全文获取类型
收费全文 | 5202篇 |
免费 | 492篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 59篇 |
综合类 | 22篇 |
化学工业 | 1153篇 |
金属工艺 | 71篇 |
机械仪表 | 264篇 |
建筑科学 | 99篇 |
矿业工程 | 8篇 |
能源动力 | 326篇 |
轻工业 | 704篇 |
水利工程 | 63篇 |
石油天然气 | 29篇 |
武器工业 | 1篇 |
无线电 | 681篇 |
一般工业技术 | 1198篇 |
冶金工业 | 79篇 |
原子能技术 | 53篇 |
自动化技术 | 937篇 |
出版年
2024年 | 30篇 |
2023年 | 198篇 |
2022年 | 399篇 |
2021年 | 739篇 |
2020年 | 453篇 |
2019年 | 511篇 |
2018年 | 465篇 |
2017年 | 387篇 |
2016年 | 386篇 |
2015年 | 234篇 |
2014年 | 284篇 |
2013年 | 392篇 |
2012年 | 225篇 |
2011年 | 282篇 |
2010年 | 160篇 |
2009年 | 135篇 |
2008年 | 87篇 |
2007年 | 88篇 |
2006年 | 33篇 |
2005年 | 24篇 |
2004年 | 34篇 |
2003年 | 25篇 |
2002年 | 16篇 |
2001年 | 7篇 |
2000年 | 10篇 |
1999年 | 13篇 |
1998年 | 17篇 |
1997年 | 9篇 |
1996年 | 11篇 |
1995年 | 16篇 |
1994年 | 7篇 |
1993年 | 10篇 |
1992年 | 8篇 |
1991年 | 7篇 |
1990年 | 1篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1986年 | 1篇 |
1985年 | 6篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1968年 | 1篇 |
1961年 | 1篇 |
排序方式: 共有5747条查询结果,搜索用时 390 毫秒
151.
152.
Muhammad Umer Khan Shuai Li Qixin Wang Zili Shao 《Journal of Intelligent and Robotic Systems》2016,82(1):163-174
This paper mainly addresses formation control problem of non-holonomic systems in an optimized manner. Instead of using linearization to solve this problem approximately, we designed control laws with guaranteed global convergence by leveraging nonlinear transformations. Under this nonlinear transformation, consensus of non-holonomic robots can be converted into a stabilization problem, to which optimal treatment applies. This concept is then extended to the formation control and tracking problem for a team of robots following leader-follower strategy. A trajectory generator prescribes the feasible motion of virtual reference robot, a decentralized control law is used for each robot to track the reference while maintaining the formation. The asymptotic convergence of follower robots to the position and orientation of the reference robot is ensured using the Lyapunov function which is also generated using chained form differential equations. In order to witness the efficacy of the scheme, simulations results are presented for Unicycle and Car-like robots. 相似文献
153.
Adnan Abid Naveed Hussain Kamran Abid Farooq Ahmad Muhammad Shoaib Farooq Uzma Farooq Sher Afzal Khan Yaser Daanial Khan Muhammad Azhar Naeem Nabeel Sabir 《Neural computing & applications》2016,27(5):1207-1229
The quantity of information placed on the web has been greater than before and is increasing rapidly day by day. Searching through the huge amount of data and finding the most relevant and useful result set involves searching, ranking, and presenting the results. Most of the users probe into the top few results and neglect the rest. In order to increase user’s satisfaction, the presented result set should not only be relevant to the search topic, but should also present a variety of perspectives, that is, the results should be different from one another. The effectiveness of web search and the satisfaction of users can be enhanced through providing various results of a search query in a certain order of relevance and concern. The technique used to avoid presenting similar, though relevant, results to the user is known as a diversification of search results. This article presents a survey of the approaches used for search result diversification. To this end, this article not only provides a technical survey of existing diversification techniques, but also presents a taxonomy of diversification algorithms with respect to the types of search queries. 相似文献
154.
