全文获取类型
收费全文 | 2090篇 |
免费 | 126篇 |
国内免费 | 104篇 |
专业分类
电工技术 | 89篇 |
综合类 | 360篇 |
化学工业 | 93篇 |
金属工艺 | 18篇 |
机械仪表 | 43篇 |
建筑科学 | 265篇 |
矿业工程 | 101篇 |
能源动力 | 67篇 |
轻工业 | 75篇 |
水利工程 | 90篇 |
石油天然气 | 44篇 |
武器工业 | 3篇 |
无线电 | 83篇 |
一般工业技术 | 145篇 |
冶金工业 | 343篇 |
原子能技术 | 44篇 |
自动化技术 | 457篇 |
出版年
2024年 | 7篇 |
2023年 | 42篇 |
2022年 | 37篇 |
2021年 | 60篇 |
2020年 | 57篇 |
2019年 | 61篇 |
2018年 | 34篇 |
2017年 | 53篇 |
2016年 | 58篇 |
2015年 | 61篇 |
2014年 | 106篇 |
2013年 | 113篇 |
2012年 | 123篇 |
2011年 | 178篇 |
2010年 | 200篇 |
2009年 | 253篇 |
2008年 | 102篇 |
2007年 | 104篇 |
2006年 | 122篇 |
2005年 | 112篇 |
2004年 | 99篇 |
2003年 | 63篇 |
2002年 | 52篇 |
2001年 | 57篇 |
2000年 | 28篇 |
1999年 | 30篇 |
1998年 | 19篇 |
1997年 | 13篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 6篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 3篇 |
1988年 | 6篇 |
1986年 | 2篇 |
1984年 | 4篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1979年 | 2篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1965年 | 3篇 |
1964年 | 4篇 |
1961年 | 1篇 |
1959年 | 1篇 |
1955年 | 1篇 |
1954年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有2320条查询结果,搜索用时 0 毫秒
81.
余震 《数字社区&智能家居》2013,(12):7672-7674
数据库系统作为信息系统中的基础软件,其安全性问题十分重要,尤其是对于并发事件的控制和处理。该文通过对于MySQL数据库系统的详细作用功能阐述,对其性能功能进行详细的研究后,利用ODBC API和MySQL自带的C API函数来实现MySQL数据库功能调用,使得其能够出现并发事件时,能快速有效的进行数据库的数据控制和处理。 相似文献
82.
Estimation of distributions involving unobservable events: the case of optimal search with unknown Target Distributions 总被引:1,自引:0,他引:1
We consider the problem of estimating the parameters of a distribution when the underlying events are themselves unobservable.
The aim of the exercise is to perform a task (for example, search a web-site or query a distributed database) based on a distribution
involving the state of nature, except that we are not allowed to observe the various “states of nature” involved in this phenomenon.
In particular, we concentrate on the task of searching for an object in a set of N locations (or bins) {C
1, C
2,…, C
N
}, in which the probability of the object being in the location C
i
is p
i
, where P = [p
1, p
2,…, p
N
]
T
is called the Target Distribution. Also, the probability of locating the object in the bin within a specified time, given that it is in the bin, is given by a function called the Detection function, which, in its most common instantiation, is typically, specified by an exponential function. The intention is to
allocate the available resources so as to maximize the probability of locating the object. The handicap, however, is that
the time allowed is limited, and thus the fact that the object is not located in bin C
i
within a specified time does not necessarily imply that the object is not in C
i
. This problem has applications in searching large databases, distributed databases, and the world-wide web, where the location
of the files sought for are unknown, and in developing various military and strategic policies. All of the research done in
this area has assumed the knowledge of the {p
i
}. In this paper we consider the problem of obtaining error bounds, estimating the Target Distribution, and allocating the
search times when the {p
i
} are unknown. To the best of our knowledge, these results are of a pioneering sort - they are the first available results
in this area, and are particularly interesting because, as mentioned earlier, the events concerning the Target Distribution,
in themselves, are unobservable.
