全文获取类型
收费全文 | 56162篇 |
免费 | 6773篇 |
国内免费 | 4906篇 |
专业分类
电工技术 | 5192篇 |
技术理论 | 15篇 |
综合类 | 7311篇 |
化学工业 | 883篇 |
金属工艺 | 372篇 |
机械仪表 | 2132篇 |
建筑科学 | 3284篇 |
矿业工程 | 1549篇 |
能源动力 | 636篇 |
轻工业 | 838篇 |
水利工程 | 1452篇 |
石油天然气 | 635篇 |
武器工业 | 997篇 |
无线电 | 9791篇 |
一般工业技术 | 2300篇 |
冶金工业 | 1637篇 |
原子能技术 | 121篇 |
自动化技术 | 28696篇 |
出版年
2024年 | 105篇 |
2023年 | 623篇 |
2022年 | 1234篇 |
2021年 | 1570篇 |
2020年 | 1695篇 |
2019年 | 1235篇 |
2018年 | 1121篇 |
2017年 | 1521篇 |
2016年 | 1787篇 |
2015年 | 2081篇 |
2014年 | 4347篇 |
2013年 | 3729篇 |
2012年 | 4714篇 |
2011年 | 4924篇 |
2010年 | 3766篇 |
2009年 | 4001篇 |
2008年 | 4230篇 |
2007年 | 4616篇 |
2006年 | 4084篇 |
2005年 | 3549篇 |
2004年 | 2961篇 |
2003年 | 2625篇 |
2002年 | 1792篇 |
2001年 | 1400篇 |
2000年 | 1073篇 |
1999年 | 669篇 |
1998年 | 447篇 |
1997年 | 345篇 |
1996年 | 292篇 |
1995年 | 223篇 |
1994年 | 207篇 |
1993年 | 149篇 |
1992年 | 107篇 |
1991年 | 83篇 |
1990年 | 52篇 |
1989年 | 59篇 |
1988年 | 47篇 |
1987年 | 27篇 |
1986年 | 28篇 |
1985年 | 45篇 |
1984年 | 52篇 |
1983年 | 43篇 |
1982年 | 28篇 |
1981年 | 18篇 |
1980年 | 19篇 |
1979年 | 17篇 |
1977年 | 8篇 |
1965年 | 10篇 |
1964年 | 11篇 |
1961年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Based on bibliometric, national and international research output within 2000~2018 of the third generation of semiconductor material SiC and GaN was collected. Analysis and studies were made in the region of time distribution, research forces and research hotspots. The general international development tendency and scientific research level in China were also discussed. Meanwhile, study directions clustering and burst key words detecting were used to discover and explain the inner law of evolutionary in this field, especially in the different research focus of various development stages. This paper could also provide a reference on research and arrangement in further studies. 相似文献
82.
疲劳断裂是金属结构中的主要失效形式,而金属结构中的早期疲劳断裂信号通常难以检测。TOA方法是常用的声发射定位源方法,但是声波传播过程中波速变换和路径的复杂性对其结果影响很大。运用Delta T声发射源定位方法,用断铅实验模拟声发射源,用AIC信息准则对到达时间进行优化,通过使用差值求源点坐标和图像处理的方法,求得声发射源坐标。通过在平板上的实验,比较两种源定位方法在不同结构中的定位结果,分析定位误差,结果表明图像处理方法更为优秀。 相似文献
83.
基于信息披露的主体框架,分析披露体系中具体的供需信息对于市场成员的引导作用。建立日前市场的双层竞价优化模型,采用强化学习的方法,通过市场中有无关键供求信息披露对于发电商报价预期的影响,推演模拟不同信息披露程度下发电商报价行为,然后从策略演化过程、策略偏离度以及策略收敛速度3个角度进行信息披露程度对市场成员交易行为影响的定量分析,验证市场供需信息的发布程度对于市场成员的引导作用,最后基于推演结果进行总结,并对我国信息披露的建设提出建议与思考。 相似文献
84.
杨霁琳张贤勇唐孝 《数据采集与处理》2016,31(6):1156-1163
在模糊信息系统中,通过有序加权平均(Ordered weighted averaging,OWA)算子计算对象相似度,可以建立λ截集的相容关系。当λ的值确定后,OWA算子中量词参数(α,β)的选取直接关系到不可区分关系的建立以及信息粒的粗细。因此合理选取参数(α,β)是值得进一步研究的问题。本文采用粗糙集三支决策理论,研究模糊信息系统
OWA算子参数选择的相关内容。基于参数的激进、中庸和消极语义,确定OWA算子(α,β)的3种常用取值;进而研究相似度、相容类、双向近似和三支区域在3种参数选择下的性质关系。最后利用实例验证分析了模糊量词参数语义解释的合理性。本文采用三支决策创新视角,得到模糊信息系统OWA算子的深入性质,为相关模糊量词参数提供语义解释与选择依据。 相似文献
85.
