全文获取类型
收费全文 | 13191篇 |
免费 | 903篇 |
国内免费 | 854篇 |
专业分类
电工技术 | 364篇 |
综合类 | 748篇 |
化学工业 | 1307篇 |
金属工艺 | 395篇 |
机械仪表 | 1420篇 |
建筑科学 | 1068篇 |
矿业工程 | 217篇 |
能源动力 | 545篇 |
轻工业 | 278篇 |
水利工程 | 279篇 |
石油天然气 | 398篇 |
武器工业 | 93篇 |
无线电 | 859篇 |
一般工业技术 | 689篇 |
冶金工业 | 344篇 |
原子能技术 | 139篇 |
自动化技术 | 5805篇 |
出版年
2024年 | 84篇 |
2023年 | 126篇 |
2022年 | 181篇 |
2021年 | 279篇 |
2020年 | 241篇 |
2019年 | 245篇 |
2018年 | 241篇 |
2017年 | 306篇 |
2016年 | 394篇 |
2015年 | 418篇 |
2014年 | 749篇 |
2013年 | 726篇 |
2012年 | 750篇 |
2011年 | 1071篇 |
2010年 | 712篇 |
2009年 | 729篇 |
2008年 | 786篇 |
2007年 | 942篇 |
2006年 | 881篇 |
2005年 | 759篇 |
2004年 | 697篇 |
2003年 | 722篇 |
2002年 | 528篇 |
2001年 | 431篇 |
2000年 | 300篇 |
1999年 | 308篇 |
1998年 | 270篇 |
1997年 | 219篇 |
1996年 | 165篇 |
1995年 | 166篇 |
1994年 | 106篇 |
1993年 | 71篇 |
1992年 | 78篇 |
1991年 | 51篇 |
1990年 | 41篇 |
1989年 | 45篇 |
1988年 | 31篇 |
1987年 | 9篇 |
1986年 | 16篇 |
1985年 | 22篇 |
1984年 | 12篇 |
1983年 | 10篇 |
1982年 | 9篇 |
1981年 | 6篇 |
1980年 | 5篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1976年 | 3篇 |
1973年 | 2篇 |
1972年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
Correlation between a dithering signal and the prediction error has been used for detecting model mismatch in univariate model based control systems. This paper extends that approach to MIMO control systems. A closed-loop cross-correlation method is presented to detect which specific input-output pairings of a model-based controller are mismatched. This method may be used in screening the complete set of models and in selecting candidate models for re-identification. The method first finds the rows and columns of the transfer function matrix that contain mismatch, and then the candidates are found by the intersection of the said rows and columns. Placing the system under partial control, whereby one or more of the manipulated variables are held constant, can be used to further reduce the set of candidate models. 相似文献
22.
基于MVC模式的Struts框架研究 总被引:5,自引:0,他引:5
Struts框架是当前Web应用开发中最流行的开发框架之一。在介绍了MVC模式的基础上对Struts框架的体系结构和工作流程作了介绍,并结合数据库连接池实现了一个电子商务网站的客户登录系统。 相似文献
23.
目前,制约竞争情报发展的一个关键问题就是情报的收集与分析手段比较落后,远远不能胜任竞争情报系统所蕴含的特点和功效。本文将竞争情报作为一种特殊的知识,吸纳知识发现理论成果和方法,提升现有竞争情报系统的构造技术,真正做到快速、全面、准确和智能化的竞争情报生成和利用。 相似文献
24.
Certain behavioral properties of distributed systems are difficult to express in interleaving semantics, whereas they are naturally expressed in terms of partial orders of events or, equivalently, Mazurkiewicz traces. Two examples of such properties are serializability of a database and global snapshots of concurrent systems. Recently, a modest extension for LTL by an operator that expresses snapshots, has been proposed. It combines the ease of linear (interleaving) specification with this useful partial order concept. The new construct allows one to assert that a global snapshot appeared in the past, perhaps not in the observed execution sequence, but possibly in an equivalent one. 相似文献
25.
