全文获取类型
收费全文 | 31494篇 |
免费 | 3404篇 |
国内免费 | 1844篇 |
专业分类
电工技术 | 2623篇 |
综合类 | 3123篇 |
化学工业 | 1962篇 |
金属工艺 | 504篇 |
机械仪表 | 1646篇 |
建筑科学 | 5225篇 |
矿业工程 | 4608篇 |
能源动力 | 990篇 |
轻工业 | 380篇 |
水利工程 | 1594篇 |
石油天然气 | 835篇 |
武器工业 | 530篇 |
无线电 | 2237篇 |
一般工业技术 | 1662篇 |
冶金工业 | 1120篇 |
原子能技术 | 172篇 |
自动化技术 | 7531篇 |
出版年
2024年 | 111篇 |
2023年 | 315篇 |
2022年 | 748篇 |
2021年 | 987篇 |
2020年 | 1081篇 |
2019年 | 786篇 |
2018年 | 766篇 |
2017年 | 927篇 |
2016年 | 1114篇 |
2015年 | 1239篇 |
2014年 | 2455篇 |
2013年 | 1891篇 |
2012年 | 2873篇 |
2011年 | 2876篇 |
2010年 | 2243篇 |
2009年 | 2202篇 |
2008年 | 2149篇 |
2007年 | 2390篇 |
2006年 | 1881篇 |
2005年 | 1565篇 |
2004年 | 1247篇 |
2003年 | 1111篇 |
2002年 | 859篇 |
2001年 | 642篇 |
2000年 | 482篇 |
1999年 | 353篇 |
1998年 | 275篇 |
1997年 | 238篇 |
1996年 | 195篇 |
1995年 | 152篇 |
1994年 | 157篇 |
1993年 | 92篇 |
1992年 | 65篇 |
1991年 | 47篇 |
1990年 | 44篇 |
1989年 | 39篇 |
1988年 | 24篇 |
1987年 | 14篇 |
1986年 | 13篇 |
1985年 | 19篇 |
1984年 | 15篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 6篇 |
1980年 | 5篇 |
1979年 | 7篇 |
1970年 | 3篇 |
1959年 | 3篇 |
1957年 | 2篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
21.
介绍了油温变化对40T支架搬运车液压系统油液黏度、液压介质和橡胶类密封件的影响,分析了液压系统的总发热功率、总散热功率,结合动态热平衡的计算,找出了液压系统总效率与油温变化之间的关系,并给出其函数关系式。根据这种关系,通过一种工况的油温实测数据取样,计算出相应的效率值,定量地验证了液压系统油温变化引起效率变化的关系,得出了总效率随着温度变化而变化的结论,即温差增大时,总效率降低;温差减小时,总效率增大。通过该结论可以全面掌握系统的工作状态,通过降低油温有效提高效率。 相似文献
22.
Rapid growth of the volume of interactive questions available to the students of modern E‐Learning courses placed the problem of personalized guidance on the agenda of E‐Learning researchers. Without proper guidance, students frequently select too simple or too complicated problems and ended either bored or discouraged. This paper explores a specific personalized guidance technology known as adaptive navigation support. We developed JavaGuide, a system, which guides students to appropriate questions in a Java programming course, and investigated the effect of personalized guidance a three‐semester long classroom study. The results of this study confirm the educational and motivational effects of adaptive navigation support. 相似文献
23.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA. 相似文献
24.
A DSS integrating empty and full containers transshipment operations is presented, addressing the typically unbalanced export/import containers trading problem. The problem is modeled as a network, where nodes represent customers, leasing companies, harbors and warehouses, while arcs represent transportation routes. The underlying mathematical model operates in stages, first prioritizing and adjusting full containers demands considering available empty containers supplies, and then statically optimizing costs. Transportation routes are registered and dynamically controlled, cyclically, for a given time horizon. The DSS is flexible, allowing several parameters to be configured. Experimental examples using randomly generated parameters were conducted to evaluate the effectiveness of the system. 相似文献
25.
Pricing schemes for digital content with DRM mechanisms 总被引:1,自引:0,他引:1
In this paper, utilizing game-theoretic model, we examine the impact of collaborative structure, content quality, and network environment on the development of pricing scheme and DRM protection policy of digital content. DRM protection level decreases and pirating activities becomes relatively tolerable as the content provider and platform provider operate collaboratively. Depending on the market structure, higher content quality may strengthen or weaken the adoption of DRM. However, it would seem that, as the network environment becomes more decentralized and uncontrolled, weaker DRM protection should be a better strategy. 相似文献
26.
