全文获取类型
收费全文 | 20995篇 |
免费 | 1607篇 |
国内免费 | 892篇 |
专业分类
电工技术 | 1109篇 |
综合类 | 1369篇 |
化学工业 | 3637篇 |
金属工艺 | 1428篇 |
机械仪表 | 1170篇 |
建筑科学 | 1549篇 |
矿业工程 | 778篇 |
能源动力 | 493篇 |
轻工业 | 1347篇 |
水利工程 | 365篇 |
石油天然气 | 1526篇 |
武器工业 | 202篇 |
无线电 | 2178篇 |
一般工业技术 | 2747篇 |
冶金工业 | 1154篇 |
原子能技术 | 188篇 |
自动化技术 | 2254篇 |
出版年
2024年 | 107篇 |
2023年 | 362篇 |
2022年 | 656篇 |
2021年 | 913篇 |
2020年 | 714篇 |
2019年 | 591篇 |
2018年 | 612篇 |
2017年 | 716篇 |
2016年 | 609篇 |
2015年 | 874篇 |
2014年 | 1077篇 |
2013年 | 1188篇 |
2012年 | 1285篇 |
2011年 | 1479篇 |
2010年 | 1257篇 |
2009年 | 1209篇 |
2008年 | 1079篇 |
2007年 | 1185篇 |
2006年 | 1136篇 |
2005年 | 980篇 |
2004年 | 610篇 |
2003年 | 541篇 |
2002年 | 546篇 |
2001年 | 459篇 |
2000年 | 468篇 |
1999年 | 541篇 |
1998年 | 410篇 |
1997年 | 367篇 |
1996年 | 319篇 |
1995年 | 292篇 |
1994年 | 252篇 |
1993年 | 171篇 |
1992年 | 131篇 |
1991年 | 82篇 |
1990年 | 64篇 |
1989年 | 50篇 |
1988年 | 55篇 |
1987年 | 32篇 |
1986年 | 21篇 |
1985年 | 11篇 |
1984年 | 12篇 |
1983年 | 13篇 |
1982年 | 10篇 |
1981年 | 5篇 |
1980年 | 1篇 |
1959年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 25 毫秒
71.
水平集算法是当前比较重要的分割算法,研究该算法的三维分割技术.提出高斯分布和瑞利分布相结合的方法进行概率密度函数的确定与分析,通过随机极大似然算法(SEM)把瑞利分布引入到水平集三维分割演化模型中.该方法成功应用于多种医学组织的三维分割,提高了分割速度和分割效果,减少了参数的设置. 相似文献
72.
实现全面资源共享、充分提高资源利用率是教育资源网格的主要研究目标,为了实现该目标,设计了ERGM(educa-tion resource grid monitor)监控模型,它具有采集的信息全面、良好的可扩展性和容错性等优点.通过它可以及时采集资源的状态信息为资源调度系统提供依据,使资源的利用更加合理,很好地满足了教育资源网格监控的需求. 相似文献
73.
变分问题是一个研究泛函极值的经典数学问题,寻求变分问题的直接解法具有重要的理论和现实意义.鉴于PSO算法在极值问题中的广泛应用,利用分段Hermite插值.建立了求解含一阶导数的变分问题优化模型,构造出了适应度函数,从而使得PSO算法成功应用到变分问题的求解当中.数值实验结果表明了方法的可行性,同时也拓展了PSO算法的应用领域. 相似文献
74.
75.
入侵检测系统(IDS)是对防火墙极其有益的补充。本文介绍了入侵检测系统的概念,分析了入侵检测系统应满足的要求,指出了部署入侵检测系统应考虑的问题,预测了入侵检测系统的发展趋势。 相似文献
76.
77.
介绍某型号合成孔径雷达系统的1553B总线通信接口设计方案与工程实现;方案采用国内自主研发的4M/s速率1553B总线接口芯片,PC/104工控机与FPGA结合,通过硬件系统设计和软件编程,实现对1553B总线数据收发和雷达部分辅助数据的提供,实现项目总体对1553B总线通信接口的要求。实际应用情况表明,该通信接口运行稳定、可靠,具有一定的实用性和良好的应用前景。 相似文献
78.
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks 总被引:2,自引:0,他引:2
He Daojing Cui Lin Huang Hejiao Ma Maode 《Parallel and Distributed Systems, IEEE Transactions on》2009,20(7):1050-1058
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature. 相似文献
79.
Afify M. Cui X. Gao Y. 《IEEE transactions on audio, speech, and language processing》2009,17(7):1325-1334
We present a stochastic mapping technique for robust speech recognition that uses stereo data. The idea is based on constructing a Gaussian mixture model for the joint distribution of the clean and noisy features and using this distribution to predict the clean speech during testing. The proposed mapping is called stereo-based stochastic mapping (SSM). Two different estimators are considered. One is iterative and is based on the maximum a posteriori (MAP) criterion while the other uses the minimum mean square error (MMSE) criterion. The resulting estimators are effectively a mixture of linear transforms weighted by component posteriors, and the parameters of the linear transformations are derived from the joint distribution. Compared to the uncompensated result, the proposed method results in 45% relative improvement in word error rate (WER) for digit recognition in the car. In the same setting, SSM outperforms SPLICE and gives similar results to MMSE compensation of Huang A 66% relative improvement in word error rate (WER) is observed when applied in conjunction with multistyle training (MST) for large vocabulary English speech recognition in a real environment. Also, the combination of the proposed mapping with CMLLR leads to about 38% relative improvement in performance compared to CMLLR alone for real field data. 相似文献
80.
Quanqing Xu Hengtao Shen Zaiben Chen Bin Cui Xiaofang Zhou Yafei Dai 《Frontiers of Computer Science in China》2009,3(3):381-395
The concept of Peer-to-Peer (P2P) has been introduced into mobile networks, which has led to the emergence of mobile P2P networks,
and originated potential applications in many fields. However,mobile P2P networks are subject to the limitations of transmission
range, and highly dynamic and unpredictable network topology, giving rise to many new challenges for efficient information
retrieval. In this paper, we propose an automatic and economical hybrid information retrieval approach based on cooperative
cache. In this method, the region covered by a mobile P2P network is partitioned into subregions, each of which is identified
by a unique ID and known to all peers. All the subregions then constitute a mobile Kademlia (MKad) network. The proposed hybrid
retrieval approach aims to utilize the floodingbased and Distributed Hash Table (DHT)-based schemes in MKad for indexing and
searching according to the designed utility functions. To further facilitate information retrieval, we present an effective
cache update method by considering all relevant factors. At the same time, the combination of two different methods for cache
update is also introduced. One of them is pull based on time stamp including two different pulls: an on-demand pull and a
periodical pull, and the other is a push strategy using update records. Furthermore, we provide detailed mathematical analysis
on the cache hit ratio of our approach. Simulation experiments in NS-2 showed that the proposed approach is more accurate
and efficient than the existing methods. 相似文献