全文获取类型
收费全文 | 3472篇 |
免费 | 164篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 40篇 |
综合类 | 3篇 |
化学工业 | 945篇 |
金属工艺 | 71篇 |
机械仪表 | 87篇 |
建筑科学 | 152篇 |
矿业工程 | 7篇 |
能源动力 | 139篇 |
轻工业 | 252篇 |
水利工程 | 21篇 |
石油天然气 | 15篇 |
无线电 | 283篇 |
一般工业技术 | 529篇 |
冶金工业 | 392篇 |
原子能技术 | 13篇 |
自动化技术 | 694篇 |
出版年
2023年 | 16篇 |
2022年 | 108篇 |
2021年 | 120篇 |
2020年 | 57篇 |
2019年 | 62篇 |
2018年 | 72篇 |
2017年 | 93篇 |
2016年 | 97篇 |
2015年 | 96篇 |
2014年 | 154篇 |
2013年 | 249篇 |
2012年 | 173篇 |
2011年 | 221篇 |
2010年 | 170篇 |
2009年 | 173篇 |
2008年 | 181篇 |
2007年 | 140篇 |
2006年 | 167篇 |
2005年 | 117篇 |
2004年 | 129篇 |
2003年 | 110篇 |
2002年 | 88篇 |
2001年 | 45篇 |
2000年 | 44篇 |
1999年 | 45篇 |
1998年 | 47篇 |
1997年 | 48篇 |
1996年 | 57篇 |
1995年 | 44篇 |
1994年 | 37篇 |
1993年 | 47篇 |
1992年 | 38篇 |
1991年 | 35篇 |
1990年 | 21篇 |
1989年 | 26篇 |
1988年 | 21篇 |
1987年 | 19篇 |
1986年 | 13篇 |
1985年 | 25篇 |
1984年 | 25篇 |
1983年 | 24篇 |
1982年 | 23篇 |
1981年 | 18篇 |
1980年 | 17篇 |
1979年 | 17篇 |
1978年 | 15篇 |
1977年 | 14篇 |
1976年 | 16篇 |
1971年 | 10篇 |
1970年 | 9篇 |
排序方式: 共有3643条查询结果,搜索用时 15 毫秒
81.
82.
83.
Marcin Bienkowski Marek Klonowski Miroslaw Korzeniowski Dariusz R. Kowalski 《Distributed Computing》2016,29(5):341-359
In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes execute a concurrent program that occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed algorithm to control entries and exits to/from the shared resource (also called a critical section), in such a way that at any time, there is at most one process accessing it. In our considerations, the shared resource is the shared communication channel itself (multiple access channel), and the main challenge arises because the channel is also the only mean of communication between these processes. We consider both the classic and a slightly weaker version of mutual exclusion, called \(\varepsilon \)-mutual-exclusion, where for each period of a process staying in the critical section the probability that there is some other process in the critical section is at most \(\varepsilon \). We show that there are channel settings, where the classic mutual exclusion is not feasible even for randomized algorithms, while the \(\varepsilon \)-mutual-exclusion is. In more relaxed channel settings, we prove an exponential gap between the makespan complexity of the classic mutual exclusion problem and its weaker \(\varepsilon \)-exclusion version. We also show how to guarantee fairness of mutual exclusion algorithms, i.e., that each process that wants to enter the critical section will eventually succeed. 相似文献
84.
85.
Forest biomass mapping from lidar and radar synergies 总被引:2,自引:0,他引:2
The use of lidar and radar instruments to measure forest structure attributes such as height and biomass at global scales is being considered for a future Earth Observation satellite mission, DESDynI (Deformation, Ecosystem Structure, and Dynamics of Ice). Large footprint lidar makes a direct measurement of the heights of scatterers in the illuminated footprint and can yield accurate information about the vertical profile of the canopy within lidar footprint samples. Synthetic Aperture Radar (SAR) is known to sense the canopy volume, especially at longer wavelengths and provides image data. Methods for biomass mapping by a combination of lidar sampling and radar mapping need to be developed.In this study, several issues in this respect were investigated using aircraft borne lidar and SAR data in Howland, Maine, USA. The stepwise regression selected the height indices rh50 and rh75 of the Laser Vegetation Imaging Sensor (LVIS) data for predicting field measured biomass with a R2 of 0.71 and RMSE of 31.33 Mg/ha. The above-ground biomass map generated from this regression model was considered to represent the true biomass of the area and was used as a reference map since no better biomass map exists for the area. Random samples were taken from the biomass map and the correlation between the sampled biomass and co-located SAR signature was studied. The best models were used to extend the biomass from lidar samples into all forested areas in the study area, which mimics a procedure that could be used for the future DESDYnI mission. It was found that depending on the data types used (quad-pol or dual-pol) the SAR data can predict the lidar biomass samples with R2 of 0.63-0.71, RMSE of 32.0-28.2 Mg/ha up to biomass levels of 200-250 Mg/ha. The mean biomass of the study area calculated from the biomass maps generated by lidar-SAR synergy was within 10% of the reference biomass map derived from LVIS data. The results from this study are preliminary, but do show the potential of the combined use of lidar samples and radar imagery for forest biomass mapping. Various issues regarding lidar/radar data synergies for biomass mapping are discussed in the paper. 相似文献
86.
87.
Paul Mulholland Zdenek Zdrahal John John Domingue Marek Hatala 《Behaviour & Information Technology》2000,19(3):171-180
Integrating working and learning is seen as a desirable alternative to traditional training regimes. An integrated approach to working and learning is more gradual, contextual, problem oriented and cost effective. Knowledge technology aims to catalyze workplace learning, but requires the right organisational culture and brings additional costs regarding the articulation, representation and transmission of knowledge. Our approach reduces these costs by making articulation a natural part of collaborative working, designing for both informal and formal knowledge, and facilitating the transition of socially situated knowledge through enriched documents. To be successful, our approach has certain prequesites concerning organisational culture, and the nature of shared documents, organisational knowledge and work activities. 相似文献
88.
Jon David 《Network Security》2001,2001(10):13-15
The information available both as input to, and as output from, any given intrusion detection apparatus is a function of where it is placed in a network architecture. In particular, placing an intrusion detection apparatus on the inside (i.e. between one’s perimeter defenses and one’s inner operations) will yield significantly different results than placing that same apparatus on the outside (i.e. between one’s perimeter defenses and the rest of the world). This writing examines these differences. 相似文献
89.
Marek Reformat Ronald R. Yager 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(6):543-558
A pervasive task in many forms of human activity is classification. Recent interest in the classification process has focused
on ensemble classifier systems. These types of systems are based on a paradigm of combining the outputs of a number of individual
classifiers. In this paper we propose a new approach for obtaining the final output of ensemble classifiers. The method presented
here uses the Dempster–Shafer concept of belief functions to represent the confidence in the outputs of the individual classifiers.
The combing of the outputs of the individual classifiers is based on an aggregation process which can be seen as a fusion
of the Dempster rule of combination with a generalized form of OWA operator. The use of the OWA operator provides an added
degree of flexibility in expressing the way the aggregation of the individual classifiers is performed. 相似文献
90.
Published online: 18 September 2001 相似文献