全文获取类型
收费全文 | 3104篇 |
免费 | 138篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 52篇 |
综合类 | 83篇 |
化学工业 | 732篇 |
金属工艺 | 111篇 |
机械仪表 | 91篇 |
建筑科学 | 98篇 |
矿业工程 | 19篇 |
能源动力 | 126篇 |
轻工业 | 119篇 |
水利工程 | 36篇 |
石油天然气 | 68篇 |
武器工业 | 9篇 |
无线电 | 531篇 |
一般工业技术 | 459篇 |
冶金工业 | 274篇 |
原子能技术 | 40篇 |
自动化技术 | 447篇 |
出版年
2023年 | 14篇 |
2022年 | 66篇 |
2021年 | 89篇 |
2020年 | 39篇 |
2019年 | 39篇 |
2018年 | 45篇 |
2017年 | 52篇 |
2016年 | 64篇 |
2015年 | 52篇 |
2014年 | 105篇 |
2013年 | 230篇 |
2012年 | 169篇 |
2011年 | 178篇 |
2010年 | 168篇 |
2009年 | 186篇 |
2008年 | 173篇 |
2007年 | 143篇 |
2006年 | 127篇 |
2005年 | 111篇 |
2004年 | 101篇 |
2003年 | 86篇 |
2002年 | 86篇 |
2001年 | 64篇 |
2000年 | 63篇 |
1999年 | 68篇 |
1998年 | 124篇 |
1997年 | 81篇 |
1996年 | 81篇 |
1995年 | 59篇 |
1994年 | 49篇 |
1993年 | 40篇 |
1992年 | 38篇 |
1991年 | 30篇 |
1990年 | 28篇 |
1989年 | 32篇 |
1988年 | 20篇 |
1987年 | 19篇 |
1986年 | 9篇 |
1985年 | 19篇 |
1984年 | 18篇 |
1983年 | 12篇 |
1982年 | 9篇 |
1981年 | 9篇 |
1980年 | 9篇 |
1979年 | 11篇 |
1977年 | 15篇 |
1976年 | 12篇 |
1975年 | 13篇 |
1973年 | 8篇 |
1967年 | 5篇 |
排序方式: 共有3295条查询结果,搜索用时 15 毫秒
82.
Kaixuan Rong Shuyuan Yang Licheng Jiao 《International journal of remote sensing》2016,37(6):1315-1318
This study clarifies the implicit potential deficiency caused by the sparse cardinality parameter k in Rong et al. (2014). In addition, k = β × W × M × N (0.9 ≤ β < 1) is suggested to avert this potential deficiency, where β is a ratio controlling the amount of sparse cardinality, W is the number of multispectral bands and M × N is the size of panchromatic image. With the choice of k suggested in this study, the low rank matrix L and sparse matrix S obtained by Go Decomposition (Zhou and Tao 2011) can be iteratively optimized and solved. Thus, instead of choosing k as W × M × N in Rong et al. (2014), the potential deficiency that L is directly obtained as an analytic solution can be averted. 相似文献
83.
One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to inadequate experimental design. This has prevented us from modeling a computational system to protect against insider threat situations. This paper provides a contemporary methodological approach for using online games to simulate insider betrayal for predictive behavioral research. The Leader’s Dilemma Game simulates an insider betrayal scenario for analyzing organizational trust relationships, providing an opportunity to examine the trustworthiness of focal individuals, as measured by humans as sensors engaging in computer-mediated communication. This experimental design provides a window into trustworthiness attribution that can generate a rigorous and relevant behavioral dataset, and contributes to building a cyber laboratory that advances future insider threat study. 相似文献
84.
