全文获取类型
收费全文 | 16413篇 |
免费 | 2886篇 |
国内免费 | 1449篇 |
专业分类
电工技术 | 2078篇 |
技术理论 | 3篇 |
综合类 | 1845篇 |
化学工业 | 438篇 |
金属工艺 | 268篇 |
机械仪表 | 1915篇 |
建筑科学 | 570篇 |
矿业工程 | 281篇 |
能源动力 | 298篇 |
轻工业 | 136篇 |
水利工程 | 365篇 |
石油天然气 | 314篇 |
武器工业 | 167篇 |
无线电 | 2149篇 |
一般工业技术 | 1090篇 |
冶金工业 | 208篇 |
原子能技术 | 139篇 |
自动化技术 | 8484篇 |
出版年
2024年 | 244篇 |
2023年 | 279篇 |
2022年 | 342篇 |
2021年 | 435篇 |
2020年 | 484篇 |
2019年 | 473篇 |
2018年 | 429篇 |
2017年 | 577篇 |
2016年 | 660篇 |
2015年 | 741篇 |
2014年 | 936篇 |
2013年 | 1019篇 |
2012年 | 1327篇 |
2011年 | 1230篇 |
2010年 | 926篇 |
2009年 | 1023篇 |
2008年 | 1065篇 |
2007年 | 1256篇 |
2006年 | 1031篇 |
2005年 | 965篇 |
2004年 | 843篇 |
2003年 | 698篇 |
2002年 | 582篇 |
2001年 | 472篇 |
2000年 | 430篇 |
1999年 | 339篇 |
1998年 | 278篇 |
1997年 | 296篇 |
1996年 | 236篇 |
1995年 | 210篇 |
1994年 | 198篇 |
1993年 | 141篇 |
1992年 | 134篇 |
1991年 | 84篇 |
1990年 | 57篇 |
1989年 | 61篇 |
1988年 | 54篇 |
1987年 | 36篇 |
1986年 | 19篇 |
1985年 | 29篇 |
1984年 | 21篇 |
1983年 | 14篇 |
1982年 | 8篇 |
1981年 | 11篇 |
1980年 | 10篇 |
1979年 | 8篇 |
1977年 | 6篇 |
1976年 | 6篇 |
1975年 | 4篇 |
1974年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
With the growing size and complexity of power systems, system analysis—such as transients calculation—takes much time. Hence, fast calculation methods are required. Although parallel processing is a hopeful method, there have been difficulties in the parallel solution of linear equations which appear in power-flow calculations by the Newton-Raphson method. This paper aims at the fast calculation of the power-flow problem by means of parallel processing. In order to improve the suitability to the parallel solution of the differential equation in transients calculation, we assume the use of a direct-mapping parallel processing machine to map directly the network of a power system onto a network of processors. Under this assumption, we propose a new parallel-processing-oriented method in which the linear equation is solved by linear iterations between nodes with Aitken acceleration. We simulate the method on three model power systems and compare this Parallel Iterative Method (PIN) with a Parallel Direct Method (PDM) which uses the banded matrix according to the number of operations required. As a result, we can expect that PIM may solve linear equations faster than PDM with m processors, although the PIM might be inferior to the PDM with m × m processors, where m denotes the half-band width of the banded matrix. 相似文献
2.
It has recently been shown that authenticated Byzantine agreement,
in which more than a third of the parties are corrupted, cannot be
securely realized under concurrent or parallel (stateless)
composition. This result puts into question any usage of
authenticated Byzantine agreement in a setting where many
executions take place. In particular, this is true for the whole
body of work of secure multi-party protocols in the case that a
third or more of the parties are corrupted. This is because these
protocols strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated Byzantine
agreement. We remark that it was accepted folklore that the use of
a broadcast channel (or authenticated Byzantine agreement) is
actually essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are corrupted.
