全文获取类型
收费全文 | 98617篇 |
免费 | 13554篇 |
国内免费 | 9660篇 |
专业分类
电工技术 | 15293篇 |
技术理论 | 9篇 |
综合类 | 11559篇 |
化学工业 | 3683篇 |
金属工艺 | 1870篇 |
机械仪表 | 4987篇 |
建筑科学 | 4395篇 |
矿业工程 | 2512篇 |
能源动力 | 2084篇 |
轻工业 | 1480篇 |
水利工程 | 2020篇 |
石油天然气 | 2207篇 |
武器工业 | 965篇 |
无线电 | 20511篇 |
一般工业技术 | 4035篇 |
冶金工业 | 1676篇 |
原子能技术 | 279篇 |
自动化技术 | 42266篇 |
出版年
2024年 | 853篇 |
2023年 | 2190篇 |
2022年 | 4158篇 |
2021年 | 4522篇 |
2020年 | 4583篇 |
2019年 | 3243篇 |
2018年 | 2686篇 |
2017年 | 3149篇 |
2016年 | 3291篇 |
2015年 | 3802篇 |
2014年 | 6623篇 |
2013年 | 5713篇 |
2012年 | 7479篇 |
2011年 | 7772篇 |
2010年 | 6015篇 |
2009年 | 6304篇 |
2008年 | 6549篇 |
2007年 | 7341篇 |
2006年 | 6160篇 |
2005年 | 5490篇 |
2004年 | 4593篇 |
2003年 | 4063篇 |
2002年 | 3180篇 |
2001年 | 2685篇 |
2000年 | 2175篇 |
1999年 | 1795篇 |
1998年 | 1271篇 |
1997年 | 1044篇 |
1996年 | 859篇 |
1995年 | 642篇 |
1994年 | 471篇 |
1993年 | 313篇 |
1992年 | 197篇 |
1991年 | 135篇 |
1990年 | 107篇 |
1989年 | 96篇 |
1988年 | 59篇 |
1987年 | 33篇 |
1986年 | 31篇 |
1985年 | 37篇 |
1984年 | 21篇 |
1983年 | 22篇 |
1982年 | 28篇 |
1981年 | 7篇 |
1980年 | 3篇 |
1979年 | 8篇 |
1978年 | 3篇 |
1959年 | 9篇 |
1955年 | 3篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
本文运用一典型的人工神经网络模型─“反向传播”模型,对高氧化态(Ⅱ─Ⅳ)三核金属簇合物的构型分布进行了分析,得到了较好的分类、预报结果为化合物结构分析提供了新的工具。 相似文献
2.
本文介绍了Windows环境下基于消息的DDE和基于动态链接库的DDEML的区别,并详细叙述了如何使用DDEML编制Windows应用程序。 相似文献
3.
Panagiotis N. Zarros Myung J. Lee Tarek N. Saadawi 《Journal of Network and Systems Management》1994,2(4):361-382
In this paper, an algorithm to determine the set of packets generated continuously and periodically from different participants that are arriving at a node either for mixing at the master of a conference, or for simply playing back at a regular participant of a conference, is proposed. The essence of the algorithm is to estimate the expected packet arrival time (or reference time) for each participant. With the reference time at hand, the maximum jitter and the optimum waiting time for a mixer to wait packets from all participants can be determined. An enhancement to improve synchronization which deals with the estimation of the time offsets between the individual periods of the sources and the period of the receiver is also presented. The error of the proposed algorithm is enumerated by the Chernoff bound and demonstrated by simulation and is shown to be acceptable in practical application. The algorithm can also be employed when traffic sources operate with different periods. 相似文献
4.
Claudia Popien Axel Kuepper Bernd Meyer 《Journal of Network and Systems Management》1994,2(4):383-400
New requirements of growing computer networks and information systems have an influence on extended client/server models with increased functionality. This forms the basis for service management in distributed systems which is realized by a service trading concept. This paper studies the requirements derived from the Open Distributed Processing (ODP) Reference Model in order to consider an open service market. Furthermore, it examines management possibilities for describing the service trading scenario. Because of similar architectures and properties ODP services, service offers, types, exporters and traders are mapped onto management components and modeled as managed objects. Therefore, the Guidelines for the Definition of Managed Objects (GDMO) are used. The final concept allows a precise and unambiguous study of the service trading scenario and provides means for exporting and importing of service offers in a distributed environment. 相似文献
5.
In this paper, symbolic code matrix ,constant matrix and count matrix are defined .The first twomatrices are used to describe the elemental expression of augmented matrix and the nede admittance equa-tion is thus obtained. The third matrix is used to obtain the incoming degree matrix, and according to thematrix all the 1- factors of the Coates graph are given. By using the data code, the determinant is expandedand the same items in the expansion are merged. Thus the symbolic network function in which no term can-cellation occurs is generated. 相似文献
6.
