全文获取类型
收费全文 | 2594篇 |
免费 | 190篇 |
国内免费 | 14篇 |
专业分类
电工技术 | 49篇 |
综合类 | 17篇 |
化学工业 | 661篇 |
金属工艺 | 63篇 |
机械仪表 | 39篇 |
建筑科学 | 126篇 |
矿业工程 | 6篇 |
能源动力 | 132篇 |
轻工业 | 101篇 |
水利工程 | 12篇 |
石油天然气 | 7篇 |
无线电 | 252篇 |
一般工业技术 | 571篇 |
冶金工业 | 120篇 |
原子能技术 | 5篇 |
自动化技术 | 637篇 |
出版年
2024年 | 6篇 |
2023年 | 60篇 |
2022年 | 123篇 |
2021年 | 159篇 |
2020年 | 107篇 |
2019年 | 105篇 |
2018年 | 109篇 |
2017年 | 121篇 |
2016年 | 131篇 |
2015年 | 100篇 |
2014年 | 159篇 |
2013年 | 188篇 |
2012年 | 210篇 |
2011年 | 220篇 |
2010年 | 136篇 |
2009年 | 140篇 |
2008年 | 126篇 |
2007年 | 100篇 |
2006年 | 82篇 |
2005年 | 42篇 |
2004年 | 47篇 |
2003年 | 42篇 |
2002年 | 35篇 |
2001年 | 28篇 |
2000年 | 22篇 |
1999年 | 23篇 |
1998年 | 33篇 |
1997年 | 21篇 |
1996年 | 8篇 |
1995年 | 16篇 |
1994年 | 6篇 |
1993年 | 7篇 |
1992年 | 11篇 |
1991年 | 9篇 |
1990年 | 14篇 |
1989年 | 5篇 |
1987年 | 3篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 4篇 |
1981年 | 4篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1975年 | 4篇 |
1974年 | 3篇 |
1973年 | 3篇 |
1972年 | 4篇 |
1971年 | 2篇 |
排序方式: 共有2798条查询结果,搜索用时 15 毫秒
31.
IntroductionAn important quality of association rules is novelty. However, evaluating rule novelty is AI-hard and has been a serious challenge for most data mining systems.ObjectiveIn this paper, we introduce functional novelty, a new non-pairwise approach to evaluating rule novelty. A functionally novel rule is interesting as it suggests previously unknown relations between user hypotheses.MethodsWe developed a novel domain-driven KDD framework for discovering functionally novel association rules. Association rules were mined from cardiovascular data sets. At post-processing, domain knowledge-compliant rules were discovered by applying semantic-based filtering based on UMLS ontology. Their knowledge compliance scores were computed against medical knowledge in Pubmed literature. A cardiologist explored possible relationships between several pairs of unknown hypotheses. The functional novelty of each rule was computed based on its likelihood to mediate these relationships.ResultsHighly interesting rules were successfully discovered. For instance, common rules such as diabetes mellitus?coronary arteriosclerosis was functionally novel as it mediated a rare association between von Willebrand factor and intracardiac thrombus.ConclusionThe proposed post-mining domain-driven rule evaluation technique and measures proved to be useful for estimating candidate functionally novel rules with the results validated by a cardiologist. 相似文献
32.
Carlos A. Jara Francisco A. Candelas Fernando Torres Sebastian Dormido Francisco Esquembre Oscar Reinoso 《Computers & Education》2009
Web-based learning environments are becoming increasingly popular in higher education. One of the most important web-learning resources is the virtual laboratory (VL), which gives students an easy way for training and learning through the Internet. Moreover, on-line collaborative communication represents a practical method to transmit the knowledge and experience from the teacher to students overcoming physical distance and isolation. Considering these facts, the authors of this document have developed a new dynamic collaborative e-learning system which combines the main advantages of virtual laboratories and collaborative learning practices. In this system, the virtual laboratories are based on Java applets which have embedded simulations developed in Easy Java Simulations (EJS), an open-source tool for teachers who do not need complex programming skills. The collaborative e-learning is based on a real-time synchronized communication among these Java applets. Therefore, this original approach provides a new tool which integrates virtual laboratories inside a synchronous collaborative e-learning framework. This paper describes the main features of this system and its successful application in a distance education environment among different universities from Spain. 相似文献
33.
