全文获取类型
收费全文 | 177672篇 |
免费 | 18010篇 |
国内免费 | 11740篇 |
专业分类
电工技术 | 13923篇 |
技术理论 | 2篇 |
综合类 | 16092篇 |
化学工业 | 24668篇 |
金属工艺 | 11234篇 |
机械仪表 | 11640篇 |
建筑科学 | 13114篇 |
矿业工程 | 5072篇 |
能源动力 | 4965篇 |
轻工业 | 16968篇 |
水利工程 | 4607篇 |
石油天然气 | 6529篇 |
武器工业 | 2001篇 |
无线电 | 21046篇 |
一般工业技术 | 18551篇 |
冶金工业 | 7740篇 |
原子能技术 | 2768篇 |
自动化技术 | 26502篇 |
出版年
2024年 | 776篇 |
2023年 | 2635篇 |
2022年 | 5845篇 |
2021年 | 7873篇 |
2020年 | 5532篇 |
2019年 | 4114篇 |
2018年 | 4571篇 |
2017年 | 5229篇 |
2016年 | 4672篇 |
2015年 | 6965篇 |
2014年 | 9139篇 |
2013年 | 11463篇 |
2012年 | 13184篇 |
2011年 | 14258篇 |
2010年 | 13175篇 |
2009年 | 12678篇 |
2008年 | 13279篇 |
2007年 | 12702篇 |
2006年 | 11487篇 |
2005年 | 9457篇 |
2004年 | 6620篇 |
2003年 | 4838篇 |
2002年 | 4700篇 |
2001年 | 4253篇 |
2000年 | 3670篇 |
1999年 | 2561篇 |
1998年 | 1989篇 |
1997年 | 1681篇 |
1996年 | 1498篇 |
1995年 | 1248篇 |
1994年 | 965篇 |
1993年 | 825篇 |
1992年 | 659篇 |
1991年 | 508篇 |
1990年 | 434篇 |
1989年 | 353篇 |
1988年 | 286篇 |
1987年 | 206篇 |
1986年 | 171篇 |
1985年 | 153篇 |
1984年 | 114篇 |
1983年 | 84篇 |
1982年 | 76篇 |
1981年 | 76篇 |
1980年 | 77篇 |
1979年 | 49篇 |
1978年 | 35篇 |
1977年 | 32篇 |
1976年 | 56篇 |
1959年 | 29篇 |
排序方式: 共有10000条查询结果,搜索用时 265 毫秒
991.
992.
The PTC-type BaTiO3 ceramics of similar microstructure are obtained by careful control of a sintering scheme. The defect chemistry of them is modified by varying the cooling rate and annealing conditons. In addition to applying Heywang and Jonker models for explaining the resistivity anomaly of these samples, the outward diffusion of oxygen vacancies (VO), which left excess barium vacancies (VBa) behind, is proposed to be the formation mechanism of surface states. The formation of defect complex consisting of a V
O
..
-
Ba
pair is assumed to be the cause of small diffusivity of VO in these materials. The phenomena, in which the slower cooling rate raises the resistivity of samples, is ascribed to the higher concentration of excess barium vacancies (VBa) contained in these samples. However, the maximum potential barrier height (max) of the samples is the same, irrespective of the amount of surface state concentration (N
s) and is estimated to be max = 0.66eV, from the In (max)-1/T
max plot. 相似文献
993.
994.
An improved method for automatically reconstructing a three-dimensional object from serial cross sections is presented. The method improves the dynamic elastic contour interpolation technique. There are two major improvements: (1) in the case of branching that involves concave contours, instead of pairwise interpolation between the start contour and each goal contour, the goal image is considered globally and local constraints are imposed on the forces exerting upon the vertices; and (2) it takes the continuity of high-order derivatives into consideration and incorporates the schemes of spline theory, quadratic-variation-based surface interpolation, and finite-element-based multilevel surface interpolation to create smoother surfaces of the reconstructed object. Based on the output from the preliminary processing, two alternatives, a quadratic-variation-based surface interpolation algorithm and a finite-element-based multilevel surface interpolation algorithm, can be adopted to obtain the final surface representation 相似文献
995.
