全文获取类型
收费全文 | 11248篇 |
免费 | 1533篇 |
国内免费 | 1213篇 |
专业分类
电工技术 | 1026篇 |
综合类 | 1553篇 |
化学工业 | 1076篇 |
金属工艺 | 527篇 |
机械仪表 | 638篇 |
建筑科学 | 933篇 |
矿业工程 | 337篇 |
能源动力 | 310篇 |
轻工业 | 825篇 |
水利工程 | 575篇 |
石油天然气 | 400篇 |
武器工业 | 147篇 |
无线电 | 972篇 |
一般工业技术 | 1044篇 |
冶金工业 | 338篇 |
原子能技术 | 63篇 |
自动化技术 | 3230篇 |
出版年
2024年 | 101篇 |
2023年 | 389篇 |
2022年 | 483篇 |
2021年 | 611篇 |
2020年 | 559篇 |
2019年 | 427篇 |
2018年 | 343篇 |
2017年 | 356篇 |
2016年 | 353篇 |
2015年 | 409篇 |
2014年 | 532篇 |
2013年 | 685篇 |
2012年 | 673篇 |
2011年 | 680篇 |
2010年 | 565篇 |
2009年 | 627篇 |
2008年 | 620篇 |
2007年 | 814篇 |
2006年 | 768篇 |
2005年 | 660篇 |
2004年 | 594篇 |
2003年 | 468篇 |
2002年 | 378篇 |
2001年 | 390篇 |
2000年 | 274篇 |
1999年 | 260篇 |
1998年 | 183篇 |
1997年 | 128篇 |
1996年 | 132篇 |
1995年 | 101篇 |
1994年 | 99篇 |
1993年 | 69篇 |
1992年 | 47篇 |
1991年 | 42篇 |
1990年 | 39篇 |
1989年 | 28篇 |
1988年 | 33篇 |
1987年 | 18篇 |
1986年 | 13篇 |
1985年 | 6篇 |
1984年 | 7篇 |
1983年 | 6篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 6篇 |
1979年 | 4篇 |
1977年 | 2篇 |
1975年 | 2篇 |
1964年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
应用改进的V-detector算法检测蠕虫 总被引:1,自引:0,他引:1
通过分析主机感染蠕虫后网络流量特性的变化,基于免疫系统的阴性选择机制,提出了一种蠕虫检测方法。首先改进了可变半径实值阴性选择算法V-detector,改进策略是在检测器生成过程中根据非自体空间的分布产生具有尽可能大覆盖范围的检测器。改进算法与原算法相比,所生成的检测器集合中检测器的数量大幅度下降,检测效率提高。应用改进的V-detector算法生成检测器集合监控主机的网络流量特性,以检测蠕虫攻击。实验结果表明,该方法能有效检测传统蠕虫及多维传播的多态蠕虫。 相似文献
992.
993.
针对自行火炮维修保障中存在大量维修案例没有被记录和整理、维修中故障诊断效率低等现状和诸多不足,提出了将人工智能中的基于案例推理技术(CBR)与人工神经网络技术(ANN)相结合(即CBR—ANN)应用于自行火炮的故障诊断中,建立了故障诊断系统;同时对诊断系统中的几个关键技术——案例的混合聚类模型、案例的表达及基于3层BP神经网络的案例索引进行了设计和说明。该系统的完善和应用有利于提高自行火炮的维修保障能力。 相似文献
994.
层际高峰交通是上行高峰、下行高峰与层间交通客流的融合,午饭交通就是发生在现代办公楼内的层际高峰交通之一,基于午饭时期层际高峰交通的特点,本文提出了一种利用人工免疫算法实现电梯群控制动态优化的策略.该策略采用两级优化控制,利用常规的THV算法对层站召唤分配实施局部优化,采用人工免疫算法定时对层站召唤分配实施全局优化.同单纯的THV算法相比,本文提出的组合算法将平均的系统等待时间降低了21.26%,仿真结果表明,本文提出的优化控制策略能够改善午饭时期电梯系统的服务性能,具有较好的现实意义和研究价值。 相似文献
995.
