全文获取类型
收费全文 | 14412篇 |
免费 | 2107篇 |
国内免费 | 2073篇 |
专业分类
电工技术 | 547篇 |
技术理论 | 19篇 |
综合类 | 317篇 |
化学工业 | 2682篇 |
金属工艺 | 639篇 |
机械仪表 | 383篇 |
建筑科学 | 108篇 |
矿业工程 | 139篇 |
能源动力 | 1520篇 |
轻工业 | 137篇 |
水利工程 | 57篇 |
石油天然气 | 105篇 |
武器工业 | 56篇 |
无线电 | 2716篇 |
一般工业技术 | 2801篇 |
冶金工业 | 291篇 |
原子能技术 | 157篇 |
自动化技术 | 5918篇 |
出版年
2024年 | 116篇 |
2023年 | 600篇 |
2022年 | 705篇 |
2021年 | 896篇 |
2020年 | 923篇 |
2019年 | 756篇 |
2018年 | 616篇 |
2017年 | 732篇 |
2016年 | 881篇 |
2015年 | 850篇 |
2014年 | 1334篇 |
2013年 | 1502篇 |
2012年 | 2118篇 |
2011年 | 1680篇 |
2010年 | 1382篇 |
2009年 | 1371篇 |
2008年 | 429篇 |
2007年 | 148篇 |
2006年 | 190篇 |
2005年 | 121篇 |
2004年 | 69篇 |
2003年 | 100篇 |
2002年 | 109篇 |
2001年 | 146篇 |
2000年 | 68篇 |
1999年 | 81篇 |
1998年 | 35篇 |
1997年 | 20篇 |
1996年 | 36篇 |
1995年 | 38篇 |
1994年 | 22篇 |
1993年 | 26篇 |
1992年 | 21篇 |
1991年 | 22篇 |
1990年 | 25篇 |
1989年 | 21篇 |
1988年 | 49篇 |
1987年 | 139篇 |
1986年 | 119篇 |
1985年 | 26篇 |
1984年 | 19篇 |
1983年 | 7篇 |
1982年 | 12篇 |
1981年 | 10篇 |
1980年 | 4篇 |
1979年 | 5篇 |
1978年 | 3篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
《Computer Standards & Interfaces》2014,36(3):641-647
In C2C communication, all necessary information must be collected promptly when a buyer and a seller communicate. That is, an intelligent C2C agent is needed to provide information to buyers and sellers. Along with the evolution of computing technology, C2C agents can exploit the efficient delivery capabilities of peer-to-peer (P2P) technology. However, P2P also increases traffic between agents, but communication faults are a fatal problem for C2C business. This study proposes a robust communication architecture based on current P2P content-delivery standards and its efficiency and robustness have been verified from an experiment. 相似文献
52.
《Computer Standards & Interfaces》2014,36(3):524-530
The abundance of mobile software applications (apps) has created a security challenge. These apps are widely available across all platforms for little to no cost and are often created by small companies and less-experienced programmers. The lack of development standards and best practices exposes the mobile device to potential attacks. This article explores not only the practices that should be adopted by developers of all apps, but also those practices the enterprise user should demand of any app that resides on a mobile device that is employed for both business and private uses. 相似文献
53.
The paper is to introduce a new systematic method that can produce lower bounds for eigenvalues. The main idea is to use nonconforming finite element methods. The conclusion is that if local approximation properties of nonconforming finite element spaces are better than total errors (sums of global approximation errors and consistency errors) of nonconforming finite element methods, corresponding methods will produce lower bounds for eigenvalues. More precisely, under three conditions on continuity and approximation properties of nonconforming finite element spaces we analyze abstract error estimates of approximate eigenvalues and eigenfunctions. Subsequently, we propose one more condition and prove that it is sufficient to guarantee nonconforming finite element methods to produce lower bounds for eigenvalues of symmetric elliptic operators. We show that this condition hold for most low-order nonconforming finite elements in literature. In addition, this condition provides a guidance to modify known nonconforming elements in literature and to propose new nonconforming elements. In fact, we enrich locally the Crouzeix-Raviart element such that the new element satisfies the condition; we also propose a new nonconforming element for second order elliptic operators and prove that it will yield lower bounds for eigenvalues. Finally, we prove the saturation condition for most nonconforming elements. 相似文献
54.
