全文获取类型
收费全文 | 46332篇 |
免费 | 4214篇 |
国内免费 | 5355篇 |
专业分类
电工技术 | 2269篇 |
技术理论 | 79篇 |
综合类 | 5845篇 |
化学工业 | 6139篇 |
金属工艺 | 1008篇 |
机械仪表 | 2682篇 |
建筑科学 | 15837篇 |
矿业工程 | 1861篇 |
能源动力 | 1295篇 |
轻工业 | 783篇 |
水利工程 | 1966篇 |
石油天然气 | 1092篇 |
武器工业 | 749篇 |
无线电 | 2232篇 |
一般工业技术 | 4678篇 |
冶金工业 | 1059篇 |
原子能技术 | 147篇 |
自动化技术 | 6180篇 |
出版年
2025年 | 12篇 |
2024年 | 714篇 |
2023年 | 882篇 |
2022年 | 976篇 |
2021年 | 1394篇 |
2020年 | 1476篇 |
2019年 | 1030篇 |
2018年 | 977篇 |
2017年 | 1192篇 |
2016年 | 1471篇 |
2015年 | 1553篇 |
2014年 | 3926篇 |
2013年 | 2775篇 |
2012年 | 3326篇 |
2011年 | 3495篇 |
2010年 | 2939篇 |
2009年 | 3071篇 |
2008年 | 3000篇 |
2007年 | 3625篇 |
2006年 | 3227篇 |
2005年 | 2954篇 |
2004年 | 2584篇 |
2003年 | 1973篇 |
2002年 | 1424篇 |
2001年 | 1106篇 |
2000年 | 936篇 |
1999年 | 739篇 |
1998年 | 553篇 |
1997年 | 476篇 |
1996年 | 402篇 |
1995年 | 351篇 |
1994年 | 272篇 |
1993年 | 216篇 |
1992年 | 201篇 |
1991年 | 113篇 |
1990年 | 81篇 |
1989年 | 78篇 |
1988年 | 63篇 |
1987年 | 40篇 |
1986年 | 36篇 |
1985年 | 41篇 |
1984年 | 43篇 |
1983年 | 30篇 |
1982年 | 21篇 |
1981年 | 14篇 |
1980年 | 16篇 |
1979年 | 11篇 |
1977年 | 6篇 |
1957年 | 6篇 |
1951年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
In reverse engineering, geometrical information of a product is obtained directly from a physical shape by a digitizing device. To fabricate the product, manufacturing information (usually tool-path) must be generated from a CAD model. The data digitized must be processed and in most cases, a surface model is constructed from them using some of the surface fitting technologies. However, these technologies are usually complicated and the process for constructing a surface patch from a massive digitizing data is time-consuming. To simplify the process for getting tool-path information, a simple algorithm is proposed in this paper. The algorithm is used to generate a 5-axis machining tool-path. Instead of implementing any complicated surface fitting techniques, a direct method is proposed for constructing three-dimensional (3D) triangular mesh from the digitizing data with the mesh points considered as the tool contact locations. Depending on the locations of the points digitized, a decimation procedure is applied such that some of the digitizing data will be filtered out. Then, the tool axis orientations which must be determined in 5-axis tool-path are calculated and the tool center locations are determined accordingly. A 3D biarc fitting technique is applied for all the tool center locations so that a complete 5-axis tool-path is obtained. 相似文献
32.
Vassilis Agouridas Alison McKay Henri Winand Alan de Pennington 《Requirements Engineering》2008,13(1):19-48
This paper reports results of research into the definition of requirements for new consumer products––specifically, electro-mechanical
products. The research dealt with the derivation of design requirements that are demonstrably aligned with stakeholder needs.
The paper describes a comprehensive process that can enable product development teams to deal with statements of product requirements,
as originally collected through market research activities, in a systematic and traceable manner from the early, fuzzy front
end, stages of the design process. The process described has been based on principles of systems engineering. A case study
from its application and evaluation drawn from the power sector is described in this paper. The case study demonstrates how
the process can significantly improve product quality planning practices through revision of captured product requirements,
analysis of stakeholder requirements and derivation of design requirements. The paper discusses benefits and issues from the
use of the process by product development teams, and identifies areas for further research. Finally, the conclusions drawn
from the reported research are presented.
相似文献
Vassilis AgouridasEmail: |
33.
该文介绍了一个基于Web结构和Client/Server结构的软件开发工具sammi,用于创建图型、嵌入应用程序的人机标准平台。 相似文献
34.
