全文获取类型
收费全文 | 5008篇 |
免费 | 174篇 |
国内免费 | 26篇 |
专业分类
电工技术 | 76篇 |
综合类 | 8篇 |
化学工业 | 970篇 |
金属工艺 | 156篇 |
机械仪表 | 117篇 |
建筑科学 | 51篇 |
矿业工程 | 16篇 |
能源动力 | 308篇 |
轻工业 | 226篇 |
水利工程 | 36篇 |
石油天然气 | 20篇 |
无线电 | 673篇 |
一般工业技术 | 1158篇 |
冶金工业 | 726篇 |
原子能技术 | 34篇 |
自动化技术 | 633篇 |
出版年
2023年 | 72篇 |
2022年 | 100篇 |
2021年 | 173篇 |
2020年 | 147篇 |
2019年 | 127篇 |
2018年 | 171篇 |
2017年 | 159篇 |
2016年 | 186篇 |
2015年 | 111篇 |
2014年 | 186篇 |
2013年 | 414篇 |
2012年 | 217篇 |
2011年 | 230篇 |
2010年 | 198篇 |
2009年 | 267篇 |
2008年 | 178篇 |
2007年 | 129篇 |
2006年 | 128篇 |
2005年 | 111篇 |
2004年 | 99篇 |
2003年 | 101篇 |
2002年 | 90篇 |
2001年 | 69篇 |
2000年 | 67篇 |
1999年 | 71篇 |
1998年 | 145篇 |
1997年 | 108篇 |
1996年 | 120篇 |
1995年 | 83篇 |
1994年 | 83篇 |
1993年 | 80篇 |
1992年 | 61篇 |
1991年 | 70篇 |
1990年 | 69篇 |
1989年 | 48篇 |
1988年 | 47篇 |
1987年 | 47篇 |
1986年 | 43篇 |
1985年 | 48篇 |
1984年 | 31篇 |
1983年 | 26篇 |
1982年 | 29篇 |
1981年 | 36篇 |
1980年 | 20篇 |
1979年 | 30篇 |
1978年 | 31篇 |
1977年 | 27篇 |
1976年 | 34篇 |
1975年 | 17篇 |
1973年 | 13篇 |
排序方式: 共有5208条查询结果,搜索用时 9 毫秒
41.
Mahashweta Das Saravanan Thirumuruganathan Sihem Amer-Yahia Gautam Das Cong Yu 《The VLDB Journal The International Journal on Very Large Data Bases》2014,23(2):201-226
The rise of Web 2.0 is signaled by sites such as Flickr, del.icio.us, and YouTube, and social tagging is essential to their success. A typical tagging action involves three components, user, item (e.g., photos in Flickr), and tags (i.e., words or phrases). Analyzing how tags are assigned by certain users to certain items has important implications in helping users search for desired information. In this paper, we develop a dual mining framework to explore tagging behavior. This framework is centered around two opposing measures, similarity and diversity, applied to one or more tagging components, and therefore enables a wide range of analysis scenarios such as characterizing similar users tagging diverse items with similar tags or diverse users tagging similar items with diverse tags. By adopting different concrete measures for similarity and diversity in the framework, we show that a wide range of concrete analysis problems can be defined and they are NP-Complete in general. We design four sets of efficient algorithms for solving many of those problems and demonstrate, through comprehensive experiments over real data, that our algorithms significantly out-perform the exact brute-force approach without compromising analysis result quality. 相似文献
42.
The viscosity and apparent molar volume of solutions of KBrO3, NaBrO3 KIO3, NaIO3, K2SO4 and Na2SO4 in dioxane (mass fraction: 10, 20 and 30%)-water mixtures at 30, 35, 40 and 45°C have been measured. The ions appear to interact appreciably and the ion-solvent interaction is of the order BrO?3 > IO?3 > SO2?4 and K+ > Na+. 相似文献
43.
Roy Satyabrata Shrivastava Manu Pandey Chirag Vinodkumar Nayak Sanjeet Kumar Rawat Umashankar 《Multimedia Tools and Applications》2021,80(21-23):31529-31567
Multimedia Tools and Applications - Present era is marked by exponential growth in transfer of multimedia data through internet. Most of the Internet-of-Things(IoT) applications send images to... 相似文献
44.
Badal Soni Saswati Debnath Pradip K. Das 《International Journal of Speech Technology》2016,19(3):525-536
An important task of speaker verification is to generate speaker specific models and match an input speaker’s utterance with these models. This paper focuses on comparing the performance of text dependent speaker verification system using Mel Frequency Cepstral Coefficients feature and different Vector Quantization (VQ) based speaker modelling techniques to generate the speaker specific models. Speaker-specific information is mainly represented by spectral features and using these features we have developed the model which serves as an important entity for determining the claimed identity of the speaker. In the modelling part, we used Linde, Buzo, Gray (LBG) VQ, proposed adaptive LBG VQ and Fuzzy C Means (FCM) VQ for generating speaker specific model. The experimental results that are performed on microphonic database shows that accuracy significantly depends on the size of the codebook in all VQ techniques, and on FCM VQ accuracy also depend on the value of learning parameter of the objective function. Experiment results shows that how the accuracy of speaker verification system is depend on different representations of the codebook, different size of codebook in VQ modelling techniques and learning parameter in FCM VQ. 相似文献
45.
