全文获取类型
收费全文 | 2469篇 |
免费 | 52篇 |
国内免费 | 68篇 |
专业分类
电工技术 | 8篇 |
综合类 | 33篇 |
化学工业 | 52篇 |
金属工艺 | 8篇 |
机械仪表 | 19篇 |
建筑科学 | 128篇 |
矿业工程 | 8篇 |
能源动力 | 12篇 |
轻工业 | 51篇 |
水利工程 | 8篇 |
石油天然气 | 10篇 |
武器工业 | 2篇 |
无线电 | 90篇 |
一般工业技术 | 34篇 |
冶金工业 | 1238篇 |
原子能技术 | 5篇 |
自动化技术 | 883篇 |
出版年
2020年 | 16篇 |
2017年 | 20篇 |
2016年 | 39篇 |
2015年 | 27篇 |
2014年 | 64篇 |
2013年 | 64篇 |
2012年 | 81篇 |
2011年 | 109篇 |
2010年 | 111篇 |
2009年 | 154篇 |
2008年 | 132篇 |
2007年 | 176篇 |
2006年 | 181篇 |
2005年 | 125篇 |
2004年 | 105篇 |
2003年 | 106篇 |
2002年 | 77篇 |
2001年 | 54篇 |
2000年 | 41篇 |
1999年 | 25篇 |
1998年 | 20篇 |
1997年 | 24篇 |
1995年 | 27篇 |
1994年 | 15篇 |
1992年 | 17篇 |
1990年 | 20篇 |
1989年 | 29篇 |
1988年 | 26篇 |
1987年 | 19篇 |
1986年 | 43篇 |
1985年 | 27篇 |
1984年 | 21篇 |
1982年 | 19篇 |
1981年 | 30篇 |
1979年 | 17篇 |
1977年 | 17篇 |
1976年 | 15篇 |
1975年 | 17篇 |
1973年 | 19篇 |
1971年 | 25篇 |
1970年 | 21篇 |
1969年 | 23篇 |
1968年 | 46篇 |
1967年 | 15篇 |
1966年 | 21篇 |
1965年 | 32篇 |
1964年 | 27篇 |
1961年 | 15篇 |
1958年 | 14篇 |
1956年 | 18篇 |
排序方式: 共有2589条查询结果,搜索用时 31 毫秒
51.
52.
发现频繁项集是关联规则挖掘中最基本、最重要的问题.提出了一种基于二进制表示的频繁项集挖掘算法,并利用二进制的性质快速产生候选项集并计算其支持度.算法总体性能在一定程度上得到了提高. 相似文献
53.
In current society, artificial intelligence processing technology offers convenient video monitoring, but also raises the risk of privacy leakage. Theoretically, the data used in intelligent video processing methods may directly convey visual information containing private content. For the above problem, this paper uses a multi-layer visual privacy-protected (VPP) coding method to blur private content in the video at the visual level, while avoiding the loss of important visual features contained in the video as much as possible. And this provides a guarantee of the quality of the subsequent keyframe extraction step. Then a visual evaluation algorithm is proposed for assessing the quality of VPP-encoded video privacy protection. And the experiment shows that the results are consistent with those of subjective evaluation. In addition, for VPP-encoded video, we propose an unsupervised two-layer clustering keyframe extraction method with corresponding performance evaluation index. Finally, an association model is established to balance the privacy protection quality and the keyframe extraction performance. 相似文献
54.
《The Journal of Strategic Information Systems》2022,31(4):101746
The Journal of Strategic Information Systems (JSIS) was first published December 1991 by Robert (Bob) D. Galliers, its Founding Editor-in-Chief (EiC). Early on Bob invited me to join the JSIS International Editorial Board1 (the Board then being more operational, with members serving as quasi-AEs, an arrangement we’ve reinstituted more recently). I became Pacific Asia Region Editor in 2003, with JSIS shifting from region editors to Senior Editors in 2007, in which role I served the journal through the end of 2018. Mid-2018 Bob and Sirkka (Sirkka Jarvenpaa joined as co-EiC in 2000) jointly decided it was time; and announced they would both step down from their co-EiC roles at the end of that year. In September 2018, I was endorsed by Bob and Sirkka, the Senior Editors and Elsevier, to succeed Bob and Sirkka and assume the role of Editor-in-Chief of JSIS commencing 1 January 2019. I served as Editor-in-Chief through 1 July 2021 after which Yolande Chan and I served as co-Editors-in-Chief. Now the end of 2022, I am stepping down from operational involvement with the journal. In this my final editorial I focus on my time as EiC, also reflecting on my almost 3 decades with the journal. I much appreciate being invited to write these brief ruminations and am honoured to be included amongst the journal’s Emeritus, along with the esteemed Robert Galliers and Sirkka Jarvenpaa. 相似文献
55.
