全文获取类型
收费全文 | 49350篇 |
免费 | 3947篇 |
国内免费 | 2028篇 |
专业分类
电工技术 | 2603篇 |
技术理论 | 8篇 |
综合类 | 3044篇 |
化学工业 | 8653篇 |
金属工艺 | 2727篇 |
机械仪表 | 3232篇 |
建筑科学 | 3724篇 |
矿业工程 | 1715篇 |
能源动力 | 1432篇 |
轻工业 | 2771篇 |
水利工程 | 786篇 |
石油天然气 | 3864篇 |
武器工业 | 446篇 |
无线电 | 5332篇 |
一般工业技术 | 5930篇 |
冶金工业 | 2491篇 |
原子能技术 | 493篇 |
自动化技术 | 6074篇 |
出版年
2024年 | 245篇 |
2023年 | 916篇 |
2022年 | 1497篇 |
2021年 | 2029篇 |
2020年 | 1578篇 |
2019年 | 1331篇 |
2018年 | 1499篇 |
2017年 | 1651篇 |
2016年 | 1461篇 |
2015年 | 1945篇 |
2014年 | 2378篇 |
2013年 | 2903篇 |
2012年 | 2939篇 |
2011年 | 3320篇 |
2010年 | 2781篇 |
2009年 | 2687篇 |
2008年 | 2772篇 |
2007年 | 2523篇 |
2006年 | 2603篇 |
2005年 | 2292篇 |
2004年 | 1439篇 |
2003年 | 1351篇 |
2002年 | 1224篇 |
2001年 | 1098篇 |
2000年 | 1212篇 |
1999年 | 1426篇 |
1998年 | 1128篇 |
1997年 | 947篇 |
1996年 | 848篇 |
1995年 | 766篇 |
1994年 | 634篇 |
1993年 | 471篇 |
1992年 | 360篇 |
1991年 | 263篇 |
1990年 | 220篇 |
1989年 | 152篇 |
1988年 | 136篇 |
1987年 | 87篇 |
1986年 | 63篇 |
1985年 | 35篇 |
1984年 | 29篇 |
1983年 | 31篇 |
1982年 | 24篇 |
1981年 | 15篇 |
1980年 | 11篇 |
1979年 | 4篇 |
1978年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
文章介绍了系统级故障诊断软件仿真系统的设计与实现,着重讨论了系统的功能设计、测试图生成、诊断算法,并给出了一个诊断实例。 相似文献
992.
舵机控制系统是飞行控制系统和舵机之间的接口,是超小型无人机系统中一个重要的单元;对舵机控制系统在信号隔离、多路PWM信号采集、多路PWM输出、控制模式切换以及通讯等方面存在的技术问题进行了研究,提出了采用数字隔离器进行信号隔离、PCA采集多路PWM信号、一路定时器输出多路PWM信号、软硬件冗余的控制模式切换电路以及SPI高速数据通讯等方法,设计了基于C8051F121单片机的高可靠性、高冗余性的舵机控制系统;经过多次试飞,证明了其实用性. 相似文献
993.
994.
项目管理技术在行业制造过程管理中的应用研究 总被引:8,自引:0,他引:8
适应行业制造管理的需求,提出了将项目管理技术应用到面向行业的产品制造过程管理中的模式。重点讨论了项目管理技术与行业制造过程管理结合的必然性、可行性和利用项目管理技术对产品制造过程进行管理的内容与手段。 相似文献
995.
Lu Chen Yuxiang Guo Congcong Ge Baihua Zheng Yunjun Gao 《International Journal of Software and Informatics》2023,13(1):27-55
With the emergence and accumulation of massive data, data governance has become an important manner to improve data quality and maximize data value. Specifically, data error detection is a crucial step to improve data quality, which has attracted wide attention from both industry and academia. At present, various detection methods tailored for a single data source have been proposed. However, in many real-world scenarios, data are not centrally stored or managed. Data from different sources but highly correlated can be employed to improve the accuracy of error detection.
Unfortunately, due to privacy/security issues, cross-source data are often not allowed to be integrated centrally. To this end, this paper proposes FeLeDetect, a cross-source data error detection method based on federated learning, so as to improve the error detection accuracy by using cross-source data information on the premise of data privacy. First, a Graph-based Error Detection Model, namely GEDM, is presented to capture sufficient data features from each data source. On this basis, the paper then designs a federated co-training algorithm, namely FCTA, to collaboratively train GEDM by using different cross-source data without privacy leakage of data. Furthermore, the paper designs a series of optimization methods to reduce communication costs during federated learning and manual labeling efforts. Finally, extensive experiments on three real-world datasets demonstrate that (1) GEDM achieves an average improvement of 10.3% and 25.2% in terms of the $F1$ score in the local and centralized scenarios, respectively, outperforming all the five existing state-of-the-art methods for error detection; (2) the F1 score of the error detection by FeLeDetect is 23.2% on average higher than that by GEDM in the local scenario. 相似文献
996.
X. Z. Gao S. J. Ovaska 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2001,5(4):287-296
In this paper, we give a comparison between the conventional power control scheme and soft computing-based approaches in
a mobile communications application. At the base station, the `bang–bang' control strategy and a neural network-based prediction
control method are employed. In addition, full power command transmission mode, single-bit command transmission mode, and
fuzzy logic-based power command enhancement unit are considered. Based on simulation experiments, we quantitatively evaluate
the performance of various combinations of these control methods and command transmission modes. Conclusions on the optimal
configuration are finally drawn. 相似文献
997.
In this paper, we present a QKA protocol with the block transmission of EPR pairs. There are several advantages in this protocol. First, this protocol can guarantee both the fairness and security of the shared key. Second, this protocol has a high qubit efficiency since there is no need to consume any quantum state except the ones used for establishing the shared key and detecting eavesdropping. In addition, this protocol uses EPR pairs as the quantum information carriers and further utilizes single-particle measurements as the main operations. Therefore, it is more feasible than the protocols that need to perform Bell measurements. Especially, we also introduce a method for sharing EPR pairs between two participants over collective-dephasing channel and collective-rotation channel, respectively. This method is meaningful since sharing EPR pairs between two participants is an important work in many quantum cryptographic protocols, especially in the protocols over non-ideal channels. By utilizing this method, the QKA protocols, which are based on EPR pairs, can be immune to these kinds of collective noise. 相似文献
998.
基于软件配置模型的构件化领域框架研究 总被引:1,自引:0,他引:1
以软件复用研究为背景,对面向软件定制的构件化领域框架进行了研究,提出了一种基于软件配置模型的构件化领域框架,并着重分析了利用框架进行软件定制的配置机制以及框架运行原理,最后以灾害快速反应系统为例,对模型和框架进行了实现. 相似文献
999.
MPEG-2传输流解复用器的设计与实现 总被引:1,自引:0,他引:1
论文介绍了MPEG-2传输流解复用的原理,提出了一种基于ARM处理器的以软件为主,硬件为辅的解复用器的实现方案。其中主要设计包括系统时钟恢复,PID过滤,TS流中节目关联表和节目映射表解码算法。 相似文献
1000.