全文获取类型
收费全文 | 6847篇 |
免费 | 1326篇 |
国内免费 | 1269篇 |
专业分类
电工技术 | 392篇 |
综合类 | 1117篇 |
化学工业 | 97篇 |
金属工艺 | 89篇 |
机械仪表 | 504篇 |
建筑科学 | 110篇 |
矿业工程 | 108篇 |
能源动力 | 62篇 |
轻工业 | 79篇 |
水利工程 | 71篇 |
石油天然气 | 59篇 |
武器工业 | 40篇 |
无线电 | 761篇 |
一般工业技术 | 358篇 |
冶金工业 | 35篇 |
原子能技术 | 12篇 |
自动化技术 | 5548篇 |
出版年
2024年 | 56篇 |
2023年 | 313篇 |
2022年 | 478篇 |
2021年 | 439篇 |
2020年 | 287篇 |
2019年 | 216篇 |
2018年 | 217篇 |
2017年 | 252篇 |
2016年 | 257篇 |
2015年 | 322篇 |
2014年 | 382篇 |
2013年 | 402篇 |
2012年 | 530篇 |
2011年 | 525篇 |
2010年 | 416篇 |
2009年 | 463篇 |
2008年 | 486篇 |
2007年 | 459篇 |
2006年 | 434篇 |
2005年 | 365篇 |
2004年 | 290篇 |
2003年 | 262篇 |
2002年 | 194篇 |
2001年 | 193篇 |
2000年 | 160篇 |
1999年 | 160篇 |
1998年 | 120篇 |
1997年 | 123篇 |
1996年 | 93篇 |
1995年 | 94篇 |
1994年 | 75篇 |
1993年 | 60篇 |
1992年 | 53篇 |
1991年 | 44篇 |
1990年 | 42篇 |
1989年 | 33篇 |
1988年 | 35篇 |
1987年 | 9篇 |
1986年 | 11篇 |
1985年 | 11篇 |
1984年 | 16篇 |
1983年 | 7篇 |
1982年 | 11篇 |
1981年 | 7篇 |
1980年 | 7篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1976年 | 8篇 |
1975年 | 4篇 |
1973年 | 3篇 |
排序方式: 共有9442条查询结果,搜索用时 15 毫秒
71.
72.
F. Hooshmand 《Optimization methods & software》2016,31(2):359-376
Multistage stochastic programming with endogenous uncertainty is a new topic in which the timing of uncertainty realization is decision-dependent. In this case, the number of nonanticipativity constraints (NACs) increases very quickly with the number of scenarios, making the problem computationally intractable. Fortunately, a large number of NACs are typically redundant and their elimination leads to a considerable reduction in the problem size. Identifying redundant NACs has been addressed in the literature only in the special case where the scenario set is equal to the Cartesian product of all possible outcomes for endogenous parameters; however, this is a scarce condition in practice. In this paper, we consider the general case where the scenario set is an arbitrary set; and two approaches, able to identify all redundant NACs, are proposed. The first approach is by mixed integer programming formulation and the second one is an exact polynomial time algorithm. Proving the fact that the proposed algorithm is able to make the uppermost reduction in the number of NACs is another novelty of this paper. Computational results evaluate the efficiency of the proposed approaches. 相似文献
73.
尽管当前已有众多二值图像的压缩方法,但这些方法并不能直接应用于加密二值图像的压缩。在云计算、分布式处理等场景下,如何高效地对加密二值图像进行有损压缩仍然是一个挑战,而当前鲜有这方面的研究。针对此问题,提出了一种基于马尔可夫随机场(MRF)的加密二值图像有损压缩算法。该算法用MRF表征二值图像的空域统计特性,进而借助MRF及解压缩还原的像素推断加密二值图像压缩过程中被丢弃的像素。所提算法的发送方采用流密码对二值图像进行加密,云端先后利用分块均匀但块内随机的下抽样方式及低密度奇偶校验(LDPC)编码对加密二值图像进行压缩,接收方则通过构造包含解码、解密及MRF重构的联合因子图实现二值图像的有损重构。实验结果表明,所提算法获得了较好的压缩效率,在0.2~0.4 bpp压缩率时有损重构图像的比特误差率(BER)不超过5%;而与针对未加密原始二值图像的国际压缩标准JBIG2的压缩效率相比,所提算法的压缩效率与其相当。这些充分表明了所提算法的可行性与有效性。 相似文献
74.
为解决煤矿井下瓦斯抽采管网因系统变化导致的抽采效率降低的问题,根据抽采系统各项特性建立了有向图论模型,将瓦斯抽采浓度与混合流量赋值于模型点权参数,将瓦斯管路长度、管径赋值于图论模型边权参数,以O-D对流量概念和管路阻力计算为基础,得到了管网中各管段阻力损失,并确定了优化管段位置及优化方案和参数。对芦岭煤矿8210抽采区域进行优化后,优化管段阻力损失降低了8倍,优化区域抽采纯量提高了1倍以上。 相似文献
75.
