全文获取类型
收费全文 | 59076篇 |
免费 | 7523篇 |
国内免费 | 5893篇 |
专业分类
电工技术 | 5167篇 |
技术理论 | 9篇 |
综合类 | 6425篇 |
化学工业 | 1423篇 |
金属工艺 | 724篇 |
机械仪表 | 3639篇 |
建筑科学 | 2324篇 |
矿业工程 | 1594篇 |
能源动力 | 812篇 |
轻工业 | 754篇 |
水利工程 | 1401篇 |
石油天然气 | 2927篇 |
武器工业 | 796篇 |
无线电 | 9000篇 |
一般工业技术 | 2862篇 |
冶金工业 | 1186篇 |
原子能技术 | 744篇 |
自动化技术 | 30705篇 |
出版年
2024年 | 317篇 |
2023年 | 852篇 |
2022年 | 1745篇 |
2021年 | 2152篇 |
2020年 | 2297篇 |
2019年 | 1775篇 |
2018年 | 1599篇 |
2017年 | 1980篇 |
2016年 | 2216篇 |
2015年 | 2532篇 |
2014年 | 4043篇 |
2013年 | 3615篇 |
2012年 | 4329篇 |
2011年 | 4673篇 |
2010年 | 3590篇 |
2009年 | 3554篇 |
2008年 | 4027篇 |
2007年 | 4565篇 |
2006年 | 3863篇 |
2005年 | 3499篇 |
2004年 | 2990篇 |
2003年 | 2534篇 |
2002年 | 1941篇 |
2001年 | 1479篇 |
2000年 | 1268篇 |
1999年 | 931篇 |
1998年 | 710篇 |
1997年 | 592篇 |
1996年 | 497篇 |
1995年 | 437篇 |
1994年 | 350篇 |
1993年 | 251篇 |
1992年 | 175篇 |
1991年 | 180篇 |
1990年 | 134篇 |
1989年 | 109篇 |
1988年 | 85篇 |
1987年 | 69篇 |
1986年 | 59篇 |
1985年 | 85篇 |
1984年 | 58篇 |
1983年 | 72篇 |
1982年 | 60篇 |
1981年 | 37篇 |
1980年 | 20篇 |
1979年 | 34篇 |
1978年 | 12篇 |
1977年 | 20篇 |
1976年 | 13篇 |
1959年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
11.
12.
本文以云杉八齿小蠹Ips typographus Linnaeus为例,经标本选取,观察虫体整体形态,绘制整体结构草图,电子显微镜观察局部、得到局部数字图像,分别建立虫体每一部分的高精度细节。把模型每部分拼装在一起组成整体模型,构建出了云杉八齿小蠹三维虚拟昆虫数字化模型。 相似文献
13.
This paper analyzes the problems existing in the teaching of data structure course, and puts forward the reform from the as-
pects of strengthening basic programming, visualized explanation of abstract theory, combination of C++, Java programming, ratio-
nal use of online platform, and stratification of exercises, aiming at improving students' practical ability, learning interest and self-
confidence. 相似文献
14.
In the first critical assessment of knowledge economy dynamic paths in Africa and the Middle East, but for a few exceptions, we find overwhelming support for diminishing cross-country disparities in knowledge-based economy dimensions. The paper employs all the four components of the World Bank's Knowledge Economy Index (KEI): economic incentives, innovation, education, and information infrastructure. The main finding suggests that sub-Saharan African (SSA) and the Middle East and North African (MENA) countries with low levels of KE dynamics and catching-up their counterparts of higher KE levels. We provide the speeds of integration and time necessary to achieve full (100%) integration. Policy implications are also discussed. 相似文献
15.
16.
18.
Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find a ppropriate d ata t o m odeling. F irst o f all, we use concept drift to make the partition of the life cycle of process object. Then, entity community detection is proposed to find changes. Finally, we propose stream-based real-time optimization of data sampling. Contributions of this paper are concept drift, community detection, and stream-based real-time computing. Experiments show the effectiveness and feasibility of our proposed adaptive data sampling mechanism for process object. 相似文献
19.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors. 相似文献
20.
For rechargeable wireless sensor networks, limited energy storage capacity, dynamic energy supply, low and dynamic duty cycles cause that it is unpractical to maintain a fixed routing path for packets delivery permanently from a source to destination in a distributed scenario. Therefore, before data delivery, a sensor has to update its waking schedule continuously and share them to its neighbors, which lead to high energy expenditure for reestablishing path links frequently and low efficiency of energy utilization for collecting packets. In this work, we propose the maximum data generation rate routing protocol based on data flow controlling technology. For a sensor, it does not share its waking schedule to its neighbors and cache any waking schedules of other sensors. Hence, the energy consumption for time synchronization, location information and waking schedule shared will be reduced significantly. The saving energy can be used for improving data collection rate. Simulation shows our scheme is efficient to improve packets generation rate in rechargeable wireless sensor networks. 相似文献