Qingxin Zhu Qingxin Zhu got his Bachelor’s degree in Mathematics in 1981 from Sichuan Normal University, China. He got the Master’s degree in Applied Mathematics from Beijing Institute of Technology in 1984. From 1984 to 1988 he was employed by the Southwest Technical Physics Institute. In 1988, he continued his higher education with the Department of Mathematics, University of Ottawa, Canada and got a PhD degree in 1993. From 1993 to 1996, he did postgraduate research and got a second Master’s degree in Computer Science from Carleton University, Canada. He is currently a Professor with the University of Electronics Science and Technology of China (UESTC). His research interests are Optimal Search Theory, Computer Applications, and Bioinformatics. B. John Oommen Dr. John Oommen was born in Coonoor, India on 9 September 1953. He obtained his B.Tech. degree from the Indian Institute of Technology, Madras, India in 1975. He obtained his M.E. from the Indian Institute of Science in Bangalore, India in 1977. He then went on for his MS and PhD which he obtained from Purdue University, in West Lafayettte, Indiana in 1979 and 1982, respectively. He joined the School of Computer Science at Carleton University in Ottawa, Canada, in the 1981–1982 academic year. He is still at Carleton and holds the rank of a Full Professor. Since July 2006, he has been awarded the honorary rank of Chancellor's Professor, which is a lifetime award from Carleton University. His research interests include Automata Learning, Adaptive Data Structures, Statistical and Syntactic Pattern Recognition, Stochastic Algorithms and Partitioning Algorithms. He is the author of more than 280 refereed journal and conference publications, and is a Fellow of the IEEE and a Fellow of the IAPR. Dr. Oommen is on the Editorial Board of the IEEE Transactions on Systems, Man and Cybernetics, and Pattern Recognition. 相似文献
B. John Oommen (Corresponding author)Email: |
Qingxin Zhu Qingxin Zhu got his Bachelor’s degree in Mathematics in 1981 from Sichuan Normal University, China. He got the Master’s degree in Applied Mathematics from Beijing Institute of Technology in 1984. From 1984 to 1988 he was employed by the Southwest Technical Physics Institute. In 1988, he continued his higher education with the Department of Mathematics, University of Ottawa, Canada and got a PhD degree in 1993. From 1993 to 1996, he did postgraduate research and got a second Master’s degree in Computer Science from Carleton University, Canada. He is currently a Professor with the University of Electronics Science and Technology of China (UESTC). His research interests are Optimal Search Theory, Computer Applications, and Bioinformatics. B. John Oommen Dr. John Oommen was born in Coonoor, India on 9 September 1953. He obtained his B.Tech. degree from the Indian Institute of Technology, Madras, India in 1975. He obtained his M.E. from the Indian Institute of Science in Bangalore, India in 1977. He then went on for his MS and PhD which he obtained from Purdue University, in West Lafayettte, Indiana in 1979 and 1982, respectively. He joined the School of Computer Science at Carleton University in Ottawa, Canada, in the 1981–1982 academic year. He is still at Carleton and holds the rank of a Full Professor. Since July 2006, he has been awarded the honorary rank of Chancellor's Professor, which is a lifetime award from Carleton University. His research interests include Automata Learning, Adaptive Data Structures, Statistical and Syntactic Pattern Recognition, Stochastic Algorithms and Partitioning Algorithms. He is the author of more than 280 refereed journal and conference publications, and is a Fellow of the IEEE and a Fellow of the IAPR. Dr. Oommen is on the Editorial Board of the IEEE Transactions on Systems, Man and Cybernetics, and Pattern Recognition. 相似文献
83.
环境伦理观研究的是人与自然之间的伦理关系,人居环境伦理观则是在具体对象上对环境伦理观的细化,研究的对象是人与人居环境的伦理关系。人居环境伦理观赋予人关心和保护人居环境,从而其实也是关心与保护人类自己的特殊职责。人居环境目前正面临着诸多危机,如城市环境污染,室内空气污染等,这意味着人居环境伦理观出现的危机,而这些危机与建筑材料密切相关。针对由于建筑材料引起的人居环境危机,提出了改善人居环境质量的途径之一,就是建筑材料的绿色化。 相似文献
84.
金融危机影响全球钼加工业经济,通过对中国钼加工业面临的挑战与机遇分析,指出金融危机下中国钼加工业的发展应拓宽钼的应用领域,突破加工瓶颈,促进产业升级,提出了理念创新、人才战略和有序发展等建议。 相似文献
85.
为了提高网络热点事件的预测精度,提出一种基于遗传优化加权相关向量机的网络热点事件预测模型(GA-WRVM)。首先对每个样本数据的噪声方差加上一个权值系数得到加权相关向量机,然后用组合核函数代替相关向量机的单一核函数,并采用遗传算法对核参数进行优化建立预测模型,最后利用网络热点数据进行仿真实验分析。结果表明,相对于神经网络和支持向量机,GA-WRVM降低了网络热点事件的预测误差,获得了更高的网络热点预测精度,具有更强的泛化能力。 相似文献
86.
