全文获取类型
收费全文 | 5901篇 |
免费 | 327篇 |
国内免费 | 47篇 |
专业分类
电工技术 | 74篇 |
综合类 | 20篇 |
化学工业 | 1652篇 |
金属工艺 | 127篇 |
机械仪表 | 223篇 |
建筑科学 | 156篇 |
矿业工程 | 4篇 |
能源动力 | 389篇 |
轻工业 | 565篇 |
水利工程 | 84篇 |
石油天然气 | 40篇 |
无线电 | 559篇 |
一般工业技术 | 1098篇 |
冶金工业 | 276篇 |
原子能技术 | 84篇 |
自动化技术 | 924篇 |
出版年
2024年 | 23篇 |
2023年 | 117篇 |
2022年 | 338篇 |
2021年 | 421篇 |
2020年 | 311篇 |
2019年 | 328篇 |
2018年 | 363篇 |
2017年 | 305篇 |
2016年 | 328篇 |
2015年 | 196篇 |
2014年 | 324篇 |
2013年 | 546篇 |
2012年 | 314篇 |
2011年 | 315篇 |
2010年 | 281篇 |
2009年 | 247篇 |
2008年 | 168篇 |
2007年 | 146篇 |
2006年 | 133篇 |
2005年 | 97篇 |
2004年 | 73篇 |
2003年 | 71篇 |
2002年 | 55篇 |
2001年 | 42篇 |
2000年 | 36篇 |
1999年 | 37篇 |
1998年 | 69篇 |
1997年 | 59篇 |
1996年 | 42篇 |
1995年 | 53篇 |
1994年 | 25篇 |
1993年 | 34篇 |
1992年 | 30篇 |
1991年 | 25篇 |
1990年 | 24篇 |
1989年 | 22篇 |
1988年 | 15篇 |
1987年 | 30篇 |
1986年 | 30篇 |
1985年 | 22篇 |
1984年 | 30篇 |
1983年 | 26篇 |
1982年 | 16篇 |
1981年 | 8篇 |
1980年 | 14篇 |
1979年 | 13篇 |
1978年 | 12篇 |
1977年 | 11篇 |
1976年 | 14篇 |
1975年 | 8篇 |
排序方式: 共有6275条查询结果,搜索用时 15 毫秒
41.
In this paper, three new Gramians are introduced namely ‐ limited‐time interval impulse response Gramians (LTIRG), generalized limited‐time Gramians (GLTG) and generalized limited‐time impulse response Gramians (GLTIRG). GLTG and GLTIRG are applicable to both unstable systems and also to systems which have eigenvalues of opposite polarities and equal magnitude. The concept of these Gramians is utilized to develop model reduction algorithms for linear time‐invariant continuous‐time single‐input single‐output (SISO) systems. In the cases of GLTIRG and GLTG based model reduction, the standard time‐limited Gramians are generalized to be applied to unstable systems by transforming the original system into a new system which requires the solution of two Riccati equations. Two numerical examples are included to illustrate the proposed methods. The results are also compared with standard techniques. 相似文献
42.
Omar?N.?Al-BoeridiEmail author S.?M.?Syed Ahmad S.?P.?Koh 《Neural computing & applications》2015,26(6):1505-1513
An off-line handwriting recognition (OFHR) system is a computerized system that is capable of intelligently converting human handwritten data extracted from scanned paper documents into an equivalent text format. This paper studies a proposed OFHR for Malaysian bank cheques written in the Malay language. The proposed system comprised of three components, namely a character recognition system (CRS), a hybrid decision system and lexical word classification system. Two types of feature extraction techniques have been used in the system, namely statistical and geometrical. Experiments show that the statistical feature is reliable, accessible and offers results that are more accurate. The CRS in this system was implemented using two individual classifiers, namely an adaptive multilayer feed-forward back-propagation neural network and support vector machine. The results of this study are very promising and could generalize to the entire Malay lexical dictionary in future work toward scaled-up applications. 相似文献
43.
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement, which is an essential concern in many secure data applications. In this paper, an efficient chaos-based image encryption scheme with higher key space is presented. Even with a single round of encryption, a significantly larger key space can be achieved. The proposed scheme removes correlation among image pixels via random chaotic sequences, simply by XOR and addition operations. In order to resist against numerous attacks, we apply the affine transformation to get the final ciphertext image. The security of the proposed scheme is proved through histogram, contrast, PSNR, entropy, correlation, key space, key sensitivity and differential attack analysis. Many significant properties of chaotic maps, sensitivity to initial condition and control parameters, structure and attack complexity, make the anticipated scheme very reliable, practical and robust in various secure communication applications. 相似文献
44.
Nadir Shah Ayaz Ahmad Babar Nazir Depei Qian 《Peer-to-Peer Networking and Applications》2016,9(2):356-371
Due to limited radio range and mobility of nodes in mobile ad hoc networks (MANETs), the network partitioning and merging could occur frequently. When structured peer-to-peer (P2P) overlays are running over MANETs, then network partition in the physical network can also cause network partition at the overlay layer. Existing approaches for structured P2P overlay over MANETs do not detect network partition at the overlay layer. This paper proposes a cross-layer approach to detect network partition at the overlay layer for structured P2P overlay over MANETs. Simulation results show that the proposed approach is highly effective and efficient in terms of routing overhead, success ratio and false-negative ratio. 相似文献
45.
