全文获取类型
收费全文 | 18860篇 |
免费 | 1804篇 |
国内免费 | 973篇 |
专业分类
电工技术 | 1244篇 |
技术理论 | 1篇 |
综合类 | 1470篇 |
化学工业 | 3058篇 |
金属工艺 | 1073篇 |
机械仪表 | 1186篇 |
建筑科学 | 1559篇 |
矿业工程 | 600篇 |
能源动力 | 455篇 |
轻工业 | 1276篇 |
水利工程 | 456篇 |
石油天然气 | 1054篇 |
武器工业 | 277篇 |
无线电 | 1999篇 |
一般工业技术 | 2003篇 |
冶金工业 | 925篇 |
原子能技术 | 189篇 |
自动化技术 | 2812篇 |
出版年
2024年 | 119篇 |
2023年 | 384篇 |
2022年 | 684篇 |
2021年 | 919篇 |
2020年 | 670篇 |
2019年 | 547篇 |
2018年 | 592篇 |
2017年 | 649篇 |
2016年 | 560篇 |
2015年 | 803篇 |
2014年 | 981篇 |
2013年 | 1162篇 |
2012年 | 1258篇 |
2011年 | 1350篇 |
2010年 | 1115篇 |
2009年 | 1036篇 |
2008年 | 999篇 |
2007年 | 977篇 |
2006年 | 991篇 |
2005年 | 860篇 |
2004年 | 587篇 |
2003年 | 544篇 |
2002年 | 570篇 |
2001年 | 557篇 |
2000年 | 434篇 |
1999年 | 409篇 |
1998年 | 367篇 |
1997年 | 299篇 |
1996年 | 243篇 |
1995年 | 236篇 |
1994年 | 181篇 |
1993年 | 125篇 |
1992年 | 112篇 |
1991年 | 75篇 |
1990年 | 44篇 |
1989年 | 43篇 |
1988年 | 49篇 |
1987年 | 35篇 |
1986年 | 16篇 |
1985年 | 13篇 |
1984年 | 10篇 |
1983年 | 10篇 |
1982年 | 6篇 |
1981年 | 3篇 |
1980年 | 6篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 2篇 |
1972年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
92.
93.
The job shop scheduling problem (JSP) is one of the most notoriously intractable NP-complete optimization problems. Over the last 10–15 years, tabu search (TS) has emerged as an effective algorithmic approach for the JSP. However, the quality of solutions found by tabu search approach depends on the initial solution. To overcome this problem and provide a robust and efficient methodology for the JSP, the heuristics search approach combining simulated annealing (SA) and TS strategy is developed. The main principle of this approach is that SA is used to find the elite solutions inside big valley (BV) so that TS can re-intensify search from the promising solutions. This hybrid algorithm is tested on the standard benchmark sets and compared with the other approaches. The computational results show that the proposed algorithm could obtain the high-quality solutions within reasonable computing times. For example, 17 new upper bounds among the unsolved problems are found in a short time. 相似文献
94.
A collaborative filtering framework based on both local user similarity and global user similarity 总被引:1,自引:0,他引:1
Collaborative filtering as a classical method of information retrieval has been widely used in helping people to deal with
information overload. In this paper, we introduce the concept of local user similarity and global user similarity, based on
surprisal-based vector similarity and the application of the concept of maximin distance in graph theory. Surprisal-based
vector similarity expresses the relationship between any two users based on the quantities of information (called surprisal) contained in their ratings. Global user similarity defines two users being similar if they can be connected through their
locally similar neighbors. Based on both of Local User Similarity and Global User Similarity, we develop a collaborative filtering
framework called LS&GS. An empirical study using the MovieLens dataset shows that our proposed framework outperforms other
state-of-the-art collaborative filtering algorithms. 相似文献
95.
96.
随着新型诱饵的快速发展,在日益复杂的目标环境中探测识别真假目标是红外探测识别系统最难解决的技术问题之一.通过分析天空背景下红外小目标,干扰物,噪音及背景的光谱特性,利用人造飞行目标光谱辐射强度高且相邻波段光谱辐射强度连续性特点,提出了一种以多光谱辐射强度和梯度相组合的目标识别高效算法.就此给出了相应的仿真算例,验证了算法在获取的红外图像信噪比很低,背景高亮度,多个诱饵干扰的条件下也能准确识别目标,具有更强的自适应性,更高的识别率和更为快捷的处理能力. 相似文献
97.