Continuity versus Discretization 总被引:1,自引:1,他引:0
The threefold interest in architecture, biology and mathematics motivated us to examine and justify new architectural forms.
We discuss some notions of rhythm: Euclidean, morphogenetic and morphologic. Contemporary relationships between structure
and form are based on the generation of shape by technological processes, thus the resulting objects are restricted to their
material expression. Here a phenomenological organisation of form and its continuity with the landscape arise out of the mathematical
and architectural creativity. The use of the computer is applied from outside to inside instead from inside to outside; this
means that we are dealing with the organisational processes via continuous methods instead of evolutionary processes given
by computer simulations, known as genetic algorithms, where the resulting configurations are reduced to a matter of routine. The role of design as an aesthetic component innovates
the theoretical framework of structural engineering to establish the architectural environments. 相似文献
35.
HUANG Jin 《电脑编程技巧与维护》2008,(16)
AutoCAD是一种人机交互的绘图软件,本身并不具备参数化绘图功能,更不具备尺寸驱动功能,但用户可以利用其所提供的强大的二次开发语言AutoLISP、VisualLISP、VBA开发完全个性化的、性能更为优越的、具有尺寸驱动功能的参数化绘图软件。 相似文献
36.
37.
Although Berman and Hafner [Berman 1989, pp. 928–938] presented the possibility to adapt the model of reasoning of development of an expert system for medical diagnosis to the reasoning of a judge when he/she sentences criminals does not resemble the reasoning found in the decisions of physicians, mathematicians or statisticians.When a lawyer reasons, he/she not only looks for the solution of a case; he/she simultaneously looks for the bases on which his/her reasoning can rest [Galindo 1992, pp. 363–367]. That is to say, he/she not only needs to find the solution but moreover he/she has to find the references (laws, jurisprudence and bibliography) that allow him/her to argue the solution.In many cases, computer solutions to these reasoning processes have been made in a separated way: the solution to the cases using expert systems, and the search of documentation using information retrieval systems.This paper presents the ARPO-2 prototype, a solution integrating the two aspects of legal reasoning: an expert system which is able to simultaneously find the solution to a problem and to give the necessary references so that the lawyer argues the solution. The subject on which the prototype solves problems is the breach of building contracts.In this paper, we describe the process of development of an expert system for solving, justification and documentation of breach of contracts, giving details on the way how the objects that intervene in the case were defined as well as on the reasoning followed.This paper was funded in part by DGICYT, Spanish Civil Law Computerization Project: PB870-632. 相似文献
38.
基于工学结合的网络综合布线教学改革实践 总被引:1,自引:0,他引:1
钟达夫 《数字社区&智能家居》2010,(6):1348-1349
该文阐述了网络综合布线在课程体系的作用,提出了工学结合的教学设计和教学方法,最后给出教学改革产生的教学效果。 相似文献
39.
翟立宏 《电子制作.电脑维护与应用》2013,(11):44
H.261是ITU-T于1990年制定的一个视频编码标准,设计目的是能够在带宽为64kbps的倍数的综合业务数字网上传输质量可接受的视频信号,是最早的运动图像压缩标准,本文对H.261的视频编码标准关键技术研究。 相似文献
40.
Flash memory efficient LTL model checking 总被引:1,自引:0,他引:1
S. EdelkampD. Sulewski J. BarnatL. Brim P. Šime?ek 《Science of Computer Programming》2011,76(2):136-157
As the capacity and speed of flash memories in form of solid state disks grow, they are becoming a practical alternative for standard magnetic drives. Currently, most solid-state disks are based on NAND technology and much faster than magnetic disks in random reads, while in random writes they are generally not.So far, large-scale LTL model checking algorithms have been designed to employ external memory optimized for magnetic disks. We propose algorithms optimized for flash memory access. In contrast to approaches relying on the delayed detection of duplicate states, in this work, we design and exploit appropriate hash functions to re-invent immediate duplicate detection.For flash memory efficient on-the-fly LTL model checking, which aims at finding any counter-example to the specified LTL property, we study hash functions adapted to the two-level hierarchy of RAM and flash memory. For flash memory efficient off-line LTL model checking, which aims at generating a minimal counterexample and scans the entire state space at least once, we analyze the effect of outsourcing a memory-based perfect hash function from RAM to flash memory.Since the characteristics of flash memories are different to magnetic hard disks, the existing I/O complexity model is no longer sufficient. Therefore, we provide an extended model for the computation of the I/O complexity adapted to flash memories that has a better fit to the observed behavior of our algorithms. 相似文献