全文获取类型
收费全文 | 2070篇 |
免费 | 78篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 10篇 |
综合类 | 3篇 |
化学工业 | 602篇 |
金属工艺 | 72篇 |
机械仪表 | 64篇 |
建筑科学 | 34篇 |
矿业工程 | 3篇 |
能源动力 | 181篇 |
轻工业 | 138篇 |
水利工程 | 13篇 |
石油天然气 | 7篇 |
无线电 | 143篇 |
一般工业技术 | 507篇 |
冶金工业 | 132篇 |
原子能技术 | 10篇 |
自动化技术 | 237篇 |
出版年
2024年 | 4篇 |
2023年 | 15篇 |
2022年 | 68篇 |
2021年 | 88篇 |
2020年 | 67篇 |
2019年 | 52篇 |
2018年 | 91篇 |
2017年 | 68篇 |
2016年 | 75篇 |
2015年 | 57篇 |
2014年 | 80篇 |
2013年 | 161篇 |
2012年 | 103篇 |
2011年 | 132篇 |
2010年 | 104篇 |
2009年 | 101篇 |
2008年 | 111篇 |
2007年 | 94篇 |
2006年 | 58篇 |
2005年 | 62篇 |
2004年 | 41篇 |
2003年 | 36篇 |
2002年 | 36篇 |
2001年 | 25篇 |
2000年 | 16篇 |
1999年 | 39篇 |
1998年 | 25篇 |
1997年 | 21篇 |
1996年 | 28篇 |
1995年 | 24篇 |
1994年 | 32篇 |
1993年 | 26篇 |
1992年 | 25篇 |
1991年 | 11篇 |
1990年 | 15篇 |
1989年 | 10篇 |
1988年 | 10篇 |
1987年 | 16篇 |
1986年 | 8篇 |
1985年 | 13篇 |
1984年 | 6篇 |
1983年 | 16篇 |
1982年 | 20篇 |
1981年 | 19篇 |
1980年 | 16篇 |
1979年 | 11篇 |
1978年 | 8篇 |
1977年 | 5篇 |
1975年 | 2篇 |
1974年 | 2篇 |
排序方式: 共有2156条查询结果,搜索用时 562 毫秒
31.
32.
Ch. Vasavi G. Suresh Kumar M. S. N. Murty 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(3):1093-1104
This paper deals with the fuzzy set-valued functions of real variables on time scale whose values are normal, convex, upper semicontinuous and compactly supported fuzzy sets in \(\mathbb {R}^{n}\). We introduce and study the fundamental properties of new class of derivative called generalized delta derivative (\(\Delta _{g}\)-derivative) and generalized delta integral (\(\Delta _{g}\)-integral) for such fuzzy functions. 相似文献
33.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI. 相似文献
34.
Pillai S. Vijayan Santhanakrishnan T. Kumar N. Suresh Rajesh R. 《Multidimensional Systems and Signal Processing》2022,33(3):879-898
Multidimensional Systems and Signal Processing - High-performance sonar systems mostly combine a large sensor array and an efficient beamformer for enhancing the overall detection capabilities and... 相似文献
35.
Ponnusamy Muruganantham Bedi Pradeep Suresh Tamilarasi Alagarsamy Aravindhan Manikandan R. Yuvaraj N. 《The Journal of supercomputing》2022,78(14):16197-16213
The Journal of Supercomputing - In the technological era, exponential increase of unorganized text documents offers increased difficulties retrieving the most relevant data. The document clustering... 相似文献
36.
The purpose of this work was to explore a new feature extraction method for classifying paddy seeds using a feature extraction algorithm to achieve the area ratio, horizontal–slant and front–rear angles and find whether the proposed features have high discriminating power. Another objective was to find the smallest feature set that can ensure highly accurate recognition of seeds. A total of a 100 image features were extracted, and features having significant discriminating power were identified based on the analysis of variance (ANOVA). From the 100 features, 14 features were found to have high discriminating power and from these features, six were selected as the proposed features. Experimental results show that the proposed features and removal of redundant features enhanced the discriminating power of the feature set, and that the proposed features have an excellent discriminating property for seeds. The presented features resulted in the highest classification accuracy (98.8%) when compared to other methods. 相似文献
37.
