全文获取类型
收费全文 | 6852篇 |
免费 | 366篇 |
国内免费 | 58篇 |
专业分类
电工技术 | 95篇 |
综合类 | 22篇 |
化学工业 | 1832篇 |
金属工艺 | 151篇 |
机械仪表 | 247篇 |
建筑科学 | 193篇 |
矿业工程 | 4篇 |
能源动力 | 429篇 |
轻工业 | 635篇 |
水利工程 | 98篇 |
石油天然气 | 54篇 |
无线电 | 735篇 |
一般工业技术 | 1250篇 |
冶金工业 | 361篇 |
原子能技术 | 91篇 |
自动化技术 | 1079篇 |
出版年
2024年 | 27篇 |
2023年 | 134篇 |
2022年 | 374篇 |
2021年 | 461篇 |
2020年 | 344篇 |
2019年 | 369篇 |
2018年 | 410篇 |
2017年 | 339篇 |
2016年 | 374篇 |
2015年 | 217篇 |
2014年 | 361篇 |
2013年 | 611篇 |
2012年 | 347篇 |
2011年 | 366篇 |
2010年 | 314篇 |
2009年 | 288篇 |
2008年 | 205篇 |
2007年 | 183篇 |
2006年 | 159篇 |
2005年 | 110篇 |
2004年 | 89篇 |
2003年 | 88篇 |
2002年 | 71篇 |
2001年 | 51篇 |
2000年 | 41篇 |
1999年 | 51篇 |
1998年 | 92篇 |
1997年 | 79篇 |
1996年 | 60篇 |
1995年 | 66篇 |
1994年 | 37篇 |
1993年 | 48篇 |
1992年 | 45篇 |
1991年 | 36篇 |
1990年 | 40篇 |
1989年 | 32篇 |
1988年 | 23篇 |
1987年 | 41篇 |
1986年 | 36篇 |
1985年 | 27篇 |
1984年 | 36篇 |
1983年 | 31篇 |
1982年 | 23篇 |
1981年 | 11篇 |
1980年 | 19篇 |
1979年 | 13篇 |
1978年 | 14篇 |
1977年 | 15篇 |
1976年 | 18篇 |
1975年 | 11篇 |
排序方式: 共有7276条查询结果,搜索用时 9 毫秒
81.
The widespread use of the Internet and the convenient mechanism it provides, such as easy access, easy downloads, and easy copy and paste functions have made many types of unethical behaviors easier, particularly those involving students in academic settings. Among the issues in ethics within the academic environment that can be triggered by the Internet are fraudulence, plagiarism, falsification, delinquency, unauthorized help, and facility misuse. Given these issues, the study seeks to investigate the extent to which students at a public university in Malaysia engage in such unethical behavior and their relationship with the big five personality model. This study was conducted using a survey method of 252 students in three different academic faculties. The results of factor analyses confirm and refine the reliability of the scales for both big five personality variables and unethical Internet behaviors as conceptualized through Internet triggered academic dishonesty (ITADS). The findings indicate that personality traits such as (1) agreeableness, (2) conscientiousness and (3) emotional stability are significantly and negatively correlated with unethical Internet behavior in university students. Significant differences in facility misuse are also observed between the three academic faculties investigated. This research should provide significant contributions to educators in designing the computer ethics curriculum and in allowing for educational institutions as well as other organizations in developing relevant policies and guidelines on matters pertaining to academic conduct, utilization of computers and Internet, and recruitment exercises. 相似文献
82.
83.
A note on the stability of fractional order systems 总被引:1,自引:0,他引:1
In this paper, a new approach is suggested to investigate stability in a family of fractional order linear time invariant systems with order between 1 and 2. The proposed method relies on finding a linear ordinary system that possesses the same stability property as the fractional order system. In this way, instead of performing the stability analysis on the fractional order systems, the analysis is converted into the domain of ordinary systems which is well established and well understood. As a useful consequence, we have extended two general tests for robust stability check of ordinary systems to fractional order systems. 相似文献
84.