根据确认的众多量测和众多目标跟踪窗之间的几何关系,引入确认矩阵并计算所有联合事件及其对应的参数,不论量测是否落入跟踪窗相交区域,根据JPDA算法计算每一个量测与其可能的各个源目标之间互联的概率。将互联的概率与Kalman滤波器相结合从而完成对每一个目标的预测和更新。理论及实验结果表明,该算法适用于序列图像密集杂波环境下的全程跟踪,并取得了一定的理论和仿真结果。 相似文献
87.
针对相位敏感光时域反射(Φ-OTDR)分布式光纤振动传感系统如何对振动事件进行高效准确识别的问题,本文提出了一种基于多尺度一维卷积神经网络(MS 1-D CNN)的振动事件识别方法。该方法将原始振动信号经过预加重、归一化和谱减降噪的预处理操作后得到的一维信号,直接通过MS 1-D CNN实现端到端的振动信号特征的提取和识别。MS 1-D CNN在提取入侵振动信号特征时可兼顾信号时间和频率尺度,利用全连接层(FC layer)和Softmax层完成最终的识别过程,与二维卷积神经网络(2-D CNN)和一维卷积神经网络(1-D CNN)相比减少了待定参数数量。对破坏、敲击和干扰三类目标振动事件的光纤振动传感信号识别结果表明,MS 1-D CNN的识别正确率与2-D CNN相近,达到了96%以上,而处理速度提升一倍,在保持识别性能的前提下,有利于提高振动事件识别的实时性。 相似文献
88.
Chuihuai You Tianzhen Cui Chang Zhang Shoujian Zang Yachun Su Youxiong Que 《International journal of molecular sciences》2023,24(1)
Gelsemium elegans (G. elegans) is a Chinese medicinal plant with substantial economic and feeding values. There is a lack of detailed studies on the mitochondrial genome of G. elegans. In this study, the mitochondrial genome of G. elegans was sequenced and assembled, and its substructure was investigated. The mitochondrial genome of G. elegans is represented by two circular chromosomes of 406,009 bp in length with 33 annotated protein-coding genes, 15 tRNA genes, and three rRNA genes. We detected 145 pairs of repeats and found that four pairs of repeats could mediate the homologous recombination into one major conformation and five minor conformations, and the presence of conformations was verified by PCR amplification and Sanger sequencing. A total of 124 SSRs were identified in the G. elegans mitochondrial genome. The homologous segments between the chloroplast and mitochondrial genomes accounted for 5.85% of the mitochondrial genome. We also predicted 477 RNA potential editing sites and found that the nad4 gene was edited 38 times, which was the most frequent occurrence. Taken together, the mitochondrial genome of G. elegans was assembled and annotated. We gained a more comprehensive understanding on the genome of this medicinal plant, which is vital for its effective utilization and genetic improvement, especially for cytoplasmic male sterility breeding and evolution analysis in G. elegans. 相似文献
89.
参考人体行走电压的测试标准IEC 61340-4-5, 搭建了电缆由线轴上绕下并在地板上拖拽积累的电压的测试系统, 测量了六类非屏蔽网线的电压波形.基于实测电缆电压波形, 提出了电缆电压的RC等效电路模型, 并分析了模型参数对电缆电压时域波形的影响.进行了电缆充电后对金属靶的放电实验, 测量了电缆放电事件的电流波形、瞬态电场和瞬态磁场波形, 分析了电缆放电事件对电子设备的影响.根据测量的电缆放电事件的电流波形, 对比了GJB 151B中CS 115电缆束注入脉冲激励传导敏感度的电流波形, 二者电流波形有一定的相似性, 但是对于较长电缆在电流的强度和宽度方面都会大于CS 115规定的限值.因此, 提出了电缆放电事件的防护方法, 并对相关标准的改进方面提出了初步建议. 相似文献
90.
于燕波 《电脑编程技巧与维护》2008,(17):102-103
随着计算机的发展,互联网的共享性,开放性以及互联程度的不断扩大。其中lnternet的广泛普及,商业数字货币,网络银行等一部分网络新业务的迅速兴起,使得计算机网络的安全问题越来越显得重要,本文归纳总结,提出网络信息中的一些安全防护策略。 相似文献