全文获取类型
收费全文 | 3533篇 |
免费 | 246篇 |
国内免费 | 153篇 |
专业分类
电工技术 | 68篇 |
综合类 | 221篇 |
化学工业 | 127篇 |
金属工艺 | 65篇 |
机械仪表 | 89篇 |
建筑科学 | 329篇 |
矿业工程 | 20篇 |
能源动力 | 108篇 |
轻工业 | 10篇 |
水利工程 | 84篇 |
石油天然气 | 14篇 |
武器工业 | 8篇 |
无线电 | 1249篇 |
一般工业技术 | 304篇 |
冶金工业 | 5篇 |
原子能技术 | 10篇 |
自动化技术 | 1221篇 |
出版年
2024年 | 4篇 |
2023年 | 77篇 |
2022年 | 55篇 |
2021年 | 80篇 |
2020年 | 111篇 |
2019年 | 80篇 |
2018年 | 144篇 |
2017年 | 255篇 |
2016年 | 289篇 |
2015年 | 196篇 |
2014年 | 400篇 |
2013年 | 281篇 |
2012年 | 277篇 |
2011年 | 258篇 |
2010年 | 227篇 |
2009年 | 260篇 |
2008年 | 157篇 |
2007年 | 175篇 |
2006年 | 116篇 |
2005年 | 78篇 |
2004年 | 46篇 |
2003年 | 49篇 |
2002年 | 35篇 |
2001年 | 53篇 |
2000年 | 31篇 |
1999年 | 34篇 |
1998年 | 16篇 |
1997年 | 10篇 |
1996年 | 17篇 |
1995年 | 13篇 |
1994年 | 12篇 |
1993年 | 8篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 8篇 |
1988年 | 7篇 |
1987年 | 27篇 |
1986年 | 19篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有3932条查询结果,搜索用时 15 毫秒
21.
《Expert systems with applications》2014,41(2):563-573
In order to offer context-aware and personalized information, intelligent processing techniques are necessary. Different initiatives considering many contexts have been proposed, but users preferences need to be learned to offer contextualized and personalized services, products or information. Therefore, this paper proposes an agent-based architecture for context-aware and personalized event recommendation based on ontology and the spreading algorithm. The use of ontology allows to define the domain knowledge model, while the spreading activation algorithm learns user patterns by discovering user interests. The proposed agent-based architecture was validated with the modeling and implementation of eAgora? application, which was illustrated at the pervasive university context. 相似文献
22.
《Expert systems with applications》2014,41(2):679-693
The aim of this study is to identify and prioritize the solutions of Knowledge Management (KM) adoption in Supply Chain (SC) to overcome its barriers. It helps organizations to concentrate on high rank solutions and develop strategies to implement them on priority. This paper proposes a framework based on fuzzy analytical hierarchy process (AHP) and fuzzy technique for order performance by similarity to ideal solution (TOPSIS) to identify and rank the solutions of KM adoption in SC and overcome its barriers. The AHP is used to determine weights of the barriers as criteria, and fuzzy TOPSIS method is used to obtain final ranking of the solutions of KM adoption in SC. The empirical case study analysis of an Indian hydraulic valve manufacturing organization is conducted to illustrate the use of the proposed framework for ranking the solutions of KM adoption in SC to overcome its barriers. This proposed framework provides a more accurate, effective and systematic decision support tool for stepwise implementation of the solutions of KM adoption in SC to increase its success rate. 相似文献
23.
《Expert systems with applications》2014,41(3):877-885
This paper describes a novel algorithm for numerical optimization, called Simple Adaptive Climbing (SAC). SAC is a simple efficient single-point approach that does not require a careful fine-tunning of its two parameters. SAC algorithm shares many similarities with local optimization heuristics, such as random walk, gradient descent, and hill-climbing. SAC has a restarting mechanism, and a powerful adaptive mutation process that resembles the one used in Differential Evolution. The algorithms SAC is capable of performing global unconstrained optimization efficiently in high dimensional test functions. This paper shows results on 15 well-known unconstrained problems. Test results confirm that SAC is competitive against state-of-the-art approaches such as micro-Particle Swarm Optimization, CMA-ES or Simple Adaptive Differential Evolution. 相似文献
24.
《Expert systems with applications》2014,41(7):3261-3275
Recommender systems apply data mining and machine learning techniques for filtering unseen information and can predict whether a user would like a given item. This paper focuses on gray-sheep users problem responsible for the increased error rate in collaborative filtering based recommender systems. This paper makes the following contributions: we show that (1) the presence of gray-sheep users can affect the performance – accuracy and coverage – of the collaborative filtering based algorithms, depending on the data sparsity and distribution; (2) gray-sheep users can be identified using clustering algorithms in offline fashion, where the similarity threshold to isolate these users from the rest of community can be found empirically. We propose various improved centroid selection approaches and distance measures for the K-means clustering algorithm; (3) content-based profile of gray-sheep users can be used for making accurate recommendations. We offer a hybrid recommendation algorithm to make reliable recommendations for gray-sheep users. To the best of our knowledge, this is the first attempt to propose a formal solution for gray-sheep users problem. By extensive experimental results on two different datasets (MovieLens and community of movie fans in the FilmTrust website), we showed that the proposed approach reduces the recommendation error rate for the gray-sheep users while maintaining reasonable computational performance. 相似文献
25.
