全文获取类型
收费全文 | 9463篇 |
免费 | 452篇 |
国内免费 | 71篇 |
专业分类
电工技术 | 255篇 |
综合类 | 31篇 |
化学工业 | 2044篇 |
金属工艺 | 205篇 |
机械仪表 | 241篇 |
建筑科学 | 317篇 |
矿业工程 | 12篇 |
能源动力 | 617篇 |
轻工业 | 997篇 |
水利工程 | 123篇 |
石油天然气 | 208篇 |
武器工业 | 6篇 |
无线电 | 1125篇 |
一般工业技术 | 1644篇 |
冶金工业 | 561篇 |
原子能技术 | 82篇 |
自动化技术 | 1518篇 |
出版年
2024年 | 18篇 |
2023年 | 206篇 |
2022年 | 493篇 |
2021年 | 639篇 |
2020年 | 481篇 |
2019年 | 484篇 |
2018年 | 612篇 |
2017年 | 438篇 |
2016年 | 502篇 |
2015年 | 301篇 |
2014年 | 456篇 |
2013年 | 755篇 |
2012年 | 518篇 |
2011年 | 541篇 |
2010年 | 365篇 |
2009年 | 307篇 |
2008年 | 270篇 |
2007年 | 250篇 |
2006年 | 207篇 |
2005年 | 180篇 |
2004年 | 144篇 |
2003年 | 111篇 |
2002年 | 128篇 |
2001年 | 72篇 |
2000年 | 79篇 |
1999年 | 94篇 |
1998年 | 164篇 |
1997年 | 133篇 |
1996年 | 83篇 |
1995年 | 97篇 |
1994年 | 62篇 |
1993年 | 60篇 |
1992年 | 46篇 |
1991年 | 29篇 |
1990年 | 33篇 |
1989年 | 55篇 |
1988年 | 54篇 |
1987年 | 32篇 |
1986年 | 34篇 |
1985年 | 53篇 |
1984年 | 51篇 |
1983年 | 43篇 |
1982年 | 32篇 |
1981年 | 25篇 |
1980年 | 33篇 |
1979年 | 23篇 |
1978年 | 20篇 |
1977年 | 23篇 |
1976年 | 34篇 |
1973年 | 18篇 |
排序方式: 共有9986条查询结果,搜索用时 15 毫秒
121.
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University. 相似文献
122.
Imam Al-wazedi Author Vitae Ahmed K. Elhakeem Author Vitae 《Computers & Electrical Engineering》2010,36(5):978-992
Wide band mesh or star oriented networks have recently become a subject of greater interest. Providing wideband multimedia access for a variety of applications has led to the inception of mesh networks. Classic access techniques such as FDMA and TDMA have been the norm for such networks. CDMA maximum transmitter power is much less than TDMA and FDMA counter parts, which is an important asset for mobile operation. In this paper we introduce a code division multiple access/time division duplex technique CDMA/TDD for such networks. The CDMA approach is an almost play and plug technology for wireless access, making it amenable for implementation by the mesh network service station, SS. Further it inherently allows mesh network service stations to use a combination of turbo coding and dynamic parallel orthogonal transmission to improve network efficiency. We outline briefly the new transmitter and receiver structures then evaluate the efficiency, delay and delay jitter. By analysis we show the advantages over classic counter parts with respect to the total network efficiency achievable especially for larger number of hops. 相似文献
123.
124.
ProbExplorer: Uncertainty‐guided Exploration and Editing of Probabilistic Medical Image Segmentation
In this paper, we develop an interactive analysis and visualization tool for probabilistic segmentation results in medical imaging. We provide a systematic approach to analyze, interact and highlight regions of segmentation uncertainty. We introduce a set of visual analysis widgets integrating different approaches to analyze multivariate probabilistic field data with direct volume rendering. We demonstrate the user's ability to identify suspicious regions (e.g. tumors) and correct the misclassification results using a novel uncertainty‐based segmentation editing technique. We evaluate our system and demonstrate its usefulness in the context of static and time‐varying medical imaging datasets. 相似文献
125.