Paul J. Flory 《Polymer International》1985,17(2):96-102
The earliest investigations on rubber elasticity, commencing in the 19th century, were necessarily limited to phenomenological interpretations. The realisation that polymers consist of very long molecular chains. commencing c. 1930, gave impetus to the molecular theory of rubber elasticity (1932-). according to which the high deformability of an elastomer, and the elastic force generated by deformation, stem from the configurations accessible to long molecular chains. Theories of rubber elasticity put forward from 1934-1946 relied on the assumption that the junctions of the rubber network undergo displacements that are affine in macroscopic strain. The theory of James and Guth (1947) dispensed with this premise, and demonstrated instead that the mean positions of the junctions of a ‘phantom’ network consisting of Gaussian chains devoid of material properties are affine in the strain. The vital significance of the distinction between the actual distribution of chain vectors in a network and their distribution if the junctions would be fixed at their mean positions went unnoticed for nearly 30 years. Experimental investigations, commencing with the incisive work of Gee in 1946. revealed large departures from the relationship of stress to strain predicted by the theories cited. This discrepancy prompted extensive studies, theoretical and experimental, during succeeding years. Inquiry into the fundamentals of polymer networks, formed for example by interlinking very long polymer molecules, exposed the need to take account of network imperfections, typically consisting of chains attached at only one end to a network junction. Various means were advocated to make corrections for these imperfections. The cycle rank ζ of the network has been shown (1976) to be the fundamental measure of its connectivity, regardless of the junction functionality and pattern of imperfections. Often overlooked is the copious interpenetration of the chains comprising typical elastomeric networks. Theories that attempt to represent such networks on a lattice are incompatible with this universal feature. Moreover, the dense interpenetration of chains may limit the ability of junctions in real networks to accommodate the fluctuations envisaged in the theory of phantom networks. It was suggested in 1975 that departures from the form predicted for the elastic equation of state are due to constraints on the fluctuations of junctions whose effect diminishes with deformation and with dilation. Formulation of a self-consistent theory based on this suggestion required recognition of the non-affine connection between the chain vector distribution function and the macroscopic strain in a real network, which may partake of characteristics of a phantom network in some degree. Implementation of the idea was achieved through postulation of domains of constraint affecting the equilibrium distribution of fluctuations of network junctions from their mean positions. This led in due course to a theory that accounts for the relationship of stress to strain virtually throughout the ranges of strain accessible to measurement. The theory establishes connections between structure and elastic properties. This is achieved with utmost frugality in arbitrary parameters. 相似文献
7.
基于网络环境的计算机资料室工作 总被引:1,自引:0,他引:1
随着信息技术的迅速发展,基于网络的信息资源共享已成为信息化社会的基本特征。数字化图书馆和电子期刊网的出现,正在改变着人们的阅读习惯,丰富的信息资源和跨时空的浏览方式彻底颠覆了传统的图书馆、资料室的服务模式。同时,数字化图书馆也给资料室管理模式创新带来了新的契机。分析了院系资料室面临的挑战与机遇,探讨了新形势下计算机资料室工作,提出了利用信息技术,改革服务方式,拓展服务内容,提高服务水平,提供有特色的专业服务。 相似文献
8.
Average consensus in networks of dynamic agents with switching topologies and multiple time-varying delays 总被引:5,自引:0,他引:5
In this paper, we discuss average consensus problem in undirected networks of dynamic agents with fixed and switching topologies as well as multiple time-varying communication delays. By employing a linear matrix inequality method, we prove that all the nodes in the network achieve average consensus asymptotically for appropriate communication delays if the network topology is connected. Particularly, several feasible linear matrix inequalities are established to determine the maximal allowable upper bound of time-varying communication delays. Numerical examples are given to demonstrate the effectiveness and the sharpness of the theoretical results. 相似文献
9.
多级网络多处理机系统的性能评估 总被引:2,自引:1,他引:1
本文建立了多级网络(δ-网)多处理机系统的马尔柯夫模型,为系统结构参数和任务粒度的选择提供了依据。文中分析了处理机数目、网络结构参数和任务粒度对系统性能的影响,并对模型计算结果和仿真结果作了比较。 相似文献
10.
张鸿宾 《计算机应用与软件》1994,11(5):15-19,53
使用BP算法训练多层网络的速度很慢而且事先难于确定隐节点和隐层的适当数目。本文提出一个有效的算法,先构造决策树,然后将构造的决策树转换为神经网。文中使用一个全局准则函数控制决策树的增长,它较好地匹配了树的复杂性和训练样本量及错分率界。实验结果,本文的算法比用BP算法训练多层网络要快,而其分类精度不低于用BP算法训练的多层神经网。 相似文献