全文获取类型
收费全文 | 35387篇 |
免费 | 4343篇 |
国内免费 | 2725篇 |
专业分类
电工技术 | 3285篇 |
技术理论 | 2篇 |
综合类 | 2857篇 |
化学工业 | 918篇 |
金属工艺 | 311篇 |
机械仪表 | 1011篇 |
建筑科学 | 3846篇 |
矿业工程 | 9985篇 |
能源动力 | 1407篇 |
轻工业 | 212篇 |
水利工程 | 3587篇 |
石油天然气 | 632篇 |
武器工业 | 109篇 |
无线电 | 2064篇 |
一般工业技术 | 826篇 |
冶金工业 | 1736篇 |
原子能技术 | 189篇 |
自动化技术 | 9478篇 |
出版年
2024年 | 111篇 |
2023年 | 371篇 |
2022年 | 923篇 |
2021年 | 1251篇 |
2020年 | 1426篇 |
2019年 | 903篇 |
2018年 | 875篇 |
2017年 | 1001篇 |
2016年 | 1166篇 |
2015年 | 1321篇 |
2014年 | 2658篇 |
2013年 | 1923篇 |
2012年 | 3186篇 |
2011年 | 3077篇 |
2010年 | 2319篇 |
2009年 | 2432篇 |
2008年 | 2479篇 |
2007年 | 2673篇 |
2006年 | 2328篇 |
2005年 | 1972篇 |
2004年 | 1777篇 |
2003年 | 1574篇 |
2002年 | 1049篇 |
2001年 | 807篇 |
2000年 | 691篇 |
1999年 | 520篇 |
1998年 | 366篇 |
1997年 | 255篇 |
1996年 | 226篇 |
1995年 | 211篇 |
1994年 | 174篇 |
1993年 | 132篇 |
1992年 | 83篇 |
1991年 | 64篇 |
1990年 | 21篇 |
1989年 | 29篇 |
1988年 | 23篇 |
1987年 | 16篇 |
1986年 | 12篇 |
1985年 | 2篇 |
1984年 | 5篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 2篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1959年 | 2篇 |
1956年 | 1篇 |
1955年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
102.
针对以前的发电管理系统或只是数据呈现,提供市电及发电相关数据信息,或只是提供出车轨迹,主要实现对出车的管理,不能全面反应发电全过程且不便于对发电事件进行分析的情况,提出可视化发电管理系统的概念。在简要介绍了LBS系统、动力环境监控系统后,讲述了可视化基站发电管理系统的组成以及通过LBS定位管理、短信互动、实时监测数据等进行系统实现。可视化发电管理系统通过可视化的界面帮助发电管理人员进行管理,直观、便捷。 相似文献
103.
选择性集成是当前机器学习领域的研究热点之一。由于选择性集成属于NP"难"问题,人们多利用启发式方法将选择性集成转化为其他问题来求得近似最优解,因为各种算法的出发点和描述角度各不相同,现有的大量选择性集成算法显得繁杂而没有规律。为便于研究人员迅速了解和应用本领域的最新进展,本文根据选择过程中核心策略的特征将选择性集成算法分为四类,即迭代优化法、排名法、分簇法、模式挖掘法;然后利用UCI数据库的20个常用数据集,从预测性能、选择时间、结果集成分类器大小三个方面对这些典型算法进行了实验比较;最后总结了各类方法的优缺点,并展望了选择性集成的未来研究重点。 相似文献
104.
引汉济渭工程黄金峡水利枢纽是陕西省境内一项重要的大型跨流域调水工程,泵站装机容量和设计流量均为目前国内甚至亚洲在建和已建泵站之最,且调水过程复杂、调水流量分布范围宽广。在分析黄金峡泵站调度原则及运行方式的基础上,综合比较目前国内外大型泵站机组设计制造水平、枢纽建筑物及机电设备投资等因素,详细论证了大型单级单吸离心式水泵机组台数和性能参数的确定方法及其影响因素,并给出了黄金峡泵站机组选型设计的最优方案,同时论证了采用变频调节的必要性及其效果。研究结果可为大型调水泵站机组的选型设计提供参考。 相似文献
105.
《Expert systems with applications》2014,41(1):195-209
The processes of logistics service providers are considered as highly human-centric, flexible and complex. Deviations from the standard operating procedures as described in the designed process models, are not uncommon and may result in significant uncertainties. Acquiring insight in the dynamics of the actual logistics processes can effectively assist in mitigating the uncovered risks and creating strategic advantages, which are the result of uncertainties with respectively a negative and a positive impact on the organizational objectives.In this paper a comprehensive methodology for applying process mining in logistics is presented, covering the event log extraction and preprocessing as well as the execution of exploratory, performance and conformance analyses. The applicability of the presented methodology and roadmap is demonstrated with a case study at an important Chinese port that specializes in bulk cargo. 相似文献
106.
107.
《Expert systems with applications》2014,41(11):5416-5430
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQLIA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQLIA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods. 相似文献
108.
《Expert systems with applications》2014,41(6):2703-2712
A concept lattice is an ordered structure between concepts. It is particularly effective in mining association rules. However, a concept lattice is not efficient for large databases because the lattice size increases with the number of transactions. Finding an efficient strategy for dynamically updating the lattice is an important issue for real-world applications, where new transactions are constantly inserted into databases. To build an efficient storage structure for mining association rules, this study proposes a method for building the initial frequent closed itemset lattice from the original database. The lattice is updated when new transactions are inserted. The number of database rescans over the entire database is reduced in the maintenance process. The proposed algorithm is compared with building a lattice in batch mode to demonstrate the effectiveness of the proposed algorithm. 相似文献
109.
《Expert systems with applications》2014,41(11):5009-5016
The weak signal concept according to Ansoff has the aim to advance strategic early warning. It enables to predict the appearance of events in advance that are relevant for an organization. An example is to predict the appearance of a new and relevant technology for a research organization. Existing approaches detect weak signals based on an environmental scanning procedure that considers textual information from the internet. This is because about 80% of all data in the internet are textual information. The texts are processed by a specific clustering approach where clusters that represent weak signals are identified. In contrast to these related approaches, we propose a new methodology that investigates a sequence of clusters measured at successive points in time. This enables to trace the development of weak signals over time and thus, it enables to identify relevant weak signal developments for organization’s decision making in strategic early warning environment. 相似文献
110.
《Expert systems with applications》2014,41(16):7235-7247
Deciding whether borrowers can fulfill their obligations is a major issue for financial institutions, and while various credit rating models have been developed to help achieve this, they cannot reflect the domain knowledge of human experts. This paper proposes a new rating model based on a support vector machine with monotonicity constraints derived from the prior knowledge of financial experts. Experiments conducted on real-world data sets show that the proposed method, not only data driven but also domain knowledge oriented, can help correct the loss of monotonicity in data occurring during the collecting process, and performs better than the conventional counterpart. 相似文献