全文获取类型
收费全文 | 3776篇 |
免费 | 162篇 |
国内免费 | 16篇 |
专业分类
电工技术 | 32篇 |
综合类 | 4篇 |
化学工业 | 1105篇 |
金属工艺 | 82篇 |
机械仪表 | 114篇 |
建筑科学 | 49篇 |
矿业工程 | 5篇 |
能源动力 | 154篇 |
轻工业 | 291篇 |
水利工程 | 21篇 |
石油天然气 | 15篇 |
无线电 | 334篇 |
一般工业技术 | 801篇 |
冶金工业 | 260篇 |
原子能技术 | 33篇 |
自动化技术 | 654篇 |
出版年
2024年 | 9篇 |
2023年 | 50篇 |
2022年 | 119篇 |
2021年 | 158篇 |
2020年 | 122篇 |
2019年 | 126篇 |
2018年 | 157篇 |
2017年 | 140篇 |
2016年 | 123篇 |
2015年 | 92篇 |
2014年 | 166篇 |
2013年 | 457篇 |
2012年 | 168篇 |
2011年 | 177篇 |
2010年 | 173篇 |
2009年 | 157篇 |
2008年 | 175篇 |
2007年 | 128篇 |
2006年 | 116篇 |
2005年 | 94篇 |
2004年 | 78篇 |
2003年 | 68篇 |
2002年 | 67篇 |
2001年 | 51篇 |
2000年 | 54篇 |
1999年 | 50篇 |
1998年 | 79篇 |
1997年 | 53篇 |
1996年 | 47篇 |
1995年 | 31篇 |
1994年 | 51篇 |
1993年 | 33篇 |
1992年 | 38篇 |
1991年 | 23篇 |
1990年 | 36篇 |
1989年 | 32篇 |
1988年 | 18篇 |
1987年 | 22篇 |
1986年 | 19篇 |
1985年 | 25篇 |
1984年 | 21篇 |
1983年 | 30篇 |
1982年 | 17篇 |
1981年 | 15篇 |
1980年 | 20篇 |
1979年 | 15篇 |
1978年 | 16篇 |
1977年 | 7篇 |
1976年 | 6篇 |
1974年 | 6篇 |
排序方式: 共有3954条查询结果,搜索用时 31 毫秒
71.
Kundu Sumantra R. Pal Sourav Basu Kalyan Das Sajal K. 《Parallel and Distributed Systems, IEEE Transactions on》2009,20(1):111-123
In networks carrying large volume of traffic, accurate traffic characterization is necessary for understanding the dynamics and patterns of network resource usage. Previous approaches to flow characterization are based on random sampling of the packets (e.g., Cisco's NetFlow) or inferring characteristics solely based on long lived flows (LLFs) or on lossy data structures (e.g., bloom filters, hash tables). However, none of these approaches takes into account the heavy-tailed nature of the Internet traffic and separates the estimation algorithm from the flow measurement architecture.In this paper, we propose an alternate approach to traffic characterization by closely linking the flow measurement architecture with the estimation algorithm. Our measurement framework stores complete information related to short lived flows (SLFs) while collecting partial information related to LLFs. For real-time separation of LLFs and SLFs, we propose a novel algorithm based on typical sequences from Information theory. The distribution (pdf) and sample space of the underlying traffic is estimated using the non-parametric Parzen window technique and likelihood function defined over the Coupon collector problem. We validate the accuracy and performance of our estimation technique using traffic traces from the internal LAN in our laboratory and from National Library for Applied Network Research (NLANR). 相似文献
72.
Kundu Amlan Panigrahi Suvasini Sural Shamik Majumdar Arun K. 《Dependable and Secure Computing, IEEE Transactions on》2009,6(4):309-315
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA. 相似文献
73.
