全文获取类型
收费全文 | 150034篇 |
免费 | 12268篇 |
国内免费 | 6783篇 |
专业分类
电工技术 | 9568篇 |
技术理论 | 13篇 |
综合类 | 10076篇 |
化学工业 | 23541篇 |
金属工艺 | 8414篇 |
机械仪表 | 9782篇 |
建筑科学 | 11884篇 |
矿业工程 | 4425篇 |
能源动力 | 4305篇 |
轻工业 | 8745篇 |
水利工程 | 2791篇 |
石油天然气 | 8041篇 |
武器工业 | 1232篇 |
无线电 | 18301篇 |
一般工业技术 | 17657篇 |
冶金工业 | 7449篇 |
原子能技术 | 1737篇 |
自动化技术 | 21124篇 |
出版年
2024年 | 476篇 |
2023年 | 2052篇 |
2022年 | 3818篇 |
2021年 | 5362篇 |
2020年 | 4038篇 |
2019年 | 3323篇 |
2018年 | 3918篇 |
2017年 | 4394篇 |
2016年 | 3881篇 |
2015年 | 5415篇 |
2014年 | 7094篇 |
2013年 | 8791篇 |
2012年 | 9775篇 |
2011年 | 10553篇 |
2010年 | 9397篇 |
2009年 | 9091篇 |
2008年 | 9222篇 |
2007年 | 8738篇 |
2006年 | 8743篇 |
2005年 | 7764篇 |
2004年 | 5418篇 |
2003年 | 4446篇 |
2002年 | 4000篇 |
2001年 | 3710篇 |
2000年 | 3670篇 |
1999年 | 3890篇 |
1998年 | 3213篇 |
1997年 | 2778篇 |
1996年 | 2501篇 |
1995年 | 2047篇 |
1994年 | 1657篇 |
1993年 | 1286篇 |
1992年 | 1033篇 |
1991年 | 774篇 |
1990年 | 627篇 |
1989年 | 532篇 |
1988年 | 401篇 |
1987年 | 297篇 |
1986年 | 202篇 |
1985年 | 170篇 |
1984年 | 97篇 |
1983年 | 78篇 |
1982年 | 89篇 |
1981年 | 58篇 |
1980年 | 51篇 |
1979年 | 38篇 |
1978年 | 25篇 |
1977年 | 25篇 |
1976年 | 40篇 |
1973年 | 11篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
网页信息提取方法中的启发式规则,是识别网页标签信息、利用网页节点分析结果、针对网页不同内容、完成信息提取的重要手段。本研究在对现有启发式规则进行研究分析的基础上,提出了几种优化的启发式规则,实现对网页标题、发布时间、来源以及正文内容等元素信息的精准提取。本研究进一步提出了运用编辑距离算法实现正文内容提取准确率的判定,并提出阙值优化方法,克服了正文提取中噪声节点多、内容识别不完全的缺陷,大大提高了提取的准确度。 相似文献
992.
993.
A current development trend in research on intelligent systems is to optimize a general intelligent prediction system into an individuation intelligent prediction system that is applied in specialized fields. Protein structure prediction is a challenging international issue. In this paper, we propose a new intelligent prediction system model, designed as a multi-layer compound pyramid model, for predicting secondary protein structure. The model comprises four independent intelligent interfaces and several knowledge discovery methods. The model penetrates throughout the domain knowledge, with the effective attributes chosen by Causal Cellular Automata. Furthermore, a high pure structure database is constructed for training. On the RS126 dataset, the overall state per-residue accuracy, Q3, reached 83.99%, while on the CB513 dataset, Q3 reached 85.58%. Meanwhile, on the CASP8 sequences, the results are superior to those produced by other methods, such as Psipred, Jpred, APSSP2 and BehairPred. These results confirm that our method has a strong generalization ability, and that it provides a model for the construction of other intelligent systems. 相似文献
994.
本文首先介绍了指挥信息系统安全防护的基本概念和特点,然后从网络安全技术和网络安全管理等方面分析了如何实现指挥信息系统完全,提出了一种基于AP2DR2模型的指挥信息系统安全防护体系,论述了AP2DR2安全模型是一个多层次、全方位的动态防御体系,指挥信息系统安全防护体系从静态、被动向动态、主动转变,有效地保障了指挥信息系统信息的安全。 相似文献
995.
Wu Li Yann-Hang Lee Wei-Tek Tsai Jingjing Xu Young-Sung Son Jun-Hee Park Kyung-Duk Moon 《Service Oriented Computing and Applications》2012,6(1):65-79
A smart home usually has a variety of devices or home appliance, instead of designing software for a specific home, this paper
proposes a service-oriented framework with a set of ontology systems to support service and device publishing, discovery of
devices and their services, composition of control software using existing control services that wrap devices, deployment,
and execution of the composed service in an computing environment, monitoring the execution, and recovery from device failure.
