全文获取类型
收费全文 | 5941篇 |
免费 | 479篇 |
国内免费 | 222篇 |
专业分类
电工技术 | 392篇 |
综合类 | 373篇 |
化学工业 | 991篇 |
金属工艺 | 300篇 |
机械仪表 | 308篇 |
建筑科学 | 496篇 |
矿业工程 | 265篇 |
能源动力 | 136篇 |
轻工业 | 371篇 |
水利工程 | 144篇 |
石油天然气 | 308篇 |
武器工业 | 22篇 |
无线电 | 686篇 |
一般工业技术 | 798篇 |
冶金工业 | 331篇 |
原子能技术 | 68篇 |
自动化技术 | 653篇 |
出版年
2024年 | 26篇 |
2023年 | 99篇 |
2022年 | 163篇 |
2021年 | 230篇 |
2020年 | 157篇 |
2019年 | 169篇 |
2018年 | 174篇 |
2017年 | 165篇 |
2016年 | 181篇 |
2015年 | 250篇 |
2014年 | 310篇 |
2013年 | 332篇 |
2012年 | 333篇 |
2011年 | 383篇 |
2010年 | 332篇 |
2009年 | 312篇 |
2008年 | 335篇 |
2007年 | 305篇 |
2006年 | 320篇 |
2005年 | 289篇 |
2004年 | 190篇 |
2003年 | 164篇 |
2002年 | 173篇 |
2001年 | 137篇 |
2000年 | 161篇 |
1999年 | 162篇 |
1998年 | 123篇 |
1997年 | 116篇 |
1996年 | 105篇 |
1995年 | 89篇 |
1994年 | 77篇 |
1993年 | 49篇 |
1992年 | 58篇 |
1991年 | 36篇 |
1990年 | 30篇 |
1989年 | 32篇 |
1988年 | 19篇 |
1987年 | 9篇 |
1986年 | 11篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1967年 | 1篇 |
1966年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有6642条查询结果,搜索用时 15 毫秒
71.
A novel approach to annotating web service based on interface concept mapping and semantic expansion
Guobing Zou Yang Xiang Yanglan Gan Yixin Chen 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2011,15(5):929-938
With the rapid development of web service technology in these years, traditional standards have been matured during the process
of service registry and discovery. However, it is difficult for service requesters to discover satisfactory web services.
The reason for this phenomenon is that the traditional service organization mode lacks semantic understanding ability for
service function interface. This paper proposes a novel approach to annotating web services. We first adopt domain ontology
as a semantic context, and give our general framework of service semantic annotation. Then, interface concept mapping algorithm
and service interface expansion algorithm are respectively presented in detail. Finally, the generation process of semantic
web service repository is presented based on preceding algorithms. Simulation experiment results demonstrate that annotated
web services by the proposed method can more satisfy requirements for service requesters than traditional ones by service
matchmaking engine. It can get better service discovery effectiveness. 相似文献
72.
干晓鸣 《计算机应用与软件》2010,27(8)
主要从软件自动化测试在工作中的实际经验出发,探讨如何合理应用"软件自动化测试"这一测试手段.同时也简单介绍了软件自动化测试的定义、目的等概念,以及常见的一些自动化测试工具软件.另外从对软件自动化测试的一些认识误区的分析中,让大家意识到软件自动化测试的合理应用是软件开发过程中降本增效的关键. 相似文献
73.
An Efficient Path Planning and Control Algorithm for RUAV’s in Unknown and Cluttered Environments 总被引:1,自引:0,他引:1
Kwangjin Yang Seng Keat Gan Salah Sukkarieh 《Journal of Intelligent and Robotic Systems》2010,57(1-4):101-122
This paper presents an efficient planning and execution algorithm for the navigation of an autonomous rotary wing UAV (RUAV) manoeuvering in an unknown and cluttered environment. A Rapidly-exploring Random Tree (RRT) variant is used for the generation of a collision free path and linear Model Predictive Control(MPC) is applied to follow this path. The guidance errors are mapped to the states of the linear MPC structure by using the nonlinear kinematic equations. The proposed path planning algorithm considers the run time of the planning stage explicitly and generates a continuous curvature path whenever replanning occurs. Simulation results show that the RUAV with the proposed methodology successfully achieves autonomous navigation regardless of its lack of prior information about the environment. 相似文献
74.