Guang Sun Jingjing Lin Chen Yang Xiangyang Yin Ziyu Li Peng Guo Junqi Sun Xiaoping Fan Bin Pan 《计算机系统科学与工程》2021,36(3):509-520
Forecasting stock prices using deep learning models suffers from problems such as low accuracy, slow convergence, and complex network structures. This study developed an echo state network (ESN) model to mitigate such problems. We compared our ESN with a long short-term memory (LSTM) network by forecasting the stock data of Kweichow Moutai, a leading enterprise in China’s liquor industry. By analyzing data for 120, 240, and 300 days, we generated forecast data for the next 40, 80, and 100 days, respectively, using both ESN and LSTM. In terms of accuracy, ESN had the unique advantage of capturing nonlinear data. Mean absolute error (MAE) was used to present the accuracy results. The MAEs of the data forecast by ESN were 0.024, 0.024, and 0.025, which were, respectively, 0.065, 0.007, and 0.009 less than those of LSTM. In terms of convergence, ESN has a reservoir state-space structure, which makes it perform faster than other models. Root-mean-square error (RMSE) was used to present the convergence time. In our experiment, the RMSEs of ESN were 0.22, 0.27, and 0.26, which were, respectively, 0.08, 0.01, and 0.12 less than those of LSTM. In terms of network structure, ESN consists only of input, reservoir, and output spaces, making it a much simpler model than the others. The proposed ESN was found to be an effective model that, compared to others, converges faster, forecasts more accurately, and builds time-series analyses more easily. 相似文献
996.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship. 相似文献
997.
Generative adversarial networks (GANs) are paid more attention to dealing with the end-to-end speech enhancement in recent years. Various GAN-based enhancement methods are presented to improve the quality of reconstructed speech. However, the performance of these GAN-based methods is worse than those of masking-based methods. To tackle this problem, we propose speech enhancement method with a residual dense generative adversarial network (RDGAN) contributing to map the log-power spectrum (LPS) of degraded speech to the clean one. In detail, a residual dense block (RDB) architecture is designed to better estimate the LPS of clean speech, which can extract rich local features of LPS through densely connected convolution layers. Meanwhile, sequential RDB connections are incorporated on various scales of LPS. It significantly increases the feature learning flexibility and robustness in the time-frequency domain. Simulations show that the proposed method achieves attractive speech enhancement performance in various acoustic environments. Specifically, in the untrained acoustic test with limited priors, e.g., unmatched signal-to-noise ratio (SNR) and unmatched noise category, RDGAN can still outperform the existing GAN-based methods and masking-based method in the measures of PESQ and other evaluation indexes. It indicates that our method is more generalized in untrained conditions. 相似文献
998.
Bai Qingchun Wei Kai Zhou Jie Xiong Chao Wu Yuanbin Lin Xin He Liang 《The Journal of supercomputing》2021,77(9):9474-9493
The Journal of Supercomputing - Sentiment analysis in Danmaku video interaction aims at measuring public mood in respect of the video, which is helpful for the potential applications in behavioral... 相似文献
999.
Yao Lin Chen Zhenyu Hu Haibo Wu Guowei Wu Bin 《Distributed and Parallel Databases》2021,39(3):785-811
Distributed and Parallel Databases - The widely application of positioning technology has made collecting the movement of people feasible for knowledge-based decision. Data in its original form... 相似文献
1000.
Nouioua Mourad Fournier-Viger Philippe Wu Cheng-Wei Lin Jerry Chun-Wei Gan Wensheng 《Applied Intelligence》2021,51(10):6785-6809
Applied Intelligence - High utility itemset mining is a popular pattern mining task, which aims at revealing all sets of items that yield a high profit in a transaction database. Although this task... 相似文献