全文获取类型
收费全文 | 24080篇 |
免费 | 1582篇 |
国内免费 | 44篇 |
专业分类
电工技术 | 177篇 |
综合类 | 115篇 |
化学工业 | 6743篇 |
金属工艺 | 529篇 |
机械仪表 | 473篇 |
建筑科学 | 834篇 |
矿业工程 | 64篇 |
能源动力 | 826篇 |
轻工业 | 4931篇 |
水利工程 | 187篇 |
石油天然气 | 193篇 |
武器工业 | 1篇 |
无线电 | 1243篇 |
一般工业技术 | 3862篇 |
冶金工业 | 2057篇 |
原子能技术 | 133篇 |
自动化技术 | 3338篇 |
出版年
2024年 | 65篇 |
2023年 | 231篇 |
2022年 | 784篇 |
2021年 | 1031篇 |
2020年 | 659篇 |
2019年 | 712篇 |
2018年 | 933篇 |
2017年 | 966篇 |
2016年 | 1077篇 |
2015年 | 765篇 |
2014年 | 1115篇 |
2013年 | 2030篇 |
2012年 | 1529篇 |
2011年 | 1764篇 |
2010年 | 1330篇 |
2009年 | 1263篇 |
2008年 | 1143篇 |
2007年 | 1015篇 |
2006年 | 770篇 |
2005年 | 642篇 |
2004年 | 577篇 |
2003年 | 577篇 |
2002年 | 487篇 |
2001年 | 322篇 |
2000年 | 284篇 |
1999年 | 281篇 |
1998年 | 790篇 |
1997年 | 528篇 |
1996年 | 390篇 |
1995年 | 244篇 |
1994年 | 204篇 |
1993年 | 163篇 |
1992年 | 94篇 |
1991年 | 68篇 |
1990年 | 52篇 |
1989年 | 67篇 |
1988年 | 67篇 |
1987年 | 55篇 |
1986年 | 38篇 |
1985年 | 72篇 |
1984年 | 47篇 |
1983年 | 39篇 |
1982年 | 47篇 |
1981年 | 39篇 |
1980年 | 49篇 |
1979年 | 36篇 |
1978年 | 30篇 |
1977年 | 38篇 |
1976年 | 59篇 |
1973年 | 23篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
The influence of several sinter-HIP variables on the densification behaviour of silicon nitride-based ceramics has been investigated. The processing conditions were studied for Si3N4 powder mixtures containing controlled amounts of Y2O3+Al2O3 or Y2O3+MgO. The specimens were subjected to sinter-HIP cycles under argon or nitrogen atmospheres at various temperatures and pressures. The final density of the powder compacts exhibited a strong dependence not only on the applied pressure, the composition and the processing temperature, but also on the pressurization rate and the initial pressurization time. The microstructural changes induced by the application of high pressure were followed by transmission electron microscopy. On examination by TEM, large concentrations of dislocations, generated inside some-Si3N4 grains, were observed. Characterization of these dislocations showed thatb=0001 is their most frequently found Burgers vector. Also, two relaxation mechanisms, tending to release the stored energy of deformation in the-Si3N4 grains, namely grain penetration (a form of strain-induced boundary migration) and grain fragmentation (the formation of subgrains due to rearrangement of dislocations into low energy configurations), have been identified. The intergranular phases formed were characterized by energy dispersive X-ray spectroscopic analysis, X-ray diffraction and electron diffraction. The influence of different sinter-HIP cycles on the transformation of silicon nitride without additives was also investigated by X-ray diffractometry. 相似文献
92.
Rodríguez-de-Vera Jesús M. González-Carrillo Josefa García José M. Bernabé Gregorio 《The Journal of supercomputing》2021,77(9):10138-10151
The Journal of Supercomputing - Left ventricular non-compaction (LVNC) is a rare cardiomyopathy characterized by abnormal trabeculations in the left ventricle cavity. Although traditional computer... 相似文献
93.
The Journal of Supercomputing - DNA methylation analysis has become an important topic in the study of human health. DNA methylation analysis requires not only a specific treatment of DNA samples... 相似文献
94.
Messing Karen Lefrançois Mélanie Saint-Charles Johanne 《Computer Supported Cooperative Work (CSCW)》2021,30(2):215-249
Computer Supported Cooperative Work (CSCW) - Work activity ergonomics (sometimes called francophone ergonomics) draws heavily on observation in order to support transformation of work to arrive at... 相似文献
95.
Moutafis Panagiotis García-García Francisco Mavrommatis George Vassilakopoulos Michael Corral Antonio Iribarne Luis 《Distributed and Parallel Databases》2021,39(3):733-784
Distributed and Parallel Databases - Given two datasets of points (called Query and Training), the Group (K) Nearest-Neighbor (GKNN) query retrieves (K) points of the Training with the smallest sum... 相似文献
96.
Giovannetti Antonio Susi Gianluca Casti Paola Mencattini Arianna Pusil Sandra López María Eugenia Di Natale Corrado Martinelli Eugenio 《Neural computing & applications》2021,33(21):14651-14667
Neural Computing and Applications - In this paper, we present the novel Deep-MEG approach in which image-based representations of magnetoencephalography (MEG) data are combined with ensemble... 相似文献
97.
Software Quality Journal - Energy consumption of software has been becoming increasingly significant, since it can vary according to how the software has been developed. In recent years, developers... 相似文献
98.
Conventional constant false alarm rate (CFAR) methods use a fixed number of cells to estimate the background variance. For homogeneous environments, it is desirable to increase the number of cells, at the cost of increased computation and memory requirements, in order to improve the estimation performance. For nonhomogeneous environments, it is desirable to use less number of cells in order to reduce the number of false alarms around the clutter edges. In this work, we present a solution with two exponential smoothers (first order IIR filters) having different time-constants to leverage the conflicting requirements of homogeneous and nonhomogeneous environments. The system is designed to use the filter having the large time-constant in homogeneous environments and to promptly switch to the filter having the small time constant once a clutter edge is encountered. The main advantages of proposed Switching IIR CFAR method are computational simplicity, small memory requirement (in comparison to windowing based methods) and its good performance in homogeneous environments (due to the large time-constant smoother) and rapid adaptation to clutter edges (due to the small time-constant smoother). 相似文献
99.
?erif Bahtiyar Mehmet Ufuk Ça?layan 《Journal of Network and Computer Applications》2012,35(1):480-490
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments. 相似文献
100.
Face recognition with lattice independent component analysis and extreme learning machines 总被引:1,自引:0,他引:1
Ion Marques Manuel Gra?a 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(9):1525-1537
We focus on two aspects of the face recognition, feature extraction and classification. We propose a two component system, introducing Lattice Independent Component Analysis (LICA) for feature extraction and Extreme Learning Machines (ELM) for classification. In previous works we have proposed LICA for a variety of image processing tasks. The first step of LICA is to identify strong lattice independent components from the data. In the second step, the set of strong lattice independent vector are used for linear unmixing of the data, obtaining a vector of abundance coefficients. The resulting abundance values are used as features for classification, specifically for face recognition. Extreme Learning Machines are accurate and fast-learning innovative classification methods based on the random generation of the input-to-hidden-units weights followed by the resolution of the linear equations to obtain the hidden-to-output weights. The LICA-ELM system has been tested against state-of-the-art feature extraction methods and classifiers, outperforming them when performing cross-validation on four large unbalanced face databases. 相似文献