目的:了解医学生的上网情况。方法:采用"医学生上网调查问卷",在七个不同专业500名学生中进行问卷调查。结果:有95.16%学生上网,上网学生中30.25%每次上网3h以上;上网目的以聊天、多媒体娱乐和玩游戏为主。结论:青年群体是网上的主力军,应警惕大学生网上迷路,鼓励上网学生要以理智态度控制上网时间,老师和学校应给予学生上网以恰当的引导和教育。 相似文献
75.
We present a type of single-hidden layer feed-forward wavelet neural networks. First, we give a new and quantitative proof
of the fact that a single-hidden layer wavelet neural network with n + 1 hidden neurons can interpolate n + 1 distinct samples with zero error. Then, without training, we constructed a wavelet neural network X
a
(x, A), which can approximately interpolate, with arbitrary precision, any set of distinct data in one or several dimensions. The
given wavelet neural network can uniformly approximate any continuous function of one variable. 相似文献
76.
77.
This paper identifies a property of delay-robustness in distributed supervisory control of discrete-event systems (DES) with communication delays. In previous work a distributed supervisory control problem has been investigated on the assumption that inter-agent communications take place with negligible delay. From an applications viewpoint it is desirable to relax this constraint and identify communicating distributed controllers which are delay-robust, namely logically equivalent to their delay-free counterparts. For this we introduce inter-agent channels modeled as 2-state automata, compute the overall system behavior, and present an effective computational test for delay-robustness. From the test it typically results that the given delay-free distributed control is delay-robust with respect to certain communicated events, but not for all, thus distinguishing events which are not delay-critical from those that are. The approach is illustrated by a workcell model with three communicating agents. 相似文献
78.
Junliu Zhong Yanfen Gan Janson Young Lian Huang Peiyu Lin 《Multimedia Tools and Applications》2017,76(13):14887-14903
Copy move forgery detection (CMFD) is one of the most active subtopic in forgery scheme. The methods of CMFD are divided into to block-based method and keypoint-based method in general. Compared with keypoint-based method, block-based method can detect undetectable detail without morphology segmentation. But many block-based methods detect the plain copy-move forgeries only. They have been incompetent to detect the post-processing operations such as various geometrical distortions, and then fail to detect the forgery regions accurately. Therefore, this paper presents an improved block-based efficient method for CMFD. Firstly, after pre-processing, an auxiliary overlapped circular block is presented to divide the forged image into overlapped circular blocks. The local and inner image feature is extracted by the Discrete Radial Harmonic Fourier Moments (DRHFMs) with the overlapped circular block from the suspicious image. Then, the similar feature vectors of blocks are searched by 2 Nearest Neighbors (2NN) test. Euclidean distance and correlation coefficient is employed to filter these features and then remove the false matches. Morphologic operation is employed to delete the isolated pixels. A series of experiments are done to analyze the performance for CMFD. Experimental results show that the new DRHFMs can obtain outstanding performance even under image geometrical distortions. 相似文献
79.
通用扫描线多边形填充算法 总被引:6,自引:2,他引:4
甘泉 《计算机工程与应用》2000,36(2):57-59
传统的扫描线多边形填充算法只适用于水平扫描线的逐行填充。文章提出通用扫描线多边形填充算法,该算法可以有效地解决任意间距、任意倾角的扫描线对多边形的填充问题。通用扫描线多边形算法采用了坐标变换、浮点数舍入策略等重要方法。顶点扫描线号是该算法中的核心概念。 相似文献
80.
One-leg methods and linear multistep methods are two class of important numerical methods applied to stiff initial value
problems of ordinary differential equations. The purpose of this paper is to present some convergence results of A-stable
one-leg and linear multistep methods for one-parameter multiply stiff singular perturbation problems and their corresponding
reduced problems which are a class of stiff differential-algebraic equations.
Received April 14, 2000; revised June 30, 2000 相似文献