The ontology systems specify semantic information about devices, services, and workflows used in various smart home, and users
can compose and recompose services for their specific needs. New devices, workflows, and services can be added into ontology.
Most of the steps in this process can be automated including code generation. For example, service composition will be carried
out in three steps: abstract workflow design, function construction, and device discovery, and different codes can be generated
for different computing platforms such as Java and Open Services Gateway initiative environments. In this way, a variety of
smart home can be constructed rapidly using the framework by discovery and composition using existing services and workflows.
This paper illustrates this framework using a media control example to illustrate the ontology, discovery, composition, deployment,
execution, monitoring, and recovery. 相似文献
996.
Qi Zhao Xuanzhe Liu Xingrun Chen Jiyu Huang Gang Huang Hong Mei 《Service Oriented Computing and Applications》2012,6(2):99-116
Facilitated by the SOA and new Web technologies, Service-Oriented Rich Clients (SORCs) compose various Web-delivered services in Web browser to create new applications. The SORCs support client-side data storage and manipulation and provide more features than traditional thin clients. However, the SORCs might suffer from data access issues, mainly due to both client-side incompatible data sources and server-side improper or even undesirable cache strategies. Addressing the data access issues, this paper proposes a data access framework for SORCs. The main contributions of this paper are as follows. First, the framework makes the SORCs accommodate heterogeneous local storage solutions and diverse Web browsers properly. The framework abstracts the underlying details of different local storages and selects the most proper data sources for current SORC in use. Secondly, the framework provides a cache mechanism, which supports client-side customized cache strategies. An adaptive technique for the strategies is also proposed to adjust cache strategies based on users?? historical actions to achieve better performance. 相似文献
997.
Chunjie Luo Jianfeng Zhan Zhen Jia Lei Wang Gang Lu Lixin Zhang Cheng-Zhong Xu Ninghui Sun 《Frontiers of Computer Science》2012,6(4):347-362
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluating cloud performance on the whole system level. To the best of our knowledge, this paper proposes the first benchmark suite CloudRank-D to benchmark and rank cloud computing systems that are shared for running big data applications. We analyze the limitations of previous metrics, e.g., floating point operations, for evaluating a cloud computing system, and propose two simple metrics: data processed per second and data processed per Joule as two complementary metrics for evaluating cloud computing systems. We detail the design of CloudRank-D that considers representative applications, diversity of data characteristics, and dynamic behaviors of both applications and system software platforms. Through experiments, we demonstrate the advantages of our proposed metrics. In several case studies, we evaluate two small-scale deployments of cloud computing systems using CloudRank-D. 相似文献
998.
三维标量场并行等值面提取与绘制技术 总被引:2,自引:0,他引:2
通过研究并行等值面提取与绘制的各项关键技术要点,面向三维标量场的特点,在sort-last并行绘制模式的基础上提出一个三维标量场并行等值面提取与绘制框架.该框架在任务分配时采用静态分配的模式,在等值面提取时采用Marching Tetrahedra等值面提取算法,在并行绘制与场景合成时采用预先构建绘制节点控制模型的混合场景并行绘制合成算法.实验结果表明,该框架能够有效地提高大规模时变三维标量场的等值面提取与绘制效率,满足实际应用的需要. 相似文献
999.
针对传统多边形位置关系计算比较烦琐,以及简单多边形的理论难以拓展到一般多边形的问题,提出标注节点状态的方法.通过定义11种位置来描述折线链上每个节点的状态,再采用"线段端点与线段"和"线段端点与邻折线"的标注方法来实现任意折线链的标注,同时利用两线段分割预处理使相交仅发生在端点处,从而使算法更高效;然后给出折线链基本位置关系的节点特征,并且探讨了三维顶点的标注方法.该方法的标注原理简单、方法实用,算法空间和时间复杂度分别为O(n)和O(n2).实验结果表明,该方法对任意形状的折线链都能实现稳定标注;通过搜索节点状态特征可以求解折线链间的相互关系,还可以实现一般折线链的碰撞检测、相交区域计算以及多边形简单化分解等. 相似文献
1000.
针对传统分步式结构优化设计的不足,提出一种同时进行结构拓扑、形状和尺寸统一优化的设计方法.首先采用水平集函数描述统一的结构优化模型和几何尺寸边界,通过引入紧支径向插值基函数将结构拓扑优化变量、形状优化变量和尺寸优化变量变换为基函数的扩展系数;然后取该扩展系数为设计变量,借助一种参数的变化表达3种优化要素对结构性能的影响,将复杂的多变量优化问题变换为相对简单的参数优化问题,有利于与相对成熟的优化算法相结合提高求解效率;进一步用R函数将其融合为一个整体,构造出统一优化模型,并用最优化准则法进行求解.最后通过数值案例证明了该方法的有效性和精确性. 相似文献