Sebastian Dörn 《Information Processing Letters》2009,109(6):325-328
In this paper we give tight quantum query complexity bounds of some important linear algebra problems. We prove Θ(n2) quantum query bounds for verify the determinant, rank, matrix inverse and the matrix power problem. 相似文献
34.
35.
Thomas Neumann Matthias Bender Sebastian Michel Ralf Schenkel Peter Triantafillou Gerhard Weikum 《Distributed and Parallel Databases》2009,26(1):3-27
Top-k query processing is a fundamental building block for efficient ranking in a large number of applications. Efficiency is a
central issue, especially for distributed settings, when the data is spread across different nodes in a network. This paper
introduces novel optimization methods for top-k aggregation queries in such distributed environments. The optimizations can be applied to all algorithms that fall into the
frameworks of the prior TPUT and KLEE methods. The optimizations address three degrees of freedom: 1) hierarchically grouping
input lists into top-k operator trees and optimizing the tree structure, 2) computing data-adaptive scan depths for different input sources, and
3) data-adaptive sampling of a small subset of input sources in scenarios with hundreds or thousands of query-relevant network
nodes. All optimizations are based on a statistical cost model that utilizes local synopses, e.g., in the form of histograms,
efficiently computed convolutions, and estimators based on order statistics. The paper presents comprehensive experiments,
with three different real-life datasets and using the ns-2 network simulator for a packet-level simulation of a large Internet-style
network. 相似文献
36.
Ahmed Fadl Zongqin Zhang Sebastian Geller Jonas Tölke Manfred Krafczyk Donna Meyer 《Microsystem Technologies》2009,15(9):1379-1387
The efficiency of the valve-less rectification micropump depends primarily on the microfluidic diodicity (the ratio of the
backward pressure drop to the forward pressure drop). In this study, different rectifying structures, including the conventional
structures (nozzle/diffuser and Tesla structures), were investigated at very low Reynolds numbers (between 0.2 and 60). The
rectifying structures were characterized with respect to their design, and a numerical approach was illustrated to calculate
the diodicity for the rectifying structures. In this study, the microfluidic diodicity was evaluated numerically for different
rectifying structures including half circle, semicircle, heart, triangle, bifurcation, nozzle/diffuser, and Tesla structures.
The Lattice Boltzmann Method (LBM) was utilized as a numerical method to simulate the fluid flow in the microscale. The results
suggest that at very low Reynolds number flow, rectification and multifunction micropumping may be achievable by using a number
of the presented structures. The results for the conventional structures agree with the reported results. 相似文献
37.
In this study, we analyze the criticality of nodes in air transportation using techniques from three different domains, and thus, three essentially different perspectives of criticality. First, we examine the unweighted structure of air transportation networks, using recent methods from control theory (maximum matching and minimum dominating set). Second, complex network metrics (betweenness and closeness) are used with passenger traffic as weights. Third, ticket data-level analysis (origin-destination betweenness and outbound traffic with transit threshold) is performed. Remarkably, all techniques identify a different set of critical nodes; while, in general, giving preference to the selection of high-degree nodes. Our evaluation on the international air transportation country network suggests that some countries, e.g., United States, France, and Germany, are critical from all three perspectives. Other countries, e.g., United Arab Emirates and Panama, have a very specific influence, by controlling the passenger traffic of their neighborhood countries. Furthermore, we assess the criticality of the country network using Multi-Criteria Decision Analysis (MCDA) techniques. United States, Great Britain, Germany, and United Arab Emirates are identified as non-dominated countries; Sensitivity analysis shows that United Arab Emirates is most sensitive to the preference information on the outbound traffic. Our work gears towards a better understanding of node criticality in air transportation networks. This study also stipulates future research possibilities on criticality in general transportation networks. 相似文献
38.
