全文获取类型
收费全文 | 18988篇 |
免费 | 825篇 |
国内免费 | 139篇 |
专业分类
电工技术 | 324篇 |
综合类 | 32篇 |
化学工业 | 4202篇 |
金属工艺 | 588篇 |
机械仪表 | 628篇 |
建筑科学 | 369篇 |
矿业工程 | 47篇 |
能源动力 | 1363篇 |
轻工业 | 1152篇 |
水利工程 | 150篇 |
石油天然气 | 84篇 |
武器工业 | 1篇 |
无线电 | 2353篇 |
一般工业技术 | 4305篇 |
冶金工业 | 1435篇 |
原子能技术 | 172篇 |
自动化技术 | 2747篇 |
出版年
2024年 | 101篇 |
2023年 | 418篇 |
2022年 | 994篇 |
2021年 | 1155篇 |
2020年 | 906篇 |
2019年 | 936篇 |
2018年 | 1214篇 |
2017年 | 954篇 |
2016年 | 924篇 |
2015年 | 600篇 |
2014年 | 836篇 |
2013年 | 1503篇 |
2012年 | 885篇 |
2011年 | 1062篇 |
2010年 | 852篇 |
2009年 | 803篇 |
2008年 | 707篇 |
2007年 | 567篇 |
2006年 | 469篇 |
2005年 | 359篇 |
2004年 | 270篇 |
2003年 | 240篇 |
2002年 | 187篇 |
2001年 | 176篇 |
2000年 | 169篇 |
1999年 | 168篇 |
1998年 | 290篇 |
1997年 | 237篇 |
1996年 | 219篇 |
1995年 | 168篇 |
1994年 | 157篇 |
1993年 | 150篇 |
1992年 | 102篇 |
1991年 | 130篇 |
1990年 | 99篇 |
1989年 | 95篇 |
1988年 | 79篇 |
1987年 | 88篇 |
1986年 | 75篇 |
1985年 | 85篇 |
1984年 | 73篇 |
1983年 | 71篇 |
1982年 | 60篇 |
1981年 | 70篇 |
1980年 | 48篇 |
1979年 | 31篇 |
1978年 | 27篇 |
1977年 | 26篇 |
1976年 | 35篇 |
1971年 | 12篇 |
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
101.
102.
Ch. Vasavi G. Suresh Kumar M. S. N. Murty 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(3):1093-1104
This paper deals with the fuzzy set-valued functions of real variables on time scale whose values are normal, convex, upper semicontinuous and compactly supported fuzzy sets in \(\mathbb {R}^{n}\). We introduce and study the fundamental properties of new class of derivative called generalized delta derivative (\(\Delta _{g}\)-derivative) and generalized delta integral (\(\Delta _{g}\)-integral) for such fuzzy functions. 相似文献
103.
Liouville numbers were the first class of real numbers which were proven to be transcendental. It is easy to construct non-normal Liouville numbers. Kano (1993) and Bugeaud (2002) have proved, using analytic techniques, that there are normal Liouville numbers. Here, for a given base k ≥ 2, we give a new construction of a Liouville number which is normal to the base k. This construction is combinatorial, and is based on de Bruijn sequences. 相似文献
104.
Harsh Bhasin Gitanshu Behal Nimish Aggarwal Raj Kumar Saini Shivani Choudhary 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(9):3403-3410
Diploid genetic algorithms (DGAs) promise robustness as against simple genetic algorithms which only work towards optimization. Moreover, these algorithms outperform others in dynamic environments. The work examines the theoretical aspect of the concept by examining the existing literature. The present work takes the example of dynamic TSP to compare greedy approach, genetic algorithms and DGAs. The work also implements a greedy genetic approach for the problem. In the experiments carried out, the three variants of dominance were implemented and 115 runs proved the point that none of them outperforms the other. 相似文献
105.
106.
