全文获取类型
收费全文 | 50752篇 |
免费 | 5991篇 |
国内免费 | 3885篇 |
专业分类
电工技术 | 4532篇 |
技术理论 | 2篇 |
综合类 | 5009篇 |
化学工业 | 6778篇 |
金属工艺 | 3309篇 |
机械仪表 | 3532篇 |
建筑科学 | 3952篇 |
矿业工程 | 1906篇 |
能源动力 | 1587篇 |
轻工业 | 5160篇 |
水利工程 | 1539篇 |
石油天然气 | 1858篇 |
武器工业 | 645篇 |
无线电 | 5758篇 |
一般工业技术 | 5018篇 |
冶金工业 | 1705篇 |
原子能技术 | 836篇 |
自动化技术 | 7502篇 |
出版年
2024年 | 294篇 |
2023年 | 911篇 |
2022年 | 1956篇 |
2021年 | 2615篇 |
2020年 | 1835篇 |
2019年 | 1456篇 |
2018年 | 1589篇 |
2017年 | 1773篇 |
2016年 | 1499篇 |
2015年 | 2363篇 |
2014年 | 2806篇 |
2013年 | 3266篇 |
2012年 | 4066篇 |
2011年 | 4080篇 |
2010年 | 3857篇 |
2009年 | 3636篇 |
2008年 | 3649篇 |
2007年 | 3633篇 |
2006年 | 3151篇 |
2005年 | 2599篇 |
2004年 | 1997篇 |
2003年 | 1515篇 |
2002年 | 1663篇 |
2001年 | 1553篇 |
2000年 | 1053篇 |
1999年 | 544篇 |
1998年 | 223篇 |
1997年 | 181篇 |
1996年 | 181篇 |
1995年 | 118篇 |
1994年 | 87篇 |
1993年 | 105篇 |
1992年 | 84篇 |
1991年 | 57篇 |
1990年 | 38篇 |
1989年 | 44篇 |
1988年 | 25篇 |
1987年 | 17篇 |
1986年 | 24篇 |
1985年 | 12篇 |
1984年 | 8篇 |
1983年 | 9篇 |
1982年 | 5篇 |
1981年 | 15篇 |
1980年 | 8篇 |
1979年 | 11篇 |
1959年 | 8篇 |
1951年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
42.
提出了一种基于计算机辅助制造的数控加工代码自动生成的方法,着重阐述了该方法针对椭圆弧的数控代码自动生成过程。该方法通过分析加工图形的dxf文件,提取图形的坐标信息,再经过数据拟和,自动生成该图形的数控代码。该方法由VC++6.0实现相应的功能,经实际运行表明,能满足加工精度要求。该方法摆脱了传统数控机床从加工图形到形成数控加工代码时间长且精度不高的缺点,极大她提高了工作效率。 相似文献
43.
Kangshun Li Yunshan Wei Zhen Yang Wenhua Wei 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(3):885-893
With the development of modern image processing techniques, the numbers of images increase at a high speed in network. As a new form of visual communication, image is widely used in network transmission. However, the image information would be lost after transmission. In view of this, we are motivated to restore the image to make it complete in an effective and efficient way in order to save the network bandwidth. At present, there are two main methods for digital image restoration, texture-based method and non-textured-based method. In the texture-based method, Criminisi algorithm is a widely used algorithm. However, the inaccurate completion order and the inefficiency in searching matching patches are two main limitations of Criminisi algorithm. To overcome these shortcomings, in this paper, an exemplar image completion based on evolutionary algorithm is proposed. In the non-textured-based method, total variation method is a typical algorithm. An improved total variation algorithm is proposed in this paper. In the improved algorithm, the diffusion coefficients are defined according to the distance and direction between the damaged pixel and its neighborhood pixel. Experimental results show that the proposed algorithms have better general performance in image completion. And these two new algorithms could improve the experience of network surfing and reduce the network communication cost. 相似文献
44.
45.
施工索道能够很好地解决高陡边坡施工材料及机械设备运输的难题。立洲水电站大坝工程根据实际地形,灵活架设了施工索道。介绍了该工程施工索道在不同地形条件下的布置和锚固端形式,例举了部分施工索道的设计参数。施工索道在立洲水电站大坝工程中的应用,可为今后复杂条件下的同类工程提供参考和借鉴。 相似文献
46.