We propose a data mining approach to predict human wine taste preferences that is based on easily available analytical tests at the certification step. A large dataset (when compared to other studies in this domain) is considered, with white and red vinho verde samples (from Portugal). Three regression techniques were applied, under a computationally efficient procedure that performs simultaneous variable and model selection. The support vector machine achieved promising results, outperforming the multiple regression and neural network methods. Such model is useful to support the oenologist wine tasting evaluations and improve wine production. Furthermore, similar techniques can help in target marketing by modeling consumer tastes from niche markets. 相似文献
26.
Per Bjesse 《Formal Methods in System Design》2009,35(1):56-72
In this paper we present a word-level model checking method that attempts to speed up safety property checking of industrial
netlists. Our aim is to construct an algorithm that allows us to check both bounded and unbounded properties using standard
bit-level model checking methods as back-end decision procedures, while incurring minimum runtime penalties for designs that
are unsuited to our analysis. We do this by combining modifications of several previously known techniques into a static abstraction
algorithm which is guaranteed to produce bit-level netlists that are as small or smaller than the original bitblasted designs.
We evaluate our algorithm on several challenging hardware components. 相似文献
27.
Model reference control design methods fail when the plant has one or more non-minimum phase zeros that are not included in the reference model, leading possibly to an unstable closed loop. This is a very serious problem for data-based control design methods, where the plant is typically unknown. In this paper, we extend the Virtual Reference Feedback Tuning method to non-minimum phase plants. This extension is based on the idea proposed in Lecchini and Gevers (2002) for Iterative Feedback Tuning. We present a simple two-step procedure that can cope with the situation where the unknown plant may or may not have non-minimum phase zeros. 相似文献
28.
Marie-Nathalie Contou-Carrere Yiannis N. Kaznessis Prodromos Daoutidis 《Systems & Control Letters》2011,60(1):75-86
This paper addresses the model reduction problem for a class of stiff chemical Langevin equations that arise as models of biomolecular networks with fast and slow reactions and can be described as continuous Markov processes. Initially, a coordinate transformation is sought that allows the decoupling of fast and slow variables in the model equations. Necessary and sufficient conditions are derived for such a linear transformation to exist, along with an explicit change of variables which achieves the desired decoupling. For the systems for which this step is applicable, the method of adiabatic elimination is applied to determine a representation of the slow dynamics. Theoretical concepts and results are illustrated with simple examples. 相似文献
29.
Flash memory efficient LTL model checking 总被引:1,自引:0,他引:1
S. EdelkampD. Sulewski J. BarnatL. Brim P. Šime?ek 《Science of Computer Programming》2011,76(2):136-157
As the capacity and speed of flash memories in form of solid state disks grow, they are becoming a practical alternative for standard magnetic drives. Currently, most solid-state disks are based on NAND technology and much faster than magnetic disks in random reads, while in random writes they are generally not.So far, large-scale LTL model checking algorithms have been designed to employ external memory optimized for magnetic disks. We propose algorithms optimized for flash memory access. In contrast to approaches relying on the delayed detection of duplicate states, in this work, we design and exploit appropriate hash functions to re-invent immediate duplicate detection.For flash memory efficient on-the-fly LTL model checking, which aims at finding any counter-example to the specified LTL property, we study hash functions adapted to the two-level hierarchy of RAM and flash memory. For flash memory efficient off-line LTL model checking, which aims at generating a minimal counterexample and scans the entire state space at least once, we analyze the effect of outsourcing a memory-based perfect hash function from RAM to flash memory.Since the characteristics of flash memories are different to magnetic hard disks, the existing I/O complexity model is no longer sufficient. Therefore, we provide an extended model for the computation of the I/O complexity adapted to flash memories that has a better fit to the observed behavior of our algorithms. 相似文献
30.