B. Bharathi C. Arun Kumar T. Nagarajan 《International Journal of Speech Technology》2013,16(1):115-124
In classification tasks, the error rate is proportional to the commonality among classes. In conventional GMM-based modeling technique, since the model parameters of a class are estimated without considering other classes in the system, features that are common across various classes may also be captured, along with unique features. This paper proposes to use unique characteristics of a class at the feature-level and at the phoneme-level, separately, to improve the classification accuracy. At the feature-level, the performance of a classifier has been analyzed by capturing the unique features while modeling, and removing common feature vectors during classification. Experiments were conducted on speaker identification task, using speech data of 40 female speakers from NTIMIT corpus, and on a language identification task, using speech data of two languages (English and French) from OGI_MLTS corpus. At the phoneme-level, performance of a classifier has been analyzed by identifying a subset of phonemes, which are unique to a speaker with respect to his/her closely resembling speaker, in the acoustic sense, on a speaker identification task. In both the cases (feature-level and phoneme-level) considerable improvement in classification accuracy is observed over conventional GMM-based classifiers in the above mentioned tasks. Among the three experimental setup, speaker identification task using unique phonemes shows as high as 9.56 % performance improvement over conventional GMM-based classifier. 相似文献
107.
In many physical systems, when implementing quantum gate operations unavoidable global and relative phases occur as by-products due to the internal structure of the governing Hamiltonian. To correct, additional phase rotation gates are used, which increases the computational overhead. Here, we show how these phase by-products can actually be used to our advantage by using them to implement universal quantum computing between qubits not directly coupled to each other. The gate operations, CNOT, Toffoli, and swap gates, require much less computational overhead than present schemes, and are achieved with fidelity greater than 99%. We then present a linear nearest-neighbor architecture that takes full advantage of the phase by-products, and we show how to implement gates from a universal set efficiently in this layout. In this scheme gate operations are realized by only varying a single control parameter per data qubit, and the ability to tune couplings is not required. 相似文献
108.
In mobile commerce, companies provide location based services to mobile users, who report their locations with a certain level of granularity to maintain a degree of anonymity. This level of granularity depends on their perceived risk as well as the incentives they receive in the form of monetary benefits or improved mobile services. This paper formulates a quantitative model in which information theoretic metrics such as entropy, quantify the anonymity level of mobile users. The individual perceived risks of users and the benefits they obtain are defined as functions of their chosen location information granularity. The interaction between the mobile commerce company and its users is investigated using mechanism design techniques as a privacy game. The user best responses and optimal strategies for the company are derived under budgetary constraints on incentives, which are provided to users in order to convince them to share their private information at the desired level of granularity. Information limitations in the system are analyzed to capture more realistic scenarios where the companies do not have access to user utility functions. Iterative distributed algorithm and regression learning methods are investigated to design mechanisms that overcome these limitations. The results obtained are demonstrated with a numerical example and simulations based on real GPS data. 相似文献
109.
Anil?Kumar?Karanam Kenneth?E.?JansenEmail author Christian?H.?Whiting 《Engineering with Computers》2008,24(1):17-26
The pre-processing stage of finite element analysis of the Navier–Stokes equations is becoming increasingly important as the
desire for more general boundary conditions, as well as applications to parallel computers increases. The set up of general
boundary conditions and communication structures for parallel computations should be accomplished during the pre-processing
phase of the analysis, if possible, to ensure efficient computations for large scale problems in computational fluid dynamics.
This paper introduces a general methodology for geometry based boundary condition application and pre-computing of parallel
communication tasks.
A. K. Karanam was supported by NSF Grant No. 9985340.
C. H. Whiting was supported by a grant from NASA LaRC. 相似文献
110.
S.T. Newman A. Nassehi X.W. Xu R.S.U. Rosso Jr. L. Wang Y. Yusof L. Ali R. Liu L.Y. Zheng S. Kumar P. Vichare V. Dhokia 《Robotics and Computer》2008
In the domain of manufacturing, computer numerically controllers (CNC) technology is a major contributor to the production capacity of the enterprises. The advances in CNC technology coupled with enhancements in computing systems have provided the basis to re-examine the way in which computer-aided systems (CAx) can be used to enable global manufacturing. Interoperability of the various components of the CAx chain is therefore a major prerequisite for manufacturing enterprises for becoming strategically agile and consequently globally competitive. Being interoperable, resources can be utilized interchangeably in a plug-and-produce manner. Over the last 8 years the eminence of a STEP standard for machining entitled STEP-NC (numerical control) has become a well-known vehicle for research to improve the level of information availability at the CNC machine tool. In this paper, the authors introduce the background to the evolution of CNC manufacturing over the last 50 years and the current standards available for programming. A review of the literature in interoperable CNC manufacturing is then provided relating to milling, turn–mill and other NC processes. The major part of the paper provides a strategic view of how interoperability can be implemented across the CAx chain with a range of standards used to regulate the flow of information. Finally, the paper outlines the advantages and major issues for future developments in interoperability, identifying future key requirements and limiting factors. 相似文献