
1999年 | 345篇 |
1998年 | 271篇 |
1997年 | 205篇 |
1996年 | 166篇 |
1995年 | 158篇 |
1994年 | 138篇 |
1993年 | 117篇 |
1992年 | 95篇 |
1991年 | 79篇 |
1990年 | 75篇 |
1989年 | 83篇 |
1988年 | 60篇 |
1987年 | 29篇 |
1986年 | 19篇 |
1985年 | 18篇 |
1984年 | 12篇 |
1983年 | 12篇 |
1982年 | 11篇 |
1981年 | 12篇 |
1979年 | 9篇 |
1964年 | 8篇 |
1963年 | 9篇 |
1961年 | 8篇 |
1957年 | 7篇 |
1955年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 218 毫秒
931.
Informally, a first-past-the-post game is a (probabilistic) game where the winner is the person who predicts the event that occurs first among a set of events. Examples of first-past-the-post games include so-called block and hidden patterns and the Penney-Ante game invented by Walter Penney. We formalise the abstract notion of a first-past-the-post game, and the process of extending a probability distribution on symbols of an alphabet to the plays of a game. We establish a number of properties of such games, for example, the property that an incomplete first-past-the-post game is also a first-past-the-post game.Penney-Ante games are multi-player games characterised by a collection of regular, prefix-free languages. Analysis of such games is facilitated by a collection of simultaneous (non-linear) equations in languages. Essentially, the equations are due to Guibas and Odlyzko. However, they did not formulate them as equations in languages but as equations in generating functions detailing lengths of words. For such games, we show how to use the equations in languages to calculate the probability of winning and how to calculate the expected length of a game for a given outcome. We also exploit the properties of first-past-the-post games to show how to calculate the probability of winning in the course of a play of the game. In this way, we avoid the construction of a deterministic finite-state machine or the use of generating functions, the two methods traditionally used for the task.We observe that Aho and Corasick's generalisation of the Knuth–Morris–Pratt pattern-matching algorithm can be used to construct the deterministic finite-state machine that recognises the language underlying a Penney-Ante game. The two methods of calculating the probabilities and expected values, one based on the finite-state machine and the other based on the non-linear equations in languages, have been implemented and verified to yield the same results. 相似文献
932.
A method for the estimation of rebar radius by post-processing the raw data acquired by the ground penetrating radar as a B-scan radargram is proposed. Considering the hyperbola trace and the diffracted amplitudes an inverse problem consisting of two steps was stated. Using at first hyperbola fitting, the wave velocity and the coordinates of the hyperbola apex are identified. Then the rebar radius is retrieved as solution of a further optimization problem for which the cost function measures the misfit between the actual value of the maximum diffracted amplitudes and their theoretical predictions. The procedure was implemented in Matlab and tested in realistic situations. The obtained results showed improved accuracy. 相似文献
933.
拟最小化性质是研究椭圆方程弱解的重要工具。该文研究了各向异性的A-调和方程-divA(x,Du)=0障碍问题的弱解,使用了Hlder不等式,Young不等式以及一些基本不等式,完成了各向异性情形下弱解的积分估计,得到了各向异性障碍问题弱解的拟最小化性质。 相似文献
934.
《Computer Languages, Systems and Structures》2014,40(3-4):137-154
It is well-known that the Dolev–Yao adversary is a powerful adversary. Besides acting as the network, intercepting, decomposing, composing and sending messages, he can remember as much information as he needs. That is, his memory is unbounded. We recently proposed a weaker Dolev–Yao like adversary, which also acts as the network, but whose memory is bounded. We showed that this Bounded Memory Dolev–Yao adversary, when given enough memory, can carry out many existing protocol anomalies. In particular, the known anomalies arise for bounded memory protocols, where although the total number of sessions is unbounded, there are only a bounded number of concurrent sessions and the honest participants of the protocol cannot remember an unbounded number of facts or an unbounded number of nonces at a time. This led us to the question of whether it is possible to infer an upper-bound on the memory required by the Dolev–Yao adversary to carry out an anomaly from the memory restrictions of the bounded protocol. This paper answers this question negatively (Theorem 8). 相似文献
935.