In this paper, we propose a new online identification approach for evolving Takagi–Sugeno (TS) fuzzy models. Here, for a TS model, a certain number of models as neighboring models are defined and then the TS model switches to one of them at each stage of evolving. We define neighboring models for an in-progress (current) TS model as its fairly evolved versions, which are different with it just in two fuzzy rules. To generate neighboring models for the current model, we apply specially designed split and merge operations. By each split operation, a fuzzy rule is replaced with two rules; while by each merge operation, two fuzzy rules combine to one rule. Among neighboring models, the one with the minimum sum of squared errors – on certain time intervals – replaces the current model.To reduce the computational load of the proposed evolving TS model, straightforward relations between outputs of neighboring models and that of current model are established. Also, to reduce the number of rules, we define and use first-order TS fuzzy models whose generated local linear models can be localized in flexible fuzzy subspaces. To demonstrate the improved performance of the proposed identification approach, the efficiency of the evolving TS model is studied in prediction of monthly sunspot number and forecast of daily electrical power consumption. The prediction and modeling results are compared with that of some important existing evolving fuzzy systems. 相似文献
46.
During the recent years, there has been a tremendous growth in the development and deployment of multimedia based networked applications such as video streaming, IP telephony, interactive games, among others. These applications, in contrast to elastic applications such as email and data sharing, are delay and delay jitter sensitive but can tolerate certain level of packet loss. A vital element of end-to-end delay and delay jitter is the random queueing delays in network switches and routers. Analysis of robust mechanisms for buffer management at network routers needs to be carried out in order to reduce end-to-end delay for traffic generated by multimedia applications. In this context, a threshold based buffer management scheme for accommodating multiple class multimedia traffic in network routers has been analysed. This technique effectively controls the allocation of buffer to various traffic classes according to their delay constraints. The forms of the joint state probabilities, as well as basic performance measures such as blocking probabilities are analytically established at equilibrium. Typical numerical experiments are included to illustrate the credibility of the proposed mechanism in the context of different quality of service (QoS) grades for various network traffic classes. This model, therefore, can be used as a powerful tool to provide a required grade of service to a particular class of multimedia based web traffic in any heterogeneous network. 相似文献
47.
By splitting a large broadcast message into segments and broadcasting the segments in a pipelined fashion, pipelined broadcast can achieve high performance in many systems. In this paper, we investigate techniques for efficient pipelined broadcast on clusters connected by multiple Ethernet switches. Specifically, we develop algorithms for computing various contention-free broadcast trees that are suitable for pipelined broadcast on Ethernet switched clusters, extend the parametrized LogP model for predicting appropriate segment sizes for pipelined broadcast, show that the segment sizes computed based on the model yield high performance, and evaluate various pipelined broadcast schemes through experimentation on Ethernet switched clusters with various topologies. The results demonstrate that our techniques are practical and efficient for contemporary fast Ethernet and Giga-bit Ethernet clusters. 相似文献
48.
A Cooperative Game Theoretical Technique for Joint Optimization of Energy Consumption and Response Time in Computational Grids 总被引:2,自引:0,他引:2
Khan Samee U. Ahmad Ishfaq 《Parallel and Distributed Systems, IEEE Transactions on》2009,20(3):346-360
With the explosive growth in computers and the growing scarcity in electric supply, reduction of energy consumption in large-scale computing systems has become a research issue of paramount importance. In this paper, we study the problem of allocation of tasks onto a computational grid, with the aim to simultaneously minimize the energy consumption and the makespan subject to the constraints of deadlines and tasks' architectural requirements. We propose a solution from cooperative game theory based on the concept of Nash Bargaining Solution. In this cooperative game, machines collectively arrive at a decision that describes the task allocation that is collectively best for the system, ensuring that the allocations are both energy and makespan optimized. Through rigorous mathematical proofs we show that the proposed cooperative game in mere O(n mlog(m)) time (where n is the number of tasks and m is the number of machines in the system) produces a Nash Bargaining Solution that guarantees Pareto-optimally. The simulation results show that the proposed technique achieves superior performance compared to the Greedy and Linear Relaxation (LR) heuristics, and with competitive performance relative to the optimal solution implemented in LINDO for small-scale problems. 相似文献
49.
We consider a state-of-the-art system that uses layered source coding and forward error correction with Reed-Solomon codes to efficiently transmit 3-D meshes over lossy packet networks. Given a transmission bit budget, the performance of this system can be optimized by determining how many layers should be sent, how each layer should be packetized, and how many parity bits should be allocated to each layer such that the expected distortion at the receiver is minimum. The previous solution for this optimization problem uses exhaustive search, which is not feasible when the transmission bit budget is large. We propose instead an exact algorithm that solves this optimization problem in linear time and space. We illustrate the advantages of our approach by providing experimental results for the compressed progressive meshes (CPM) mesh compression technique. 相似文献
50.
The effect of molecular anisotropy on backscattered UV (BUV) radiances is computed by accounting for it in both Rayleigh optical thickness and the scattering-phase matrix. If the effect of molecular anisotropy is included only in the optical thickness and not in the phase matrix, then for high sun (θ(0) ~ 0°), the nadir radiance (I(0)) leaving the top of the atmosphere is approximately 1.8% higher than the radiance (I(op)) computed with the effect included in the phase matrix. For very low sun (θ(0) > 80°), I(0) is approximately 2.3% lower than I(op). For off-nadir radiances the relative increase (decrease) depends on both the local zenith angle as well as the azimuth angle. Also, an increase in the surface reflectivity decreases the effect of molecular anisotropy on the upwelling radiances. Exclusion of the anisotropy factor in the Rayleigh-phase matrix has very little effect (<1%) on ozone retrieval from the BUV-type instruments. This is because of the ratio technique used in the retrieval algorithm, which practically cancels out the anisotropy effect. 相似文献