全文获取类型
收费全文 | 5651篇 |
免费 | 297篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 79篇 |
综合类 | 8篇 |
化学工业 | 1060篇 |
金属工艺 | 116篇 |
机械仪表 | 125篇 |
建筑科学 | 177篇 |
矿业工程 | 8篇 |
能源动力 | 177篇 |
轻工业 | 323篇 |
水利工程 | 32篇 |
石油天然气 | 22篇 |
无线电 | 945篇 |
一般工业技术 | 960篇 |
冶金工业 | 1012篇 |
原子能技术 | 29篇 |
自动化技术 | 895篇 |
出版年
2023年 | 93篇 |
2022年 | 143篇 |
2021年 | 275篇 |
2020年 | 214篇 |
2019年 | 180篇 |
2018年 | 221篇 |
2017年 | 186篇 |
2016年 | 273篇 |
2015年 | 167篇 |
2014年 | 224篇 |
2013年 | 351篇 |
2012年 | 264篇 |
2011年 | 298篇 |
2010年 | 219篇 |
2009年 | 212篇 |
2008年 | 210篇 |
2007年 | 186篇 |
2006年 | 142篇 |
2005年 | 127篇 |
2004年 | 101篇 |
2003年 | 87篇 |
2002年 | 75篇 |
2001年 | 82篇 |
2000年 | 53篇 |
1999年 | 76篇 |
1998年 | 383篇 |
1997年 | 195篇 |
1996年 | 144篇 |
1995年 | 107篇 |
1994年 | 87篇 |
1993年 | 109篇 |
1992年 | 39篇 |
1991年 | 39篇 |
1990年 | 25篇 |
1989年 | 37篇 |
1988年 | 25篇 |
1987年 | 26篇 |
1986年 | 24篇 |
1985年 | 22篇 |
1984年 | 25篇 |
1983年 | 17篇 |
1982年 | 17篇 |
1981年 | 16篇 |
1980年 | 17篇 |
1979年 | 12篇 |
1978年 | 12篇 |
1977年 | 33篇 |
1976年 | 55篇 |
1975年 | 9篇 |
1973年 | 8篇 |
排序方式: 共有5968条查询结果,搜索用时 953 毫秒
171.
Vinh Phu Nguyen Oriol Lloberas-Valls Martijn Stroeven Lambertus Johannes Sluys 《Computer Methods in Applied Mechanics and Engineering》2011,200(9-12):1220-1236
The existence of a representative volume element (RVE) for a class of quasi-brittle materials having a random heterogeneous microstructure in tensile, shear and mixed mode loading is demonstrated by deriving traction–separation relations, which are objective with respect to RVE size. A computational homogenization based multiscale crack modelling framework, implemented in an FE2 setting, for quasi-brittle solids with complex random microstructure is presented. The objectivity of the macroscopic response to the micro-sample size is shown by numerical simulations. Therefore, a homogenization scheme, which is objective with respect to macroscopic discretization and microscopic sample size, is devised. Numerical examples including a comparison with direct numerical simulation are given to demonstrate the performance of the proposed method. 相似文献
172.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results. 相似文献
173.
Tich Phuoc Tran Thi Thanh Sang Nguyen Poshiang Tsai Xiaoying Kong 《Artificial Intelligence Review》2011,35(4):369-382
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast
growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend
without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning
technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models
are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics
of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy
and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace
Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative
diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy
with relatively small computational complexity compared with other conventional detection methods. 相似文献
174.
The automatic recognition of natural or close to natural speech is linked to the problem of detection of “new” or “unknown”
words. These are the words or the nonverbal acoustical events that do not belong to the speech recognition system’s vocabulary.
In this paper we consider a new method for the estimation of confidence score for words at the output of the recognition system
based on a likelihood score of the signal frame. The method and confidence measure could be used, for example, for out-of-vocabulary
(OOV) word detection and rejection.
The text was submitted by the authors in English.
Minh T. Nguyen received the MS degree in computer sciences from Moscow State University in 2004. In 2004 he began postgraduate studies at
the Computing Centre, Russian Academy of Sciences. He is working on development and evaluation of confidence measures for
speech recognition.
Vladimir J. Chuchupal received the MS degree in mathematics from Moscow State Pedagogical Institute in 1976. He received his Candidate of Sciences
degree from the Computing Centre, USSR Academy of Sciences, in 1984 completing his dissertation work in noisy speech enhancement
methods.
Since 1984 he has been with the Speech Recognition subdivision of the Computing Centre, Russian Academy of Sciences, where
he works on speech recognition problems. Currently he is the head of the subdivision. 相似文献
175.
Internet complexity makes reasoning about traffic equilibrium difficult, partly because users react to congestion. This difficulty calls for an analytic technique that is simple, yet have enough details to capture user behavior and flexibly address a broad range of issues.This paper presents such a technique. It treats traffic equilibrium as a balance between an inflow controlled by users, and an outflow controlled by the network (link capacity, congestion avoidance, etc.). This decomposition is demonstrated with a surfing session model, and validated with a traffic trace and NS2 simulations.The technique’s accessibility and breadth are illustrated through an analysis of several issues concerning the location, stability, robustness and dynamics of traffic equilibrium. 相似文献
176.