Sohaib Manzoor Hira Manzoor Saddaf Rubab Muhammad Attique Khan Majed Alhaisoni Abdullah Alqahtani Ye Jin Kim Byoungchol Chang 《计算机、材料和连续体(英文)》2023,75(2):2347-2363
Despite the planned installation and operations of the traditional IEEE 802.11 networks, they still experience degraded performance due to the number of inefficiencies. One of the main reasons is the received signal strength indicator (RSSI) association problem, in which the user remains connected to the access point (AP) unless the RSSI becomes too weak. In this paper, we propose a multi-criterion association (WiMA) scheme based on software defined networking (SDN) in Wi-Fi networks. An association solution based on multi-criterion such as AP load, RSSI, and channel occupancy is proposed to satisfy the quality of service (QoS). SDN having an overall view of the network takes the association and reassociation decisions making the handoffs smooth in throughput performance. To implement WiMA extensive simulations runs are carried out on Mininet-NS3-Wi-Fi network simulator. The performance evaluation shows that the WiMA significantly reduces the average number of retransmissions by 5%–30% and enhances the throughput by 20%–50%, hence maintaining user fairness and accommodating more wireless devices and traffic load in the network, when compared to traditional client-driven (CD) approach and state of the art Wi-Balance approach. 相似文献
56.
Managerial decision-making processes often involve data of the time nature and need to understand complex temporal associations among events. Extending classical association rule mining approaches in consideration of time in order to obtain temporal information/knowledge is deemed important for decision support, which is nowadays one of the key issues in business intelligence. This paper presents the notion of multi-temporal patterns with four different temporal predicates, namely before, during, equal and overlap, and discusses a number of related properties, based on which a mining algorithm is designed. This enables us to effectively discover multi-temporal patterns in large-scale temporal databases by reducing the database scan in the generation of candidate patterns. The proposed approach is then applied to stock markets, aimed at exploring possible associative movements between the stock markets of Chinese mainland and Hong Kong so as to provide helpful knowledge for investment decisions. 相似文献
57.
58.
Lin-huang Chang Author Vitae Chun-hui Sung Author Vitae Author Vitae Yen-wen Lin Author Vitae 《Journal of Systems and Software》2010,83(12):2536-2555
In this paper we design and implement the pseudo session initiation protocol (p-SIP) server embedded in each mobile node to provide the ad-hoc voice over Internet protocol (VoIP) services. The implemented p-SIP server, being compatible with common VoIP user agents, integrates the standard SIP protocol with SIP presence to handle SIP signaling and discovery mechanism in the ad-hoc VoIP networks. The ad-hoc VoIP signaling and voice traffic performances are analyzed using E-model R rating value for up to six hops in the implemented test-bed. We also conduct the interference experiments to imitate the practical ad-hoc VoIP environment. The analyzed results demonstrate the realization of ad-hoc VoIP services by using p-SIP server. 相似文献
59.
Given a real number sequence A=(a1,a2,…,an), an average lower bound L, and an average upper bound U, the Average-Constrained Maximum-Sum Segment problem is to locate a segment A(i,j)=(ai,ai+1,…,aj) that maximizes ∑i?k?jak subject to . In this paper, we give an O(n)-time algorithm for the case where the average upper bound is ineffective, i.e., U=∞. On the other hand, we prove that the time complexity of the problem with an effective average upper bound is Ω(nlogn) even if the average lower bound is ineffective, i.e., L=−∞. 相似文献
60.
Frequent pattern mining is an essential theme in data mining. Existing algorithms usually use a bottom-up search strategy. However, for very high dimensional data, this strategy cannot fully utilize the minimum support constraint to prune the rowset search space. In this paper, we propose a new method called top-down mining together with a novel row enumeration tree to make full use of the pruning power of the minimum support constraint. Furthermore, to efficiently check if a rowset is closed, we develop a method called the trace-based method. Based on these methods, an algorithm called TD-Close is designed for mining a complete set of frequent closed patterns. To enhance its performance further, we improve it by using new pruning strategies and new data structures that lead to a new algorithm TTD-Close. Our performance study shows that the top-down strategy is effective in cutting down search space and saving memory space, while the trace-based method facilitates the closeness-checking. As a result, the algorithm TTD-Close outperforms the bottom-up search algorithms such as Carpenter and FPclose in most cases. It also runs faster than TD-Close. 相似文献