Subir Kumar Ghosh Anil Maheshwari Sudebkumar Prasant Pal C. E. Veni Madhavan 《The Visual computer》1994,10(8):443-451
A polygonP is said to be apalm polygon if there exists a pointxP such that the Euclidean shortest path fromx to any pointyP makes only left turns or only right turns. The set of all such pointsx is called thepalm kernel. In this paper we propose an O(E) time algorithm for recognizing a palm polygonP, whereE is the size of the visibility graph ofP. The algorithm recognizes the given polygonP as a palm polygon by computing the palm kernel ofP. If the palm kernel is not empty,P is a palm polygon.The extended abstract of this paper was reported at the Second Canadian Conference in Computational Geometry, pp. 246–251, 1990 相似文献
74.
A connectionist system has been designed for learning and simultaneous recognition of flat industrial objects (based an the concepts of conventional and structured connectionist computing) by integrating the psychological hypotheses with the generalized Hough transform technique. The psychological facts include the evidence of separation of two regions for identification ("what it is") and pose estimation ("where it is"). The system uses the mechanism of selective attention for initial hypotheses generation. A special two-stage training paradigm has been developed for learning the structural relationships between the features and objects and the importance values of the features with respect to the objects. The performance of the system has been demonstrated on real-life data both for single and mixed (overlapped) instances of object categories. The robustness of the system with respect to noise and false alarming has been theoretically investigated. 相似文献
75.
For a long time, legal entities have developed and used crime prediction methodologies. The techniques are frequently updated based on crime evaluations and responses from scientific communities. There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level. Child maltreatment is not adequately addressed because children are voiceless. As a result, the possibility of developing a model for predicting child abuse was investigated in this study. Various exploratory analysis methods were used to examine the city of Chicago’s child abuse events. The data set was balanced using the Borderline-SMOTE technique, and then a stacking classifier was employed to ensemble multiple algorithms to predict various types of child abuse. The proposed approach successfully predicted crime types with 93% of accuracy, precision, recall, and F1-Score. The AUC value of the same was 0.989. However, when compared to the Extra Trees model (17.55), which is the second best, the proposed model’s execution time was significantly longer (476.63). We discovered that Machine Learning methods effectively evaluate the demographic and spatial-temporal characteristics of the crimes and predict the occurrences of various subtypes of child abuse. The results indicated that the proposed Borderline-SMOTE enabled Stacking Classifier model (BS-SC Model) would be effective in the real-time child abuse prediction and prevention process. 相似文献
76.
Wireless Personal Communications - Everyone today actively uses online social networks to get in touch with their friends, for career opportunities, and business also. Some of the most popular... 相似文献
77.
Mahajan Nitish Chauhan Amita Kumar Harish Kaushal Sakshi Sangaiah Arun Kumar 《Mobile Networks and Applications》2022,27(4):1423-1443
Mobile Networks and Applications - In the era of Internet of Things (IoT) powered by 5G technologies, Automobile Industry is headed towards a revolution. In Intelligent Transport Systems (ITS),... 相似文献
78.
Pal Tumpa Saha Ramesh Biswas Suparna 《International Journal of Wireless Information Networks》2022,29(3):373-392
International Journal of Wireless Information Networks - In this work, energy efficient routing protocol variants considering different sink mobility in hierarchical cluster based wireless sensor... 相似文献
79.
Salunkhe Satish S. Pal Shelendra Agrawal Abhishek Rai Ravi Mole S. S. Sreeja Jos Bos Mathew 《The Journal of supercomputing》2022,78(6):8493-8508
The Journal of Supercomputing - This study offers a neural network-based deep learning method for energy optimization modeling in electric vehicles (EV). The pre-processed driving cycle is... 相似文献
80.
A vendor-managed inventory (VMI) relationship between a downstream retailer and an upstream vendor consists of two distinct components: (i) information sharing (IS) and (ii) a shift in decision-making responsibility. This study compares these two components of VMI in a two-stage serial supply chain based on the ‘static uncertainty’ strategy under dynamic and random demand with fill rate constraints. Numerical experiments are conducted using analytical models to identify the conditions where the incremental value of VMI over IS is significant. The results provide guidelines relevant to academia and supply chain practitioners in taking VMI adoption decision above and beyond IS according to their specific business environment. 相似文献