对于建筑企业而言,能否实现安全生产直接影响着企业的可持续健康发展。建筑施工业属于事故多发行业,随着建筑施工规模及难度的加大,建筑施工安全生产方面的事故发生率也在不断上升。因此,加强建筑施工安全管理意义重大。 相似文献
937.
Rafael K. de Andrades Márcio Dorn Daniel S. Farenzena Luis C. Lamb 《Expert systems with applications》2013,40(13):5210-5218
The Medical and Pharmaceutical industries have shown high interest in the precise engineering of protein hormones and enzymes that perform existing functions under a wide range of conditions. Proteins are responsible for the execution of different functions in the cell: catalysis in chemical reactions, transport and storage, regulation and recognition control. Computational Protein Design (CPD) investigates the relationship between 3-D structures of proteins and amino acid sequences and looks for all sequences that will fold into such 3-D structure. Many computational methods and algorithms have been proposed over the last years, but the problem still remains a challenge for Mathematicians, Computer Scientists, Bioinformaticians and Structural Biologists. In this article we present a new method for the protein design problem. Clustering techniques and a Dead-End-Elimination algorithm are combined with a SAT problem representation of the CPD problem in order to design the amino acid sequences. The obtained results illustrate the accuracy of the proposed method, suggesting that integrated Artificial Intelligence techniques are useful tools to solve such an intricate problem. 相似文献
938.
The present research examined how problem characteristics might influence the online helping behavior of shy individuals. Three hundred undergraduates were recruited and assessed using the College Students’ Shyness Scale. According to the scores, 68 high-shy students and 68 low-shy students were selected to participate in simulated experiments designed to determine the influence of the shyness level, the presence of a foreseeable reward, the complexity of the problem, and the urgency of the problem influence online helping behavior. The results showed that (a) High-shy individuals tended to exhibit online helping behavior more for low-complexity problems and high-urgency problems than for high-complexity problems and low-urgency problems. (b) Low-shy individuals always exhibited online helping behavior less for high-complexity problems and when no reward was offered than they did for low-complexity problems and when a reward was offered. (c) High-shy individuals showed online helping behavior more than low-shy individuals did for no-reward, high-complexity problems and high-urgency problems. (d) Participants online had higher shyness scores for showing helping behavior than those offline. 相似文献
939.
帝国竞争算法是一种局部搜索能力较强的群智能优化算法,但过度的局部搜索会导致多样性丢失并陷入局部最优。针对这一问题提出基于多样化搜索的帝国竞争算法(MSSICA)。将国家定义为一条可行解,将王国定义成四种特性不同的组合人造解方式。在搜索时使用区块机制保留各自的优势解片段,并对不同的帝国使用差异化的组合人造解方式以搜索不同解空间的有效可行解信息。在陷入局部最优时,使用多样化搜索策略注入均匀分布的可行解替换较无优势的解以提升多样性。实验结果显示,多样化搜索策略可以有效地改善帝国算法的求解多样性,并提升求解质量与稳定性。 相似文献
940.
The increased use of nonlinear loads in distribution system is increasing the distortion in the voltage and current waveforms. Moreover, the distribution systems are inherently unbalanced. This paper presents Cuckoo Optimization Algorithm (COA) based Unified Power Quality Conditioner (UPQC) allocation in three phase unbalanced distribution network. The performance of UPQC is studied in terms of minimization of load disturbance during fault condition in the test systems, % reduction of total harmonic distortion and individual harmonics, minimization of real power loss, decrease in voltage unbalance and increase in cost savings during normal operating condition. The performance of COA is compared with other soft computing techniques to get the better results, i.e., better voltage profile, the optimal location and optimal number of UPQCs. 相似文献