In this paper we show that this folklore is false. We present a
mild relaxation of the definition of secure computation allowing
abort. Our new definition captures all the central security issues
of secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the definition is
in decoupling the issue of agreement from these issues. We
then show that this relaxation suffices for achieving secure
computation in a point-to-point network. That is, we show that
secure multi-party computation for this definition can be achieved
for any number of corrupted parties and without a
broadcast channel (or trusted pre-processing phase as required for
running authenticated Byzantine agreement). Furthermore, this is
achieved by just replacing the broadcast channel in known
protocols with a very simple and efficient echo-broadcast
protocol. An important corollary of our result is the ability to
obtain multi-party protocols that remain secure under composition,
without assuming a broadcast channel. 相似文献
3.
广义de Bruijn多计算机互连网络 总被引:1,自引:0,他引:1
(d,m)de Bruijn多计算机系统互连网络限制网络的规模必须为d^m。本文把(d,m)de Bruijn网络推广到了任意顶点情形,提出了广义de Bruijn网络,研究了广义de Bruijn网络的自路由性质,设计了路由算法,研究了广义de Bruijn网络顶点度的性质和容错特性。 相似文献
4.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit. 相似文献
5.
密集平行束孔落矿的底盘漏斗采矿方案的特点是:用密集严行束孔落矿;凿岩与出矿水平合二为一;实行“掘井、劈漏、落矿三位一体”的回采工艺。该方案结构简单、采切比低、工人劳动强度低,适于开采缓倾斜顶底围岩不稳固的中厚以上矿体。 相似文献
6.
In this work a simple method to solve the forward displacement analysis of the general 6-6 fully parallel manipulator is applied. The method is based on generating closure equations upon the unknown coordinates of three points embedded to the moving platform. The method is easy to follow and it is available for both, planar and three-dimensional moving platforms. Numerical examples are included with the purpose to show the application of the method. 相似文献
7.
Chih-Peng Huang 《International journal of systems science》2014,45(9):1830-1843
This paper mainly studies an extended discrete singular fuzzy model incorporating the multiple difference matrices in the rules and discusses its stability and design issues. By embracing additional algebraic constraint, traditional discrete Takagi-Sugeno (T-S) fuzzy model can be extended to a generalised discrete singular Takagi-Sugeno (GDST-S) model with individual difference matrices Ei in the locally singular models, where it can describe a larger class of physical or non-linear systems. Based on the linear matrix inequality (LMI) approach, we focus on deriving some explicit stability and design criteria expressed by the LMIs for the regarded system. Thus, the stability verification and controller synthesis can be performed by the current LMI tools. Finally, some illustrative examples are given to illustrate the effectiveness and validity of the proposed approach. 相似文献
8.
在双筐并流氨合成塔中使用了A110-1-H/A110-1型氨合成催化剂,使用寿命达1740天,累计产氨438378t.该催化剂组合具有低温活性好、易还原、高催化活性、高抗毒能力、良好的热稳定性与破碎强度等优点. 相似文献
9.
彭勇 《安徽水利水电职业技术学院学报》2010,10(1):67-70
分析了大变幅扬程下灌溉泵站并联运行水泵机组性能,提出了提高泵站装置效率的方法。 相似文献
10.
The modern technological advancement influences the growth of the cyber–physical system and cyber–social system to a more advanced computing system cyber–physical–social system (CPSS). Therefore, CPSS leads the data science revolution by promoting tri-space information resource from a single space. The establishment of CPSSs increases the related privacy concerns. To provide privacy on CPSSs data, various privacy-preserving schemes have been introduced in the recent past. However, technological advancement in CPSSs requires the modifications of previous techniques to suit its dynamics. Meanwhile, differential privacy has emerged as an effective method to safeguard CPSSs data privacy. To completely comprehend the state-of-the-art developments and learn the field’s research directions, this article provides a comprehensive review of differentially private data fusion and deep learning in CPSSs. Additionally, we present a novel differentially private data fusion and deep learning Framework for Cyber–Physical–Social Systems , and various future research directions for CPSSs. 相似文献