Wael Saleh Author Vitae Author Vitae 《Computers & Electrical Engineering》2009,35(4):587-593
Microwave imaging for medical applications has been of interest for many years. A novel near-field microwave non-invasive testing and evaluation (NIT&E) technique utilizing tapered rectangular waveguide probes is presented for breast cancer detection. Near-field microwave NIT&E techniques can be a successful candidate for the detection of breast cancer because of their potential in dealing with materials of low conductivity (i.e. lossy dielectrics like the breast tissue). The physical basis for breast tumor detection with microwave imaging is the contrast in dielectric properties of normal and malignant breast tissues. A method adopting Fourier transform matching (FTM) technique and utilizing the reflection coefficient at the aperture of a tapered rectangular waveguide sensor radiating into a breast is described resulting in microwave images that indicate the presence of a tumor. These images demonstrate the feasibility of detecting breast tumors using this approach. 相似文献
85.
This paper proposes the Mobility-Aware Resource Reservation Protocol (MARSVP) in which mobility and QoS signaling are performed as a single functional block. The key concept of MARSVP is to convey mobility-specific information (binding updates and their associated acknowledgments) by using newly defined RSVP objects embedded in existing RSVP messages. An appealing feature of MARSVP is that it adheres to the current RSVP standard (RFC 2205) and thus requires minimal changes to end nodes without affecting any of the conventional RSVP routers in between. The proposed mechanism is evaluated using a simulation model for application-level performance and an analytical model for network-level signaling cost. Simulation results indicate a 27.9% improvement in QoS interruption when using Mobile IPv6 (MIPv6), 12.5% when using Hierarchical Mobile IPv6 (HMIPv6), and no improvement when using Fast Handovers for MIPv6 (FMIPv6). On the network-level, signaling cost savings of 9.4% and 11.9% are achieved for MIPv6 and HMIPv6, respectively, while FMIPv6 achieves savings of 17.9% when using Voice-over-IP traffic and 26.7% for Video-over-IP traffic. The results of the conducted studies indicate MARSVP’s superiority to conventional RSVP when deployed over wireless networks. 相似文献
86.
Ahmad Sadhiqin Mohd Isira Zhengtao Ding 《International journal of systems science》2016,47(16):3772-3781
This paper deals with the leader-follower consensus problem of Lipschitz nonlinear systems under fixed directed communication networks. Both state and output feedback control are proposed based on state and output measurements of neighbouring agents, respectively. Laplacian matrix features are explored for the stability analysis, and the sufficient conditions are derived to solve the consensus problem. Finally, simulation results are included to demonstrate the effectiveness of the output-based consensus controller. 相似文献
87.
Digital image processing systems are complex, being usually composed of different computer vision libraries. Algorithm implementations cannot be directly used in conjunction with algorithms developed using other computer vision libraries. This paper formulates a software solution by proposing a processor with the capability of handling different types of image processing algorithms, which allow the end users to install new image processing algorithms from any library. This approach has other functionalities like capability to process one or more images, manage multiple processing jobs simultaneously and maintain the manner in which an image was processed for later use. It is a computational efficient and promising technique to handle variety of image processing algorithms. To promote the reusability and adaptation of the package for new types of analysis, a feature of sustainability is established. The framework is integrated and tested on a medical imaging application, and the software is made freely available for the reader. Future work involves introducing the capability to connect to another instance of processing service with better performance. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
88.
User Activities Outliers Detection; Integration of Statistical and Computational Intelligence Techniques 下载免费PDF全文
In this article, a hybrid technique for user activities outliers detection is introduced. The hybrid technique consists of a two‐stage integration of principal component analysis and fuzzy rule‐based systems. In the first stage, the Hamming distance is used to measure the differences between different activities. Principal component analysis is then applied to the distance measures to find two indices of Hotelling's T2 and squared prediction error. In the second stage of the process, the calculated indices are provided as inputs to the fuzzy rule‐based systems to model them heuristically. The model is used to identify the outliers and classify them. The proposed system is tested in real home environments, equipped with appropriate sensory devices, to identify outliers in the activities of daily living of the user. Three case studies are reported to demonstrate the effectiveness of the proposed system. The proposed system successfully identifies the outliers in activities distinguishing between the normal and abnormal behavioral patterns. 相似文献
89.
90.
Ahmad W. Bitar Rony Darazi Jean-François Couchot Raphaël Couturier 《Multimedia Tools and Applications》2017,76(1):143-161
In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency. 相似文献