全文获取类型
收费全文 | 12848篇 |
免费 | 1310篇 |
国内免费 | 757篇 |
专业分类
电工技术 | 416篇 |
技术理论 | 1篇 |
综合类 | 1227篇 |
化学工业 | 1968篇 |
金属工艺 | 245篇 |
机械仪表 | 1271篇 |
建筑科学 | 448篇 |
矿业工程 | 428篇 |
能源动力 | 307篇 |
轻工业 | 1498篇 |
水利工程 | 106篇 |
石油天然气 | 299篇 |
武器工业 | 103篇 |
无线电 | 817篇 |
一般工业技术 | 2390篇 |
冶金工业 | 261篇 |
原子能技术 | 72篇 |
自动化技术 | 3058篇 |
出版年
2024年 | 55篇 |
2023年 | 194篇 |
2022年 | 333篇 |
2021年 | 458篇 |
2020年 | 538篇 |
2019年 | 395篇 |
2018年 | 435篇 |
2017年 | 465篇 |
2016年 | 525篇 |
2015年 | 589篇 |
2014年 | 845篇 |
2013年 | 1191篇 |
2012年 | 919篇 |
2011年 | 912篇 |
2010年 | 664篇 |
2009年 | 747篇 |
2008年 | 668篇 |
2007年 | 811篇 |
2006年 | 738篇 |
2005年 | 640篇 |
2004年 | 607篇 |
2003年 | 469篇 |
2002年 | 356篇 |
2001年 | 282篇 |
2000年 | 216篇 |
1999年 | 176篇 |
1998年 | 116篇 |
1997年 | 96篇 |
1996年 | 73篇 |
1995年 | 65篇 |
1994年 | 52篇 |
1993年 | 49篇 |
1992年 | 47篇 |
1991年 | 39篇 |
1990年 | 34篇 |
1989年 | 22篇 |
1988年 | 12篇 |
1987年 | 9篇 |
1986年 | 6篇 |
1985年 | 17篇 |
1984年 | 14篇 |
1983年 | 11篇 |
1982年 | 10篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1970年 | 1篇 |
1963年 | 1篇 |
1960年 | 1篇 |
1959年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 21 毫秒
61.
针对供应链合作伙伴选择的准确性和效率问题,提出一种基于粒子群和蚁群优化的合作伙伴选择算法。建立基于供应链链节体和连接弧的有向图路径模型,构造多目标规划模型。利用改进的离散型粒子群算法,求取伙伴选择问题的初始解集,构建初始信息素矩阵,通过改进蚁群算法的寻径规则,求取供应链合作伙伴选择问题的最优解。实验结果表明,所提算法有效提高了供应链合作伙伴选择的精度和效率,具有较好的性能。 相似文献
62.
本系统适用于小型连锁超市进行商品销售或购物卡的管理。其主要功能包括购物卡的制作管理、发行管理、信息查询、系统维护。本系统界面友好、直观,操作简便,系统中的多级权限管理等也可以保证数据的安全可靠。 相似文献
63.
《Information Security Journal: A Global Perspective》2013,22(5):248-256
ABSTRACT A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2. 相似文献
64.
The 3GPP Long Term Evolution (LTE) Advanced and IEEE 802.16j specifications adopt the mobile multi-hop relaying (MMR) mechanism for enlarging service area and improving wireless transmission quality simultaneously. By deploying different types of Relay Stations (RSs), MMR can bring some advantages: (1) the signal fading and wireless interference of a single long wireless link is improved obviously; (2) the ranges of wireless access and relay area are extended, etc. MMR can offer a high data rate transmission for packet services and can increase system capacity. Note that MMR can be applied to the public transportation system, e.g., equipped a mobile RS on a high-speed train. A mobile RS handoff initializes a multiple handoff requests of different types of traffics. It becomes as a critical handoff issue in 4G MMR. Thus, the MMR handoff needs a new efficient Connection Admission Control (CAC) to guarantee qualities for various types of traffics and to increase system revenue. However, traditional CACs are difficult to fulfill the objectives. This paper thus proposes the Dynamic Cost-Reward-based (DCR) CAC that consists of two key mechanisms: (1) adopting a Markov decision process-based (MDP) cost function and (2) providing different reward functions for different types of nodes and various types of connection. Additionally, a mathematical analytical Markov chain is modeled for DCR. The simulation results are very close to the analysis results, which justifies the correctness of the analytical model. Numerical results demonstrate that DCA outperforms the compared CACs in the probabilities of new blocking, MS-handoff, and RS-handoff dropping, FRL, GoS, and system reward. 相似文献
65.
针对加氢分馏装置分馏塔工艺特点,重点分析加氢分馏塔所面临的控制问题,采用多变量预测控制软件APC—Adcon,通过实验测试、模型辨识、控制器和切换逻辑设计等工作实现该工业分馏塔系的多变量预测控制,显著提高两塔运行参数的平稳性,有效降低操作人员的操作难度。实际应用的结果表明该多变量预测控制系统可有效地克服干扰、确保工艺参数的平稳运行。通过该系统的应用使在相同的负荷下,燃料气减少5%,显著提高分馏塔的分离能力,组分切割更为合理,航空煤油收率提高0.4%,取得了显著的经济效益。 相似文献
66.
67.
基于关键词处理的传统检索技术会在检索过程中遗漏大量与检索概念相关或同义的内容。本文在本体基础上重点研究语义相似度算法及相应的语义扩展算法,在此基础上将模型应用于数字期刊的信息检索中,以提高查准率和查全率。 相似文献
68.
The aim of this paper is to develop an optimal technique for dealing with the fuzziness aspect of demand uncertainties. Triangular fuzzy numbers are used to model external demand, and decision models in both non-coordination and coordination situations are constructed. It is shown that in the decision models there exists a unique solution that can be expressed analytically. Based on the closed form solutions for both models, the behaviors and relationships of both the manufacturer and the retailer are quantitatively analyzed, and a cooperative policy for the optimization of the whole supply chain is put forward. 相似文献
69.
70.
One of the main problems in operational risk management is the lack of loss data, which affects the parameter estimates of the marginal distributions of the losses. The principal reason is that financial institutions only started to collect operational loss data a few years ago, due to the relatively recent definition of this type of risk. Considering this drawback, the employment of Bayesian methods and simulation tools could be a natural solution to the problem. The use of Bayesian methods allows us to integrate the scarce and, sometimes, inaccurate quantitative data collected by the bank with prior information provided by experts. An original proposal is a Bayesian approach for modelling operational risk and for calculating the capital required to cover the estimated risks. Besides this methodological innovation a computational scheme, based on Markov chain Monte Carlo simulations, is required. In particular, the application of the MCMC method to estimate the parameters of the marginals shows advantages in terms of a reduction of capital charge according to different choices of the marginal loss distributions. 相似文献