全文获取类型
收费全文 | 24369篇 |
免费 | 5389篇 |
国内免费 | 1139篇 |
专业分类
电工技术 | 2242篇 |
综合类 | 2788篇 |
化学工业 | 2976篇 |
金属工艺 | 620篇 |
机械仪表 | 2110篇 |
建筑科学 | 1247篇 |
矿业工程 | 207篇 |
能源动力 | 683篇 |
轻工业 | 896篇 |
水利工程 | 440篇 |
石油天然气 | 391篇 |
武器工业 | 227篇 |
无线电 | 2392篇 |
一般工业技术 | 1267篇 |
冶金工业 | 477篇 |
原子能技术 | 229篇 |
自动化技术 | 11705篇 |
出版年
2024年 | 10篇 |
2023年 | 207篇 |
2022年 | 464篇 |
2021年 | 518篇 |
2020年 | 501篇 |
2019年 | 516篇 |
2018年 | 628篇 |
2017年 | 517篇 |
2016年 | 671篇 |
2015年 | 487篇 |
2014年 | 3859篇 |
2013年 | 2913篇 |
2012年 | 3550篇 |
2011年 | 3937篇 |
2010年 | 3389篇 |
2009年 | 3092篇 |
2008年 | 1374篇 |
2007年 | 575篇 |
2006年 | 450篇 |
2005年 | 432篇 |
2004年 | 329篇 |
2003年 | 305篇 |
2002年 | 256篇 |
2001年 | 248篇 |
2000年 | 193篇 |
1999年 | 196篇 |
1998年 | 193篇 |
1997年 | 158篇 |
1996年 | 141篇 |
1995年 | 122篇 |
1994年 | 101篇 |
1993年 | 90篇 |
1992年 | 65篇 |
1991年 | 48篇 |
1990年 | 44篇 |
1989年 | 39篇 |
1988年 | 22篇 |
1987年 | 26篇 |
1986年 | 33篇 |
1985年 | 65篇 |
1984年 | 29篇 |
1983年 | 32篇 |
1982年 | 20篇 |
1981年 | 18篇 |
1980年 | 12篇 |
1979年 | 7篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1974年 | 4篇 |
1971年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 859 毫秒
101.
针对光网络故障恢复资源利用的优化问题,采用改进的蜂群算法(IABC)来求解专有路径保护设计优化问题。由于采蜜机理的蜂群算法全局寻优能力较弱,引入禁忌表机制,增强算法搜索全局最优解的能力,并改进蜂群算法的交叉算子,增强算法的收敛速度。通过实验仿真。结果表明与传统的ABC算法相比,IABC能算法大大地提高计算效率,针对较复杂网络资源优化的NP问题提供有效的可行性实施方法。 相似文献
102.
Snort作为开源的入侵检测系统,利用定义的静态规则集合实现对网络的入侵事件的检测。本文分析入侵检测系统的基本原理和模型,阐述Snort入侵检测系统部署到网络时,其静态规则集的配置方法,根据统计流量阈值和告警频率阈值动态产生动态规则集的方法,改进并提高了部署Snort应有的灵活性。 相似文献
103.
由于传统的MIL-STD-1553B总线难以满足高速数据传输需求且更换现有总线代价过高,因此迫切需要在不影响现有基带通信的条件下升级1553B系统以提供高速通信接口。本文分析1553B的信道特性并据此选择频谱利用率高、抗频率选择性衰落的离散多音调制(DMT)作为扩展带宽的技术,基于离散多音调制,提出一个与现有通信相互兼容的扩展方案以显著提高传输速率,并对该方案涉及的关键技术进行介绍。 相似文献
104.
给出了一个符合JMx规范的MuleESB管理控制台的设计和实现方案。借助了该控制台可以远程管理MuleESB.查看MuleEsB服务器信息、MuleEsB及其服务的运行时状态和运行日志,也可以远程调用部署在MuleESB&服务方法。该控制台弥补了MuleESB不提供远程管理的开源实现的不足。实验证实,该控制台运行稳定可靠。 相似文献
105.
Alison E. Adam 《AI & Society》1990,4(3):232-241
There have been few attempts, so far, to document the history of artificial intelligence. It is argued that the historical sociology of scientific knowledge can provide a broad historiographical approach for the history of AI, particularly as it has proved fruitful within the history of science in recent years. The article shows how the sociology of knowledge can inform and enrich four types of project within the history of AI; organizational history; AI viewed as technology; AI viewed as cognitive science and historical biography. In the latter area the historical treatments of Darwin and Turing are compared to warn against the pitfalls of rational reconstructions of the past. 相似文献
106.