Breast cancer is one of the most common cancers diagnosed in women. Large margin classifiers like the support vector machine (SVM) have been reported effective in computer-assisted diagnosis systems for breast cancers. However, since the separating hyperplane determination exclusively relies on support vectors, the SVM is essentially a local classifier and its performance can be further improved. In this work, we introduce a structured SVM model to determine if each mammographic region is normal or cancerous by considering the cluster structures in the training set. The optimization problem in this new model can be solved efficiently by being formulated as one second order cone programming problem. Experimental evaluation is performed on the Digital Database for Screening Mammography (DDSM) dataset. Various types of features, including curvilinear features, texture features, Gabor features, and multi-resolution features, are extracted from the sample images. We then select the salient features using the recursive feature elimination algorithm. The structured SVM achieves better detection performance compared with a well-tested SVM classifier in terms of the area under the ROC curve. 相似文献
27.
设计并实施了一种基于云计算的营销决策支持系统,和其他管理决策子系统发生交互,共同构成了完整的现代企业经营决策支持系统.系统的数据库采用分布式设计,使得系统既有独立处理本地数据库的能力,也可读取异地数据库中的数据.系统模型库包含多种营销因素的决策模型,并采用模型组合的思想,将复杂的决策问题通过模型之间的组合来实现.在流程设计上充分考虑人机交互,将用户的经验判断纳入到决策过程中.完成了系统的开发,并用仿真数据进行了系统测试,结果表明系统基本运行稳定,各子模块衔接良好,与其他子系统实现了数据共享. 相似文献
28.
Loren Paul ReesAuthor VitaeJason K. DeaneAuthor Vitae Terry R. RakesAuthor VitaeWade H. BakerAuthor Vitae 《Decision Support Systems》2011,51(3):493-505
Security countermeasures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due to uncertainty, the financial impact of threats attacking assets is often difficult to measure quantitatively, and thus it is difficult to prescribe which countermeasures to employ. In this research, we describe a decision support system for calculating the uncertain risk faced by an organization under cyber attack as a function of uncertain threat rates, countermeasure costs, and impacts on its assets. The system uses a genetic algorithm to search for the best combination of countermeasures, allowing the user to determine the preferred tradeoff between the cost of the portfolio and resulting risk. Data collected from manufacturing firms provide an example of results under realistic input conditions. 相似文献
29.
Chung‐Shi Tseng 《Asian journal of control》2008,10(4):420-429
In this study, a robust nonlinear L∞‐gain tracking control design for uncertain robotic systems is proposed under persistent bounded disturbances. The design objective is that the peak of the tracking error in time domain must be as small as possible under persistent bounded disturbances. Since the nonlinear L∞ ‐gain optimal tracking control cannot be solved directly, the nonlinear L∞ ‐gain optimal tracking problem is transformed into a nonlinear L∞ ‐gain tracking problem by given a prescribed disturbance attenuation level for the L∞ ‐gain tracking performance. To guarantee that the L∞ ‐gain tracking performance can be achieved for the uncertain robotic systems, a sliding‐mode scheme is introduced to eliminate the effect of the parameter uncertainties. By virtue of the skew‐symmetric property of the robotic systems, sufficient conditions are developed for solving the robust L∞ ‐gain tracking control problems in terms of an algebraic equation instead of a differential equation. The proposed method is simple and the algebraic equation can be solved analytically. Therefore, the proposed robust L∞ ‐gain tracking control scheme is suitable for practical control design of uncertain robotic systems. Copyright © 2008 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
30.
A multimodel scheme is designed for a triggering tunnel-diode circuit. The scheme improves the transient behavior during the transition time period after switching from a stable system equilibrium point to another one which is known as a triggering process. Each model is obtained by a linearization of the circuit near an equilibrium point. Moreover, each of these models can be described as a combination of two other transfer functions describing the linearized plant behavior near two different equilibrium points. The scheme chooses online the model with the best tracking performance in order to generate the control law. Different reference transfer functions are proposed with the aim of generating the desired transient in the triggering process. Some simulations show the usefulness of this scheme. 相似文献