全文获取类型
收费全文 | 30194篇 |
免费 | 2642篇 |
国内免费 | 953篇 |
专业分类
电工技术 | 1261篇 |
综合类 | 1608篇 |
化学工业 | 6375篇 |
金属工艺 | 1148篇 |
机械仪表 | 1252篇 |
建筑科学 | 1680篇 |
矿业工程 | 450篇 |
能源动力 | 844篇 |
轻工业 | 4557篇 |
水利工程 | 563篇 |
石油天然气 | 759篇 |
武器工业 | 136篇 |
无线电 | 2537篇 |
一般工业技术 | 3671篇 |
冶金工业 | 1351篇 |
原子能技术 | 257篇 |
自动化技术 | 5340篇 |
出版年
2024年 | 123篇 |
2023年 | 416篇 |
2022年 | 1107篇 |
2021年 | 1328篇 |
2020年 | 1020篇 |
2019年 | 906篇 |
2018年 | 1007篇 |
2017年 | 1101篇 |
2016年 | 1031篇 |
2015年 | 1340篇 |
2014年 | 1772篇 |
2013年 | 2328篇 |
2012年 | 2461篇 |
2011年 | 2707篇 |
2010年 | 2211篇 |
2009年 | 2163篇 |
2008年 | 1975篇 |
2007年 | 1862篇 |
2006年 | 1488篇 |
2005年 | 1109篇 |
2004年 | 757篇 |
2003年 | 613篇 |
2002年 | 507篇 |
2001年 | 350篇 |
2000年 | 290篇 |
1999年 | 236篇 |
1998年 | 278篇 |
1997年 | 210篇 |
1996年 | 169篇 |
1995年 | 128篇 |
1994年 | 98篇 |
1993年 | 91篇 |
1992年 | 66篇 |
1991年 | 51篇 |
1990年 | 47篇 |
1989年 | 50篇 |
1988年 | 35篇 |
1987年 | 37篇 |
1986年 | 33篇 |
1985年 | 34篇 |
1984年 | 21篇 |
1983年 | 20篇 |
1982年 | 24篇 |
1981年 | 27篇 |
1980年 | 19篇 |
1979年 | 19篇 |
1978年 | 25篇 |
1977年 | 15篇 |
1976年 | 25篇 |
1973年 | 12篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
Correa CD Crnovrsanin T Ma KL 《IEEE transactions on visualization and computer graphics》2012,18(1):106-120
In this paper, we study the sensitivity of centrality metrics as a key metric of social networks to support visual reasoning. As centrality represents the prestige or importance of a node in a network, its sensitivity represents the importance of the relationship between this and all other nodes in the network. We have derived an analytical solution that extracts the sensitivity as the derivative of centrality with respect to degree for two centrality metrics based on feedback and random walks. We show that these sensitivities are good indicators of the distribution of centrality in the network, and how changes are expected to be propagated if we introduce changes to the network. These metrics also help us simplify a complex network in a way that retains the main structural properties and that results in trustworthy, readable diagrams. Sensitivity is also a key concept for uncertainty analysis of social networks, and we show how our approach may help analysts gain insight on the robustness of key network metrics. Through a number of examples, we illustrate the need for measuring sensitivity, and the impact it has on the visualization of and interaction with social and other scale-free networks. 相似文献
112.
Since wavelet transform uses the multi-scale (or multi-resolution) techniques for time series, wavelet transform is suitable for modeling complex signals. Haar wavelet transform is the most commonly used and the simplest one. The Haar wavelet neural network (HWNN) applies the Harr wavelet transform as active functions. It is easy for HWNN to model a nonlinear system at multiple time scales and sudden transitions. In this paper, two types of HWNN, feedforward and recurrent wavelet neural networks, are used to model discrete-time nonlinear systems, which are in the forms of the NARMAX model and state-space model. We first propose an optimal method to determine the structure of HWNN. Then two stable learning algorithms are given for the shifting and broadening coefficients of the wavelet functions. The stability of the identification procedures is proven. 相似文献
113.
