全文获取类型
收费全文 | 909250篇 |
免费 | 11158篇 |
国内免费 | 2108篇 |
专业分类
电工技术 | 16553篇 |
综合类 | 807篇 |
化学工业 | 139173篇 |
金属工艺 | 35289篇 |
机械仪表 | 27532篇 |
建筑科学 | 21570篇 |
矿业工程 | 5557篇 |
能源动力 | 23701篇 |
轻工业 | 75983篇 |
水利工程 | 10117篇 |
石油天然气 | 19114篇 |
武器工业 | 64篇 |
无线电 | 99565篇 |
一般工业技术 | 178865篇 |
冶金工业 | 171339篇 |
原子能技术 | 20007篇 |
自动化技术 | 77280篇 |
出版年
2021年 | 8345篇 |
2020年 | 6146篇 |
2019年 | 7873篇 |
2018年 | 13441篇 |
2017年 | 13476篇 |
2016年 | 14191篇 |
2015年 | 9374篇 |
2014年 | 15604篇 |
2013年 | 41498篇 |
2012年 | 24388篇 |
2011年 | 33423篇 |
2010年 | 26652篇 |
2009年 | 29744篇 |
2008年 | 30381篇 |
2007年 | 29987篇 |
2006年 | 26047篇 |
2005年 | 23764篇 |
2004年 | 22734篇 |
2003年 | 22391篇 |
2002年 | 21455篇 |
2001年 | 21138篇 |
2000年 | 19970篇 |
1999年 | 20561篇 |
1998年 | 51133篇 |
1997年 | 36432篇 |
1996年 | 28141篇 |
1995年 | 21283篇 |
1994年 | 18854篇 |
1993年 | 18475篇 |
1992年 | 13705篇 |
1991年 | 12985篇 |
1990年 | 12865篇 |
1989年 | 12454篇 |
1988年 | 11824篇 |
1987年 | 10628篇 |
1986年 | 10379篇 |
1985年 | 11682篇 |
1984年 | 10677篇 |
1983年 | 9909篇 |
1982年 | 9136篇 |
1981年 | 9274篇 |
1980年 | 8839篇 |
1979年 | 8781篇 |
1978年 | 8587篇 |
1977年 | 9908篇 |
1976年 | 12841篇 |
1975年 | 7582篇 |
1974年 | 7214篇 |
1973年 | 7369篇 |
1972年 | 6170篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
911.
Performance of Storage Tanks in Oil Facilities Damaged by Hurricanes Katrina and Rita 总被引:1,自引:0,他引:1
Luis A. Godoy 《Canadian Metallurgical Quarterly》2007,21(6):441-449
912.
913.
914.
J. L. Díez J. L. Navarro A. Sala 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2007,11(10):973-983
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in
order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably
close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model
accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in
literature. Some examples illustrate the proposed approach. 相似文献
915.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases
the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct
system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2)
to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which
is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs,
the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control
is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated
six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing. 相似文献
916.
Georgios D. Styliaras Georgios K. Tsolis Chris M. Papaterpos 《International Journal on Digital Libraries》2007,8(1):61-78
In this paper, AssetCollector is presented, which is a system for managing collections of cultural assets. AssetCollector
covers the needs of collection curators towards defining, populating and searching a collection in a flexible way, while supporting
them in generating reports based on the collection’s assets and reusing them in order to build web sites and CD-ROMs. In order
to support the above functionality, the system provides the content structuring subsystem, the content input subsystem, the
search subsystem and the report subsystem. The use of the subsystems is straightforward and requires no technical skills from
the curators. AssetCollector has been successfully applied for organizing various collections of cultural assets in Greece,
such as archaeological sites, museums and published books. In the future, an evaluation procedure is planned in order to further
refine the use of the system according to the targeted users’ needs. Furthermore, more import and export facilities will be
provided, which will make the system compliant with widely accepted standards. 相似文献
917.
918.
Bonto-Kane Maria Vicente A. Chin Alvin Mc Carthy Sheila Srikulwong Mayuree Timmins Paul J. 《Pervasive Computing, IEEE》2007,6(4)
Pervasive computing is as much about the user as it is about the technology. So, the Fifth International Conference on Pervasive Computing emphasized desirability rather than just feasibility. Featured themes included user benefits, human-computer interaction, group and social interactions, context awareness, finding and positioning people and objects, and personal privacy. 相似文献
919.
Unicode is rapidly becoming the preferred means for representing symbols used in creating multimedia content, especially for information that's presented in multiple languages. This article discusses a unicode vulnerability that makes such content susceptible to being used for creation of covert channel communications. We also developed a solution architecture, the unified secure message augmentation (USMA) service. The USMA service incorporates rules (in an XML vocabulary) that we can apply to unicode transmissions that will detect an attempt to transmit a potential exploit, alert network managers to the presence of the unicode anomaly, and take action to mitigate the exploit. 相似文献
920.
Packing two-dimensional shapes on a surface such that no shapes overlap and the uncovered surface area is minimized is an important problem that arises in a variety of industrial applications. This paper introduces an intelligent system which tackles the most difficult instance of this problem, where two-dimensional irregular shapes have to be packed on a regularly or irregularly shaped surface. The proposed system utilizes techniques not previously applied to packing, drawn from computer vision and artificial intelligence, and achieves high-quality solutions with short computational times. In addition, the system deals with complex shapes and constraints that occur in industrial applications, such as defective regions and irregularly shaped sheets. We evaluate the effectiveness and efficiency of the proposed method using 14 established benchmark problems that are available from the EURO Special Interest Group on Cutting and Packing. 相似文献