全文获取类型
收费全文 | 62482篇 |
免费 | 6794篇 |
国内免费 | 4119篇 |
专业分类
电工技术 | 5475篇 |
技术理论 | 3篇 |
综合类 | 5292篇 |
化学工业 | 8856篇 |
金属工艺 | 3742篇 |
机械仪表 | 4219篇 |
建筑科学 | 5345篇 |
矿业工程 | 1655篇 |
能源动力 | 1814篇 |
轻工业 | 4803篇 |
水利工程 | 1502篇 |
石油天然气 | 2691篇 |
武器工业 | 700篇 |
无线电 | 7768篇 |
一般工业技术 | 6912篇 |
冶金工业 | 2173篇 |
原子能技术 | 830篇 |
自动化技术 | 9615篇 |
出版年
2024年 | 373篇 |
2023年 | 1097篇 |
2022年 | 2167篇 |
2021年 | 2987篇 |
2020年 | 2254篇 |
2019年 | 1725篇 |
2018年 | 1779篇 |
2017年 | 2071篇 |
2016年 | 1922篇 |
2015年 | 2691篇 |
2014年 | 3341篇 |
2013年 | 3934篇 |
2012年 | 4729篇 |
2011年 | 4893篇 |
2010年 | 4422篇 |
2009年 | 4351篇 |
2008年 | 4391篇 |
2007年 | 3936篇 |
2006年 | 3719篇 |
2005年 | 2976篇 |
2004年 | 2141篇 |
2003年 | 1859篇 |
2002年 | 2164篇 |
2001年 | 1907篇 |
2000年 | 1428篇 |
1999年 | 1015篇 |
1998年 | 646篇 |
1997年 | 537篇 |
1996年 | 437篇 |
1995年 | 352篇 |
1994年 | 270篇 |
1993年 | 194篇 |
1992年 | 172篇 |
1991年 | 126篇 |
1990年 | 85篇 |
1989年 | 79篇 |
1988年 | 57篇 |
1987年 | 43篇 |
1986年 | 22篇 |
1985年 | 23篇 |
1984年 | 15篇 |
1983年 | 8篇 |
1982年 | 15篇 |
1981年 | 10篇 |
1980年 | 14篇 |
1979年 | 6篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1959年 | 5篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
设计了一种基于MAX11068的电池电压检测及保护系统。以C8051F340单片机为主控制器,MAX11068将采集的电压数据通过I^2C总线接口隔离传输到主控器,具有电压检测、过欠压报警、均衡充电控制等功能。系统结构简单,可靠性高、安全性好,并且能达到现场智能控制的要求。 相似文献
992.
在系统的应用过程中,数据库性能问题一直是决策者和技术人员共同关注的焦点,影响数据库性能的因素有很多,选择合适的索引能有效地提升查询性能。在select和where子句的列上创建连接索引,这样查询就只会访问索引,从而优化查询的性能,提升系统响应速度,节约系统资源。 相似文献
993.
Message forwarding (e.g.,retweeting on Twitter.com) is one of the most popular functions in many existing microblogs,and a large number of users participate in the propagation of information,for any given messages.While this large number can generate notable diversity and not all users have the same ability to diffuse the messages,this also makes it challenging to find the true users with higher spreadability,those generally rated as interesting and authoritative to diffuse the messages.In this paper,a novel method called SpreadRank is proposed to measure the spreadability of users in microblogs,considering both the time interval of retweets and the location of users in information cascades.Experiments were conducted on a real dataset from Twitter containing about 0.26 million users and 10 million tweets,and the results showed that our method is consistently better than the PageRank method with the network of retweets and the method of retweetNum which measures the spreadability according to the number of retweets.Moreover,we find that a user with more tweets or followers does not always have stronger spreadability in microblogs. 相似文献
994.
In the service-oriented computing paradigm, cross-organizational applications and information systems can be built upon services from different providers. Services are subject to changes required by the organizational and regulatory policies changes. The challenging problem of service change management has been studied actively in recent years. This paper provides an extensive overview of the current research on change management in the context of service-oriented computing. First, we classify service changes into three major types as interface, behavioral, and non-functional changes. Then, we review the existing work on change management from the four broad categories: Service Adaptation, Process Flexibility, Service Evolution, and Change Analysis and Management in Service Compositions. In each category, we discuss the focusing changes, the proposed approaches to dealing with the change problems, and the change issues that remain to be solved. 相似文献
995.