Md. Mamunur Rashid Muhammad Amar Iqbal Gondal Joarder Kamruzzaman 《Applied Intelligence》2016,45(3):638-651
Bearings play a crucial role in rotational machines and their failure is one of the foremost causes of breakdowns in rotary machinery. Their functionality is directly relevant to the operational performance, service life and efficiency of these machines. Therefore, bearing fault identification is very significant. The accuracy of fault or anomaly detection by the current techniques is not adequate. We propose a data mining-based framework for fault identification and anomaly detection from machine vibration data. In this framework, to capture the useful knowledge from the vibration data stream (VDS), we first pre-process the data using Fast Fourier Transform (FFT) to extract the frequency signature and then build a compact tree called SAFP-tree (sliding window associated frequency pattern tree), and propose a mining algorithm called SAFP. Our SAFP algorithm can mine associated frequency patterns (i.e., fault frequency signatures) in the current window of VDS and use them to identify faults in the bearing data. Finally, SAFP is further enhanced to SAFP-AD for anomaly detection by determining the normal behavior measure (NBM) from the extracted frequency patterns. The results show that our technique is very efficient in identifying faults and detecting anomalies over VDS and can be used for remote machine health diagnosis. 相似文献
155.
Muhammad Usman Muhammad Moazam Fraz Sarah A. Barman 《Archives of Computational Methods in Engineering》2017,24(3):449-465
The retina is a tiny layer at the posterior pole of an eye and is made up of tissues sensitive to light, these tissues generate nerve signals that pass through the optic nerve to the brain. A retinal disorder occurs when the retina malfunctions; glaucoma, diabetic retinopathy and pathologic myopia are retinal disorders and principal causes of blindness worldwide. These retinal disorders are often diagnosed and treated by an ophthalmologist. However, to accurately assess a retinal disease, ophthalmologist would need qualitative and quantitative analysis of the disease, it’s early and current statistics, but acquisition of these measurements are not possible through manual techniques, there should be automated computer aided diagnosis (CAD) systems to assist ophthalmologists. In this comprehensive review, an analysis and evaluation has been performed of different computer vision and image processing approaches applied to OCT images for automatic diagnosis of retinal disorders. We also reported disease causes, symptoms and pathologies manifestations within OCT images, which can serve as baseline knowledge for development of an automated CAD system. Hence, this disease specific review offers a good understanding to analyze visual impairments from retinal OCT images which will help researcher to design enhanced therapeutic systems for retinal disorders. 相似文献
156.
Human activity recognition is an effective approach for identifying the characteristics of historical data. In the past decades, different shallow classifiers and handcrafted features were used to identify the activities from the sensor data. These approaches are configured for offline processing and are not suitable for sequential data. This article proposes an adaptive framework for human activity recognition using a deep learning mechanism. This deep learning approach forms the deep belief network (DBN), which contains a visible layer and hidden layers. The processing of raw sensor data is performed by these layers and the activity is identified at the top most layers. The DBN is tested using the real time environment with the help of mobile devices that contain an accelerometer, a magnetometer, and a gyroscope. The results are analyzed with the metrics of precision, recall, and the F1-score. The results proved that the proposed method has a higher F1_score when compared to the existing approach. 相似文献
157.
Muhammad Sajjad Khan Muhammad Sung Wook Baik Seungmin Rho Zahoor Jan Sang-Soo Yeo Irfan Mehmood 《Multimedia Tools and Applications》2017,76(3):3519-3536
In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers. 相似文献
158.
159.
A steady and laminar convective flow has been numerically simulated in the fully-developed annular region of a finned double-pipe subjected to the constant heat flux boundary condition imposed at the inner-pipe wall. Finite element method has been employed in this study. Friction factor and Nusselt number have been studied as flow characteristics against variations in the ratio of radii of the inner and the outer pipes, the fin height, the fin half angle and the number of fins. The results show significant enhancement in the heat transfer rate in both the cases when sufficient pumping power is available and when it is not. The minimum and maximum increase in the product of friction factor and Reynolds number relative to the finless geometry is more than one time and more than 40 times respectively while gain in the relative value of Nusselt number lies in the range 1–177. This provides an evidence of more than four times enhancement in the heat transfer coefficient relative to that in the pressure loss as a result of extended fin surfaces. 相似文献
160.
Muhammad Adeel ZaffarAuthor Vitae Ram L. KumarAuthor Vitae 《Decision Support Systems》2011,51(3):597-608
The rising popularity of open source software (OSS) calls for a better understanding of the drivers of its adoption and diffusion. In this research, we propose an integrated framework that simultaneously investigates a broad range of social and economic factors on the diffusion dynamics of OSS using an Agent Based Computational Economics (ACE) approach. We find that interoperability costs, variability of OSS support costs, and duration of PS upgrade cycle are major determinants of OSS diffusion. Furthermore, there are interaction effects between network topology, network density and interoperability costs, which strongly influence the diffusion dynamics of OSS. The proposed model can be used as a building block to further investigate complex competitive dynamics in software markets. 相似文献