全文获取类型
收费全文 | 28689篇 |
免费 | 4125篇 |
国内免费 | 3042篇 |
专业分类
电工技术 | 697篇 |
技术理论 | 5篇 |
综合类 | 3116篇 |
化学工业 | 647篇 |
金属工艺 | 337篇 |
机械仪表 | 1062篇 |
建筑科学 | 1836篇 |
矿业工程 | 9399篇 |
能源动力 | 418篇 |
轻工业 | 284篇 |
水利工程 | 304篇 |
石油天然气 | 176篇 |
武器工业 | 105篇 |
无线电 | 1345篇 |
一般工业技术 | 1158篇 |
冶金工业 | 1863篇 |
原子能技术 | 40篇 |
自动化技术 | 13064篇 |
出版年
2024年 | 101篇 |
2023年 | 383篇 |
2022年 | 850篇 |
2021年 | 1032篇 |
2020年 | 1162篇 |
2019年 | 792篇 |
2018年 | 762篇 |
2017年 | 784篇 |
2016年 | 963篇 |
2015年 | 1034篇 |
2014年 | 1773篇 |
2013年 | 1664篇 |
2012年 | 2310篇 |
2011年 | 2224篇 |
2010年 | 1799篇 |
2009年 | 2015篇 |
2008年 | 2139篇 |
2007年 | 2303篇 |
2006年 | 2055篇 |
2005年 | 1789篇 |
2004年 | 1578篇 |
2003年 | 1457篇 |
2002年 | 993篇 |
2001年 | 789篇 |
2000年 | 687篇 |
1999年 | 526篇 |
1998年 | 354篇 |
1997年 | 233篇 |
1996年 | 224篇 |
1995年 | 230篇 |
1994年 | 185篇 |
1993年 | 154篇 |
1992年 | 119篇 |
1991年 | 100篇 |
1990年 | 56篇 |
1989年 | 66篇 |
1988年 | 52篇 |
1987年 | 30篇 |
1986年 | 20篇 |
1985年 | 14篇 |
1984年 | 4篇 |
1980年 | 3篇 |
1979年 | 6篇 |
1968年 | 3篇 |
1966年 | 3篇 |
1965年 | 3篇 |
1963年 | 4篇 |
1962年 | 3篇 |
1960年 | 3篇 |
1958年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
Dantong Yu Gholamhosein Sheikholeslami Aidong Zhang 《Knowledge and Information Systems》2002,4(4):387-412
Finding the rare instances or the outliers is important in many KDD (knowledge discovery and data-mining) applications, such
as detecting credit card fraud or finding irregularities in gene expressions. Signal-processing techniques have been introduced
to transform images for enhancement, filtering, restoration, analysis, and reconstruction. In this paper, we present a new
method in which we apply signal-processing techniques to solve important problems in data mining. In particular, we introduce
a novel deviation (or outlier) detection approach, termed FindOut, based on wavelet transform. The main idea in FindOut is to remove the clusters from the original data and then identify
the outliers. Although previous research showed that such techniques may not be effective because of the nature of the clustering,
FindOut can successfully identify outliers from large datasets. Experimental results on very large datasets are presented
which show the efficiency and effectiveness of the proposed approach.
Received 7 September 2000 / Revised 2 February 2001 / Accepted in revised form 31 May 2001
Correspondence and offprint requests to: A. Zhang, Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY 14260, USA.
Email: azhang@cse.buffalo.eduau 相似文献
42.
中国学术期刊网燕化镜像站点建设 总被引:1,自引:0,他引:1
通过中国学术期刊网燕化镜像站点的建设,介绍了燕山石化镜像站点的配置及主要管理功能和对全文数据库的检索,浏览功能,同时介绍了新形势下,信息化建设的新观念,新思路,以及强化信息意识,加强信息服务产业化发展的重要性和迫切性。 相似文献
43.
We compare two link analysis ranking methods of web pages in a site. The first, called Site Rank, is an adaptation of PageRank to the granularity of a web site and the second, called Popularity Rank, is based on the frequencies of user clicks on the outlinks in a page that are captured by navigation sessions of users through
the web site. We ran experiments on artificially created web sites of different sizes and on two real data sets, employing
the relative entropy to compare the distributions of the two ranking methods. For the real data sets we also employ a nonparametric
measure, called Spearman's footrule, which we use to compare the top-ten web pages ranked by the two methods. Our main result
is that the distributions of the Popularity Rank and Site Rank are surprisingly close to each other, implying that the topology
of a web site is very instrumental in guiding users through the site. Thus, in practice, the Site Rank provides a reasonable
first order approximation of the aggregate behaviour of users within a web site given by the Popularity Rank. 相似文献
44.
