全文获取类型
收费全文 | 26240篇 |
免费 | 2319篇 |
国内免费 | 1558篇 |
专业分类
电工技术 | 463篇 |
技术理论 | 1篇 |
综合类 | 1065篇 |
化学工业 | 968篇 |
金属工艺 | 434篇 |
机械仪表 | 519篇 |
建筑科学 | 223篇 |
矿业工程 | 101篇 |
能源动力 | 958篇 |
轻工业 | 177篇 |
水利工程 | 39篇 |
石油天然气 | 56篇 |
武器工业 | 32篇 |
无线电 | 4818篇 |
一般工业技术 | 1931篇 |
冶金工业 | 128篇 |
原子能技术 | 146篇 |
自动化技术 | 18058篇 |
出版年
2024年 | 97篇 |
2023年 | 587篇 |
2022年 | 919篇 |
2021年 | 1225篇 |
2020年 | 1178篇 |
2019年 | 960篇 |
2018年 | 985篇 |
2017年 | 1965篇 |
2016年 | 2268篇 |
2015年 | 1664篇 |
2014年 | 2523篇 |
2013年 | 1719篇 |
2012年 | 1747篇 |
2011年 | 1717篇 |
2010年 | 1433篇 |
2009年 | 1637篇 |
2008年 | 892篇 |
2007年 | 1382篇 |
2006年 | 1239篇 |
2005年 | 714篇 |
2004年 | 327篇 |
2003年 | 366篇 |
2002年 | 428篇 |
2001年 | 414篇 |
2000年 | 264篇 |
1999年 | 299篇 |
1998年 | 158篇 |
1997年 | 123篇 |
1996年 | 120篇 |
1995年 | 92篇 |
1994年 | 122篇 |
1993年 | 74篇 |
1992年 | 74篇 |
1991年 | 73篇 |
1990年 | 63篇 |
1989年 | 62篇 |
1988年 | 82篇 |
1987年 | 6篇 |
1986年 | 16篇 |
1985年 | 18篇 |
1984年 | 14篇 |
1983年 | 8篇 |
1982年 | 10篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1979年 | 5篇 |
1978年 | 7篇 |
1977年 | 11篇 |
1976年 | 7篇 |
1975年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
31.
Correction to: Double Vision Model Using Space-Time Function Control within Silicon Microring System
Silicon - The original version of this article unfortunately contained a mistake in the “Acknowledgments” section. 相似文献
32.
Many argue that digital technologies have the potential to enhance the teaching and learning of mathematics. However, the availability of technology is not sufficient to realise this potential. The study reported takes a detailed approach to investigate the utility of the particular offerings of the available technologies in the teaching and learning of a specific area of mathematics, functions. Sixteen affordances identified in the data are described. The complexity of the process involved in resolving a situation where particular affordances would be useful so as they are perceived and enacted is detailed. Finally, a grounded theory framework arising from the data analysis from this study that can be used to explain, predict and guide action in other digital environments is presented. 相似文献
33.
An Intermediate Bulk Container (IBC) was punctured during its handling, releasing oil onto soil at an environmentally-sensitive region of Australia. The telehandler did not pierce the plastic of the IBC directly (as was expected) but rather one of the tynes had caught on the underside of the metal base plate, despite numerous controls being in place at time of spill, revealing a previously unreported mechanism for a fluid spill from handling of petroleum hydrocarbons. The diverse investigation team used a root cause analysis (RCA) technique to identify the underlying cause: the inspection process was inadequate with contributing factors of not using a spotter and design of IBC did not anticipate conditions. Engineering controls were put in place as part of the change management process to help prevent spills from occurring from piercing from telehandler tynes on the current project site. 相似文献
34.
Creating an intelligent system that can accurately predict stock price in a robust way has always been a subject of great interest for many investors and financial analysts. Predicting future trends of financial markets is more remarkable these days especially after the recent global financial crisis. So traders who access to a powerful engine for extracting helpful information throw raw data can meet the success. In this paper we propose a new intelligent model in a multi-agent framework called bat-neural network multi-agent system (BNNMAS) to predict stock price. The model performs in a four layer multi-agent framework to predict eight years of DAX stock price in quarterly periods. The capability of BNNMAS is evaluated by applying both on fundamental and technical DAX stock price data and comparing the outcomes with the results of other methods such as genetic algorithm neural network (GANN) and some standard models like generalized regression neural network (GRNN), etc. The model tested for predicting DAX stock price a period of time that global financial crisis was faced to economics. The results show that BNNMAS significantly performs accurate and reliable, so it can be considered as a suitable tool for predicting stock price specially in a long term periods. 相似文献
35.