该文用“图”这一数学工具,通过定量分析来揭示语言系统中的隐性规律,设计了“赢家通吃”和“赢多输少”两种生成算法,将理想算法“步步竞争、择优而行”的博弈论思路贯彻到非理想状态。两种新算法都较前人有更好的概括能力。赢多输少算法更兼顾了充分概括和适度概括均衡。生成语图后,该设计着重准确率的最小简图和着重覆盖率的最大简图归纳算法,挖掘控制的主流规则、分析语言系统的语言学规律。在最小简图基础上提出控制度公式以评价语言系统。
相似文献
相似文献
76.
活动社交网络(EBSNs)为用户提供了方便的组织、参加和分享社交活动的平台。该文面向EBSNs活动推荐问题,提出了包含活动(Event)、主办方(Sponsor)和用户(User)的ESU图模型,深入揭示了EBSNs的实体及其社交关系。因为用户参加活动受多个因素影响,我们提出了基于ESU图的活动推荐多因素决策模型,包括社交影响力、活动内容、活动地点及活动时间。根据ESU图特点,提出了基于双向重启随机游走算法BD-RWR的实体重要度计算方法。选取真实的EBSNs平台—豆瓣同城验证所提方法的有效性。实验结果表明,该文提出的ESU图模型及融合了多因素的活动推荐模型,与已有最新方法相比,有效地提升了用户参加活动的推荐效果。 相似文献
77.
This paper presents an approach for evaluating collaboration attributes in companies operating in industrial clusters. From the literature review, we identified governance, geographic proximity, and trust as the main collaboration attributes in industrial clusters. For each of them, there is a set of related sub-attributes that composed the evaluation model. For developing the model, we used the graph theoretic approach (GTA), a methodology for multi-attribute assessment that considers interdependencies among elements of a system to provide an overall evaluation. We applied the model to five companies of a furniture cluster. The results showed the model allows for systematizing relationship management because it highlights the collaboration attributes that need to be improved. Furthermore, the application of the model may contribute to encouraging companies to develop collaborative practices. 相似文献
78.
To detect copy-paste tampering, an im-proved SIFT (Scale invariant feature transform)-based al-gorithm was proposed. Maximum angle is defined and a maximum angle-based marked graph is constructed. The m arked graph feature vector is provided to each SIFT key point via discrete polar coordinate transformation. Key points are matched to detect the copy-paste tamper-ing regions. The experimental results show that the pro-posed algorithm can effectively identify and detect the ro-tated or scaled copy-paste regions, and in comparison with the methods reported previously, it is resistant to post-processing, such as blurring, Gaussian white noise and JPEG recompression. The proposed algorithm performs better than the existing algorithm to dealing with scaling transformation. 相似文献
79.
《Expert systems with applications》2014,41(2):535-543
Most existing research on applying the matrix factorization approaches to query-focused multi-document summarization (Q-MDS) explores either soft/hard clustering or low rank approximation methods. We employ a different kind of matrix factorization method, namely weighted archetypal analysis (wAA) to Q-MDS. In query-focused summarization, given a graph representation of a set of sentences weighted by similarity to the given query, positively and/or negatively salient sentences are values on the weighted data set boundary. We choose to use wAA to compute these extreme values, archetypes, and hence to estimate the importance of sentences in target documents set. We investigate the impact of using the multi-element graph model for query focused summarization via wAA. We conducted experiments on the data of document understanding conference (DUC) 2005 and 2006. Experimental results evidence the improvement of the proposed approach over other closely related methods and many of state-of-the-art systems. 相似文献
80.
With the advent of information technology, emails have gained wide acceptability among students as an asynchronous communication tool. According to the current pedagogy literature the overall trend of the use of email communication by university students has been increasing significantly since its inception, despite the rapid growth of the popularity and acceptability of other social mediums (e.g. Mobile phone and Facebook). In this study, we explore a longitudinal email communication network, which evolved under an increasing study load among 38 students throughout a university semester, using measures of social network analysis (SNA) and exponential random graph (ERG) models. This longitudinal network was divided into three waves, where each wave represents the portion of the complete longitudinal network that evolves between two consecutive observations. An increased study load was imposed through the assessment components of the course. SNA measures of degree centrality (i.e. the activity of an actor or actor popularity), betweenness centrality (i.e. the capacity to control the flow of information in a network), closeness centrality (i.e. reachable to other nodes) and reciprocity (i.e. tendency to make reciprocal links) are considered to explore this longitudinal network. ERG models are probabilistic models that are presented by locally determined explanatory variables and can effectively identify structural properties of networks. From the analysis of this email communication network, we notice that students' network positions and behaviours change with the changes in their study load. In particular, we find that (i) students make an increased number of email communications with the increase of study load; (ii) the email communication network become sparse with the increase of study load; and (iii) the 2-star parameter (a subset of three nodes in which one node is connected to each of the other two nodes) and the triangle parameter (a subset of three nodes in which each node is connected to the other two nodes) can effectively explain the formation of network in wave3; whereas, the 3-star parameter (a subset of four nodes in which one node is connected to each of other three nodes) can effectively explain the formation of network in wave1 and wave2. Interpretations of these findings for the monitoring of student behaviour in online learning environments, as well as the implications for the design of assessment and the use of asynchronous tools are discussed in this paper. 相似文献