Suresh Kumar S. Ashwin Clement H. Karthik R. 《Journal of Failure Analysis and Prevention》2017,17(4):780-787
Journal of Failure Analysis and Prevention - In the present work, mixed-mode stress intensity factor (SIF) of multiple cracks in a riveted lap joint has been determined, with and without the... 相似文献
38.
In this paper, we consider a dynamic supply chain where a manufacturer produces and distributes a featured product through an exclusive retailer to end consumers. The manufacturer decides the product quality and wholesale price, while the retailer sets the retail price in the presence of a revenue-sharing contract and consumers’ reference quality effects. The objective of this study is to investigate the impacts of myopic behaviour regarding the reference quality on the product quality and pricing strategies and profits of both members. Our results suggest that the manufacturer’s myopia leads to a higher quality, higher price strategy and a higher quality–price ratio which benefits consumers. Meanwhile, relative to the far-sighted behaviour, myopia results in a more quality-sensitive but less price-sensitive market demand. What’s more, we find that the manufacturer is apt to act in a far-sighted way, but the retailer isn’t always willing to cooperate with a far-sighted manufacturer. Taking myopic strategies for both members is likely to gain a high profit of the whole supply chain for a relatively high marginal contribution of product quality on demand and a relatively low revenue-sharing proportion. 相似文献
39.
A mobile ad hoc network (MANET) has abundant mobile nodes that are free to communicate independently in many locations. Many existing energy models address the inadequacy of resources based on Ad hoc On-demand Multipath Distance Vector and Optimized Link State Protocol (OLSP) routing protocols for MANET along with various parameters. The architecture of energy-efficient routing mechanisms is a challenging problem in a MANET. In this work, a novel energy-aware routing model is introduced for MANET comprising an ant colony optimization (ACO) enhanced approach to energy-efficient-optimized link state routing (named ACO–EEOLSR). Initially, the route discovery is progressed by means of neighbor estimation and also with the authentication of link stability. Parameters such as energy, distance, and hop count are employed as willingness nodes, where both the energy and distance are entrenched through the OLSP. Consequently, the hop count is applied via the ACO system that is beneficial for link stability. After the acceptance of an acknowledgement, the hop count is authorized for further performance analysis. This approach increases the Quality of Service and also uses less energy compared to other energy models. The accomplished simulation upshot depicts that the ACO–EEOLSR outperforms the EEOLSR scheme with respect to the performance metrics of energy consumption, packet delivery ratio, total remaining time, average network lifetime, and a variance of energy. 相似文献
40.
Performance comparison of texture feature analysis methods using PNN classifier for segmentation and classification of brain CT images
下载免费PDF全文
![点击此处可从《International journal of imaging systems and technology》网站下载免费的PDF全文](/ch/ext_images/free.gif)
A computer software system is designed for the segmentation and classification of benign and malignant tumor slices in brain computed tomography images. In this paper, we present a texture analysis methods to find and select the texture features of the tumor region of each slice to be segmented by support vector machine (SVM). The images considered for this study belongs to 208 benign and malignant tumor slices. The features are extracted and selected using Student's t‐test. The reduced optimal features are used to model and train the probabilistic neural network (PNN) classifier and the classification accuracy is evaluated using k fold cross validation method. The segmentation results are also compared with the experienced radiologist ground truth. Quantitative analysis between ground truth and segmented tumor is presented in terms of quantitative measure of segmentation accuracy and the overlap similarity measure of Jaccard index. The proposed system provides some newly found texture features have important contribution in segmenting and classifying benign and malignant tumor slices efficiently and accurately. The experimental results show that the proposed hybrid texture feature analysis method using Probabilistic Neural Network (PNN) based classifier is able to achieve high segmentation and classification accuracy effectiveness as measured by Jaccard index, sensitivity, and specificity. 相似文献