全文获取类型
收费全文 | 28132篇 |
免费 | 2035篇 |
国内免费 | 883篇 |
专业分类
电工技术 | 1391篇 |
技术理论 | 4篇 |
综合类 | 1726篇 |
化学工业 | 4980篇 |
金属工艺 | 1280篇 |
机械仪表 | 1637篇 |
建筑科学 | 2082篇 |
矿业工程 | 640篇 |
能源动力 | 753篇 |
轻工业 | 2152篇 |
水利工程 | 456篇 |
石油天然气 | 1494篇 |
武器工业 | 204篇 |
无线电 | 2828篇 |
一般工业技术 | 3935篇 |
冶金工业 | 1786篇 |
原子能技术 | 292篇 |
自动化技术 | 3410篇 |
出版年
2024年 | 100篇 |
2023年 | 390篇 |
2022年 | 624篇 |
2021年 | 855篇 |
2020年 | 685篇 |
2019年 | 620篇 |
2018年 | 696篇 |
2017年 | 829篇 |
2016年 | 751篇 |
2015年 | 962篇 |
2014年 | 1206篇 |
2013年 | 1559篇 |
2012年 | 1630篇 |
2011年 | 1754篇 |
2010年 | 1478篇 |
2009年 | 1416篇 |
2008年 | 1501篇 |
2007年 | 1429篇 |
2006年 | 1523篇 |
2005年 | 1392篇 |
2004年 | 911篇 |
2003年 | 853篇 |
2002年 | 783篇 |
2001年 | 720篇 |
2000年 | 833篇 |
1999年 | 900篇 |
1998年 | 878篇 |
1997年 | 729篇 |
1996年 | 614篇 |
1995年 | 554篇 |
1994年 | 419篇 |
1993年 | 309篇 |
1992年 | 242篇 |
1991年 | 195篇 |
1990年 | 152篇 |
1989年 | 134篇 |
1988年 | 111篇 |
1987年 | 56篇 |
1986年 | 58篇 |
1985年 | 50篇 |
1984年 | 21篇 |
1983年 | 15篇 |
1982年 | 23篇 |
1981年 | 15篇 |
1980年 | 14篇 |
1979年 | 11篇 |
1978年 | 6篇 |
1977年 | 13篇 |
1976年 | 15篇 |
1975年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
本文研究了TiO2掺入对CaO稳定ZrO2(简称CaSZ-NiCr)金属陶瓷烧结特性的影响,测定了CaSZ-NiCr-TiO2金属陶瓷烧结样品的密度和显微硬度,结果表明,TiO2的掺入能提高CaSZ-NICr金属陶瓷的烧结密度和显微硬度,对CaSZ-NiCr金属陶瓷有助烧结作用.金相观察表明,TiO3的掺入改变了NiCr相在金属陶瓷中的形貌,说明了NiCr与CaSZ的浸润性有一定的改善.XRD和EPMA分析结果显示,TiO2偏聚在NiCr金属相中,不影响CaSZ的稳定性. 相似文献
122.
立体书是一种独特的纸张艺术形式,有着精细的几何结构.针对一类特殊的V型立体纸雕进行了系统性的研究,给出了V型立体纸雕可实现性的充分条件,使其可以只借助2张支撑面的力量进行打开和关闭,同时在这个过程中所有的面片都保持刚性并且相互不产生自交.基于这些充分条件,文中分别实现了一个计算机辅助交互V型纸雕设计工具,以及一个基于体方法的自动生成算法. 相似文献
123.
In group assessment, the focus is on finding high‐authority experts to improve the reliability of assessment results. In this study, we propose an authority updating algorithm while considering the power and judgement reliability of an expert on the basis of social networks and post‐evaluations. A network power index is established and used to reflect the power of an expert while considering social networks. The measurement of the judgement reliability of an expert considers the post‐evaluation of the objects selected by experts, thereby more scientifically reflecting the reliability of experts. The analysis shows the following: although the social‐network structure influences the authority of experts, the influence weakens when the assessment group is a highly or even fully connected group; the network effect may increase the authority of some experts and reduce that of others, and it will weaken as the network connectivity increases; moreover, the judgement reliability and authority of an expert while considering post‐evaluation can encourage him/her to make fair assessments and strive to reduce his/her motivation and cognitive biases. 相似文献
124.
Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao 《计算机系统科学与工程》2021,39(3):373-390
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier. 相似文献
125.
Muñoz-Montoro A. J. Suarez-Dou D. Cortina R. Canadas-Quesada F. J. Combarro E. F. 《The Journal of supercomputing》2021,77(8):8135-8150
The Journal of Supercomputing - In this paper, we propose a parallel source separation system designed to extract heart and lung sounds from single-channel mixtures. The proposed system is based on... 相似文献
126.
Gu Min Gu Yanhui Luo Weilan Xu Guandong Yang Zhenglu Zhou Junsheng Qu Weiguang 《Neural computing & applications》2021,33(11):6009-6025
Neural Computing and Applications - Semantic understanding is an essential research issue for many applications, such as social network analysis, collective intelligence and content computing,... 相似文献
127.
The explosive growth of Chinese electronic market has made it possible for companies to better understand consumers?? opinion towards their products in a timely fashion through their online reviews. This study proposes a framework for extracting knowledge from online reviews through text mining and econometric analysis. Specifically, we extract product features, detect topics, and identify determinants of customer satisfaction. An experiment on the online reviews from a Chinese leading B2C (Business-to-Customer) website demonstrated the feasibility of the proposed method. We also present some findings about the characteristics of Chinese reviewers. 相似文献
128.
Guoqiang Gao Ruixuan Li Kunmei Wen Xiwu Gu 《Journal of Network and Computer Applications》2012,35(1):85-96
Unstructured peer-to-peer (P2P) networks have become a very popular architecture for content distribution in large-scale and dynamic environments. The search efficiency problem in unstructured P2P networks has not been adequately addressed so far, especially concerning search for rare objects. In this paper, we propose a proactive replication strategy to improve search efficiency for rare objects. It uses an object-probing technique for peers to decide whether or not to establish replications for their objects when they join the network. This strategy can effectively increase the popularity of rare objects in order to enhance search efficiency. We also present a rare object search algorithm to reduce the overhead caused by the replication strategy. When a peer forwards a search request, the forward probability is calculated according to its neighbors' degrees and the number of neighbors' objects. Therefore, the search request is forwarded to the peers more likely containing target objects. Simulations show that our proactive replication strategy greatly improves search efficiency for rare objects with moderate communication overhead. The rare object search algorithm not only improves search efficiency for rare objects, but also achieves load balance in search. 相似文献
129.
Fuzzy local maximal marginal embedding for feature extraction 总被引:1,自引:0,他引:1
Cairong Zhao Zhihui Lai Chuancai Liu Xingjian Gu Jianjun Qian 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(1):77-87
In graph-based linear dimensionality reduction algorithms, it is crucial to construct a neighbor graph that can correctly
reflect the relationship between samples. This paper presents an improved algorithm called fuzzy local maximal marginal embedding
(FLMME) for linear dimensionality reduction. Significantly differing from the existing graph-based algorithms is that two
novel fuzzy gradual graphs are constructed in FLMME, which help to pull the near neighbor samples in same class nearer and
nearer and repel the far neighbor samples of margin between different classes farther and farther when they are projected
to feature subspace. Through the fuzzy gradual graphs, FLMME algorithm has lower sensitivities to the sample variations caused
by varying illumination, expression, viewing conditions and shapes. The proposed FLMME algorithm is evaluated through experiments
by using the WINE database, the Yale and ORL face image databases and the USPS handwriting digital databases. The results
show that the FLMME outperforms PCA, LDA, LPP and local maximal marginal embedding. 相似文献
130.
This paper presents the following results on sets that are complete for NP.
- If there is a problem in NP that requires $2^{n^{\Omega(1)}}$ time at almost all lengths, then every many-one NP-complete set is complete under length-increasing reductions that are computed by polynomial-size circuits.
- If there is a problem in co-NP that cannot be solved by polynomial-size nondeterministic circuits, then every many-one NP-complete set is complete under length-increasing reductions that are computed by polynomial-size circuits.
- If there exist a one-way permutation that is secure against subexponential-size circuits and there is a hard tally language in NP??co-NP, then there is a Turing complete language for NP that is not many-one complete.