《Expert systems with applications》2014,41(7):3143-3156
Previous research on scheduling and solar power issues of wireless sensor networks (WSNs) assumes that the sensors are deployed in a general environment. While monitoring the stream environment, sensors are attached to the stream side to collect the sensed data and transmit the data back to the sink. The stream environment can be scaled in several similar environments. This type of geographic limitation not only exists in a stream environment but also on streets, roads, and trails. This study presents an effective node-selection scheme to enhance the efficiency of saving power and coverage of solar-powered WSNs in a stream environment. Analysis of the sensor deployment in the stream environment permits sensors to be classified into different segments, and then allows the selection of active nodes for building inter-stream connections, inter-segment connections, and intra-segment connections. Based on these connections, the number of active nodes and transmitted packets is minimized. Simulation results show that this scheme can significantly increase the energy efficiency and maintain the monitoring area in solar-powered WSNs. 相似文献
26.
《Computer Standards & Interfaces》2014,36(3):577-584
A mobile ad hoc network (MANET) is a special type of wireless network in which a collection of mobile nodes with wireless network interfaces may form a temporary network, without the aids of any fixed infrastructure. Security has become a hot research topic in mobile ad hoc networks. In 1998, Volker and Mehrdad proposed a tree-based key management and access control scheme for the mobile agents to manage rights to access its own resources for the visited mobile nodes. Latter, Huang et al. showed that Volker and Mehrdad's scheme needs a large amount of storage and costs for managing and storing secret keys. Huang et al. further proposed a new and efficient scheme based on the elliptic curve cryptosystems to reduce costs and gain better efficiency. However, there is a security leak inherent in Huang et al.'s scheme that the malicious node can overstep his authority to access unauthorized information. This paper will propose a secure, robust, and efficient hierarchical key management scheme for MANETs. Some practical issues and solutions about dynamic key management are also considered and proposed. As compared with Huang et al.'s scheme, our proposed scheme can provide better security assurance, while requiring smaller key-size, lower computational complexities, and constant key management costs which is independent on the number of the confidential files and the visited nodes. 相似文献
27.
《Computer Standards & Interfaces》2014,36(3):513-523
One of the critical security issues of Vehicular Ad Hoc Networks (VANETs) is the revocation of misbehaving vehicles. While essential, revocation checking can leak potentially sensitive information. Road Side Units (RSUs) receiving the certificate status queries could infer the identity of the vehicles posing the query. An important loss of privacy results from the RSUs ability to tie the checking vehicle with the query's target. We propose a Privacy Preserving Revocation mechanism (PPREM) based on a universal one-way accumulator. PPREM provides explicit, concise, authenticated and unforgeable information about the revocation status of each certificate while preserving the users' privacy. 相似文献
28.
《Polymer》2007,48(6):1612-1619
Substituted benzene-1,3,5-tricarboxylic acid trisamides are known to be efficient nucleating agents and in some selected cases are clarifiers for isotactic polypropylene (i-PP). In this paper we expanded the application range of this class of additives to the area of i-PP electret materials. This paper discusses in particular the relation between charge storage properties and additive concentration. Furthermore, attention is directed towards processing conditions, which were found to play an important role and seemed to be related to the dissolution and crystallization behavior of these additives from the i-PP melt. The formation of isolated nanometer-sized supramolecular structures was established to be important. It was found that, with the addition of benzene-1,3,5-tricarboxylic acid-(N-cyclohexyl)-trisamide, the charge storage properties of i-PP films can be improved at concentrations below 0.02 wt% (200 ppm). At such low concentrations, the additive appears to be present as isolated nano-aggregates, which can, therefore, efficiently act as charge traps. A further improvement in electret characteristics can be achieved by increasing the cooling rate of the polymer/additive blends. A clear correlation between nucleation efficiency and charge storage efficiency could not be revealed. 相似文献
29.
30.
《Image and vision computing》2014,32(12):1194-1203
We propose a measure of information gained through biometric matching systems. Firstly, we discuss how the information about the identity of a person is derived from biometric samples through a biometric system, and define the “biometric system entropy” or BSE based on mutual information. We present several theoretical properties and interpretations of the BSE, and show how to design a biometric system which maximizes the BSE. Then we prove that the BSE can be approximated asymptotically by the relative entropy D(fG(x)∥fI(x)) where fG(x) and fI(x) are probability mass functions of matching scores between samples from individuals and among population. We also discuss how to evaluate the BSE of a biometric system and show experimental evaluation of the BSE of face, fingerprint and multimodal biometric systems. 相似文献