全文获取类型
收费全文 | 586410篇 |
免费 | 8532篇 |
国内免费 | 2067篇 |
专业分类
电工技术 | 10598篇 |
综合类 | 527篇 |
化学工业 | 87434篇 |
金属工艺 | 19610篇 |
机械仪表 | 16611篇 |
建筑科学 | 16300篇 |
矿业工程 | 1275篇 |
能源动力 | 16244篇 |
轻工业 | 62039篇 |
水利工程 | 4656篇 |
石油天然气 | 3384篇 |
武器工业 | 16篇 |
无线电 | 76646篇 |
一般工业技术 | 106341篇 |
冶金工业 | 111591篇 |
原子能技术 | 7684篇 |
自动化技术 | 56053篇 |
出版年
2021年 | 3971篇 |
2020年 | 2858篇 |
2019年 | 3626篇 |
2018年 | 5629篇 |
2017年 | 5710篇 |
2016年 | 6207篇 |
2015年 | 4931篇 |
2014年 | 8252篇 |
2013年 | 27703篇 |
2012年 | 14705篇 |
2011年 | 21240篇 |
2010年 | 16361篇 |
2009年 | 18622篇 |
2008年 | 19839篇 |
2007年 | 20161篇 |
2006年 | 18320篇 |
2005年 | 16868篇 |
2004年 | 16312篇 |
2003年 | 15985篇 |
2002年 | 15257篇 |
2001年 | 15594篇 |
2000年 | 14323篇 |
1999年 | 15329篇 |
1998年 | 36200篇 |
1997年 | 25917篇 |
1996年 | 20011篇 |
1995年 | 15504篇 |
1994年 | 13696篇 |
1993年 | 13321篇 |
1992年 | 9726篇 |
1991年 | 9259篇 |
1990年 | 8747篇 |
1989年 | 8379篇 |
1988年 | 8088篇 |
1987年 | 6709篇 |
1986年 | 6558篇 |
1985年 | 8082篇 |
1984年 | 7476篇 |
1983年 | 6627篇 |
1982年 | 6100篇 |
1981年 | 6168篇 |
1980年 | 5746篇 |
1979年 | 5457篇 |
1978年 | 5066篇 |
1977年 | 6153篇 |
1976年 | 8130篇 |
1975年 | 4267篇 |
1974年 | 4046篇 |
1973年 | 3970篇 |
1972年 | 3123篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
J. L. Díez J. L. Navarro A. Sala 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2007,11(10):973-983
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in
order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably
close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model
accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in
literature. Some examples illustrate the proposed approach. 相似文献
992.
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy. 相似文献
993.
994.
C. Janke R. Jones S. Öberg P. R. Briddon 《Journal of Materials Science: Materials in Electronics》2007,18(7):775-780
Boron is observed to diffuse very slowly in germanium, as opposed to its behaviour in silicon where it exhibits Transient
Enhanced Diffusion effects in implanted samples. As a result of this slow diffusion, boron is a very stable dopant, allowing
devices to be created with very well-defined doping regions. To understand this superior performance, calculations were performed
on a variety of boron diffusion paths, within vacancy and interstitial mediated methods. It was found that the vacancy mediated
diffusion which is associated with the fast diffusion of many other species in germanium exhibits a total barrier of 5.8 eV.
Interstitial-mediated diffusion had a total barrier for migration of 3.4 eV in the neutral and singly negative charge states,
3.2 eV for the positive charge state, but a formation barrier of 4.1 eV. Thus the barrier for interstitial-mediated diffusion
is dominated by the formation energy of the self-interstitial. 相似文献
995.
Perceptual Temporal Quality Metric for Compressed Video 总被引:2,自引:0,他引:2
Kai-Chieh Yang Guest C.C. El-Maleh K. Das P.K. 《Multimedia, IEEE Transactions on》2007,9(7):1528-1535
This paper presents a metric to quantify frame loss according to the impact on perceived temporal quality. This metric particularly aims at measuring the temporal quality degradation caused by both regular and irregular frame loss. Experimental results with subjective viewing demonstrate high performance on prediction of perceptual temporal quality. 相似文献
996.
Bonto-Kane Maria Vicente A. Chin Alvin Mc Carthy Sheila Srikulwong Mayuree Timmins Paul J. 《Pervasive Computing, IEEE》2007,6(4)
Pervasive computing is as much about the user as it is about the technology. So, the Fifth International Conference on Pervasive Computing emphasized desirability rather than just feasibility. Featured themes included user benefits, human-computer interaction, group and social interactions, context awareness, finding and positioning people and objects, and personal privacy. 相似文献
997.
Unicode is rapidly becoming the preferred means for representing symbols used in creating multimedia content, especially for information that's presented in multiple languages. This article discusses a unicode vulnerability that makes such content susceptible to being used for creation of covert channel communications. We also developed a solution architecture, the unified secure message augmentation (USMA) service. The USMA service incorporates rules (in an XML vocabulary) that we can apply to unicode transmissions that will detect an attempt to transmit a potential exploit, alert network managers to the presence of the unicode anomaly, and take action to mitigate the exploit. 相似文献
998.
The Magtalo prototype environment harnesses dialogue protocols to support flexible, intuitive interaction with data in complex, contentious domains and provides mechanisms for eliciting structured knowledge. Magtalo represents the first example of an implemented online system that uses a closely specified argument-based dialogue protocol combined with a rich language for representing monologic argument to provide a tool for intuitive user exploration of a disagreement space. This approach also enables the expansion of argument resources through knowledge elicitation, which is structured by the argument dialogue protocol. The continuing aim of our research is to use advances in argumentation theory to push the practice of argumentation technology in providing tools and interfaces that have wide appeal. 相似文献
999.
1000.
Edward C. Malthouse 《Data mining and knowledge discovery》2007,15(3):383-402
This paper discusses a new application of data mining, quantifying the importance of responding to trigger events with reactive
contacts. Trigger events happen during a customer’s lifecycle and indicate some change in the relationship with the company.
If detected early, the company can respond to the problem and retain the customer; otherwise the customer may switch to another
company. It is usually easy to identify many potential trigger events. What is needed is a way of prioritizing which events
demand interventions. We conceptualize the trigger event problem and show how survival analysis can be used to quantify the
importance of addressing various trigger events. The method is illustrated on four real data sets from different industries
and countries. 相似文献