Howard T. Moncarz 《Journal of research of the National Institute of Standards and Technology》2002,107(2):193-205
Geometric dimensioning and tolerancing (GD&T) is a method to specify the dimensions and form of a part so that it will meet its design intent. GD&T is difficult to master for two main reasons. First, it is based on complex 3D geometric entities and relationships. Second, the geometry is associated with a large, diverse knowledge base of dimensional metrology with many interconnections. This paper describes an approach to create a dimensional metrology knowledge base that is organized around a set of key concepts and to represent those concepts as virtual objects that can be navigated with interactive, computer visualization techniques to access the associated knowledge. The approach can enable several applications. First is the application to convey the definition and meaning of GD&T over a broad range of tolerance types. Second is the application to provide a visualization of dimensional metrology knowledge within a control hierarchy of the inspection process. Third is the application to show the coverage of interoperability standards to enable industry to make decisions on standards development and harmonization efforts. A prototype system has been implemented to demonstrate the principles involved in the approach. 相似文献
45.
Xueming Huang Gordon I. McCalla Jim E. Greer Eric Neufeld 《User Modeling and User-Adapted Interaction》1991,1(1):87-115
A user/student model must be revised when new information about the user/student is obtained. But a sophisticated user/student model is a complex structure that contains different types of knowledge. Different techniques may be needed for revising different types of knowledge. This paper presents a student model maintenance system (SMMS) which deals with revision of two important types of knowledge in student models: deductive knowledge and stereotypical knowledge. In the SMMS, deductive knowledge is represented by justified beliefs. Its revision is accomplished by a combination of techniques involving reason maintenance and formal diagnosis. Stereotypical knowledge is represented in the Default Package Network (DPN). The DPN is a knowledge partitioning hierarchy in which each node contains concepts in a sub-domain. Revision of stereotypical knowledge is realized by propagating new information through the DPN to change default packages (stereotypes) of the nodes in the DPN. A revision of deductive knowledge may trigger a revision of stereotypical knowledge, which results in a desirable student model in which the two types of knowledge exist harmoniously. 相似文献
46.
Reports an error in "Interactive use of lexical information in speech perception" by Cynthia M. Connine and Charles Clifton (Journal of Experimental Psychology: Human Perception and Performance, 1987[May], Vol 13[2], 291-299). In the aforementioned article, Figures 1 and 2 were inadvertently transposed. The figure on p. 294 is actually Figure 2, and the figure on p. 296 is actually Figure 1. The captions are correct as they stand. (The following abstract of the original article appeared in record 1987-23984-001.) Two experiments are reported that demonstrate contextual effects on identification of speech voicing continua. Experiment 1 demonstrated the infuence of lexical knowledge on identification of ambiguous tokens from word–nonword and nonword–word continua. Reaction times for word and nonword responses showed a word advantage only for ambiguous stimulus tokens (at the category boundary); no word advantage was found for clear stimuli (at the continua endpoints). Experiment 2 demonstrated an effect of a postperceptual variable, monetary payoff, on nonword–nonword continua. Identification responses were influenced by monetary payoff, but reaction times for bias-consistent and bias-inconsistent responses did not differ at the category boundary. An advantage for bias-consistent responses was evident at the continua endpoints. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
47.
阐述了仿真环境中的网络攻击模型的设计,建立了一个网络攻击仿真模型,用以产生网络攻击,以达到摧毁网络的机密性、完整性和可用性的目的;采用知识表达的方法来建立模型,该模型包含具有知识库和推理机的专家系统,通过随时间而变化的量,使模型具有基于仿真时钟的推理能力;在攻击模型的设计中,定义了它的基本状态和状态跃迁函数,说明了模型的行为,以及攻击策略的制定,最佳策略的选择,攻击选择原则等问题。 相似文献
48.
简述了我国钨矿业概况、现有采选技术水平及钨矿加工利用率 ;从资源配置出发 ,阐述了钨矿业发展存在的几个主要问题 ,并且针对性地提出了可持续发展的几点建议。 相似文献
49.
Finkel Melinda J.; Storaasli Ragnar D.; Bandele Anthony; Schaefer Vivian 《Canadian Metallurgical Quarterly》2003,34(5):555
How can psychologists and graduate students become more affirmative of lesbian, gay, bisexual, and transgender (LGBT) issues? Safe Zone is a diversity-training program to increase sensitivity toward, knowledge of, and advocacy for LGBT populations and issues that affect them. In this exploratory study, the implementation of Safe Zone is described within a school of professional psychology; its effectiveness was assessed by self-reported behavioral and attitudinal changes and from participant evaluations. Results were encouraging with regard to the goals of Safe Zone and its adaptation to institutions interested in improving relations with the LGBT community, but additional empirical studies are needed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
50.
通过梳理管理学界对战略联盟的定义,发现价值链的鸸释同样适用于大学问的战略联盟。通过对已有的大学战略联盟的分析,提出了名校联盟与非名校联盟间的若干差异,最后提出了我国大学联盟战略的若干建议。 相似文献