一种新的最小二乘支持向量机稀疏化算法 总被引:1,自引:1,他引:0
普通的最小二乘支持向量机(LS-SVM)稀疏化算法在处理有些常见的模式识别问题时,随着训练样本的删减,识别率下滑很快,往往达不到稀疏化的目的。针对这种情况,提出了一种新的LS-SVM稀疏化算法来弥补这种不足,从而使得LS-SVM稀疏化算法体系更加完善。将新算法应用到雷达一维距离像的识别中,实验结果证明了新算法的有效性。 相似文献
98.
Xiaohong Guan Wei Wang Xiangliang Zhang 《Journal of Network and Computer Applications》2009,32(1):31-44
In this paper, we present an efficient fast anomaly intrusion detection model incorporating a large amount of data from various data sources. A novel method based on non-negative matrix factorization (NMF) is presented to profile program and user behaviors of a computer system. A large amount of high-dimensional data is collected in our experiments and divided into smaller data blocks by a specific scheme. The system call data is divided into blocks by processes, while command data is divided into consecutive blocks with a fixed length. The frequencies of individual elements in each block of data are computed and placed column by column as data vectors to construct a matrix representation. NMF is employed to reduce the high-dimensional data vectors and anomaly detection can be realized as a very simple classifier in low dimensions. Experimental results show that the model presented in this paper is promising in terms of detection accuracy, computation efficiency and implementation for fast intrusion detection. 相似文献
99.
L. Guan I.U. Awan I. Phillips A. Grigg W. Dargie 《Simulation Modelling Practice and Theory》2009,17(3):558-568
The provision of guaranteed QoS for various Internet traffic types has become a challenging problem for researchers. New Internet applications, mostly multimedia-based, require differentiated treatments under certain QoS constraints. Due to a rapid increase in these new services, Internet routers are facing serious traffic congestion problems. This paper presents an approximate analytical performance model in a discrete-time queue, based on closed form expressions using queue threshold, to control the congestion caused by the bursty Internet traffic. The methodology of maximum entropy (ME) has been used to characterize closed form expressions for the state and blocking probabilities. A discrete-time GGeo/GGeo/1/{N1, N2} censored queue with finite capacity, N2, external compound Bernoulli traffic process and generalised geometric transmission times under a first come first serve (FCFS) rule and arrival first (AF) buffer management policy has been used for the solution process. To satisfy the low delay along with high throughput, a threshold, N1, has been incorporated to slow the arrival process from mean arrival rate λ1 to λ2 once the instantaneous queue length has been reached, otherwise the source operates normally. This creates an implicit feedback from the queue to the arrival process. The system can be potentially used as a model for congestion control based on the Random Early Detection (RED) mechanism. Typical numerical experiments have been included to show the credibility of ME solution against simulation for various performance measures and to demonstrate the performance evaluation of the proposed analytical model. 相似文献
100.
Ying-Xia Du Qiao Yang Wang-Ting Lu Qing-Yu Guan Fei-Fei Cao Geng Zhang 《Advanced functional materials》2023,33(27):2300895
Single metal atom isolated in nitrogen-doped carbon materials (M N C) are effective electrocatalysts for oxygen reduction reaction (ORR), which produces H2O2 or H2O via 2-electron or 4-electron process. However, most of M N C catalysts can only present high selectivity for one product, and the selectivity is usually regulated by complicated structure design. Herein, a carbon black-supported Co N C catalyst (CB@Co N C) is synthesized. Tunable 2-electron/4-electron behavior is realized on CB@Co-N-C by utilizing its H2O2 yield dependence on electrolyte pH and catalyst loading. In acidic media with low catalyst loading, CB@Co N C presents excellent mass activity and high selectivity for H2O2 production. In flow cell with gas diffusion electrode, a H2O2 production rate of 5.04 mol h−1 g−1 is achieved by CB@Co N C on electrolyte circulation mode, and a long-term H2O2 production of 200 h is demonstrated on electrolyte non-circulation mode. Meanwhile, CB@Co N C exhibits a dominant 4-electron ORR pathway with high activity and durability in pH neutral media with high catalyst loading. The microbial fuel cell using CB@Co N C as the cathode catalyst shows a peak power density close to that of benchmark Pt/C catalyst. 相似文献