全文获取类型
收费全文 | 11778篇 |
免费 | 2099篇 |
国内免费 | 1518篇 |
专业分类
电工技术 | 1518篇 |
技术理论 | 2篇 |
综合类 | 1465篇 |
化学工业 | 300篇 |
金属工艺 | 442篇 |
机械仪表 | 1119篇 |
建筑科学 | 676篇 |
矿业工程 | 279篇 |
能源动力 | 177篇 |
轻工业 | 280篇 |
水利工程 | 161篇 |
石油天然气 | 158篇 |
武器工业 | 181篇 |
无线电 | 1841篇 |
一般工业技术 | 880篇 |
冶金工业 | 165篇 |
原子能技术 | 52篇 |
自动化技术 | 5699篇 |
出版年
2024年 | 99篇 |
2023年 | 305篇 |
2022年 | 503篇 |
2021年 | 514篇 |
2020年 | 607篇 |
2019年 | 467篇 |
2018年 | 428篇 |
2017年 | 516篇 |
2016年 | 548篇 |
2015年 | 613篇 |
2014年 | 779篇 |
2013年 | 884篇 |
2012年 | 940篇 |
2011年 | 995篇 |
2010年 | 735篇 |
2009年 | 739篇 |
2008年 | 759篇 |
2007年 | 848篇 |
2006年 | 760篇 |
2005年 | 682篇 |
2004年 | 460篇 |
2003年 | 462篇 |
2002年 | 351篇 |
2001年 | 292篇 |
2000年 | 222篇 |
1999年 | 167篇 |
1998年 | 116篇 |
1997年 | 110篇 |
1996年 | 108篇 |
1995年 | 81篇 |
1994年 | 63篇 |
1993年 | 55篇 |
1992年 | 32篇 |
1991年 | 34篇 |
1990年 | 31篇 |
1989年 | 25篇 |
1988年 | 6篇 |
1987年 | 6篇 |
1986年 | 9篇 |
1985年 | 8篇 |
1984年 | 10篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1975年 | 3篇 |
1957年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
102.
103.
如何高效快速地应对网络中的故障是设计路由协议的基本要求和主要任务。由于动态路由协议在应对网络中的故障时,在协议动态收敛的过程中将会有大量的报文被丢弃。因此,目前路由器厂商普遍采用路由保护方法来克服网络故障,在众多的路由保护方法中,DC(downstream criterion)规则是一种被普遍认可的方法。然而,已有的实现 DC规则算法的时间复杂度普遍较高,并且复杂度随着网络节点平均度的增加而迅速增加。为了应对上述问题,提出一种线性时间复杂度的高效路由保护方案ERPLR(an efficient routing protection method with linear time complexity),该方法首先提出了备份下一跳计算规则,然后在已有最短路径树的基础上,根据备份下一跳计算规则为所有的源目的节点对计算备份下一跳。在计算备份下一跳的过程中,每个节点和其邻居最多被访问一次,因此ERPLR的时间复杂度为O(V+E)。实验结果表明,与已有的实现DC规则相比较,ERPLR在故障保护率和路径拉伸度两个度量指标结果相似的情况下,在真实网络拓扑和模拟拓扑中,ERPLR分别降低了大约74.93%和78.91%的计算开销,该方法可以极大地降低DC规则的计算开销。 相似文献
104.
针对无先验地图条件下电力管廊无人机自主巡检能力不足的问题,本文提出了一种不依赖先验地图的无人机巡检方法。首先,无人机搭载激光雷达,通过SLAM(Simultaneous Localization and Mapping)算法进行实时场景构图,并基于RRT(Rapidly-exploring Random Tree)算法对构建的全局栅格地图进行边界搜索;其次,针对传统RRT算法难以判断环境地图完整性、保障巡检全面性的问题,提出了一种基于数字图像处理的边界检测方法。通过Canny算子对实时构建的地图进行边缘检测,并对地图进行完整性评估。最后,为验证本文提出方法的有效性,在江苏无锡处某220kV电力管廊的仿真模型中进行验证,分别采用RRT算法和本文改进算法进行自主巡检测试,结果表明本文提出的算法相比RRT算法可提升21.8%的巡检覆盖率。 相似文献
105.
106.
107.
《Information Processing Letters》2014,114(10):568-572
The problem of counting maximal independent sets is #P-complete for chordal graphs but solvable in polynomial time for its subclass of interval graphs. This work improves upon both of these results by showing that the problem remains #P-complete when restricted to directed path graphs but that a further restriction to rooted directed path graphs admits a polynomial time solution. 相似文献
108.
In this paper, we aim to solve the finite-horizon optimal control problem for a class of non-linear discrete-time switched systems using adaptive dynamic programming(ADP) algorithm. A new ε-optimal control scheme based on the iterative ADP algorithm is presented which makes the value function converge iteratively to the greatest lower bound of all value function indices within an error according to ε within finite time. Two neural networks are used as parametric structures to implement the iterative ADP algorithm with ε-error bound, which aim at approximating the value function and the control policy, respectively. And then, the optimal control policy is obtained. Finally, a simulation example is included to illustrate the applicability of the proposed method. 相似文献
109.
Chen Qing; Lord Susan T.; Lentz Barry R. 《Protein engineering, design & selection : PEDS》1996,9(6):545-553
To define the role of phosphatidylserine-induced conformationalchanges in prothrombin activation during blood coagulation,a recombinant bovine prothrombin was constructed, characterizedand shown to have a globally native-like conformation. We introduceda cysteine to replace the penultimate residue (Gly581) of apreviously constructed active site mutant, and expressed thedouble mutant in Chinese hamster ovary cells at the level of0.6 µg/ml of cell culture medium. Specific labeling withfluorescein maleimide was accomplished by limited reductionwith dithiothreitol to free the engineered cysteine while maintainingthe native-like functional properties of the molecule. The averagestoichiometry of labeling was 0.84 probe/protein. The locationof the probe at the C-terminus was confirmed by proteolysisby native thrombin, by Taipan venom, and by carboxypeptidaseY. Both the double mutant and labeled prothrombin could be activatedby snake venoms and the prothrombinase but, as expected, thedouble mutant meizothrombin did not autolyze as does nativemeizothrombin. Thus, for the first time, a native-like but specificallylabeled prothrombin has been constructed. This molecule willbe an essential tool for elucidating the structural role ofmembranes during prothrombin activation. In addition, the methodsdescribed might be usefully applied to labeling of an odd, engineeredcysteine in other disulfide bond-containing proteins. 相似文献
110.
In traditional networks special efforts are put to secure the perimeter with firewalls: particular routers that analyze and filter the traffic to separate zones with different levels of trust. In wireless multi-hop networks the perimeter is a concept extremely hard to identify, thus, it is much more effective to enforce control on the nodes that will route more traffic. But traffic filtering and traffic analysis are costly activities for the limited resources of mesh nodes, so a trade-off must be reached limiting the number of nodes that enforce them. This work shows how, using the OLSR protocol, the centrality of groups of nodes with reference to traffic can be estimated with high accuracy independently of the network topology or size. We also show how this approach greatly limits the impact of an attack to the network using a number of firewalls that is only a fraction of the available nodes. 相似文献