Cyber attacks on computer and network systems induce system quality and reliability problems, and present a significant threat to the computer and network systems that we are heavily dependent on. Cyber attack detection involves monitoring system data and detecting the attack‐induced quality and reliability problems of computer and network systems caused by cyber attacks. Usually there are ongoing normal user activities on computer and network systems when an attack occurs. As a result, the observed system data may be a mixture of attack data and normal use data (norm data). We have established a novel attack–norm separation approach to cyber attack detection that includes norm data cancelation to improve the data quality as an important part of this approach. Aiming at demonstrating the importance of norm data cancelation, this paper presents a set of data modeling and analysis techniques developed to perform norm data cancelation before applying an existing technique of anomaly detection, the chi‐square distance monitoring (CSDM), to residual data obtained after norm data cancelation for cyber attack detection. Specifically, a Markov chain model of norm data and an artificial neural network (ANN) of norm data cancelation are developed and tested. This set of techniques is compared with using CSDM alone for cyber attack detection. The results show a significant improvement of detection performance by CSDM with norm data cancelation over CSDM alone. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
996.
This paper presents vision‐based control strategies for decentralized stabilization of unmanned vehicle formations. Three leader–follower formation control algorithms, which ensure asymptotic co‐ordinated motion, are described and compared. The first algorithm is a full state feedback nonlinear controller that requires full knowledge of the leader's velocities and accelerations. The second algorithm is a robust state feedback nonlinear controller that requires knowledge of the rate of change of the relative position error. Finally, the third algorithm is an output feedback approach that uses a high‐gain observer to estimate the derivative of the unmanned vehicles' relative position. Thus, this algorithm only requires knowledge of the leader–follower relative distance and bearing angle. Both data are computed using measurements from a single camera, eliminating sensitivity to information flow between vehicles. Lyapunov's stability theory‐based analysis and numerical simulations in a realistic 3D environment show the stability properties of the control methodologies. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
997.
选择两种商品化的低甲醛防皱整理剂,使用常规工艺对棉织物进行防皱整理.将整理织物分别在不同pH值的蒸馏水以及人工汗液中进行释放甲醛试验,比较整理织物在不同水介质中的甲醛释放规律的异同点,并考察汗液体积对整理织物甲醛释放的影响.研究结果表明,防皱整理织物在碱性水溶液中比在酸性水溶液中更易于释放甲醛;在相同条件下,防皱整理织物在人工汗液中的释放量都低于它们在蒸馏水中的对应释放量. 相似文献
998.
999.
Giovanni Egidio Pazienza Xavier Ponce‐García Marco Balsi Xavier Vilasís‐Cardona 《International Journal of Circuit Theory and Applications》2007,35(4):449-462
Cellular neural networks (CNNs) are well suited for image processing due to the possibility of a parallel computation. In this paper, we present two algorithms for tracking and obstacle avoidance using CNNs. Furthermore, we show the implementation of an autonomous robot guided using only real‐time visual feedback; the image processing is performed entirely by a CNN system embedded in a digital signal processor (DSP). We successfully tested the two algorithms on this robot. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
1000.
Xin Li Jiaguo Yu S. Wageh Ahmed A. Al‐Ghamdi Jun Xie 《Small (Weinheim an der Bergstrasse, Germany)》2016,12(48):6640-6696
In recent years, heterogeneous photocatalysis has received much research interest because of its powerful potential applications in tackling many important energy and environmental challenges at a global level in an economically sustainable manner. Due to their unique optical, electrical, and physicochemical properties, various 2D graphene nanosheets‐supported semiconductor composite photocatalysts have been widely constructed and applied in different photocatalytic fields. In this review, fundamental mechanisms of heterogeneous photocatalysis, including thermodynamic and kinetics requirements, are first systematically summarized. Then, the photocatalysis‐related properties of graphene and its derivatives, and design rules and synthesis methods of graphene‐based composites are highlighted. Importantly, different design strategies, including doping and sensitization of semiconductors by graphene, improving electrical conductivity of graphene, increasing eloectrocatalytic active sites on graphene, strengthening interface coupling between semiconductors and graphene, fabricating micro/nano architectures, constructing multi‐junction nanocomposites, enhancing photostability of semiconductors, and utilizing the synergistic effect of various modification strategies, are thoroughly summarized. The important applications including photocatalytic pollutant degradation, H2 production, and CO2 reduction are also addressed. Through reviewing the significant advances on this topic, it may provide new opportunities for designing highly efficient 2D graphene‐based photocatalysts for various applications in photocatalysis and other fields, such as solar cells, thermal catalysis, separation, and purification. 相似文献