全文获取类型
收费全文 | 23447篇 |
免费 | 957篇 |
国内免费 | 164篇 |
专业分类
电工技术 | 391篇 |
综合类 | 44篇 |
化学工业 | 5022篇 |
金属工艺 | 728篇 |
机械仪表 | 732篇 |
建筑科学 | 411篇 |
矿业工程 | 60篇 |
能源动力 | 1630篇 |
轻工业 | 1339篇 |
水利工程 | 184篇 |
石油天然气 | 104篇 |
武器工业 | 1篇 |
无线电 | 2944篇 |
一般工业技术 | 5353篇 |
冶金工业 | 2119篇 |
原子能技术 | 205篇 |
自动化技术 | 3301篇 |
出版年
2024年 | 106篇 |
2023年 | 465篇 |
2022年 | 1068篇 |
2021年 | 1288篇 |
2020年 | 1015篇 |
2019年 | 1031篇 |
2018年 | 1341篇 |
2017年 | 1077篇 |
2016年 | 1076篇 |
2015年 | 693篇 |
2014年 | 986篇 |
2013年 | 1871篇 |
2012年 | 1070篇 |
2011年 | 1278篇 |
2010年 | 1033篇 |
2009年 | 1053篇 |
2008年 | 874篇 |
2007年 | 682篇 |
2006年 | 586篇 |
2005年 | 461篇 |
2004年 | 359篇 |
2003年 | 332篇 |
2002年 | 267篇 |
2001年 | 240篇 |
2000年 | 229篇 |
1999年 | 230篇 |
1998年 | 432篇 |
1997年 | 344篇 |
1996年 | 338篇 |
1995年 | 250篇 |
1994年 | 239篇 |
1993年 | 225篇 |
1992年 | 161篇 |
1991年 | 198篇 |
1990年 | 165篇 |
1989年 | 142篇 |
1988年 | 127篇 |
1987年 | 132篇 |
1986年 | 118篇 |
1985年 | 133篇 |
1984年 | 104篇 |
1983年 | 96篇 |
1982年 | 84篇 |
1981年 | 105篇 |
1980年 | 67篇 |
1979年 | 61篇 |
1978年 | 56篇 |
1977年 | 53篇 |
1976年 | 68篇 |
1975年 | 26篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
In this paper we formulate a least squares version of the recently proposed twin support vector machine (TSVM) for binary classification. This formulation leads to extremely simple and fast algorithm for generating binary classifiers based on two non-parallel hyperplanes. Here we attempt to solve two modified primal problems of TSVM, instead of two dual problems usually solved. We show that the solution of the two modified primal problems reduces to solving just two systems of linear equations as opposed to solving two quadratic programming problems along with two systems of linear equations in TSVM. Classification using nonlinear kernel also leads to systems of linear equations. Our experiments on publicly available datasets indicate that the proposed least squares TSVM has comparable classification accuracy to that of TSVM but with considerably lesser computational time. Since linear least squares TSVM can easily handle large datasets, we further went on to investigate its efficiency for text categorization applications. Computational results demonstrate the effectiveness of the proposed method over linear proximal SVM on all the text corpuses considered. 相似文献
62.
63.
Bikash K. Behera Anindita Banerjee Prasanta K. Panigrahi 《Quantum Information Processing》2017,16(12):312
Quantum cheques could be a forgery-free way to make transaction in a quantum networked banking system with perfect security against any no-signalling adversary. Here, we demonstrate the implementation of quantum cheque, proposed by Moulick and Panigrahi (Quantum Inf Process 15:2475–2486, 2016), using the five-qubit IBM quantum computer. Appropriate single qubit, CNOT and Fredkin gates are used in an optimized configuration. The accuracy of implementation is checked and verified through quantum state tomography by comparing results from the theoretical and experimental density matrices. 相似文献
64.
Information Systems and e-Business Management - Collaborative filtering (CF) is a popular and widely accepted recommendation technique. CF is an automated form of word-of-mouth communication... 相似文献
65.
