首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15197篇
  免费   1793篇
  国内免费   1278篇
电工技术   555篇
技术理论   1篇
综合类   1058篇
化学工业   802篇
金属工艺   1074篇
机械仪表   515篇
建筑科学   404篇
矿业工程   120篇
能源动力   89篇
轻工业   198篇
水利工程   67篇
石油天然气   134篇
武器工业   105篇
无线电   2465篇
一般工业技术   1769篇
冶金工业   2469篇
原子能技术   63篇
自动化技术   6380篇
  2024年   113篇
  2023年   305篇
  2022年   482篇
  2021年   547篇
  2020年   491篇
  2019年   376篇
  2018年   336篇
  2017年   432篇
  2016年   430篇
  2015年   465篇
  2014年   705篇
  2013年   830篇
  2012年   857篇
  2011年   1262篇
  2010年   900篇
  2009年   1000篇
  2008年   1025篇
  2007年   1044篇
  2006年   919篇
  2005年   902篇
  2004年   805篇
  2003年   652篇
  2002年   563篇
  2001年   471篇
  2000年   306篇
  1999年   259篇
  1998年   227篇
  1997年   196篇
  1996年   194篇
  1995年   171篇
  1994年   151篇
  1993年   120篇
  1992年   102篇
  1991年   66篇
  1990年   72篇
  1989年   57篇
  1988年   53篇
  1987年   14篇
  1986年   18篇
  1985年   34篇
  1984年   33篇
  1983年   33篇
  1982年   31篇
  1981年   26篇
  1980年   29篇
  1979年   35篇
  1978年   13篇
  1977年   16篇
  1976年   17篇
  1964年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Memory loss in retrograde amnesia has long been held to be larger for recent periods than for remote periods, a pattern usually referred to as the Ribot gradient. One explanation for this gradient is consolidation of long-term memories. Several computational models of such a process have shown how consolidation can explain characteristics of amnesia, but they have not elucidated how consolidation must be envisaged. Here findings are reviewed that shed light on how consolidation may be implemented in the brain. Moreover, consolidation is contrasted with alternative theories of the Ribot gradient. Consolidation theory, multiple trace theory, and semantization can all handle some findings well but not others. Conclusive evidence for or against consolidation thus remains to be found. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
32.
Preexposing rats to the context facilitates subsequent contextual fear conditioning. This effect depends on the hippocampus (J. W. Rudy, R. M. Barrientos, & R. C. O'Reilly, 2002). The authors report that inactivating the basolateral region of the amygdala (BLA) by injecting muscimol, a GABAA agonist, before or after preexposure reduced this effect. In contrast, bilateral injections of anisomycin, a protein synthesis inhibitor, into BLA did not impair the consolidation of the context memory. However, when injected after fear conditioning, anisomycin impaired consolidation of both contextual and auditory-cue fear conditioning. Results are consistent with 2 ideas about the amygdala's contribution to memory: (a) It modulates memory formation in other regions of the brain, and (b) it is a storage site for cue-shock associations. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
33.
We consider the problem of PAC-learning distributions over strings, represented by probabilistic deterministic finite automata (PDFAs). PDFAs are a probabilistic model for the generation of strings of symbols, that have been used in the context of speech and handwriting recognition, and bioinformatics. Recent work on learning PDFAs from random examples has used the KL-divergence as the error measure; here we use the variation distance. We build on recent work by Clark and Thollard, and show that the use of the variation distance allows simplifications to be made to the algorithms, and also a strengthening of the results; in particular that using the variation distance, we obtain polynomial sample size bounds that are independent of the expected length of strings.  相似文献   
34.
基于约束优化的联想记忆模型学习算法   总被引:1,自引:1,他引:0  
汪涛  俞瑞钊 《通信学报》1992,13(5):88-92
本文提出了一种对称互连神经元网络的学习策略,利用全局约束优化方法确定连接权。优化过程采用了梯度下降技术。这种学习算法可以保证训练样本成为系统的稳定吸引子,并且具有优化意义上的最大吸引域。本文讨论了网络的存储容量,训练样本的渐近稳定性和吸引域大小。计算机实验结果说明了学习算法的优越性。  相似文献   
35.
EuLisp has an integrated object system with reflective capabilities. We discuss some example applications which use these facilities to experiment with some advanced and powerful concepts, namely, finalization, virtual shared memory and persistence. A secondary goal is to attempt to illustrate the additional possibilities of metaobject programming over non-metalevel techniques.  相似文献   
36.
Determining contributions of source-monitoring and inhibitory function to age-related forgetting has been an elusive goal for cognitive theorists. Five studies used a verbal working memory paradigm to examine mechanisms accounting for disproportionate retroactive interference (RI) experienced with adult aging. Participants distinguished studied target-word pairs from interfering pairs that were read aloud. Source-monitoring and inhibitory task components varied through manipulations of response requirements. RI effects were primarily due to source-monitoring failures rather than to inhibitory failures. Removing both source and inhibitory components eliminated age differences in RI. When source monitoring was emphasized, RI continued to be observed in all age groups but disproportionately for older adults. Process dissociation analyses of memory found recollection decreases and familiarity increases consistent with source failures. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
37.
We consider a system defined as the product of a finite set of periodic systems on cyclic groups. It is of interest to determine if certain subgroups and unions of subgroups of the state set are reachable from a specified initial state, and in particular to determine the computational complexity of verifying such reachability. These questions are motivated by certain problems that arise in the modelling and control of discrete event systems and certain forms of periodic scheduling. Our main result is that deciding whether or not the union of a certain set of subgroups is reachable or not is NP-complete.  相似文献   
38.
A new method of cryptologic attack on binary sequences is given, using their linear complexities relative to odd prime numbers. We show that, relative to a particular prime number p, the linear complexity of a binary geometric sequence is low. It is also shown that the prime p can be determined with high probability by a randomized algorithm if a number of bits much smaller than the linear complexity is known. This determination is made by exploiting the imbalance in the number of zeros and ones in the sequences in question, and uses a new statistical measure, the partial imbalance.This project was sponsored by the National Security Agency under Grant No. MDA904-91-H-0012. The United States Government is authorized to reproduce and distribute reprints notwithstanding any copyright notation hereon.  相似文献   
39.
提出一种改进4管自体偏压结构SRAM/SOI单元.基于TSUPREM4和MEDICI软件的模拟和结构性能的分析,设计单元结构并选取结构参数.该结构采用nMOS栅下的含p+埋沟的衬底体电阻代替传统6管CMOSSRAM单元中的pMOS元件,具有面积小、工艺简单的优点.该结构可以在0.5V的电源电压下正常工作,与6管单元相比,该单元瞬态响应正常,功耗只有6管单元的1/10,满足低压低功耗的要求.  相似文献   
40.
内嵌闪存MCU的高性能多通道24位采集系统ADuC845   总被引:6,自引:0,他引:6  
ADuC845是ADI公司新推出的嵌有单指令周期8052闪存MCU、带两路24位∑ -△A/D、双12位D/A以及两个灵活脉宽调制输出的高性能24位数据采集与处理系统芯片。该芯片的数据处理速度达12MIPS,且设计简单 ,噪声低 ,非常适用于精密仪器仪表。文中详细介绍了该芯片的功能特点和工作原理 ,给出了该芯片的应用方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号