全文获取类型
收费全文 | 5166篇 |
免费 | 132篇 |
国内免费 | 46篇 |
专业分类
电工技术 | 93篇 |
综合类 | 5篇 |
化学工业 | 997篇 |
金属工艺 | 122篇 |
机械仪表 | 199篇 |
建筑科学 | 97篇 |
矿业工程 | 2篇 |
能源动力 | 194篇 |
轻工业 | 239篇 |
水利工程 | 27篇 |
石油天然气 | 7篇 |
无线电 | 915篇 |
一般工业技术 | 919篇 |
冶金工业 | 564篇 |
原子能技术 | 25篇 |
自动化技术 | 939篇 |
出版年
2024年 | 9篇 |
2023年 | 31篇 |
2022年 | 113篇 |
2021年 | 109篇 |
2020年 | 35篇 |
2019年 | 56篇 |
2018年 | 67篇 |
2017年 | 76篇 |
2016年 | 103篇 |
2015年 | 103篇 |
2014年 | 177篇 |
2013年 | 378篇 |
2012年 | 276篇 |
2011年 | 325篇 |
2010年 | 235篇 |
2009年 | 270篇 |
2008年 | 273篇 |
2007年 | 244篇 |
2006年 | 230篇 |
2005年 | 199篇 |
2004年 | 164篇 |
2003年 | 158篇 |
2002年 | 126篇 |
2001年 | 116篇 |
2000年 | 90篇 |
1999年 | 101篇 |
1998年 | 250篇 |
1997年 | 152篇 |
1996年 | 114篇 |
1995年 | 72篇 |
1994年 | 96篇 |
1993年 | 61篇 |
1992年 | 45篇 |
1991年 | 54篇 |
1990年 | 36篇 |
1989年 | 45篇 |
1988年 | 53篇 |
1987年 | 39篇 |
1986年 | 33篇 |
1985年 | 24篇 |
1984年 | 28篇 |
1983年 | 24篇 |
1982年 | 11篇 |
1981年 | 16篇 |
1980年 | 15篇 |
1979年 | 9篇 |
1978年 | 12篇 |
1977年 | 18篇 |
1976年 | 34篇 |
1974年 | 7篇 |
排序方式: 共有5344条查询结果,搜索用时 0 毫秒
61.
Ping-Hui Hsu Hui-Ming Teng Yung-Tsan Jou Hui Ming Wee 《Computers & Industrial Engineering》2008,54(3):602-612
The supplier–buyer coordination is an important policy in the supply chain management. The buyer in the two-echelon inventory system with regular selling season has to face the uncertainty of customer demand, supplier’s delivery time and variable price change. At the same time, the supplier has to consider the inventory holding and delay cost. The objective of this study is to develop an integrated supply chain strategy for products with short lifecycle and variable selling price to entice cooperation. The strategy must provide a win–win situation for both the supplier and the buyer. A numerical case example, sensitivity analysis and compensation mechanism are given to illustrate the model. 相似文献
62.
This paper proposes an approach to reduce the total operational cost of a spare part logistic system by appropriately designing the BOM (bill of material) configuration. A spare part may have several vendors. Parts supplied by different vendors may vary in failure rates and prices – the higher the failure rate, the lower the price. Selecting vendors for spare parts is therefore a trade-off decision. Consider a machine where the BOM is composed of s critical parts and each part has k vendors. The number of possible BOM configurations for the machine is then ks. For each BOM configuration, we can use OPUS10 (proprietary software) to calculate an optimum inventory policy and its associated total logistic cost. Exhaustively searching the solution space by OPUS10 can yield an optimal BOM configuration; however, it may be formidably time-consuming. To remedy the time-consuming problem, this research proposes a GA-neural network approach to solve the BOM configuration design problem. A neural network is developed to efficiently emulate the function of OPUS10 and a GA (genetic algorithm) is developed to quickly find a near-optimal BOM configuration. Experiment results indicate that the approach can obtain an effective BOM configuration efficiently. 相似文献
63.
Trappey A. Trappey C.V. Fu-Chiang Hsu Hsiao D.W. 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2009,39(3):806-814
This correspondence presents a novel hierarchical clustering approach for knowledge document self-organization, particularly for patent analysis. Current keyword-based methodologies for document content management tend to be inconsistent and ineffective when partial meanings of the technical content are used for cluster analysis. Thus, a new methodology to automatically interpret and cluster knowledge documents using an ontology schema is presented. Moreover, a fuzzy logic control approach is used to match suitable document cluster(s) for given patents based on their derived ontological semantic webs. Finally, three case studies are used to test the approach. The first test case analyzed and clustered 100 patents for chemical and mechanical polishing retrieved from the World Intellectual Property Organization (WIPO). The second test case analyzed and clustered 100 patent news articles retrieved from online Web sites. The third case analyzed and clustered 100 patents for radio-frequency identification retrieved from WIPO. The results show that the fuzzy ontology-based document clustering approach outperforms the K-means approach in precision, recall, F-measure, and Shannon's entropy. 相似文献
64.
