全文获取类型
收费全文 | 438637篇 |
免费 | 35246篇 |
国内免费 | 19479篇 |
专业分类
电工技术 | 26165篇 |
技术理论 | 47篇 |
综合类 | 30870篇 |
化学工业 | 71811篇 |
金属工艺 | 25209篇 |
机械仪表 | 27221篇 |
建筑科学 | 33930篇 |
矿业工程 | 13429篇 |
能源动力 | 12095篇 |
轻工业 | 30330篇 |
水利工程 | 8492篇 |
石油天然气 | 26732篇 |
武器工业 | 3425篇 |
无线电 | 49594篇 |
一般工业技术 | 49294篇 |
冶金工业 | 22866篇 |
原子能技术 | 4535篇 |
自动化技术 | 57317篇 |
出版年
2024年 | 1750篇 |
2023年 | 6630篇 |
2022年 | 12056篇 |
2021年 | 16819篇 |
2020年 | 12567篇 |
2019年 | 10236篇 |
2018年 | 11794篇 |
2017年 | 13442篇 |
2016年 | 12223篇 |
2015年 | 16814篇 |
2014年 | 21431篇 |
2013年 | 26084篇 |
2012年 | 28166篇 |
2011年 | 31276篇 |
2010年 | 27512篇 |
2009年 | 26206篇 |
2008年 | 25716篇 |
2007年 | 24581篇 |
2006年 | 24728篇 |
2005年 | 21470篇 |
2004年 | 14639篇 |
2003年 | 13008篇 |
2002年 | 12326篇 |
2001年 | 10895篇 |
2000年 | 10558篇 |
1999年 | 11168篇 |
1998年 | 8902篇 |
1997年 | 7576篇 |
1996年 | 7099篇 |
1995年 | 5874篇 |
1994年 | 4738篇 |
1993年 | 3338篇 |
1992年 | 2639篇 |
1991年 | 2009篇 |
1990年 | 1589篇 |
1989年 | 1274篇 |
1988年 | 1063篇 |
1987年 | 697篇 |
1986年 | 560篇 |
1985年 | 388篇 |
1984年 | 299篇 |
1983年 | 239篇 |
1982年 | 192篇 |
1981年 | 136篇 |
1980年 | 151篇 |
1979年 | 84篇 |
1978年 | 54篇 |
1977年 | 58篇 |
1976年 | 87篇 |
1973年 | 32篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
文章简述了IT运维的发展趋势,举例说明了综合运维软件的功能特点,并阐述了综合运维软件在供水企业中的应用案例及应用效果,由此提出综合运维软件的重要作用。 相似文献
32.
33.
34.
35.
36.
Yingcai Bi Menglu Lan Jiaxin Li Shupeng Lai Ben M. Chen 《Asian journal of control》2019,21(4):1732-1744
Micro Aerial Vehicles (MAVs) have great potentials to be applied for indoor search and rescue missions. In this paper, we propose a modular lightweight design of an autonomous MAV with integrated hardware and software. The MAV is equipped with the 2D laser scanner, camera, mission computer and flight controller, running all the computation onboard in real time. The onboard perception system includes a laser‐based SLAM module and a custom‐designed visual detection module. A dual Kalman filter design provides robust state estimation by multiple sensor fusion. Specifically, the fusion module provides robust altitude measurement in the circumstance of surface changing. In addition, indoor‐outdoor transition is explicitly handled by the fusion module. In order to efficiently navigate through obstacles and adapt to multiple tasks, a task tree‐based mission planning method is seamlessly integrated with path planning and control modules. The MAV is capable of searching and rescuing victims from unknown indoor environments effectively. It was validated by our award‐winning performance at the 2017 International Micro Air Vehicle Competition (IMAV 2017), held in Toulouse, France. The performance video is available on https://youtu.be/8H19ppS_VXM . 相似文献
37.
Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find a ppropriate d ata t o m odeling. F irst o f all, we use concept drift to make the partition of the life cycle of process object. Then, entity community detection is proposed to find changes. Finally, we propose stream-based real-time optimization of data sampling. Contributions of this paper are concept drift, community detection, and stream-based real-time computing. Experiments show the effectiveness and feasibility of our proposed adaptive data sampling mechanism for process object. 相似文献
38.
Wang Li Gong Hua-Jun Liu Chun-Sheng 《International Journal of Control, Automation and Systems》2019,17(3):617-629
International Journal of Control, Automation and Systems - In this paper, a composite fault-tolerant control problem is studied for a class of uncertain nonlinear system with asymmetric input... 相似文献
39.
40.
Neural Computing and Applications - Traffic identification is currently an important challenge for network management and security. In this paper, we propose a novel application identification... 相似文献