全文获取类型
收费全文 | 24682篇 |
免费 | 2008篇 |
国内免费 | 898篇 |
专业分类
电工技术 | 1195篇 |
技术理论 | 5篇 |
综合类 | 1376篇 |
化学工业 | 4470篇 |
金属工艺 | 1645篇 |
机械仪表 | 1470篇 |
建筑科学 | 1852篇 |
矿业工程 | 701篇 |
能源动力 | 830篇 |
轻工业 | 1655篇 |
水利工程 | 397篇 |
石油天然气 | 1693篇 |
武器工业 | 158篇 |
无线电 | 2483篇 |
一般工业技术 | 3070篇 |
冶金工业 | 1388篇 |
原子能技术 | 258篇 |
自动化技术 | 2942篇 |
出版年
2024年 | 125篇 |
2023年 | 498篇 |
2022年 | 766篇 |
2021年 | 1053篇 |
2020年 | 864篇 |
2019年 | 712篇 |
2018年 | 828篇 |
2017年 | 859篇 |
2016年 | 730篇 |
2015年 | 990篇 |
2014年 | 1181篇 |
2013年 | 1591篇 |
2012年 | 1533篇 |
2011年 | 1616篇 |
2010年 | 1425篇 |
2009年 | 1346篇 |
2008年 | 1286篇 |
2007年 | 1247篇 |
2006年 | 1307篇 |
2005年 | 1139篇 |
2004年 | 702篇 |
2003年 | 645篇 |
2002年 | 602篇 |
2001年 | 472篇 |
2000年 | 545篇 |
1999年 | 655篇 |
1998年 | 556篇 |
1997年 | 412篇 |
1996年 | 398篇 |
1995年 | 338篇 |
1994年 | 280篇 |
1993年 | 194篇 |
1992年 | 156篇 |
1991年 | 108篇 |
1990年 | 88篇 |
1989年 | 49篇 |
1988年 | 66篇 |
1987年 | 42篇 |
1986年 | 30篇 |
1985年 | 32篇 |
1984年 | 28篇 |
1983年 | 16篇 |
1982年 | 13篇 |
1981年 | 9篇 |
1980年 | 13篇 |
1979年 | 9篇 |
1978年 | 4篇 |
1974年 | 3篇 |
1959年 | 2篇 |
1958年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results. 相似文献
102.
用有限状态图来识别系统入侵 总被引:8,自引:1,他引:7
文章首先对系统入侵的状态转换进行了研究,通过使用有限状态图的分析方法,分析识别了常见黑客攻击的特征,包括ROOT用户攻击、TCPSYNFLOODING、IP分片攻击等等;最后根据对系统入侵的状态转换图的研究和对攻击特征的分析设计了一个入侵检测系统。 相似文献
103.
Three-dimensional quantitative structure-activity relationship (3D-QSAR) models were developed using comparative molecular field analysis (CoMFA) and comparative molecular similarity analysis (CoMSIA) on a series of agonists of thyroid hormone receptor beta (TRbeta), which may lead to safe therapies for non-thyroid disorders while avoiding the cardiac side effects. The reasonable q(2) (cross-validated) values 0.600 and 0.616 and non-cross-validated r(2) values of 0.974 and 0.974 were obtained for CoMFA and CoMSIA models for the training set compounds, respectively. The predictive ability of two models was validated using a test set of 12 molecules which gave predictive correlation coefficients (r(pred)(2)) of 0.688 and 0.674, respectively. The Lamarckian Genetic Algorithm (LGA) of AutoDock 4.0 was employed to explore the binding mode of the compound at the active site of TRbeta. The results not only lead to a better understanding of interactions between these agonists and the thyroid hormone receptor beta but also can provide us some useful information about the influence of structures on the activity which will be very useful for designing some new agonist with desired activity. 相似文献
104.
The filtering problem for continuous‐time linear systems with unknown parameters is considered. A new suboptimal filter is herein proposed. It is based on the optimal mean‐square linear combination of the local Kalman filters. In contrast to the optimal weights, the suboptimal weights do not depend on current observations; thus, the proposed filter can easily be implemented in real‐time. Examples demonstrate high accuracy and efficiency of the suboptimal filter. Copyright © 2008 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
105.
106.
