全文获取类型
收费全文 | 49503篇 |
免费 | 2634篇 |
国内免费 | 155篇 |
专业分类
电工技术 | 708篇 |
综合类 | 65篇 |
化学工业 | 10593篇 |
金属工艺 | 2136篇 |
机械仪表 | 3242篇 |
建筑科学 | 1099篇 |
矿业工程 | 25篇 |
能源动力 | 2111篇 |
轻工业 | 3887篇 |
水利工程 | 271篇 |
石油天然气 | 88篇 |
武器工业 | 2篇 |
无线电 | 7835篇 |
一般工业技术 | 10663篇 |
冶金工业 | 3881篇 |
原子能技术 | 658篇 |
自动化技术 | 5028篇 |
出版年
2024年 | 50篇 |
2023年 | 570篇 |
2022年 | 870篇 |
2021年 | 1483篇 |
2020年 | 1069篇 |
2019年 | 1176篇 |
2018年 | 1429篇 |
2017年 | 1411篇 |
2016年 | 1750篇 |
2015年 | 1294篇 |
2014年 | 2089篇 |
2013年 | 3007篇 |
2012年 | 3266篇 |
2011年 | 3890篇 |
2010年 | 2814篇 |
2009年 | 2921篇 |
2008年 | 2811篇 |
2007年 | 2185篇 |
2006年 | 2031篇 |
2005年 | 1724篇 |
2004年 | 1571篇 |
2003年 | 1513篇 |
2002年 | 1329篇 |
2001年 | 1135篇 |
2000年 | 996篇 |
1999年 | 928篇 |
1998年 | 1557篇 |
1997年 | 991篇 |
1996年 | 803篇 |
1995年 | 557篇 |
1994年 | 461篇 |
1993年 | 406篇 |
1992年 | 290篇 |
1991年 | 274篇 |
1990年 | 258篇 |
1989年 | 241篇 |
1988年 | 205篇 |
1987年 | 168篇 |
1986年 | 119篇 |
1985年 | 115篇 |
1984年 | 92篇 |
1983年 | 63篇 |
1982年 | 38篇 |
1981年 | 39篇 |
1980年 | 30篇 |
1979年 | 31篇 |
1978年 | 30篇 |
1977年 | 38篇 |
1976年 | 61篇 |
1973年 | 20篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
In this paper, a new weighted approach on Lagrangian support vector machine for imbalanced data classification problem is proposed. The weight parameters are embedded in the Lagrangian SVM formulation. The training method for weighted Lagrangian SVM is presented and its convergence is proven. The weighted Lagrangian SVM classifier is tested and compared with some other SVMs using synthetic and real data to show its effectiveness and feasibility. 相似文献
982.
Jeoungkun Kim Soongeun Hong Jinyoung Min Heeseok Lee 《Expert systems with applications》2011,38(8):9530-9542
Although ASP (Application Service Provider) has the potential to fundamentally change the manner in which IT services are provided for user firms, current ASPs often fail to provide good results in accumulating and retaining customers. To fill the gap between the expected benefits of application service and its disappointing results in the real world, we present a conceptual model including three quality measures – System Quality, Information Quality, and Service Quality. To extend the horizons of ASP acceptance, this study sharpens the model that these quality measures regulate Satisfaction and Trust, which lead to Continuance Intention. We test the research model and hypotheses through the use of the data from 203 small and medium enterprises with application service experience. Data analysis results using LISREL reveal that Satisfaction and Trust have significant effects on a client firm’s Continuance Intention. Trust is found to be the most salient determinant while previous studies mainly focused on the role of Satisfaction. Furthermore, an empirical support is found for the direct effect of Service Quality on Continuance Intention as well as its mediating effects. 相似文献
983.
In automated container terminals, containers are transported from the marshalling yard to a ship and vice versa by automated vehicles. The automated vehicle type studied in this paper is an automated lifting vehicle (ALV) that is capable of lifting a container from the ground by itself. This study discusses how to dispatch ALVs by utilizing information about pickup and delivery locations and time in future delivery tasks. A mixed-integer programming model is provided for assigning optimal delivery tasks to ALVs. A procedure for converting buffer constraints into time window constraints and a heuristic algorithm for overcoming the excessive computational time required for solving the mathematical model are suggested. Numerical experiments are reported to compare the objective values and computational times by a heuristic algorithm with those by an optimizing method and to analyze the effects of dual cycle operation, number of ALVs, and buffer capacity on the performance of ALVs. 相似文献
984.
