全文获取类型
收费全文 | 34826篇 |
免费 | 2867篇 |
国内免费 | 1365篇 |
学科分类
工业技术 | 39058篇 |
出版年
2024年 | 119篇 |
2023年 | 571篇 |
2022年 | 816篇 |
2021年 | 1409篇 |
2020年 | 1068篇 |
2019年 | 888篇 |
2018年 | 1061篇 |
2017年 | 1159篇 |
2016年 | 982篇 |
2015年 | 1303篇 |
2014年 | 1663篇 |
2013年 | 2064篇 |
2012年 | 2177篇 |
2011年 | 2423篇 |
2010年 | 2072篇 |
2009年 | 1881篇 |
2008年 | 1818篇 |
2007年 | 1697篇 |
2006年 | 1870篇 |
2005年 | 1694篇 |
2004年 | 1146篇 |
2003年 | 967篇 |
2002年 | 896篇 |
2001年 | 762篇 |
2000年 | 888篇 |
1999年 | 1030篇 |
1998年 | 795篇 |
1997年 | 714篇 |
1996年 | 694篇 |
1995年 | 558篇 |
1994年 | 458篇 |
1993年 | 347篇 |
1992年 | 262篇 |
1991年 | 191篇 |
1990年 | 145篇 |
1989年 | 127篇 |
1988年 | 109篇 |
1987年 | 65篇 |
1986年 | 48篇 |
1985年 | 23篇 |
1984年 | 16篇 |
1983年 | 15篇 |
1982年 | 30篇 |
1981年 | 12篇 |
1980年 | 11篇 |
1979年 | 2篇 |
1977年 | 6篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1951年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
993.
994.
本文设计与实现了局域网防火墙。首先阐述了防火墙的原理,然后分析防火墙系统总体设计,最后论述防火墙的设计与实现,并详述其具体实现的各个模块。 相似文献
995.
本文简析了基于网络环境下新课程高中英语阅读教学实践研究的理论基础与必要性,运用任务型教学途径,从网络英语课堂教学与课外阅读教学两方面进行探索,并进行了效能与问题分析。 相似文献
996.
以ARM9和嵌入式Linux为平台,采用光电码盘,解决了在ARM中无高速I/O外部脉冲计数寄存器情况下轮式移动机器人的速度检测问题,并利用积分分离的PID算法实现了速度调制。在嵌入式Linux操作系统中完成整个控制过程驱动的编写,并在测速和动态调速等关键实现上给出详细的介绍,最终实现智能机器人的闭环控制。 相似文献
997.
Discrete surface Ricci flow 总被引:1,自引:0,他引:1
Jin M Kim J Luo F Gu X 《IEEE transactions on visualization and computer graphics》2008,14(5):1030-1043
This work introduces a unified framework for discrete surface Ricci flow algorithms, including spherical, Euclidean, and hyperbolic Ricci flows, which can design Riemannian metrics on surfaces with arbitrary topologies by user-defined Gaussian curvatures. Furthermore, the target metrics are conformal (angle-preserving) to the original metrics. A Ricci flow conformally deforms the Riemannian metric on a surface according to its induced curvature, such that the curvature evolves like a heat diffusion process. Eventually, the curvature becomes the user defined curvature. Discrete Ricci flow algorithms are based on a variational framework. Given a mesh, all possible metrics form a linear space, and all possible curvatures form a convex polytope. The Ricci energy is defined on the metric space, which reaches its minimum at the desired metric. The Ricci flow is the negative gradient flow of the Ricci energy. Furthermore, the Ricci energy can be optimized using Newton's method more efficiently. Discrete Ricci flow algorithms are rigorous and efficient. Our experimental results demonstrate the efficiency, accuracy and flexibility of the algorithms. They have the potential for a wide range of applications in graphics, geometric modeling, and medical imaging. We demonstrate their practical values by global surface parameterizations. 相似文献
998.
There is a potential server bottleneck problem when the Kerberos model is applied in large-scale networks because the model uses centralized management. To enlarge its application scope, researchers must consider how to build a trust relation among those Kerberos servers located on different isolated domains, but have not provided a way to prevent the potential bottleneck that can occur with Kerberos servers. With the development of across-domain authentication techniques, the local server bottleneck problem has not been alleviated; in fact, it has become more serious.Adopting the rigorous binary tree code algorithm, we present an authentication model based on Kerberos. Compared with similar models, our model has several advantages. First, it overcomes the potential server bottleneck problem and can balance the load automatically. Second, it can process across-domain authentication and enlarge the authentication boundary. Finally, its authentication path is short, with no more than two Kerberos servers being involved when authenticating a user. 相似文献
999.
Design of distributed compliant micromechanisms with an implicit free boundary representation 总被引:2,自引:2,他引:0
Zhen Luo Liyong Tong Michael Yu Wang 《Structural and Multidisciplinary Optimization》2008,36(6):607-621
In this paper, a parameterization approach is presented for structural shape and topology optimization of compliant mechanisms
using a moving boundary representation. A level set model is developed to implicitly describe the structural boundary by embedding
into a scalar function of higher dimension as zero level set. The compactly supported radial basis function of favorable smoothness
and accuracy is used to interpolate the level set function. Thus, the temporal and spatial initial value problem is now converted
into a time-separable parameterization problem. Accordingly, the more difficult shape and topology optimization of the Hamilton–Jacobi
equation is then transferred into a relatively easy size optimization with the expansion coefficients as design variables.
The design boundary is therefore advanced by applying the optimality criteria method to iteratively evaluate the size optimization
so as to update the level set function in accordance with expansion coefficients of the interpolation. The optimization problem
of the compliant mechanism is established by including both the mechanical efficiency as the objective function and the prescribed
material usage as the constraint. The design sensitivity analysis is performed by utilizing the shape derivative. It is noted
that the present method is not only capable of simultaneously addressing shape fidelity and topology changes with a smooth
structural boundary but also able to avoid some of the unfavorable numerical issues such as the Courant–Friedrich–Levy condition,
the velocity extension algorithm, and the reinitialization procedure in the conventional level set method. In particular,
the present method can generate new holes inside the material domain, which makes the final design less insensitive to the
initial guess. The compliant inverter is applied to demonstrate the availability of the present method in the framework of
the implicit free boundary representation. 相似文献
1000.
结合光电干扰武器系统的工作过程,对影响目标威胁评估的各种因素进行了分析,讨论了常用威胁评估方法的缺点和不足,提出了基于神经网络的空中目标的威胁估计算法,利用神经网络良好的自适应能力和自学习能力,通过样本数据训练,确定各个因素之间的非线性复杂关系,并通过示例介绍了目标威胁值的解算过程;与层次分析法进行了比较,结果表明,神经网络可以很好地逼近各个因素之间的权重关系,提高了空中目标威胁估计算法的准确性和适应性。 相似文献