全文获取类型
收费全文 | 9388篇 |
免费 | 1517篇 |
国内免费 | 1234篇 |
专业分类
电工技术 | 758篇 |
综合类 | 908篇 |
化学工业 | 144篇 |
金属工艺 | 92篇 |
机械仪表 | 394篇 |
建筑科学 | 116篇 |
矿业工程 | 76篇 |
能源动力 | 114篇 |
轻工业 | 60篇 |
水利工程 | 79篇 |
石油天然气 | 56篇 |
武器工业 | 116篇 |
无线电 | 1172篇 |
一般工业技术 | 746篇 |
冶金工业 | 315篇 |
原子能技术 | 17篇 |
自动化技术 | 6976篇 |
出版年
2024年 | 77篇 |
2023年 | 184篇 |
2022年 | 302篇 |
2021年 | 300篇 |
2020年 | 340篇 |
2019年 | 328篇 |
2018年 | 305篇 |
2017年 | 442篇 |
2016年 | 467篇 |
2015年 | 572篇 |
2014年 | 675篇 |
2013年 | 801篇 |
2012年 | 773篇 |
2011年 | 825篇 |
2010年 | 618篇 |
2009年 | 681篇 |
2008年 | 761篇 |
2007年 | 697篇 |
2006年 | 555篇 |
2005年 | 472篇 |
2004年 | 363篇 |
2003年 | 280篇 |
2002年 | 254篇 |
2001年 | 213篇 |
2000年 | 171篇 |
1999年 | 97篇 |
1998年 | 84篇 |
1997年 | 82篇 |
1996年 | 58篇 |
1995年 | 56篇 |
1994年 | 42篇 |
1993年 | 40篇 |
1992年 | 29篇 |
1991年 | 25篇 |
1990年 | 17篇 |
1989年 | 24篇 |
1988年 | 14篇 |
1987年 | 8篇 |
1986年 | 9篇 |
1985年 | 9篇 |
1984年 | 4篇 |
1983年 | 11篇 |
1982年 | 14篇 |
1981年 | 11篇 |
1980年 | 11篇 |
1979年 | 6篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1976年 | 5篇 |
1975年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
11.
Greg A. Breed Paul M. Severns Andrew M. Edwards 《Journal of the Royal Society Interface》2015,12(103)
Lévy flights have gained prominence for analysis of animal movement. In a Lévy flight, step-lengths are drawn from a heavy-tailed distribution such as a power law (PL), and a large number of empirical demonstrations have been published. Others, however, have suggested that animal movement is ill fit by PL distributions or contend a state-switching process better explains apparent Lévy flight movement patterns. We used a mix of direct behavioural observations and GPS tracking to understand step-length patterns in females of two related butterflies. We initially found movement in one species (Euphydryas editha taylori) was best fit by a bounded PL, evidence of a Lévy flight, while the other (Euphydryas phaeton) was best fit by an exponential distribution. Subsequent analyses introduced additional candidate models and used behavioural observations to sort steps based on intraspecific interactions (interactions were rare in E. phaeton but common in E. e. taylori). These analyses showed a mixed-exponential is favoured over the bounded PL for E. e. taylori and that when step-lengths were sorted into states based on the influence of harassing conspecific males, both states were best fit by simple exponential distributions. The direct behavioural observations allowed us to infer the underlying behavioural mechanism is a state-switching process driven by intraspecific interactions rather than a Lévy flight. 相似文献
12.
Neural Machine Translation (NMT) is an end-to-end learning approach for
automated translation, overcoming the weaknesses of conventional phrase-based translation
systems. Although NMT based systems have gained their popularity in commercial
translation applications, there is still plenty of room for improvement. Being the most
popular search algorithm in NMT, beam search is vital to the translation result. However,
traditional beam search can produce duplicate or missing translation due to its target
sequence selection strategy. Aiming to alleviate this problem, this paper proposed neural
machine translation improvements based on a novel beam search evaluation function. And
we use reinforcement learning to train a translation evaluation system to select better
candidate words for generating translations. In the experiments, we conducted extensive
experiments to evaluate our methods. CASIA corpus and the 1,000,000 pairs of bilingual
corpora of NiuTrans are used in our experiments. The experiment results prove that the
proposed methods can effectively improve the English to Chinese translation quality. 相似文献
13.
14.
Efficient multicast search under delay and bandwidth constraints 总被引:1,自引:0,他引:1
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over
only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal
is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has
been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search
cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search
delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost
is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency
between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard.
We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed
strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior
to the implementation of an optimal single user search on a group of users.
Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both
from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California.
From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February
1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University,
Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor
with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York.
Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with
the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks,
mobility, search strategies, and multiple access protocols. 相似文献
15.
可验证秘密分享在实用密码学领域内是一个非常重要的工具,它在密钥管理协议、门限或分布式签名协议、电子商务、多方安全计算及团体式密码系统等许多方面都有极为广泛的应用。针对一类突发事务须及时、安全解决的特点, 利用离散对数问题的难解性,在假设初始化阶段和秘密恢复阶段始终有一位值得信赖的分发者参与的情况下,提出了一个可公开验证的门限秘密分享方案。 相似文献
16.
17.
BIDPS^*是一种把IDA算法和PS法相结合而产生的人工智能搜索算法。该文研究了不考虑启发式计算最小化技术的搜索效率问题,提出了一些新的算法效率的度量,用8数码难题检验了BIDPS算法并与IDA算法进行了比较分析,实验结果表明尽管BIDPS启发式计算量较大,但较IDA算法在效率上还有所提高的。 相似文献
18.
陈国龙 《计算机辅助设计与图形学学报》1994,6(2):136-142
本文介绍了一种在微机上实现的印制板自动布线方法──多级线探索法及其编程方法。这种方法是基于完备布线算法的概念,通过分析李氏算法和传统线探索法的不足之处而得到的。虽然它也是一种线探索法,但有较传统线探索法更强的探索能力,不需要结合李氏算法而能单独完成布线任务,是一种较理想的算法,通过实验获得了较为满意的效果。 相似文献
19.
We consider the problem of rescheduling trains in the case where one track of a railway section consisting of two tracks
in opposing directions is closed due to construction activities. After presenting an appropriate model for this situation
we derive a polynomial algorithm for the subproblem of finding an optimal schedule with minimal latenesss if the subsequences
of trains for both directions outside the construction site are fixed. Based on this algorithm we propose a local search procedure
for the general problem of finding good schedules and report test results for some real world instances.
Received: December 8, 1999 / Accepted: May 2, 2001 相似文献
20.
中国学术期刊网燕化镜像站点建设 总被引:1,自引:0,他引:1
通过中国学术期刊网燕化镜像站点的建设,介绍了燕山石化镜像站点的配置及主要管理功能和对全文数据库的检索,浏览功能,同时介绍了新形势下,信息化建设的新观念,新思路,以及强化信息意识,加强信息服务产业化发展的重要性和迫切性。 相似文献