全文获取类型
收费全文 | 63391篇 |
免费 | 5036篇 |
国内免费 | 2833篇 |
专业分类
电工技术 | 3396篇 |
技术理论 | 6篇 |
综合类 | 4192篇 |
化学工业 | 10821篇 |
金属工艺 | 3955篇 |
机械仪表 | 3877篇 |
建筑科学 | 4780篇 |
矿业工程 | 2219篇 |
能源动力 | 2035篇 |
轻工业 | 3692篇 |
水利工程 | 1106篇 |
石油天然气 | 4619篇 |
武器工业 | 467篇 |
无线电 | 6655篇 |
一般工业技术 | 7413篇 |
冶金工业 | 3422篇 |
原子能技术 | 758篇 |
自动化技术 | 7847篇 |
出版年
2024年 | 267篇 |
2023年 | 1058篇 |
2022年 | 1873篇 |
2021年 | 2601篇 |
2020年 | 1939篇 |
2019年 | 1729篇 |
2018年 | 1915篇 |
2017年 | 2125篇 |
2016年 | 1903篇 |
2015年 | 2428篇 |
2014年 | 3104篇 |
2013年 | 3579篇 |
2012年 | 3784篇 |
2011年 | 4103篇 |
2010年 | 3750篇 |
2009年 | 3347篇 |
2008年 | 3316篇 |
2007年 | 3265篇 |
2006年 | 3241篇 |
2005年 | 2813篇 |
2004年 | 2071篇 |
2003年 | 2165篇 |
2002年 | 2497篇 |
2001年 | 2091篇 |
2000年 | 1629篇 |
1999年 | 1733篇 |
1998年 | 1269篇 |
1997年 | 1075篇 |
1996年 | 1113篇 |
1995年 | 856篇 |
1994年 | 636篇 |
1993年 | 475篇 |
1992年 | 368篇 |
1991年 | 280篇 |
1990年 | 209篇 |
1989年 | 166篇 |
1988年 | 153篇 |
1987年 | 90篇 |
1986年 | 69篇 |
1985年 | 37篇 |
1984年 | 39篇 |
1983年 | 27篇 |
1982年 | 25篇 |
1981年 | 14篇 |
1980年 | 23篇 |
1979年 | 4篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1974年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
51.
By combining of the benefits of high-order network and TSK (Tagaki-Sugeno-Kang) inference system, Pi-Sigma network is capable to dispose with the nonlinear problems much more effectively, which means it has a compacter construction, and quicker computational speed. The aim of this paper is to present a gradient-based learning method for Pi-Sigma network to train TSK fuzzy inference system. Moreover, some strong convergence results are established based on the weak convergence outcomes, which indicates that the sequence of weighted fuzzy parameters gets to a fixed point. Simulation results show the modified learning algorithm is effective to support the theoretical results. 相似文献
52.
53.
Qian?LiEmail author Wenjia?Niu Gang?Li Endong?Tong Yue?Hu Ping?Liu Li?Guo 《Journal of Network and Systems Management》2015,23(3):474-501
With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sensor nodes that are in a normal status. Currently, two kinds of approaches exist to identify the substitute sensor nodes: the most common approach is to prepare redundancy nodes, though the involved tasks such as maintaining redundancy nodes, i.e., relocating the new node, lead to an extra burden on the wireless sensor networks. More recently, other approaches without using redundancy nodes are emerging, and they merely select the substitute nodes in a sensor node’s perspective i.e., migrating the service of faulty node to it’s nearest sensor node, though usually neglecting the requirements of the application level. Even a few work consider the need of the application level, they perform at packets granularity and don’t fit well at service granularity. In this paper, we aim to remove these limitations in the wireless sensor network with the service-oriented architecture. Instead of deploying redundancy nodes, the proposed mechanism replaces the faulty sensor node with consideration of the similarity on the application level, as well as on the sensor level. On the application level, we apply the Bloom Filter for its high efficiency and low space costs. While on the sensor level, we design an objective solution via the coefficient of a variation as an evaluation for choosing the substitute on the sensor level. 相似文献
54.
55.
56.
57.
郭果 《数字社区&智能家居》2013,(20):4609-4614
随着网络技术和IT技术的发展和进步,计算机应用已经涉及到人们生活的各个方面。医院住院信息管理系统是实现一个Web形式的B/S架构的数据信息收集、处理和查询的完整的信息处理方案。该系统集合了患者管理,床位管理,医生管理以及病房管理的综合性信息医院管理系统软件。运用软件工程的设计思想对网站进行了需求分析和逐步设计。 相似文献
58.
Prithima R. Mosaly Hua Guo Lukasz Mazur 《International journal of human-computer interaction》2013,29(20):1883-1891
ABSTRACTThe goal of this study was to assess the relationship of task difficulty and mental effort with performance during physicians’ interaction with electronic health records (EHRs). A total of 38 physicians were asked to identify abnormal results and take follow-up action to “close the loop” on care delivery. Task difficulty was quantified via task-flow strategies and computer mouse-click patterns. Mental effort was quantified using eye movements based on changes in pupillary dilations (task evoked pupillary response or TEPR) and blink rate. Performance was quantified based on commission errors (error vs. no-error). Results indicated that physicians had different task-flow strategies; however, with improved awareness of the patient status, they exhibited an optimal task-flow strategy. Overall, performance was related to task-flow strategies, computer mouse-click patterns, and blink rate, indicating that physicians had lower task-difficulty and experienced lower mental effort with improved awareness of patient follow-up status. This is an important finding demonstrating that task-flows are a dominant predictor of physician performance when comparing between EHR designs. On the contrary, mouse-click patterns and blink rate are both useful predictors of physician performance when assessment was done within an EHR. 相似文献
59.
This paper proposes an improved semi-fragile speech watermarking scheme by quantization of linear prediction (LP) parameters, i.e., the inverse sine (IS) parameters. The spectral distortion due to watermark embedding is controlled to meet the ‘transparency’ criterion in speech coding. A modified bit allocation algorithm combined with watermarking is developed to determine the quantization step so that the ‘transparency’ requirement is satisfied. Due to the statistical nature, the LP coefficients estimated from the watermarked speech signal are different from the watermarked LP coefficients even in the absence of attacks. This effect is the cause of increase in decoding error and minimum authentication length. To tackle this problem, an Analysis by Synthesis (AbS) scheme is developed to reduce the difference between the estimated LP coefficients and the watermarked ones. The watermark detection threshold and minimum authentication length are then derived according to the probability of error and the signal to noise ratio (SNR) requirements. Experimental results show that the proposed AbS based method can effectively reduce the difference between the watermarked IS parameter and the extracted IS parameter when there is no attacks. In addition, the modified bit allocation algorithm can automatically find the appropriate quantization step used in the odd-even modulation so that the transparency requirement is satisfied. 相似文献
60.
On Controllability of Switched Linear Systems 总被引:1,自引:0,他引:1
Zhijian Ji Long Wang Xiaoxia Guo 《Automatic Control, IEEE Transactions on》2008,53(3):796-801
This paper investigates the number of switchings and design of switching sequences for controllability of switched linear systems. Two related results are established. One is a new constructive approach to designing switching sequences. The controllable state set of each switching sequence designed via the approach coincides with the controllable subspace of switched linear systems. The other is a well-estimated value for the minimum number of switchings required for controllability. Each state in the controllable subspace can be steered to origin within this value of switching times. 相似文献