Emanuel Gull Philipp Werner Sebastian Fuchs Brigitte Surer Thomas Pruschke Matthias Troyer 《Computer Physics Communications》2011,182(4):1078-1082
Continuous-time quantum Monte Carlo impurity solvers are algorithms that sample the partition function of an impurity model using diagrammatic Monte Carlo techniques. The present paper describes codes that implement the interaction expansion algorithm originally developed by Rubtsov, Savkin, and Lichtenstein, as well as the hybridization expansion method developed by Werner, Millis, Troyer, et al. These impurity solvers are part of the ALPS-DMFT application package and are accompanied by an implementation of dynamical mean-field self-consistency equations for (single orbital single site) dynamical mean-field problems with arbitrary densities of states.
Program summary
Program title: dmftCatalogue identifier: AEIL_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEIL_v1_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: ALPS LIBRARY LICENSE version 1.1No. of lines in distributed program, including test data, etc.: 899 806No. of bytes in distributed program, including test data, etc.: 32 153 916Distribution format: tar.gzProgramming language: C++Operating system: The ALPS libraries have been tested on the following platforms and compilers:•
Linux with GNU Compiler Collection (g++ version 3.1 and higher), and Intel C++ Compiler (icc version 7.0 and higher) •
MacOS X with GNU Compiler (g++ Apple-version 3.1, 3.3 and 4.0) •
IBM AIX with Visual Age C++ (xlC version 6.0) and GNU (g++ version 3.1 and higher) compilers •
Compaq Tru64 UNIX with Compq C++ Compiler (cxx) •
SGI IRIX with MIPSpro C++ Compiler (CC) •
HP-UX with HP C++ Compiler (aCC) •
Windows with Cygwin or coLinux platforms and GNU Compiler Collection (g++ version 3.1 and higher)
[1]
A. Albuquerque, F. Alet, P. Corboz, et al., J. Magn. Magn. Mater. 310 (2007) 1187. [2]
http://arxiv.org/abs/1012.4474, Rev. Mod. Phys., in press.
39.
During summer and autumn 2007, a 11 GHz microwave radiometer was deployed in an experimental tree plantation in Sardinilla, Panama. The opacity of the tree canopy was derived from incoming brightness temperatures received on the ground. A collocated eddy-covariance flux tower measured water vapor fluxes and meteorological variables above the canopy. In addition, xylem sapflow of trees was measured within the flux tower footprint. We observed considerable diurnal differences between measured canopy opacities and modeled theoretical opacities that were closely linked to xylem sapflow. It is speculated that dielectric changes in the leaves induced by the sapflow are causing the observed diurnal changes. In addition, canopy intercepted rain and dew formation also modulated the diurnal opacity cycle. With an enhanced canopy opacity model accounting for water deposited on the leaves, we quantified the influence of canopy stored water (i.e. intercepted water and dew) on the opacity. A time series of dew formation and rain interception was directly monitored during a period of two weeks. We found that during light rainfall up to 60% of the rain amount is intercepted by the canopy whereas during periods of intense rainfall only 4% were intercepted. On average, 0.17 mm of dew was formed during the night. Dew evaporation contributed 5% to the total water vapor flux measured above the canopy. 相似文献
40.
Sebastian GunrebenAuthor Vitae 《Performance Evaluation》2011,68(3):237-255
Contention resolution schemes in optical burst switched networks (OBS) as well as contention avoidance schemes delay burst delivery and change the burst arrival sequence. The burst arrival sequence usually changes the packet arrival sequence and degrades the upper layer protocols performance, e.g., the throughput of the transmission control protocol (TCP).In this paper, we present and analyze a detailed burst reordering model for two widely applied burst assembly strategies: time-based and random selection. We apply the IETF reordering metrics and calculate explicitly three reordering metrics: the reordering ratio, the reordering extent metric and the TCP relevant metric. These metrics allow estimating the degree of reordering in a certain network scenario. They estimate the buffer space at the destination to resolve reordering and quantify the number of duplicate acknowledgements relevant for investigations on the transmission control protocol.We show that our model reflects the burst/packet reordering pattern of simulated OBS networks very well. Applying our model in a network emulation scenario, enables investigations on real protocol implementations in network emulation environments. It therefore serves as a substitute for extensive TCP over OBS network simulations with a focus on burst reordering. 相似文献