There are numerous methods currently used to calculate required water flow rates for sprinklered and non-sprinklered buildings. The aim of this study is provide a flexible automated procedure for indentifying locations lacking adequate fire flow. To accomplish this objective, this research uses a GIS procedure to determine the spatial relationships between fire hydrants and historical fire incidences, and integrates the recommended hydrant spacing and building type specifications from the International Fire Code. This method was tested in two communities in eastcentral Michigan, USA. The results indicate an ability to define clusters of fires, determine the availability of hydrants, and assess the suitability of the available fire flow, including areas of potential extra capacity. Using these same data, additional GIS analyses can optimize hydrant location, ascertain the frequencies of different categories of fires, and identify the patterns of building types prone to fires. 相似文献
86.
This paper addresses a new distributed cost optimization (DCO) method for load shedding (LS) of an islanded microgrid considering cost. A two-layer improved average consensus algorithm (IACA) of multi-agent system (MAS) is proposed, and the consensus characteristic of which is analyzed in detail. With the global information discovered in the first layer of the IACA, the DCO of LS can be solved by using the synchronization processing of the IACA in the second layer. PSCAD/EMTDC-based simulation models are built to study the value settings of consensus constants and the performances of the proposed DCO method. Simulation results verified the convergence improvement of the IACA and the effectiveness of the proposed DCO. 相似文献
87.
The need for feature selection and dimension reduction is felt as a fundamental step in security assessment of large power systems in which the number of features representing the state of power grids dramatically increases. These large amounts of attributes are not proper to be used for computational intelligence (CI) techniques as inputs, because it may lead to a time consuming procedure with insufficient results and they are not suitable for on-line purposes and updates.This paper proposes a combined method for an online voltage security assessment in which the dimension of the token data from phasor measurement units (PMUs) is reduced by principal component analysis (PCA). Then, the features with different stability indices are put into several categories and feature selection is done by correlation analysis in each category. These selected features are then given to decision trees (DTs) for classification and security assessment of power systems.The method is applied to 39-bus test system and a part of Iran power grid. It is seen from the results that the DTs with reduced data have simpler splitting rules, better performance in saving time, reasonable DT error and they are more suitable for constant updates. 相似文献
88.
Nowadays, despite the ever increasing need of people for staying “connected” at any time and everywhere, in many areas of the world data connection is extremely expensive or even absent. The Global System for Mobile Communication (GSM) network virtually covers all the populated areas of the world and on average, the entire world population have a handheld device capable of accessing at least the GSM services. Therefore, it makes sense to consider the Short Message Service (SMS) as the most popular wireless data service for such devices. In this work, we exploit the SMS as mechanism for data transfer, especially in scenarios where there is no other network coverage than GSM, such as in rural areas and developing regions. In particular, we propose a framework, based on the SMS as transport facility, which enables secure end-to-end data communication in a ubiquitous and pervasive manner. Moreover, we investigated how, by using compression techniques, the overall processing and transmission efforts needed for secure data communication can be effectively reduced, with the obvious consequences also in terms of energy consumption on the involved devices. Finally, we successfully tested the effectiveness of the proposed framework within the context of a proof of concept implementation. 相似文献
89.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis. 相似文献
90.
A theoretical framework to consensus building within a networked social group is put forward. This article investigates a trust based estimation and aggregation methods as part of a visual consensus model for multiple criteria group decision making with incomplete linguistic information. A novel trust propagation method is proposed to derive trust relationship from an incomplete connected trust network and the trust score induced order weighted averaging operator is presented to aggregate the orthopairs of trust/distrust values obtained from different trust paths. Then, the concept of relative trust score is defined, whose use is twofold: (1) to estimate the unknown preference values and (2) as a reliable source to determine experts’ weights. A visual feedback process is developed to provide experts with graphical representations of their consensus status within the group as well as to identify the alternatives and preference values that should be reconsidered for changing in the subsequent consensus round. The feedback process also includes a recommendation mechanism to provide advice to those experts that are identified as contributing less to consensus on how to change their identified preference values. It is proved that the implementation of the visual feedback mechanism guarantees the convergence of the consensus reaching process. 相似文献