In this paper, we extend the binary Gray code to symbolic Gray code. We then show that this symbolic Gray code can be used as a multikey hashing function for storing symbolic records. The record stored at location k and the record stored at location k + 1 will be nearest neighbors if this hashing function is used. Thus, this symbolic Gray code hashing function exhibits some kind of clustering property which will group similar records together. This property is a desirable property for designing nearest neighbor searching (also called best match searching) systems. There are many other interesting properties of this hashing function. For instance, there exists an address-to-key transformation which can be used to determine the record stored at certain location k if this hashing function is used. Besides, if there are totally M records, we only have to reserve exactly M locations; there are no collisions and wasting of memory storage. At the end of this paper, it is shown that the resulting file exhibits the multiple-attribute tree structure. 相似文献
107.
This paper presents a novel divide-and-integrate strategy based approach for solving large scale job-shop scheduling problems. The proposed approach works in three phases. First, in contrast to traditional job-shop scheduling approaches where optimization algorithms are used directly regardless of problem size, priority rules are deployed to decrease problem scale. These priority rules are developed with slack due dates and mean processing time of jobs. Thereafter, immune algorithm is applied to solve each small individual scheduling module. In last phase, integration scheme is employed to amalgamate the small modules to get gross schedule with minimum makespan. This integration is carried out in dynamic fashion by continuously checking the preceding module's machine ideal time and feasible slots (satisfying all the constraint). In this way, the proposed approach will increase the machine utilization and decrease the makespan of gross schedule. Efficacy of the proposed approach has been tested with extremely hard standard test instances of job-shop scheduling problems. Implementation results clearly show effectiveness of the proposed approach. 相似文献
108.
The purpose is to perform a sharp analysis of the Lavrentiev method applied to the regularization of the ill-posed Cauchy problem, set in the Steklov-Poincaré variational framework. Global approximation results have been stated earlier that demonstrate that the Lavrentiev procedure yields a convergent strategy. However, no convergence rates are available unless a source condition is assumed on the exact Cauchy solution. We pursue here bounds on the approximation (bias) and the noise propagation (variance) errors away from the incomplete boundary where instabilities are located. The investigation relies on a Carleman inequality that enables enhanced local convergence rates for both bias and variance errors without any particular smoothness assumption on the exact solution. These improved results allows a new insight on the behavior of the Lavrentiev solution, look similar to those established for the Quasi-Reversibility method in [Inverse Problems 25, 035005, 2009]. There is a case for saying that this sort of ??super-convergence?? is rather inherent to the nature of the Cauchy problem and any reasonable regularization procedure would enjoy the same locally super-convergent behavior. 相似文献
109.
Hyperspectral band selection aims at the determination of an optimal subset of spectral bands for dimensionality reduction
without loss of discriminability. Many conventional band selection approaches depend on the concept of “statistical distance”
measure between the probability distributions characterizing sample classes. However, the maximization of separability does
not necessarily guarantee that a classification process results in the best classification accuracies. This paper presents
a multidimensional local spatial autocorrelation (MLSA) measure that quantifies the spatial autocorrelation of the hyperspectral
image data. Based on the proposed spatial measure, a collaborative band selection strategy is developed that combines both
spectral separability measure and spatial homogeneity measure for hyperspectral band selection without losing the spectral
details useful in classification processes. The selected band subset by the proposed method shows both larger separability
between classes and stronger spatial similarity within class. Case studies in biomedical and remote sensing applications demonstrate
that the MLSA-based band selection approach improves object classification accuracies in hyperspectral imaging compared with
conventional approaches. 相似文献
110.
Case learning for CBR-based collision avoidance systems 总被引:1,自引:1,他引:0
Yuhong Liu Chunsheng Yang Yubin Yang Fuhua Lin Xuanmin Du Takayuki Ito 《Applied Intelligence》2012,36(2):308-319
With the rapid development of case-based reasoning (CBR) techniques, CBR has been widely applied to real-world applications
such as collision avoidance systems. A successful CBR-based system relies on a high-quality case base, and a case creation
technique for generating such a case base is highly required. In this paper, we propose an automated case learning method
for CBR-based collision avoidance systems. Building on techniques from CBR and natural language processing, we developed a
methodology for learning cases from maritime affair records. After giving an overview on the developed systems, we present
the methodology and the experiments conducted in case creation and case evaluation. The experimental results demonstrated
the usefulness and applicability of the case learning approach for generating cases from the historic maritime affair records. 相似文献