Guo‐Zhen Wang Yi‐Pai Huang Tian‐Sheuan Chang 《Journal of the Society for Information Display》2013,21(9):381-388
A camera‐free 3D air‐touch system was proposed. Hovering, air swiping, and 3D gestures for further interaction with the floated 3D images on the mobile display were demonstrated. By embedding multiwavelength optical sensors into the display pixels and adding angular‐scanning illuminators with multiwavelength on the edge of the display, the flat panel can sense images reflected by a bare finger from different heights. In addition, three axis (x, y, z) information of the reflected image of the fingertip can be calculated. Finally, the proposed 3D air‐touch system was successfully demonstrated on a 4‐inch mobile 3D display. 相似文献
996.
Kuo‐Chung Huang Yi‐Heng Chou Lang‐chin Lin Hoang Yan Lin Fu‐Hao Chen Ching‐Chiu Liao Yi‐Han Chen Kuen Lee Wan‐Hsuan Hsu 《Journal of the Society for Information Display》2013,21(6):263-270
The optimal viewing distance was proposed as a parameter for designing a parallax barrier 3D display. It can be designed based on simple geometric method and by considering the pitches of image display pixels and parallax barrier, or even including the aperture ratios of the image display pixels and parallax barrier. It can be analyzed by using ray tracing method. By considering the optical refraction index of the cover glass, the angular behavior of the system becomes more realistic; however, the geometric method is difficult to be used. We propose a revised method for estimating the view distance and angular behavior. In this paper, we have demonstrated a designated eye position (DEP) for each view and shown that multiple DEPs make a circular curve around the center of the display. We prove the new concept by comparing the optical ray tracing calculations and optical measurement. 相似文献
997.
Shams Qazi Raad Raad Yi Mu Willy Susilo 《Journal of Network and Computer Applications》2013,36(2):582-592
A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks which limit the usability of these solutions. In this paper, we present a security enhancement to dynamic source routing (DSR) protocol against wormhole attacks for ad hoc networks which relies on calculation of round trip time (RTT). Our protocol secures DSR against a wormhole attack in ad hoc networks for multirate transmissions. We also consider the processing and queuing delays of each participating node in the calculation of RTTs between neighbors which to date has not been addressed in the existing literature. This work provides two test cases that show that not taking multirate transmission into consideration results in miss identifying a wormhole attack. 相似文献
998.
Based on the classification rule of sparse representation-based classification (SRC) and linear regression classification (LRC), we propose the maximum nearest subspace margin criterion for feature extraction. The proposed method can be seen as a preprocessing step of SRC and LRC. By maximizing the inter-class reconstruction error and minimizing the intra-class reconstruction error simultaneously, the proposed method significantly improves the performances of SRC and LRC. Compared with linear discriminant analysis, the proposed method avoids the small sample size problem and can extract more features. Moreover, we extend LRC to overcome the potential singular problem. The experimental results on the extended Yale B (YALE-B), AR, PolyU finger knuckle print and the CENPARMI handwritten numeral databases demonstrate the effectiveness of the proposed method. 相似文献
999.
In recent years, hashing-based methods for large-scale similarity search have sparked considerable research interests in the data mining and machine learning communities. While unsupervised hashing-based methods have achieved promising successes for metric similarity, they cannot handle semantic similarity which is usually given in the form of labeled point pairs. To overcome this limitation, some attempts have recently been made on semi-supervised hashing which aims at learning hash functions from both metric and semantic similarity simultaneously. Existing semi-supervised hashing methods can be regarded as passive hashing since they assume that the labeled pairs are provided in advance. In this paper, we propose a novel framework, called active hashing, which can actively select the most informative labeled pairs for hash function learning. Specifically, it identifies the most informative points to label and constructs labeled pairs accordingly. Under this framework, we use data uncertainty as a measure of informativeness and develop a batch mode algorithm to speed up active selection. We empirically compare our method with a state-of-the-art passive hashing method on two benchmark data sets, showing that the proposed method can reduce labeling cost as well as overcome the limitations of passive hashing. 相似文献
1000.
Series of experiments for phenol degradation with assistance of TiO2 catalyst at pH of 6.5 and temperature of 25 degrees C were conducted using a lab-scale electrochemical reactor constructed in our laboratory. According to the results, at the presence of the TiO2 catalyst the removal of phenol was increased and first-order kinetics could describe the evolution of phenol concentration. For inspecting the relationship between rate constants and dosage of TiO2, two possible kinetics were proposed in this study. Contrasted to the abundant experimental data, a reasonable kinetics was obtained for the estimation of phenol concentration effluent during continuous flow of raw wastewater, especially when the TiO2 dosage was less than 0.5g L(-1). The model obtained from these experiments could employed for the calculation of rate constants at different TiO2 dosage and the necessary dosage of catalyst when a discharge standard was designed. 相似文献