Salah Bouktif Faheem Ahmed Issa Khalil Giuliano Antoniol 《Information and Software Technology》2010,52(12):1298-1311
Context:How can quality of software systems be predicted before deployment? In attempting to answer this question, prediction models are advocated in several studies. The performance of such models drops dramatically, with very low accuracy, when they are used in new software development environments or in new circumstances.ObjectiveThe main objective of this work is to circumvent the model generalizability problem. We propose a new approach that substitutes traditional ways of building prediction models which use historical data and machine learning techniques.MethodIn this paper, existing models are decision trees built to predict module fault-proneness within the NASA Critical Mission Software. A genetic algorithm is developed to combine and adapt expertise extracted from existing models in order to derive a “composite” model that performs accurately in a given context of software development. Experimental evaluation of the approach is carried out in three different software development circumstances.ResultsThe results show that derived prediction models work more accurately not only for a particular state of a software organization but also for evolving and modified ones.ConclusionOur approach is considered suitable for software data nature and at the same time superior to model selection and data combination approaches. It is then concluded that learning from existing software models (i.e., software expertise) has two immediate advantages; circumventing model generalizability and alleviating the lack of data in software-engineering. 相似文献
126.
El-Sayed Ahmed El-Dahshan Tamer Hosny Abdel-Badeeh M. Salem 《Digital Signal Processing》2010,20(2):433-441
This paper presents a hybrid technique for the classification of the magnetic resonance images (MRI). The proposed hybrid technique consists of three stages, namely, feature extraction, dimensionality reduction, and classification. In the first stage, we have obtained the features related to MRI images using discrete wavelet transformation (DWT). In the second stage, the features of magnetic resonance images have been reduced, using principal component analysis (PCA), to the more essential features. In the classification stage, two classifiers have been developed. The first classifier based on feed forward back-propagation artificial neural network (FP-ANN) and the second classifier is based on k-nearest neighbor (k-NN). The classifiers have been used to classify subjects as normal or abnormal MRI human images. A classification with a success of 97% and 98% has been obtained by FP-ANN and k-NN, respectively. This result shows that the proposed technique is robust and effective compared with other recent work. 相似文献
127.
This paper presents a novel compensation method for the coupled fuselage-rotor mode of a Rotary wing Unmanned Aerial Vehicle (RUAV). The presence of stabilizer bar limits the performance of attitude control of an RUAV. In this paper, a Positive Position Feedback (PPF) is introduced to increase the stability margins and allow higher control bandwidth. The identified model is used to design a PPF controller to mitigate the presence of stabilizer bar. Parameters for the linear RUAV model are obtained by performing linear system identification about a few selected points. This identification process gives complete RUAV dynamics and is suitable for designing a Stability Augmentation System (SAS) of an RUAV. The identified parameters of an RUAV model are verified using experimental flight data and can be used to obtain the nonlinear model of an RUAV. The performance of the proposed algorithm is tested using a high-fidelity RUAV simulation model, which is validated through experimental flight data. The closed-loop response of the rotorcraft indicates that the desired attitude performance is achieved while ensuring that the coupled fuselage-rotor mode is effectively compensated without penalizing the phase response. 相似文献
128.
Roman Palenichka Ahmed Lakhssassi Marek Zaremba 《Engineering Applications of Artificial Intelligence》2011,24(5):822-832
This paper presents a method for multi-scale segmentation of surface data using scale-adaptive region growing. The proposed segmentation algorithm is initiated by an unsupervised learning of optimal seed positions through the surface attribute clustering with a two-criterion score function. The seeds are selected as consecutive local maxima of the clustering map, which is computed by an aggregation of the local isotropic contrast and local variance maps. The proposed method avoids typical segmentation errors caused by an inappropriate choice of seed points and thresholds used in the region-growing algorithm. The scale-adaptive threshold estimate is based on the image local statistics in the neighborhoods of seed points. The performance of this method was evaluated on LiDAR surface images. 相似文献
129.
Perimeter discovery in wireless sensor networks 总被引:1,自引:0,他引:1
In this paper, we focus on the perimeter detection problem using wireless sensor networks, as perimeter detection has a wide range of uses in several areas. We present a decentralized localized algorithm where sensor nodes determine if they are located along the perimeter of a wireless sensor network. Our proposed algorithm uses the location neighborhood information in conjunction with the Barycentric technique to determine if the sensor node enclosed by neighboring nodes, and consequently, if it is located within the interior of the wireless sensor network. We define performance metrics to analyze the performance of our approach and the simulation shows that the algorithm gives fairly accurate results. 相似文献
130.
Ahmed M. Al-Adilee 《Information Sciences》2009,179(24):4199-4207
A quantum logic is one of possible mathematical models for non-compatible random events. In this paper, we introduce and study functions called QL-copula and QL-co-copula on a quantum logic and we compare them with the classical definition of copula and co-copula, respectively. Finally, we show several examples of these functions by means of an s-map. 相似文献