承包商在工作中与业主、咨询工程师的沟通和交流比较困难,是国际工程合同管理中普遍存在的问题。原因主要有:语言隔阂和障碍;双方的工作思维方式和知识结构存在很大差异;承包商固执的惯性思维和工作习惯。解决这个问题,改善和消除承包商和业主、咨询机构的沟通困难,对承包商的合同管理工作是至关重要的,主要的经验和基本原则是:承包商在合同管理工作中应尽量摒弃以往的习惯性思维和经验,牢牢把握灵活、变通的工作思维原则。通过一些案例分析,具体说明如何针对具体情况在合同管理中应用灵活变通的思维原则解决问题。 相似文献
47.
Cui‐Zhen Yao 《Asian journal of control》2013,15(5):1531-1537
This article considers stabilization of a one‐dimensional Schrödinger equation with variable coefficient and boundary observation which suffers from an arbitrary given time delay. We design an observer and predictor to stabilize the system. The state is estimated in the time span where the observation is available, and also predicted in the time interval where the observation is not available. It is shown that the estimated state feedback stabilizes the system exponentially. A numerical simulation is presented to illustrate the effect of the stabilizing controller. 相似文献
48.
现行的多数网络教学系统在学生按需学习和"因材施教"上存在局限性,本文用PSO和K均值的混合分类算法对传统的网络教学系统进行改进,根据获取的用户基本信息和兴趣特征进行聚类,充分体现"以学习者为中心"个性化教学模式。实验结果表明,该算法具有较好的全局收敛性,寻优能力明显提升。 相似文献
49.
Zhen He X. Sean Wang Byung Suk Lee Alan C. H. Ling 《Knowledge and Information Systems》2008,15(1):31-54
Recently, periodic pattern mining from time series data has been studied extensively. However, an interesting type of periodic
pattern, called partial periodic (PP) correlation in this paper, has not been investigated. An example of PP correlation is
that power consumption is high either on Monday or Tuesday but not on both days. In general, a PP correlation is a set of
offsets within a particular period such that the data at these offsets are correlated with a certain user-desired strength.
In the above example, the period is a week (7 days), and each day of the week is an offset of the period. PP correlations
can provide insightful knowledge about the time series and can be used for predicting future values. This paper introduces
an algorithm to mine time series for PP correlations based on the principal component analysis (PCA) method. Specifically,
given a period, the algorithm maps the time series data to data points in a multidimensional space, where the dimensions correspond
to the offsets within the period. A PP correlation is then equivalent to correlation of data when projected to a subset of
the dimensions. The algorithm discovers, with one sequential scan of data, all those PP correlations (called minimum PP correlations)
that are not unions of some other PP correlations. Experiments using both real and synthetic data sets show that the PCA-based
algorithm is highly efficient and effective in finding the minimum PP correlations.
Zhen He is a lecturer in the Department of Computer Science at La Trobe University. His main research areas are database systems
optimization, time series mining, wireless sensor networks, and XML information retrieval. Prior to joining La Trobe University,
he worked as a postdoctoral research associate in the University of Vermont. He holds Bachelors, Honors and Ph.D degrees in
Computer Science from the Australian National University.
X. Sean Wang received his Ph.D degree in Computer Science from the University of Southern California in 1992. He is currently the Dorothean
Chair Professor in Computer Science at the University of Vermont. He has published widely in the general area of databases
and information security, and was a recipient of the US National Science Foundation Research Initiation and CAREER awards.
His research interests include database systems, information security, data mining, and sensor data processing.
Byung Suk Lee is associate professor of Computer Science at the University of Vermont. His main research areas are database systems, data
modeling, and information retrieval. He held positions in industry and academia: Gold Star Electric, Bell Communications Research,
Datacom Global Communications, University of St. Thomas, and currently University of Vermont. He was also a visiting professor
at Dartmouth College and a participating guest at Lawrence Livermore National Laboratory. He served on international conferences
as a program committee member, a publicity chair, and a special session organizer, and also on US federal funding proposal
review panel. He holds a BS degree from Seoul National University, MS from Korea Advanced Institute of Science and Technology,
and Ph.D from Stanford University.
Alan C. H. Ling is an assistant professor at Department of Computer Science in University of Vermont. His research interests include combinatorial
design theory, coding theory, sequence designs, and applications of design theory. 相似文献
50.
李振 《数字社区&智能家居》2009,(16)
该文提出和实现了一种基于网络异常流量特征的检测模型。通过将多条链路或多个流的流量信号作为一个整体进行研究,构建了网络异常流量监控的系统模型。该模型包括了数据采集、分析、异常判断和警告等功能,并综合了异常信息融合及警告信息关联性分析技术。通过实验证明,该套系统模型对短时间段内的突发流量能提供有效的检测和报警服务。 相似文献