This paper proposes an adaptive robust fuzzy control scheme for path tracking of a wheeled mobile robot with uncertainties.
The robot dynamics including the actuator dynamics is considered in this work. The presented controller is composed of a fuzzy
basis function network (FBFN) to approximate an unknown nonlinear function of the robot complete dynamics, an adaptive robust
input to overcome the uncertainties, and a stabilizing control input. The stability and the convergence of the tracking errors
are guaranteed using the Lyapunov stability theory. When the controller is designed, the different parameters for two actuator
models in the dynamic equation are taken into account. The proposed control scheme does not require the accurate parameter
values for the actuator parameters as well as the robot parameters. The validity and robustness of the proposed control scheme
are demonstrated through computer simulations.
This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January
31–February 2, 2008 相似文献
177.
Thinh Nguyen Kolazhi K. Kamath R. Cheung S.-c.S. Tran D.A. 《Multimedia, IEEE Transactions on》2008,10(3):523-537
In recent years, the number of peer-to-peer (P2P) applications has increased significantly. One important problem in many P2P applications is how to efficiently disseminate data from a single source to multiple receivers on the Internet. A successful model used for analyzing this problem is a graph consisting of nodes and edges, with a capacity assigned to each edge. In some situations however, it is inconvenient to use this model. To that end, we propose to study the problem of efficient data dissemination in a source constraint network. A source constraint network is modeled as a graph in which, the capacity is associated with a node, rather than an edge. The contributions of this paper include (a) a quantitative data dissemination in any source constraint network, (b) a set of topologies suitable for data dissemination in P2P networks, and (c) an architecture and implementation of a P2P system based on the proposed optimal topologies. We will present the experimental results of our P2P system deployed on PlanetLab nodes demonstrating that our approach achieves near optimal throughput while providing scalability, low delay and bandwidth fairness among peers. 相似文献
178.
Gene expression changes in a transgenic mouse model overexpressing human wildtype and mutant torsinA
Grundmann K Hübener J Häbig K Reischmann B Poths S Hauser TK Magg J Riess O Bonin M Nguyen HP 《Proteomics. Clinical applications》2008,2(5):720-736
Primary torsion dystonia is an autosomal-dominantly inherited, neurodevelopmental movement disorder caused by a GAG deletion (ΔGAG) in the DYT1 gene, encoding torsinA. This mutation is responsible for approximately 70% of cases of early-onset primary torsion dystonia. The function of wildtype torsinA is still unknown, and it is unsolved how the deletion in the DYT1 gene contributes to the development of the disease. To better understand the molecular processes involved in torsinA pathology, we used genome-wide oligonucleotide microarrays to characterize gene expression patterns in the striatum of mouse models overexpressing the human wildtype and mutant torsinA. By this approach we were able to detect gene expression changes that seem to be specific for torsinA pathology. We found an impact of torsinA, independent from genotype, on vesicle trafficking, exocytosis, and neurotransmitter release in our mouse model. In addition, we were able to identify several new pathways and processes involved in the development of the nervous system that are affected by wildtype and mutant torsinA. Furthermore, we have striking evidence from our gene expression data that glutamate receptor mediated synaptic plasticity in the striatum is the affected underlying cellular process for impaired motor learning in human ΔGAG torsinA transgenic mice. 相似文献
179.
Daniel J. Berleant Olga Kosheleva Vladik Kreinovich Hung T. Nguyen 《Reliable Computing》2007,13(3):261-282
In many real-life situations, we only have partial information about probabilities. This information is usually described
by bounds on moments, on probabilities of certain events, etc. –i.e., by characteristics c(p) which are linear in terms of the unknown probabilities p
j. If we know interval bounds on some such characteristics , and we are interested in a characteristic c(p), then we can find the bounds on c(p) by solving a linear programming problem.
In some situations, we also have additional conditions on the probability distribution –e.g., we may know that the two variables
x
1 and x
2 are independent, or that the joint distribution of x
1 and x
2 is unimodal. We show that adding each of these conditions makes the corresponding interval probability problem NP-hard. 相似文献
180.
During the first ten months of 1992 the Oslo Ambulance Department registered 716 incidences of assumed drug-related intoxications. 80% happened in down town Oslo. 19 cases of asystoly were recorded, 13 of the patients recovered after treatment, without sequelae. Five of these patients left the location after emergency help and they refused hospitalization. 432 of the patients were unconscious when the ambulance personal arrived, 472 were treated with naloxone both by the intramuscular and the intravenous route. Most of the persons refused further observation. A team of specially trained out reach workers offers help after acute medical treatment by means of "streetwork". The intervention is directed at addicts who have experienced an overdose. 相似文献