全文获取类型
收费全文 | 39892篇 |
免费 | 3312篇 |
国内免费 | 2564篇 |
专业分类
电工技术 | 2521篇 |
技术理论 | 8篇 |
综合类 | 3977篇 |
化学工业 | 773篇 |
金属工艺 | 568篇 |
机械仪表 | 2398篇 |
建筑科学 | 8699篇 |
矿业工程 | 627篇 |
能源动力 | 555篇 |
轻工业 | 455篇 |
水利工程 | 270篇 |
石油天然气 | 597篇 |
武器工业 | 421篇 |
无线电 | 4329篇 |
一般工业技术 | 2130篇 |
冶金工业 | 517篇 |
原子能技术 | 414篇 |
自动化技术 | 16509篇 |
出版年
2024年 | 60篇 |
2023年 | 403篇 |
2022年 | 689篇 |
2021年 | 839篇 |
2020年 | 894篇 |
2019年 | 704篇 |
2018年 | 759篇 |
2017年 | 977篇 |
2016年 | 1182篇 |
2015年 | 1305篇 |
2014年 | 2534篇 |
2013年 | 2085篇 |
2012年 | 2689篇 |
2011年 | 3136篇 |
2010年 | 2475篇 |
2009年 | 2513篇 |
2008年 | 2647篇 |
2007年 | 3056篇 |
2006年 | 2792篇 |
2005年 | 2443篇 |
2004年 | 2062篇 |
2003年 | 1828篇 |
2002年 | 1411篇 |
2001年 | 1134篇 |
2000年 | 979篇 |
1999年 | 806篇 |
1998年 | 590篇 |
1997年 | 435篇 |
1996年 | 396篇 |
1995年 | 379篇 |
1994年 | 276篇 |
1993年 | 217篇 |
1992年 | 184篇 |
1991年 | 115篇 |
1990年 | 102篇 |
1989年 | 102篇 |
1988年 | 88篇 |
1987年 | 59篇 |
1986年 | 55篇 |
1985年 | 50篇 |
1984年 | 44篇 |
1983年 | 33篇 |
1982年 | 34篇 |
1981年 | 39篇 |
1980年 | 25篇 |
1979年 | 20篇 |
1978年 | 22篇 |
1977年 | 21篇 |
1976年 | 34篇 |
1975年 | 10篇 |
排序方式: 共有10000条查询结果,搜索用时 221 毫秒
1.
边坡位移的时间序列曲线存在复杂的非线性特性,传统的预测模型精度不足以满足预测要求。为此提出了基于变分模态分解的鸟群优化-核极限学习机的预测模型,并用于河北省某水泥厂的边坡位移预测。该方法首先采用VMD把边坡位移序列分解为一系列的有限带宽的子序列,再对各子序列分别采用相空间重构并用核极限学习机预测,采用鸟群算法优化相空间重构的嵌入维度和KELM中惩罚系数和核参数三个数值,以取得最优预测模型。最后将各个子序列预测值叠加,得到边坡位移的最终预测值。结果表明:和KELM、BSA-KELM、EEMD-BSA-KELM模型相比,基于VMD的BSA-KELM预测精度更高,为边坡位移的预测提供一种有效的方法。 相似文献
2.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
3.
Woong-Kee Loh 《计算机、材料和连续体(英文)》2021,66(2):1251-1267
Many database applications currently deal with objects in a metric space. Examples of such objects include unstructured multimedia objects and points of interest (POIs) in a road network. The M-tree is a dynamic index structure that facilitates an efficient search for objects in a metric space. Studies have been conducted on the bulk loading of large datasets in an M-tree. However, because previous algorithms involve excessive distance computations and disk accesses, they perform poorly in terms of their index construction and search capability. This study proposes two efficient M-tree bulk loading algorithms. Our algorithms minimize the number of distance computations and disk accesses using FastMap and a space-filling curve, thereby significantly improving the index construction and search performance. Our second algorithm is an extension of the first, and it incorporates a partitioning clustering technique and flexible node architecture to further improve the search performance. Through the use of various synthetic and real-world datasets, the experimental results demonstrated that our algorithms improved the index construction performance by up to three orders of magnitude and the search performance by up to 20.3 times over the previous algorithm. 相似文献
4.
为了探讨在安卓平台上构建医用图像采集系统的开发个案,分析通过以智能手机、平板电脑为核心安卓设备通过拍照获得化验单数据后进行文本识别并提交智慧医疗系统的解决方案。本文首先通过二值化算法形成低阈值图像数据,使用卷积神经元网络算法对文本进行逐一识别,使用K-means算法对识别后的单字文本进行字段记录值的整合并形成元数据库服务于其他智慧医疗系统模块。在使用9000组数据对神经元网络进行前期训练的前提下,该系统的识别准确率达到了99.5%以上。本系统具有一定的可行性,对未来智慧医疗的系统开发有实践意义。 相似文献
5.
模拟量模块采用RS485通讯网路,将分散的现场数据点的模拟量经AD变换传输到主机或由PC控制远程主站点。模拟量模块具有计量数据采集、测量数据采集、设备开关状态采集和对外逻辑控制等多项功能,主要用作各种测控终端的数据采集、控制和显示设备,适用于各行业的自动化、信息化系统。本文介绍了一种模拟量模块的应用。 相似文献
6.
7.
8.
精准预测生物氧化预处理中的进气量对提高黄金提取率和节能降耗具有重要意义。以气体管流连续性方程和运动方程为控制方程,采用Preissmann隐格式法作为差分方法。同时,根据集合卡尔曼滤波(Ensemble Kalman filter,EnKF)算法原理,构造进气量、压强的状态空间模型。结果表明,基于气体管流控制方程建立的进气量模型预测结果与实际进气量观测值具有较好的一致性;与传统静态预测方法相比,EnKF同化方法引入实时观测值和模型参数的更新,有效提高了进气量的预测精度,其平均绝对误差、平均相对误差和均方根误差有明显的降低。可见,基于气体管流控制方程建立的预测模型结合EnKF同化方法是提高生物氧化槽进气量预测精度的有效手段。 相似文献
9.
An integrated approach to measure the cost efficiency of the postal network of Universal Service Provider is proposed. An integrated approach enables the measurement of cost efficiency for delivery and non-delivery postal network units. The proposed approach is verified and tested on the postal network of the selected provider and the results were derived by using Data Envelopment Analysis (DEA). The results show that the main sources of inefficiency are inadequate allocation of resources relative to the network units. In addition, the study indicates that economies of scale have a positive impact on the efficiency of postal network units. 相似文献
10.
Communication between organizations is formalized as process choreographies in daily business. While the correct ordering of exchanged messages can be modeled and enacted with current choreography techniques, no approach exists to describe and automate the exchange of data between processes in a choreography using messages. This paper describes an entirely model-driven approach for BPMN introducing a few concepts that suffice to model data retrieval, data transformation, message exchange, and correlation – four aspects of data exchange. For automation, this work utilizes a recent concept to enact data dependencies in internal processes. We present a modeling guideline to derive local process models from a given choreography; their operational semantics allows to correctly enact the entire choreography from the derived models only including the exchange of data. Targeting on successful interactions, we discuss means to ensure correct process choreography modeling. Finally, we implemented our approach by extending the camunda BPM platform with our approach and show its feasibility by realizing all service interaction patterns using only model-based concepts. 相似文献