In the first section of the article, we examine some recent criticisms of the connectionist enterprise: first, that connectionist models are fundamentally behaviorist in nature (and, therefore, non-cognitive), and second that connectionist models are fundamentally associationist in nature (and, therefore, cognitively weak). We argue that, for a limited class of connectionist models (feed-forward, pattern-associator models), the first criticism is unavoidable. With respect to the second criticism, we propose that connectionist modelsare fundamentally associationist but that this is appropriate for building models of human cognition. However, we do accept the point that there are cognitive capacities for which any purely associative model cannot provide a satisfactory account. The implication that we draw from is this is not that associationist models and mechanisms should be scrapped, but rather that they should be enhanced.In the next section of the article, we identify a set of connectionist approaches which are characterized by active symbols — recurrent circuits which are the basis of knowledge representation. We claim that such approaches avoid criticisms of behaviorism and are, in principle, capable of supporting full cognition. In the final section of the article, we speculate at some length about what we believe would be the characteristics of a fully realized active symbol system. This includes both potential problems and possible solutions (for example, mechanisms needed to control activity in a complex recurrent network) as well as the promise of such systems (in particular, the emergence of knowledge structures which would constitute genuine internal models). 相似文献
107.
Process monitoring in additive manufacturing may allow components to be certified cheaply and rapidly and opens the possibility of healing defects, if detected. Here, neural networks (NNs) and convolutional neural networks (CNNs) are trained to detect flaws in layerwise images of a build, using labeled XCT data as a ground truth. Multiple images were recorded after each layer before and after recoating with various lighting conditions. Classifying networks were given a single image or multiple images of various lighting conditions for training and testing. CNNs demonstrated significantly better performance than NNs across all tasks. Furthermore, CNNs demonstrated improved generalizability, i.e., the ability to generalize to more diverse data than either the training or validation data sets. Specifically, CNNs trained on high-resolution layerwise images from one build showed minimal loss in performance when applied to data from an independent build, whereas the performance of the NNs degraded significantly. CNN accuracy was also demonstrated to be a function of flaw size, suggesting that smaller flaws may be produced by mechanisms that do not alter the surface morphology of the build plate. CNNs demonstrated accuracies of 93.5 % on large (>200 μm) flaws when testing and training on components from the same build and accuracies of 87.3 % when testing on a previously unseen build. Finally, evidence linking the formation of large lack-of-fusion defects to the presence of process ejecta is presented. 相似文献
108.
With the development of the globalization of economy and manufacturing industry, distributed manufacturing mode has become a hot topic in current production research. In the context of distributed manufacturing, one job has different process routes in different workshops because of heterogeneous manufacturing resources and manufacturing environments in each factory. Considering the heterogeneous process planning problems and shop scheduling problems simultaneously can take advantage of the characteristics of distributed factories to finish the processing task well. Thus, a novel network-based mixed-integer linear programming (MILP) model is established for distributed integrated process planning and scheduling problem (DIPPS). The paper designs a new encoding method based on the process network and its OR-nodes, and then proposes a discrete artificial bee colony algorithm (DABC) to solve the DIPPS problem. The proposed DABC can guarantee the feasibility of individuals via specially-designed mapping and switching operations, so that the process precedence constraints contained by the network graph can be satisfied in the entire procedure of the DABC algorithm. Finally, the proposed MILP model is verified and the proposed DABC is tested through some open benchmarks. By comparing with other powerful reported algorithms and obtaining new better solutions, the experiment results prove the effectiveness of the proposed model and DABC algorithm successfully. 相似文献
109.
Artificial intelligence (AI) has been heralded by many as the next source of business value. Grounded on the resource-based theory of the firm and on recent work on AI at the organizational context, this study (1) identifies the AI-specific resources that jointly create an AI capability and provides a definition, (2) develops an instrument to capture the AI capability of the firms, and (3) examines the relationship between an AI capability and organizational creativity and performance. Findings empirically support the suggested theoretical framework and corresponding instrument and provide evidence that an AI capability results in increased organizational creativity and performance. 相似文献
110.
物联网安全研究主要集中在物联网安全体系、物联网个体隐私保护模式、物联网安全相关法律的制定等方面。首先举例说明物联网在智能电网等生产生活领域的应用,然后讨论了物联网安全技术架构。最后根据物联网的安全架构分析了物联网安全面临的挑战。由此警示我们应提早应对物联网发展带来的信息安全等挑战。 相似文献