Traditional microfluidic paper-based analytical devices (μPADs) consist of a flat straight channel printed on a paper substrate. Such devices provide a promising low-cost solution for a variety of biomedical assays. However, they have a relatively high sample consumption due to their use of external reservoirs. Moreover, in μPADs based on the ion concentration polarization (ICP) effect, controlling the cross-sectional area of the Nafion membrane relative to that of the hydrophilic channel is difficult. Accordingly, the present study utilizes an origami technique to create a μPAD with a three-dimensional (3D) structure. The μPAD features short channels and embedded reservoirs, and therefore reduces both the driving voltage requirement and the sample consumption. Moreover, the preconcentration effect is enhanced through the use of an additional hydrophilic area adjacent to the Nafion membrane. The existence of electroosmotic flow (EOF) within the proposed device is confirmed using a current-monitoring method. In addition, the occurrence of ICP is evaluated by measuring the current–voltage response of the device at external voltages ranging from 0 to 50 V. The experimental results obtained for a fluorescein sample with an initial concentration of 10?5 M show that a 100-fold enhancement factor can be achieved given the use of a non-uniform-geometry design for the assay channel and an additional hydrophilic region with an area equal to approximately 10% of the channel cross-sectional area. Finally, a 100-fold factor can also be achieved for a fluorescein isothiocyanate sample with an initial concentration of 10?6 M given an external driving voltage of 40 V. 相似文献
85.
86.
Yuqing SongAuthor Vitae Shuyuan JinAuthor VitaeJie ShenAuthor Vitae 《Data & Knowledge Engineering》2011,70(11):984-1003
We prove a unique property of single-link distance, based on which an algorithm is designed for data clustering. The property states that a single-link cluster is a subset with inter-subset distance greater than intra-subset distance, and vice versa. Among the major linkages (single, complete, average, centroid, median, and Ward's), only single-link distance has this property. Based on this property we introduce monotonic sequences of iclusters (i.e., single-link clusters) to model the phenomenon that a natural cluster has a dense kernel and the density decreases as we move from the kernel to the boundary. A monotonic sequence of iclusters is a sequence of nested iclusters such that an icluster in the sequence is a dominant child (in terms of size) of the icluster before it. Our data clustering algorithm is monotonic sequence based. We classify a dataset of one monotonic sequence into to two classes by splitting the sequence into two parts: the kernel part and the surrounding part. For a data set of multiple monotonic sequences, each leaf monotonic sequence represents the kernel of a class, which then “grows” by absorbing nearby non-kernel points. This algorithm, proved by experiments, compares favorable in effectiveness to other clustering algorithms. 相似文献
87.
Chung-Wei Yeh Chih-Ping Chu 《Knowledge and Data Engineering, IEEE Transactions on》2008,20(7):965-975
Various graphic techniques have been developed to analyze structural errors in rule-based systems that utilize inference (propositional) logic rules. Four typical errors in rule-based systems are: redundancy (numerous rule sets resulting in the same conclusion); circularity (a rule leading back to itself); incompleteness (deadends or a rule set conclusion leading to unreachable goals); and inconsistency (rules conflicting with each other). This study presents a new DNA-based computing algorithm mainly based upon Adleman's DNA operations. It can be used to detect such errors. There are three phases to this molecular solution: rule-to-DNA transformation design, solution space generation, and rule verification. We first encode individual rules using relatively short DNA strands, and then generate all possible rule paths by the directed joining of such short strands to form longer strands. We then conduct the verification algorithm to detect errors. The potential of applying this proposed DNA computation algorithm to rule verification is promising given the operational time complexity of O(n*q), in which n denotes the number of fact clauses in the rule base and q is the number of rules with longest inference chain. 相似文献
88.
Electrostatic model for an asymmetric combdrive 总被引:4,自引:0,他引:4
This paper presents an analytical solution to the electrostatic actuation of an asymmetric combdrive in out-of-plane and torsional motions. The exact solutions to force in the out-of-plane motion and the integral for torque in the torsional motion are obtained. The dependence of the peak force on the thickness of the movable fingers and the amount of overlap of the combs is given in closed form. Using our model, the shift of the natural resonant frequency due to a dc bias is analyzed. Furthermore, our solution also applies to the in-plane motion of an in-plane interdigitated combdrive. We found that an in-plane interdigitated combdrive generates a constant force within 0.1% when the minimum initial engagement length of the combs is twice the separation gap 相似文献
89.
90.