In this paper, a new approximation to off-line signature verification is proposed based on two-class classifiers using an
expert decisions ensemble. Different methods to extract sets of local and a global features from the target sample are detailed.
Also a normalization by confidence voting method is used in order to decrease the final equal error rate (EER). Each set of
features is processed by a single expert, and on the other approach proposed, the decisions of the individual classifiers
are combined using weighted votes. Experimental results are given using a subcorpus of the large MCYT signature database for
random and skilled forgeries. The results show that the weighted combination outperforms the individual classifiers significantly.
The best EER obtained were 6.3 % in the case of skilled forgeries and 2.31 % in the case of random forgeries. 相似文献
114.
Alexandre Petrenko Adenilso Simao José Carlos Maldonado 《International Journal on Software Tools for Technology Transfer (STTT)》2012,14(4):383-386
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS). 相似文献
115.
This paper is concerned with the neutral‐delay‐dependent and discrete‐delay‐dependent stability for uncertain neutral systems with mixed delays and norm‐bounded uncertainties. Through constructing a new augmented Lyapunov‐Krasovskii functional and proving its positive definiteness, introducing some slack matrices and using integral inequality, the improved delay‐dependent stability criteria are derived in terms of linear matrix inequalities. Numerical examples are given to illustrate the significant improvement on the conservatism of the delay bound over some existing results. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
116.
Carlos Laorden Igor Santos Borja Sanz Gonzalo Alvarez Pablo G. Bringas 《Electronic Commerce Research and Applications》2012,11(3):290-298
Spam has become a major issue in computer security because it is a channel for threats such as computer viruses, worms, and phishing. More than 86% of received e-mails are spam. Historical approaches to combating these messages, including simple techniques such as sender blacklisting or the use of e-mail signatures, are no longer completely reliable. Many current solutions feature machine-learning algorithms trained using statistical representations of the terms that most commonly appear in such e-mails. However, these methods are merely syntactic and are unable to account for the underlying semantics of terms within messages. In this paper, we explore the use of semantics in spam filtering by introducing a pre-processing step of Word Sense Disambiguation (WSD). Based upon this disambiguated representation, we apply several well-known machine-learning models and show that the proposed method can detect the internal semantics of spam messages. 相似文献
117.
Juan Zheng Shuyao Long Guangyao Li 《Structural and Multidisciplinary Optimization》2012,45(1):119-127
In this paper, the topology optimization design of the free vibrating continuum structures is formulated based on the element
free Galerkin (EFG) method. Considering the relative density of nodes as design variable, and the maximization of the fundamental
eigenvalue as an objective function, the mathematical formulation of the topology optimization model is developed using the
solid isotropic microstructures with penalization (SIMP) interpolation scheme. The topology optimization problem is solved
by the optimality criteria method. Finally, the feasibility and efficiency of the proposed method are illustrated with several
2D examples that are widely used in the topology optimization design. 相似文献
118.
针对城市环境中车载自组网信息发送面临的问题,本文提出一种可靠的车载自组网广播算法。首先,结合节点间的位置信息与移动方向将节点分类,基于距离机制选择中继节点,实现多跳广播;在十字路口处,为解决消息在各个路口进行广播,结合道路拓扑,将节点分为前向节点与后向节点两类;最后,针对车辆密度稀疏状况而出现通信空洞的问题,采用携带转发策略解决,节点主动探测空洞的发生,并验证消息发送方向上有节点进入通信范围,再次进行消息广播。仿真实验表明,算法在数据包延时、数据包成功发送率以及发送单一数据包平均负荷等方面具有较好的性能。 相似文献
119.
针对一类具有未知扰动的线性系统的故障检测(FD)问题,通过对系统进行重构,设计出了系统的H2/H-优化FD观测器。利用构造的Lyapunov函数和线性矩阵不等式,证明并给出了FD观测器有解的充分条件和优化设计方法。所设计的观测器使系统具有渐近稳定性,抑制干扰能力强,满足所给的范数指标。仿真结果验证了所设计方法的有效性。 相似文献
120.