全文获取类型
收费全文 | 6830篇 |
免费 | 860篇 |
国内免费 | 782篇 |
专业分类
电工技术 | 148篇 |
技术理论 | 1篇 |
综合类 | 1995篇 |
化学工业 | 71篇 |
金属工艺 | 30篇 |
机械仪表 | 178篇 |
建筑科学 | 5篇 |
矿业工程 | 15篇 |
能源动力 | 51篇 |
轻工业 | 7篇 |
石油天然气 | 8篇 |
武器工业 | 4篇 |
无线电 | 3491篇 |
一般工业技术 | 295篇 |
冶金工业 | 9篇 |
原子能技术 | 1篇 |
自动化技术 | 2163篇 |
出版年
2024年 | 20篇 |
2023年 | 79篇 |
2022年 | 203篇 |
2021年 | 222篇 |
2020年 | 189篇 |
2019年 | 160篇 |
2018年 | 169篇 |
2017年 | 171篇 |
2016年 | 151篇 |
2015年 | 181篇 |
2014年 | 497篇 |
2013年 | 546篇 |
2012年 | 763篇 |
2011年 | 675篇 |
2010年 | 623篇 |
2009年 | 683篇 |
2008年 | 623篇 |
2007年 | 701篇 |
2006年 | 678篇 |
2005年 | 369篇 |
2004年 | 162篇 |
2003年 | 144篇 |
2002年 | 108篇 |
2001年 | 122篇 |
2000年 | 126篇 |
1999年 | 46篇 |
1998年 | 22篇 |
1997年 | 1篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1987年 | 8篇 |
1986年 | 7篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有8472条查询结果,搜索用时 0 毫秒
41.
通过结合网站设计初期的网站结构和典型用例的预先定义,构建一个基于Web日志数据的用户访问数据分析系统。该系统(AS-UAB,Analysis System of User Access Behaviors)通过对网站结构和典型用例的预先植入,利用该领域最新的研究方法和结论,为网站相关人员提供可视化的用户访问信息统计及趋势预测,网站结构设计及交互设计上存在的问题及改进建议等通用功能和个性化定制功能。 相似文献
42.
43.
Zhe XUE Junping DU Xin XU Xiangbin LIU Junfu WANG Feifei KOU 《Frontiers of Computer Science》2023,17(2):172316
Node classification has a wide range of application scenarios such as citation analysis and social network analysis. In many real-world attributed networks, a large portion of classes only contain limited labeled nodes. Most of the existing node classification methods cannot be used for few-shot node classification. To train the model effectively and improve the robustness and reliability of the model with scarce labeled samples, in this paper, we propose a local adaptive discriminant structure learning (LADSL) method for few-shot node classification. LADSL aims to properly represent the nodes in the attributed graphs and learn a metric space with a strong discriminating power by reducing the intra-class variations and enlarging inter-class differences. Extensive experiments conducted on various attributed networks datasets demonstrate that LADSL is superior to the other methods on few-shot node classification task. 相似文献
44.
Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first is the migration trigger determination algorithm for cross-border migration and service degradation migration, respectively, based on trajectory prediction and traffic awareness to improve the determination accuracy. The second is the migration target decision calculation model for minimizing the average migration time and maximizing the average service time to reduce migration times and improve the stability and adaptability of migration decisions. The third is the migration decision algorithm based on the improved artificial bee colony algorithm to avoid local optimal migration decisions. Simulation results show that the proposed migration mechanism can reduce migration times, reduce average migration time, improve average service time and enhance the stability and adaptability of IoV application services. 相似文献
45.
Yu-Guang Yang Yi-Wei Teng Hai-Ping Chai Qiao-Yan Wen 《Quantum Information Processing》2011,10(3):317-323
A. Chamoli and C.M. Bhandari presented a secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8,
347 (2009)]. M.Naseri analyzed its security and pointed out that in this protocol any dishonest party can obtain all the other
one’s secret message with zero risk of being detected by using fake entangled particles (FEP attack) [M. Naseri, Quantum Inf.
Process. online]. In this letter, we reexamine the protocol’s security and discover that except the FEP attack, using a special
property of GHZ states, any one dishonest party can also take a special attack, i.e., double-CNOT(Controlled NOT) attack.
Finally, a denial-of-service attack is also discussed. 相似文献
46.
针对传统的矿井煤仓二维设计存在绘图复杂、抽象、易出错等问题,提出了一种矿井煤仓三维计算机辅助设计的方案;以恒源煤矿的-600煤仓和主井缓冲煤仓为例,详细介绍了煤仓三维计算机辅助设计及其动画演示的具体实现。该方案解决了复杂工程施工中设计者与施工人员的交流问题,为高质量、快速施工提供了基础保障。 相似文献
47.
基于液滴指纹图的波形分析算法的改进 总被引:1,自引:0,他引:1
不同的液体在相同的夜滴分析系统中,光纤信号的强弱不同,电容信号的强弱即液滴体积不同,液滴指纹图的波峰波谷的高度、位置以及峰的形状不同,液滴指纹图的曲线长度和曲线下的面积不同;因此,对光电液滴指纹图进行波形分析,计算波形参数,可以实现特征提取并区分不同液体.针对波形分析算法在特征提取过程中存在的两个缺陷,即最值检测时可能错误识别波谷位置和邻域比较时产生大量等值数据集,提出了改进的波形分析算法;对改进前后的波形分析算法进行了分析比较,改进后的算法有效提高了波形参数的准确性. 相似文献
48.
软件无线电因为它的开放性强,兼容性高,在航空航天,多频段、多用户、多模兼容以及互联系统有着广泛的应用前景;文中简要介绍了软件无线电的背景,着重对其关键技术及研究难点提炼与归纳,最后对软件无线电在军事通信、个人移动通信的应用与发展趋势进行了分析及总结。 相似文献
49.
XU Kun YIN Jie NIU Jian SUN XiaoQiang WU Jian & LIN JinTong Key Laboratory of Information Photonics Optical Communications Ministry of Education Beijing University of Posts Telecommunications Beijing China 《中国科学:信息科学(英文版)》2011,(2):236-243
50.
To study the communication between information systems, Wang et al. [C. Wang, C. Wu, D. Chen, Q. Hu, C. Wu, Communicating between information systems, Information Sciences 178 (2008) 3228-3239] proposed two concepts of type-1 and type-2 consistent functions. Some properties of such functions and induced relation mappings have been investigated there. In this paper, we provide an improvement of the aforementioned work by disclosing the symmetric relationship between type-1 and type-2 consistent functions. We present more properties of consistent functions and induced relation mappings and improve upon several deficient assertions in the original work. In particular, we unify and extend type-1 and type-2 consistent functions into the so-called neighborhood-consistent functions. This provides a convenient means for studying the communication between information systems based on various neighborhoods. 相似文献