全文获取类型
收费全文 | 15197篇 |
免费 | 1793篇 |
国内免费 | 1278篇 |
专业分类
电工技术 | 555篇 |
技术理论 | 1篇 |
综合类 | 1058篇 |
化学工业 | 802篇 |
金属工艺 | 1074篇 |
机械仪表 | 515篇 |
建筑科学 | 404篇 |
矿业工程 | 120篇 |
能源动力 | 89篇 |
轻工业 | 198篇 |
水利工程 | 67篇 |
石油天然气 | 134篇 |
武器工业 | 105篇 |
无线电 | 2465篇 |
一般工业技术 | 1769篇 |
冶金工业 | 2469篇 |
原子能技术 | 63篇 |
自动化技术 | 6380篇 |
出版年
2024年 | 113篇 |
2023年 | 305篇 |
2022年 | 482篇 |
2021年 | 547篇 |
2020年 | 491篇 |
2019年 | 376篇 |
2018年 | 336篇 |
2017年 | 432篇 |
2016年 | 430篇 |
2015年 | 465篇 |
2014年 | 705篇 |
2013年 | 830篇 |
2012年 | 857篇 |
2011年 | 1262篇 |
2010年 | 900篇 |
2009年 | 1000篇 |
2008年 | 1025篇 |
2007年 | 1044篇 |
2006年 | 919篇 |
2005年 | 902篇 |
2004年 | 805篇 |
2003年 | 652篇 |
2002年 | 563篇 |
2001年 | 471篇 |
2000年 | 306篇 |
1999年 | 259篇 |
1998年 | 227篇 |
1997年 | 196篇 |
1996年 | 194篇 |
1995年 | 171篇 |
1994年 | 151篇 |
1993年 | 120篇 |
1992年 | 102篇 |
1991年 | 66篇 |
1990年 | 72篇 |
1989年 | 57篇 |
1988年 | 53篇 |
1987年 | 14篇 |
1986年 | 18篇 |
1985年 | 34篇 |
1984年 | 33篇 |
1983年 | 33篇 |
1982年 | 31篇 |
1981年 | 26篇 |
1980年 | 29篇 |
1979年 | 35篇 |
1978年 | 13篇 |
1977年 | 16篇 |
1976年 | 17篇 |
1964年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Memory loss in retrograde amnesia has long been held to be larger for recent periods than for remote periods, a pattern usually referred to as the Ribot gradient. One explanation for this gradient is consolidation of long-term memories. Several computational models of such a process have shown how consolidation can explain characteristics of amnesia, but they have not elucidated how consolidation must be envisaged. Here findings are reviewed that shed light on how consolidation may be implemented in the brain. Moreover, consolidation is contrasted with alternative theories of the Ribot gradient. Consolidation theory, multiple trace theory, and semantization can all handle some findings well but not others. Conclusive evidence for or against consolidation thus remains to be found. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
32.
Preexposing rats to the context facilitates subsequent contextual fear conditioning. This effect depends on the hippocampus (J. W. Rudy, R. M. Barrientos, & R. C. O'Reilly, 2002). The authors report that inactivating the basolateral region of the amygdala (BLA) by injecting muscimol, a GABAA agonist, before or after preexposure reduced this effect. In contrast, bilateral injections of anisomycin, a protein synthesis inhibitor, into BLA did not impair the consolidation of the context memory. However, when injected after fear conditioning, anisomycin impaired consolidation of both contextual and auditory-cue fear conditioning. Results are consistent with 2 ideas about the amygdala's contribution to memory: (a) It modulates memory formation in other regions of the brain, and (b) it is a storage site for cue-shock associations. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
33.
PAC-learnability of probabilistic deterministic finite state automata in terms of variation distance
We consider the problem of PAC-learning distributions over strings, represented by probabilistic deterministic finite automata (PDFAs). PDFAs are a probabilistic model for the generation of strings of symbols, that have been used in the context of speech and handwriting recognition, and bioinformatics. Recent work on learning PDFAs from random examples has used the KL-divergence as the error measure; here we use the variation distance. We build on recent work by Clark and Thollard, and show that the use of the variation distance allows simplifications to be made to the algorithms, and also a strengthening of the results; in particular that using the variation distance, we obtain polynomial sample size bounds that are independent of the expected length of strings. 相似文献
34.
基于约束优化的联想记忆模型学习算法 总被引:1,自引:1,他引:0
本文提出了一种对称互连神经元网络的学习策略,利用全局约束优化方法确定连接权。优化过程采用了梯度下降技术。这种学习算法可以保证训练样本成为系统的稳定吸引子,并且具有优化意义上的最大吸引域。本文讨论了网络的存储容量,训练样本的渐近稳定性和吸引域大小。计算机实验结果说明了学习算法的优越性。 相似文献
35.
EuLisp has an integrated object system with reflective capabilities. We discuss some example applications which use these facilities to experiment with some advanced and powerful concepts, namely, finalization, virtual shared memory and persistence. A secondary goal is to attempt to illustrate the additional possibilities of metaobject programming over non-metalevel techniques. 相似文献
36.
Determining contributions of source-monitoring and inhibitory function to age-related forgetting has been an elusive goal for cognitive theorists. Five studies used a verbal working memory paradigm to examine mechanisms accounting for disproportionate retroactive interference (RI) experienced with adult aging. Participants distinguished studied target-word pairs from interfering pairs that were read aloud. Source-monitoring and inhibitory task components varied through manipulations of response requirements. RI effects were primarily due to source-monitoring failures rather than to inhibitory failures. Removing both source and inhibitory components eliminated age differences in RI. When source monitoring was emphasized, RI continued to be observed in all age groups but disproportionately for older adults. Process dissociation analyses of memory found recollection decreases and familiarity increases consistent with source failures. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
37.
We consider a system defined as the product of a finite set of periodic systems on cyclic groups. It is of interest to determine if certain subgroups and unions of subgroups of the state set are reachable from a specified initial state, and in particular to determine the computational complexity of verifying such reachability. These questions are motivated by certain problems that arise in the modelling and control of discrete event systems and certain forms of periodic scheduling. Our main result is that deciding whether or not the union of a certain set of subgroups is reachable or not is NP-complete. 相似文献
38.
Andrew Klapper 《Journal of Cryptology》1994,7(1):33-51
A new method of cryptologic attack on binary sequences is given, using their linear complexities relative to odd prime numbers. We show that, relative to a particular prime number p, the linear complexity of a binary geometric sequence is low. It is also shown that the prime p can be determined with high probability by a randomized algorithm if a number of bits much smaller than the linear complexity is known. This determination is made by exploiting the imbalance in the number of zeros and ones in the sequences in question, and uses a new statistical measure, the partial imbalance.This project was sponsored by the National Security Agency under Grant No. MDA904-91-H-0012. The United States Government is authorized to reproduce and distribute reprints notwithstanding any copyright notation hereon. 相似文献
39.
40.
内嵌闪存MCU的高性能多通道24位采集系统ADuC845 总被引:6,自引:0,他引:6
ADuC845是ADI公司新推出的嵌有单指令周期8052闪存MCU、带两路24位∑ -△A/D、双12位D/A以及两个灵活脉宽调制输出的高性能24位数据采集与处理系统芯片。该芯片的数据处理速度达12MIPS,且设计简单 ,噪声低 ,非常适用于精密仪器仪表。文中详细介绍了该芯片的功能特点和工作原理 ,给出了该芯片的应用方法。 相似文献