Hyun Soo Kim 《Computer aided design》2009,41(1):47-591
This paper presents n-dimensional feature recognition of triangular meshes that can handle both geometric properties and additional attributes such as color information of a physical object. Our method is based on a tensor voting technique for classifying features and integrates a clustering and region growing methodology for segmenting a mesh into sub-patches. We classify a feature into a corner, a sharp edge and a face. Then, finally we detect features via region merging and cleaning processes. Our feature detection shows good performance with efficiency for various dimensional models. 相似文献
985.
String inclusion and non-inclusion problems have been vigorously studied in such diverse fields as molecular biology, data compression, and computer security. Among the well-known string inclusion or non-inclusion notions, we are interested in the longest common nonsuperstring. Given a set of strings, the longest common nonsuperstring problem is finding the longest string that is not a superstring of any string in the given set. It is known that the longest common nonsuperstring problem is solvable in polynomial time.In this paper, we propose an efficient algorithm for the longest common nonsuperstring problem. The running time of our algorithm is linear with respect to the sum of the lengths of the strings in the given set, using generalized suffix trees. 相似文献
986.
Eunsang Kim 《Information Processing Letters》2009,109(9):454-459
Bentley and Sedgewick proposed multikey Quicksort with ‘split-end’ partitioning for sorting strings. But it can be slow in case of many equal elements because it adopted ‘split-end’ partitioning that moves equal elements to the ends and swaps back to the middle. We present ‘collect-center’ partitioning to improve multikey Quicksort in that case. It moves equal elements to the middle directly like the ‘Dutch National Flag Problem’ partitioning approach and it uses two inner loops like Bentley and McIlroy's. In case of many equal elements such as DNA sequences, HTML files, and English texts, multikey Quicksort with ‘collect-center’ partitioning is faster than multikey Quicksort with ‘split-end’ partitioning. 相似文献
987.
We develop a scheme for constructing G 1 triangular spline surfaces of arbitrary topological type. To assure that the scheme is local and singularity-free, we analyze the selection of scalar weight functions and the construction of the boundary curve network in detail. With the further requirements of interpolating positions, normals, and surface curvatures, we show that the minimum degree of such a triangular spline surface is 6. And we present a method for constructing boundary curves network, which consists of cubic Bézier curves. To deal with certain singular cases, the base mesh must be locally subdivided and we proposed an adaptive subdivision strategy for it. An application of our G 1 triangular spline surfaces to the approximation of implicit surfaces is described. The visual quality of this scheme is demonstrated by some examples. 相似文献
988.
Fully discrete potential-based finite element methods called methods are used to solve a transient eddy current problem in a three-dimensional convex bounded polyhedron. Using methods, fully discrete coupled and decoupled numerical schemes are developed. The existence and uniqueness of solutions
for these schemes together with the energy-norm error estimates are provided. To verify the validity of both schemes, some
computer simulations are performed for the model from TEAM Workshop Problem 7.
This work was supported by Postech BSRI Research Fund-2009, National Basic Research Program of China (2008CB425701), NSFC
under the grant 10671025 and the Key Project of Chinese Ministry of Education (No. 107018). 相似文献
989.
Though cryptography is being used more and more widely in reality, it seems that there exists no scheme or a concatenation of some existing schemes that could deal soundly with such practical situations as providing a clue, where the provider of the clue may want to reserve his beneficial rights while keeping his identity secret. To address this problem, inspired by the two notions of the ring signature and the authenticated encryption signature, we propose a new type of authenticated encryption scheme, which we call the ring authenticated encryption scheme, which can enable any member of a group of persons to provide a clue to some designated recipient wisely. 相似文献
990.
The trend of digital convergence makes multitasking common in many digital electronic products. Some applications in those systems have inherent real‐time properties, while many others have few or no timeliness requirements. Therefore the embedded Linux kernels, which are widely used in those devices, provide real‐time features in many forms. However, providing real‐time scheduling usually induces throughput degradation in heavy multitasking due to the increased context switches. Usually the throughput degradation becomes a critical problem, since the performance of the embedded processors is generally limited for cost, design and energy efficiency reasons. This paper proposes schemes to lessen the throughput degradation, which is from real‐time scheduling, by suppressing unnecessary context switches and applying real‐time scheduling mechanisms only when it is necessary. Also the suggested schemes enable the complete priority inheritance protocol to prevent the well‐known priority inversion problem. We evaluated the effectiveness of our approach with open‐source benchmarks. By using the suggested schemes, the throughput is improved while the scheduling latency is kept same or better in comparison with the existing approaches. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献