Stephen J. Blackband Richard W. Bowtell Andrew Peters Jonathan C. Sharp Peter Mansfield Edward W. Hsu Nanci Aiken Anthony Horsman 《Magma (New York, N.Y.)》1994,2(3):445-447
Previous NMR microimaging studies at 360 MHz have demonstrated a clear differentiation between the nucleus and cytoplasm in isolated single neurons. In particular, theT
2 of the cell nucleus is 2.5 times larger than that of the cytoplasm. In order to determine the magnitude of possibleT
2
*
influences on these observations, images of single cells have been obtained at 500 MHz using spin-echo and line-narrowing sequences. Comparison of the images acquired by the two sequences, and of the spin-echo images at 360 and 500 MHz, imply that anyT
2
*
contributions are relatively small. Consequently, the measuredT
2 differences in spin-echo imaging represent a true difference in theT
2 relaxation in the two cellular compartments. 相似文献
65.
66.
We demonstrate that two cross-polarized longitudinal modes can have 50% higher conversion efficiency than two parallel-polarized longitudinal modes in a diode-laser-pumped and intracavity frequency-doubled Nd:YVO(4) laser when operated under periodic pulse oscillation. Through simulations of the rate equations for primary frequency intensities and gains, we also verify that this effect can be attributed to gain competition and complementary conversion coefficient between second-harmonic and sum-frequency generations. 相似文献
67.
The optical properties and the surface morphologies of single-ion-beam sputtering (SIBS) and dual-ion-beam sputtering (DIBS) depositions of titanium oxide films are investigated and compared. In the DIBS process, the ion-assisted deposition by the voltage of a low ion beam ranged from 50 to 300 V at a 0% and 44% oxygen percentage. Cosputtering with materials of Si, SiO(2) (fused silica), and Al is also utilized in SIBS to improve amorphous-structure film. For the low-absorption and surface-roughness film, the optimum deposition condition of DIBS and postdeposition baking temperature for SIBS and DIBS are essential to the process. 相似文献
68.
Fault-tolerant broadcasting and secure message distribution are important issues for numerous applications in networks. It is a common idea to design multiple spanning trees with a specific property in the underlying graph of a network to serve as a broadcasting scheme or a distribution protocol for receiving high levels of fault-tolerance and of security. A set of spanning trees in a graph is said to be edge-disjoint if these trees are rooted at the same node without sharing any common edge. Hsieh and Tu [S.-Y. Hsieh, C.-J. Tu, Constructing edge-disjoint spanning trees in locally twisted cubes, Theoretical Computer Science 410 (2009) 926-932] recently presented an algorithm for constructing n edge-disjoint spanning trees in an n-dimensional locally twisted cube. In this paper, we prove that indeed all spanning trees constructed by their algorithm are independent, i.e., any two spanning trees are rooted at the same node, say r, and for any other node v≠r, the two different paths from v to r, one path in each tree, are internally node-disjoint. 相似文献
69.
Wen-Chung Kao Author Vitae Ming-Chai Hsu Author VitaeAuthor Vitae 《Pattern recognition》2010,43(5):1736-1747
Recognizing human faces in various lighting conditions is quite a difficult problem. The problem becomes more difficult when face images are taken in extremely high dynamic range scenes. Most of the automatic face recognition systems assume that images are taken under well-controlled illumination. The face segmentation as well as recognition becomes much simpler under such a constrained condition. However, illumination control is not feasible when a surveillance system is installed in any location at will. Without compensating for uneven illumination, it is impossible to get a satisfactory recognition rate. In this paper, we propose an integrated system that first compensates uneven illumination through local contrast enhancement. Then the enhanced images are fed into a robust face recognition system which adaptively selects the most important features among all candidate features and performs classification by support vector machines (SVMs). The dimension of feature space as well as the selected types of features is customized for each hyperplane. Three face image databases, namely Yale, Yale Group B, and Extended Yale Group B, are used to evaluate performance. The experimental result shows that the proposed recognition system give superior results compared to recently published literatures. 相似文献
70.
A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting 总被引:1,自引:0,他引:1
Digital Rights Management (DRM) of videos is an important issue nowadays. Considering that H.264/AVC videos will be widely used in various applications, we propose a practical design, which combines the methodologies of selective encryption and fingerprinting, for effective DRM of H.264/AVC streaming videos. A selective encryption scheme is first presented to scramble the video content by encrypting a small amount of data in the compressed bit-stream. The scrambled video is H.264-compliant to reduce the complexity of decoder since it can still be played without triggering errors in the decoding process. A fingerprinting scheme is then introduced to provide further protection. We extract a reasonable amount of data from the video and embed the watermark acting as the fingerprint of the video recipient. To acquire the high-quality video for viewing, the user has to decrypt the video obtained from a video server and then combine it with the watermarked data provided from a user information server. The resulting viewable video is thus fingerprinted to deter the user from illegally redistributing the content. Experimental results will demonstrate the feasibility of the proposed approach. 相似文献