In this paper, the dynamical behaviors of a two-dimensional simplified Hodgkin–Huxley (H–H) model exposed to external electric fields are investigated through qualitative analysis and numerical simulation. A necessary and sufficient condition is proposed for the existence of the Hopf bifurcation. Saddle-node bifurcations and canards of the simplified model with the coefficients of different linear forms are also discussed. Finally, the bifurcation curves with the coefficients of different linear forms are shown. The numerical results demonstrate that some linear forms can retain the bifurcation characteristics of the original model, which is of great use to simplify the H–H model for the real-world applications. 相似文献
55.
In this paper, a novel self-adaptive extreme learning machine (ELM) based on affinity propagation (AP) is proposed to optimize the radial basis function neural network (RBFNN). As is well known, the parameters of original ELM which developed by G.-B. Huang are randomly determined. However, that cannot objectively obtain a set of optimal parameters of RBFNN trained by ELM algorithm for different realistic datasets. The AP algorithm can automatically produce a set of clustering centers for the different datasets. According to the results of AP, we can, respectively, get the cluster number and the radius value of each cluster. In that case, the above cluster number and radius value can be used to initialize the number and widths of hidden layer neurons in RBFNN and that is also the parameters of coefficient matrix H of ELM. This may successfully avoid the subjectivity prior knowledge and randomness of training RBFNN. Experimental results show that the method proposed in this thesis has a more powerful generalization capability than conventional ELM for an RBFNN. 相似文献
56.
Twin support vector machine (TWSVM) is a research hot spot in the field of machine learning in recent years. Although its performance is better than traditional support vector machine (SVM), the kernel selection problem still affects the performance of TWSVM directly. Wavelet analysis has the characteristics of multivariate interpolation and sparse change, and it is suitable for the analysis of local signals and the detection of transient signals. The wavelet kernel function based on wavelet analysis can approximate any nonlinear functions. Based on the wavelet kernel features and the kernel function selection problem, wavelet twin support vector machine (WTWSVM) is proposed by this paper. It introduces the wavelet kernel function into TWSVM to make the combination of wavelet analysis techniques and TWSVM come true. The experimental results indicate that WTWSVM is feasible, and it improves the classification accuracy and generalization ability of TWSVM significantly. 相似文献
57.
58.
With the fast explosive rate of the amount of image data on the Internet, how to efficiently utilize them in the cross-media scenario becomes an urgent problem. Images are usually accompanied with contextual textual information. These two heterogeneous modalities are mutually reinforcing to make the Internet content more informative. In most cases, visual information can be regarded as an enhanced content of the textual document. To make image-to-image similarity being more consistent with document-to-document similarity, this paper proposes a method to learn image similarities according to the relations of the accompanied textual documents. More specifically, instead of using the static quantitative relations, rank-based learning procedure by employing structural SVM is adopted in this paper, and the ranking structure is established by comparing the relative relations of textual information. The learning results are in more accordance with the human’s recognition. The proposed method in this paper can be used not only for the image-to-image retrieval, but also for cross-modality multimedia, where a query expansion framework is proposed to get more satisfactory results. Extensive experimental evaluations on large scale Internet dataset validate the performance of the proposed methods. 相似文献
59.
《Expert systems with applications》2014,41(13):5780-5787
The massive quantity of data available today in the Internet has reached such a huge volume that it has become humanly unfeasible to efficiently sieve useful information from it. One solution to this problem is offered by using text summarization techniques. Text summarization, the process of automatically creating a shorter version of one or more text documents, is an important way of finding relevant information in large text libraries or in the Internet. This paper presents a multi-document summarization system that concisely extracts the main aspects of a set of documents, trying to avoid the typical problems of this type of summarization: information redundancy and diversity. Such a purpose is achieved through a new sentence clustering algorithm based on a graph model that makes use of statistic similarities and linguistic treatment. The DUC 2002 dataset was used to assess the performance of the proposed system, surpassing DUC competitors by a 50% margin of f-measure, in the best case. 相似文献
60.
《Expert systems with applications》2014,41(13):5733-5750
The study of criminal networks using traces from heterogeneous communication media is acquiring increasing importance in nowadays society. The usage of communication media such as mobile phones and online social networks leaves digital traces in the form of metadata that can be used for this type of analysis. The goal of this work is twofold: first we provide a theoretical framework for the problem of detecting and characterizing criminal organizations in networks reconstructed from phone call records. Then, we introduce an expert system to support law enforcement agencies in the task of unveiling the underlying structure of criminal networks hidden in communication data. This platform allows for statistical network analysis, community detection and visual exploration of mobile phone network data. It enables forensic investigators to deeply understand hierarchies within criminal organizations, discovering members who play central role and provide connection among sub-groups. Our work concludes illustrating the adoption of our computational framework for a real-word criminal investigation. 相似文献