全文获取类型
收费全文 | 12855篇 |
免费 | 880篇 |
国内免费 | 602篇 |
专业分类
电工技术 | 2088篇 |
综合类 | 1046篇 |
化学工业 | 295篇 |
金属工艺 | 253篇 |
机械仪表 | 1262篇 |
建筑科学 | 314篇 |
矿业工程 | 299篇 |
能源动力 | 142篇 |
轻工业 | 127篇 |
水利工程 | 60篇 |
石油天然气 | 102篇 |
武器工业 | 270篇 |
无线电 | 1676篇 |
一般工业技术 | 306篇 |
冶金工业 | 176篇 |
原子能技术 | 116篇 |
自动化技术 | 5805篇 |
出版年
2024年 | 25篇 |
2023年 | 44篇 |
2022年 | 98篇 |
2021年 | 114篇 |
2020年 | 170篇 |
2019年 | 87篇 |
2018年 | 93篇 |
2017年 | 188篇 |
2016年 | 223篇 |
2015年 | 328篇 |
2014年 | 686篇 |
2013年 | 514篇 |
2012年 | 949篇 |
2011年 | 1069篇 |
2010年 | 797篇 |
2009年 | 687篇 |
2008年 | 870篇 |
2007年 | 1160篇 |
2006年 | 1066篇 |
2005年 | 1093篇 |
2004年 | 796篇 |
2003年 | 771篇 |
2002年 | 631篇 |
2001年 | 452篇 |
2000年 | 359篇 |
1999年 | 264篇 |
1998年 | 164篇 |
1997年 | 128篇 |
1996年 | 111篇 |
1995年 | 80篇 |
1994年 | 63篇 |
1993年 | 44篇 |
1992年 | 34篇 |
1991年 | 26篇 |
1990年 | 16篇 |
1989年 | 21篇 |
1988年 | 13篇 |
1987年 | 12篇 |
1986年 | 7篇 |
1985年 | 17篇 |
1984年 | 14篇 |
1983年 | 12篇 |
1982年 | 12篇 |
1981年 | 13篇 |
1980年 | 4篇 |
1979年 | 6篇 |
1978年 | 3篇 |
1977年 | 2篇 |
1973年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
本文在分析智能接触器发展前景的基础上,结合现场总线说明数据通讯能力对于接触器监控的重要性。利用计算机强大的图形处理和数据计算能力。将工业现场一定数量的接触器应用现场总线组成控制局域网,通过监控计算机实施本地或远程监控和管理。 相似文献
102.
103.
介绍了水厂生产管理决策支持系统的设计原理和方法,其中主要讲述了数据库和知识库的建立,并阐述了该系统的运行功能、管理和维护方法。 相似文献
104.
《Expert systems with applications》2014,41(9):4337-4348
A goal of this study is to develop a Composite Knowledge Manipulation Tool (CKMT). Some of traditional medical activities are rely heavily on the oral transfer of knowledge, with the risk of losing important knowledge. Moreover, the activities differ according to the regions, traditions, experts’ experiences, etc. Therefore, it is necessary to develop an integrated and consistent knowledge manipulation tool. By using the tool, it will be possible to extract the tacit knowledge consistently, transform different types of knowledge into a composite knowledge base (KB), integrate disseminated and complex knowledge, and complement the lack of knowledge. For the reason above, I have developed the CKMT called as K-Expert and it has four advanced functionalities as follows. Firstly, it can extract/import logical rules from data mining (DM) with the minimum of effort. I expect that the function can complement the oral transfer of traditional knowledge. Secondly, it transforms the various types of logical rules into database (DB) tables after the syntax checking and/or transformation. In this situation, knowledge managers can refine, evaluate, and manage the huge-sized composite KB consistently with the support of the DB management systems (DBMS). Thirdly, it visualizes the transformed knowledge in the shape of decision tree (DT). With the function, the knowledge workers can evaluate the completeness of the KB and complement the lack of knowledge. Finally, it gives SQL-based backward chaining function to the knowledge users. It could reduce the inference time effectively since it is based on SQL query and searching not the sentence-by-sentence translation used in the traditional inference systems. The function will give the young researchers and their fellows in the field of knowledge management (KM) and expert systems (ES) more opportunities to follow up and validate their knowledge. Finally, I expect that the approach can present the advantages of mitigating knowledge loss and the burdens of knowledge transformation and complementation. 相似文献
105.
106.
《Expert systems with applications》2014,41(11):5416-5430
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQLIA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQLIA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods. 相似文献
107.
为提高CAN测控网络的适应性和通信效率,以CAN2.0A技术规范为基础,针对流程加工测控网络的特点,设计面向流程加工领域的CAN总线应用层协议ProCAN。在明确流程加工概念及范围的基础上,分析流程加工测控系统结构模型的特征,提出通信报文的类型,定义标准数据帧仲裁域与数据域的编码格式,并讨论ProCAN协议的通信模式、通信状态、通信异常及长报文误帧重传控制。利用OPNET网络仿真软件进行实验,结果表明,ProCAN协议能实现报文通信,并且具有延时短、实时性强、可靠性高的特点,尤其当网络负载较大时,效果更为明显。 相似文献
108.
109.
110.