Ashwin S. Dhabale Rutuja Dive Mohan V. Aware Shantanu Das 《Asian journal of control》2015,17(6):2143-2152
In this paper a new algorithm is presented to calculate the poles and zeros to approximate a fractional order (FO) differintegral (s±α,α∈(0,1)) by a rational function on a finite frequency band ω∈(ωl,ωh). The constant phase property of the FO differintegral is the basis for development of the algorithm. Interlacing of real poles and zeros is used to achieve the constant phase. The calculations are done using the asymptotic Bode phase plot. A brief investigation is made to get a good approximation for the Bode phase plot. Two design parameters are introduced to keep the average phase close to the desired phase angle and to keep the error within the allowed bounds. A study is done to empirically understand the relationship between the error and the design parameters. The results thus obtained help in the further calculations. The algorithm is computationally simple and inexpensive, and gives a fairly good approximation of fractance frequency response on the specified frequency band. 相似文献
46.
Probir Saha Debashis Tarafdar Surjya K. Pal Partha Saha Ashok K. Srivastava Karabi Das 《Applied Soft Computing》2013,13(4):2065-2074
This paper proposed a Neuro-Genetic technique to optimize the multi-response of wire electro-discharge machining (WEDM) process. The technique was developed through hybridization of a radial basis function network (RBFN) and non-dominated sorting genetic algorithm (NSGA-II). The machining was done on 5 vol% titanium carbide (TiC) reinforced austenitic manganese steel metal matrix composite (MMC). The proposed Neuro-Genetic technique was found to be potential in finding several optimal input machining conditions which can satisfy wide requirements of a process engineer and help in efficient utilization of WEDM in industry. 相似文献
47.
48.
Critical Density for Coverage and Connectivity in Three-Dimensional Wireless Sensor Networks Using Continuum Percolation 总被引:3,自引:0,他引:3
Although most of the studies on coverage and connectivity in wireless sensor networks (WSNs) considered two-dimensional (2D) settings, such networks can in reality be accurately modeled in a three-dimensional (3D) space. The concepts of continuum percolation theory best fit the problem of connectivity in WSNs to find out whether the network provides long-distance multihop communication. In this paper, we focus on percolation in coverage and connectivity in 3D WSNs. We say that the network exhibits a coverage percolation (respectively, connectivity percolation) when a giant covered region (respectively, giant connected component) almost surely spans the entire network for the first time. Because of the dependency between coverage and connectivity, the problem is not only a continuum percolation problem but also an integrated continuum percolation problem. Thus, we propose an integrated-concentric-sphere model to address coverage and connectivity in 3D WSNs in an integrated way. First, we compute the critical density lambdaC con above which coverage percolation in 3D WSNs will almost surely occur. Second, we compute the critical density lambdac con above which connectivity percolation in 3D WSNs will almost surely occur. Third, we compute the critical density lambdac cov-con above which both coverage and connectivity percolation in 3D WSNs will almost surely occur. For each of these three problems, we also compute their corresponding critical network degree. Our results can be helpful in the design of energy-efficient topology control protocols for 3D WSNs in terms of coverage and connectivity. 相似文献
49.
Regression models for six muscles, the left and right iliocostalis, the left and right erector spinae, and the left and right external oblique, were developed for asymmetry and height effects for floor and knuckle lifts. The models were based on participant anthropometric and other measures. Stepwise regression was performed for developing the prediction models. The models developed were discrete in terms of specific height and asymmetry. © 2009 Wiley Periodicals, Inc. 相似文献
50.
KP Dingemans MA van den Bergh Weerman RF Keep PK Das 《Canadian Metallurgical Quarterly》1994,57(3):433-439
We have previously reported that an invasive morphotype can be evoked in a rat colon carcinoma by transplanting it into pre-induced subcutaneous granulation tissue. We have now studied the interaction of the same tumor with liver tissue, which is extremely poor in connective tissue in comparison with the subcutaneous site. Tumor cells were injected into the portal system and the resulting experimental liver metastases were examined by electron microscopy and immunohistochemistry. Early metastases consisted of well-differentiated acini, fully surrounded by connective tissue that was derived from the periportal stroma. In a later stage, this connective tissue was overgrown by tumor cells and, almost immediately, acinar differentiation was lost. Most metastases eventually reached the liver capsule, which reacted by forming a layer of granulation tissue. Only in this layer, we observed invasion by thin tumor cell strands, which were often intimately associated with fibroblasts or with blood capillaries. The tumor cells remained smooth and rounded during this process. After fully penetrating the granulation tissue, the tumor cell strands reached the liver surface, where they formed poorly structured papillary masses that were nearly devoid of stroma. Our observations indicate that, even in a relatively homogeneous organ like the liver, the tumor-host interaction is highly complex and dynamic. They also confirm the notion that granulation tissue stimulates tumor invasiveness. Finally, they show that tumor cells can actively invade host tissues without exhibiting a "fibroblastic" morphology. 相似文献