By exploiting the unattended nature of the wireless sensor networks, an attacker can physically capture and compromise sensor nodes and then launch a variety of attacks. He can additionally create many replicas of a few compromised nodes and spread these replicas over the network, thus launching further attacks with their help. In order to minimize the damage incurred by compromised and replicated nodes, it is very important to detect such malicious nodes as quickly as possible. In this review article, we synthesize our previous works on node compromise detection in sensor networks while providing the extended analysis in terms of performance comparison to the related work. More specifically, we use the methodology of the sequential analysis to detect static and mobile compromised nodes, as well as mobile replicated nodes in sensor networks. With the help of analytical and simulation results, we also demonstrate that our schemes provide robust and efficient node compromise detection capability. 相似文献
66.
Schloegel K. Karypis G. Kumar V. 《Parallel and Distributed Systems, IEEE Transactions on》2001,12(5):451-466
Current multilevel repartitioning schemes tend to perform well on certain types of problems while obtaining worse results for other types of problems. We present two new multilevel algorithms for repartitioning adaptive meshes that improve the performance of multilevel schemes for the types of problems that current schemes perform poorly while maintaining similar or better results for those problems that current schemes perform well. Specifically, we present a new scratch-remap scheme called Locally-matched Multilevel Scratch-remap (or simply LMSR) for repartitioning of adaptive meshes. LMSR tries to compute a high-quality partitioning that has a large amount of overlap with the original partitioning. We show that LMSR generally decreases the data redistribution costs required to balance the load compared to current scratch-remap schemes. We present a new diffusion-based scheme that we refer to as Wavefront Diffusion. In Wavefront Diffusion, the flow of vertices moves in a wavefront from overweight to underweight subdomains. We show that Wavefront Diffusion obtains significantly lower data redistribution costs while maintaining similar or better edge-cut results compared to existing diffusion algorithms. We also compare Wavefront Diffusion with LMSR and show that these provide a trade-off between edge-cut and data redistribution costs for a wide range of problems. Our experimental results on a Gray T3E, an IBM SP2, and a cluster of Pentium Pro workstations show that both schemes are fast and scalable. For example, both are capable of repartitioning a seven million vertex graph in under three seconds on 128 processors of a Gray T3E. Our schemes obtained relative speedups of between nine and 12 when the number of processors was increased by a factor of 16 on a Gray T3E 相似文献
67.
Full instrumental rationality and perfect institutions are two cornerstoneassumptions underlying neoclassical models. However, in the real world, thesetwo assumptions never hold, especially not in developing countries. In thispaper, we develop a game theoretical model to investigate if relaxations inthe full instrumental rationality and perfect institutions premise can explainthe conflicts that have been occurring between the various principals in theNarok district in Kenya with regard to land tenure and use. 相似文献
68.
ON THE HARDNESS OF APPROXIMATING MULTICUT AND SPARSEST-CUT 总被引:1,自引:1,他引:0
69.
Scalable parallel data mining for association rules 总被引:3,自引:0,他引:3
Eui-Hong Han Karypis G. Kumar V. 《Knowledge and Data Engineering, IEEE Transactions on》2000,12(3):337-352
The authors propose two new parallel formulations of the Apriori algorithm (R. Agrawal and R. Srikant, 1994) that is used for computing association rules. These new formulations, IDD and HD, address the shortcomings of two previously proposed parallel formulations CD and DD. Unlike the CD algorithm, the IDD algorithm partitions the candidate set intelligently among processors to efficiently parallelize the step of building the hash tree. The IDD algorithm also eliminates the redundant work inherent in DD, and requires substantially smaller communication overhead than DD. But IDD suffers from the added cost due to communication of transactions among processors. HD is a hybrid algorithm that combines the advantages of CD and DD. Experimental results on a 128-processor Cray T3E show that HD scales just as well as the CD algorithm with respect to the number of transactions, and scales as well as IDD with respect to increasing candidate set size 相似文献
70.