A steelmaking-continuous casting (SCC) scheduling problem is an example of complex hybrid flow shop scheduling problem (HFSSP) with a strong industrial background. This paper investigates the SCC scheduling problem that involves controllable processing times (CPT) with multiple objectives concerning the total waiting time, earliness/tardiness and adjusting cost. The SCC scheduling problem with CPT is seldom discussed in the existing literature. This study is motivated by the practical situation of a large integrated steel company in which the just-in-time (JIT) and cost-cutting production strategy have become a significant concern. To address this complex HFSSP, the scheduling problem is decomposed into two subproblems: a parallel machine scheduling problem (PMSP) in the last stage and an HFSSP in the upstream stages. First, a hybrid differential evolution (HDE) algorithm combined with a variable neighborhood decomposition search (VNDS) is proposed for the former subproblem. Second, an iterative backward list scheduling (IBLS) algorithm is presented to solve the latter subproblem. The effectiveness of this bi-layer optimization approach is verified by computational experiments on well-designed and real-world scheduling instances. This study provides a new perspective on modeling and solving practical SCC scheduling problems. 相似文献
36.
Smart grid has opened up a new role of “prosumer” in an energy value network, transforming many conventional energy consumers into prosumers, who not only generate green energy but also share the surplus with utilities and other consumers. The concept of a goal-oriented prosumer community group (PCG) has emerged recently as an effective way to fulfill sustainable energy exchange. Such community-based energy sharing networks comprise multiple irreconcilable objectives such as demand constraints, cost constraints, and income maximization. In many cases, one goal may be achievable only at the expense of other goals. This necessitates the development of an effective framework to manage the multiple goals and reduce the gap with their achievement levels. Therefore, in this research paper, an effective framework is developed to negotiate among the multiple goals and thus to define optimal mutual goals for each PCG in a more sustainable manner using multiple-criteria goal programming techniques. Simulation results are presented to illustrate how the methods work in practical situations, where each of the objective measure is given a target value and the unwanted deviations from this set are minimized in an achievement function. 相似文献
37.
We use photoluminescence to observe light-induced degradation in silicon in real time. Numerical simulations are used to match our results and lifetime decay data from the literature with theoretical models for the generation of the light-induced boron–oxygen defects. It is found that the existing model of the slowly generated defect SRC, where its saturated concentration is a function of the majority carrier concentration, does not explain certain results in both p- and n-type samples. A new model is proposed in which the saturated SRC concentration is controlled by the total hole concentration under illumination. 相似文献
38.
The architectural choices underlying Linked Data have led to a compendium of data sources which contain both duplicated and fragmented information on a large number of domains. One way to enable non-experts users to access this data compendium is to provide keyword search frameworks that can capitalize on the inherent characteristics of Linked Data. Developing such systems is challenging for three main reasons. First, resources across different datasets or even within the same dataset can be homonyms. Second, different datasets employ heterogeneous schemas and each one may only contain a part of the answer for a certain user query. Finally, constructing a federated formal query from keywords across different datasets requires exploiting links between the different datasets on both the schema and instance levels. We present Sina, a scalable keyword search system that can answer user queries by transforming user-supplied keywords or natural-languages queries into conjunctive SPARQL queries over a set of interlinked data sources. Sina uses a hidden Markov model to determine the most suitable resources for a user-supplied query from different datasets. Moreover, our framework is able to construct federated queries by using the disambiguated resources and leveraging the link structure underlying the datasets to query. We evaluate Sina over three different datasets. We can answer 25 queries from the QALD-1 correctly. Moreover, we perform as well as the best question answering system from the QALD-3 competition by answering 32 questions correctly while also being able to answer queries on distributed sources. We study the runtime of SINA in its mono-core and parallel implementations and draw preliminary conclusions on the scalability of keyword search on Linked Data. 相似文献
39.
Every year, the rate at which technology is applied on areas of our everyday life is increasing at a steady pace. This rapid development drives the technology companies to design and fabricate their integrated circuits (ICs) in non-trustworthy outsourcing foundries to reduce the cost, thus, leaving space for a synchronous form of virus, known as Hardware Trojan (HT), to be developed. HTs leak encrypted information, degrade device performance or lead to total destruction. To reduce the risks associated with these viruses, various approaches have been developed aiming to prevent and detect them, based on conventional or machine learning methods. Ideally, any undesired modification made to an IC should be detectable by pre-silicon verification/simulation and post-silicon testing. The infected circuit can be inserted in different stages of the manufacturing process, rendering the detection of HTs a complicated procedure. In this paper, we present a comprehensive review of research dedicated to countermeasures against HTs embedded into ICs. The literature is grouped in four main categories; (a) conventional HT detection approaches, (b) machine learning for HT countermeasures, (c) design for security and (d) runtime monitor. 相似文献
40.