全文获取类型
收费全文 | 30149篇 |
免费 | 2805篇 |
国内免费 | 2414篇 |
专业分类
电工技术 | 1743篇 |
技术理论 | 1篇 |
综合类 | 2470篇 |
化学工业 | 1551篇 |
金属工艺 | 382篇 |
机械仪表 | 1152篇 |
建筑科学 | 793篇 |
矿业工程 | 233篇 |
能源动力 | 457篇 |
轻工业 | 248篇 |
水利工程 | 234篇 |
石油天然气 | 171篇 |
武器工业 | 158篇 |
无线电 | 6838篇 |
一般工业技术 | 1608篇 |
冶金工业 | 527篇 |
原子能技术 | 60篇 |
自动化技术 | 16742篇 |
出版年
2024年 | 142篇 |
2023年 | 499篇 |
2022年 | 604篇 |
2021年 | 675篇 |
2020年 | 845篇 |
2019年 | 720篇 |
2018年 | 688篇 |
2017年 | 882篇 |
2016年 | 1029篇 |
2015年 | 1189篇 |
2014年 | 1718篇 |
2013年 | 1889篇 |
2012年 | 1927篇 |
2011年 | 2221篇 |
2010年 | 1691篇 |
2009年 | 2022篇 |
2008年 | 2130篇 |
2007年 | 2184篇 |
2006年 | 1754篇 |
2005年 | 1567篇 |
2004年 | 1339篇 |
2003年 | 1194篇 |
2002年 | 1064篇 |
2001年 | 894篇 |
2000年 | 793篇 |
1999年 | 684篇 |
1998年 | 603篇 |
1997年 | 511篇 |
1996年 | 419篇 |
1995年 | 328篇 |
1994年 | 249篇 |
1993年 | 221篇 |
1992年 | 152篇 |
1991年 | 96篇 |
1990年 | 78篇 |
1989年 | 65篇 |
1988年 | 42篇 |
1987年 | 29篇 |
1986年 | 20篇 |
1985年 | 46篇 |
1984年 | 41篇 |
1983年 | 38篇 |
1982年 | 44篇 |
1981年 | 5篇 |
1980年 | 7篇 |
1979年 | 8篇 |
1978年 | 3篇 |
1977年 | 3篇 |
1975年 | 9篇 |
1974年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
51.
52.
A graph G is panconnected if each pair of distinct vertices u,v∈V(G) are joined by a path of length l for all dG(u,v)?l?|V(G)|-1, where dG(u,v) is the length of a shortest path joining u and v in G. Recently, Fan et. al. [J. Fan, X. Lin, X. Jia, Optimal path embedding in crossed cubes, IEEE Trans. Parall. Distrib. Syst. 16 (2) (2005) 1190-1200, J. Fan, X. Jia, X. Lin, Complete path embeddings in crossed cubes, Inform. Sci. 176 (22) (2006) 3332-3346] and Xu et. al. [J.M. Xu, M.J. Ma, M. Lu, Paths in Möbius cubes and crossed cubes, Inform. Proc. Lett. 97 (3) (2006) 94-97] both proved that n-dimensional crossed cube, CQn, is almost panconnected except the path of length dCQn(u,v)+1 for any two distinct vertices u,v∈V(CQn). In this paper, we give a necessary and sufficient condition to check for the existence of paths of length dCQn(u,v)+1, called the nearly shortest paths, for any two distinct vertices u,v in CQn. Moreover, we observe that only some pair of vertices have no nearly shortest path and we give a construction scheme for the nearly shortest path if it exists. 相似文献
53.
We propose a data mining approach to predict human wine taste preferences that is based on easily available analytical tests at the certification step. A large dataset (when compared to other studies in this domain) is considered, with white and red vinho verde samples (from Portugal). Three regression techniques were applied, under a computationally efficient procedure that performs simultaneous variable and model selection. The support vector machine achieved promising results, outperforming the multiple regression and neural network methods. Such model is useful to support the oenologist wine tasting evaluations and improve wine production. Furthermore, similar techniques can help in target marketing by modeling consumer tastes from niche markets. 相似文献
54.
This paper investigates the use of artificial intelligent models as virtual sensors to predict relevant emissions such as
carbon dioxide, carbon monoxide, unburnt hydrocarbons and oxides of nitrogen for a hydrogen powered car. The virtual sensors
are developed by means of application of various Artificial Intelligent (AI) models namely; AI software built at the University
of Tasmania, back-propagation neural networks with Levenberg–Marquardt algorithm, and adaptive neuro-fuzzy inference systems.
These predictions are based on the study of qualitative and quantitative effects of engine process parameters such as mass
airflow, engine speed, air-to-fuel ratio, exhaust gas temperature and engine power on the harmful exhaust gas emissions. All
AI models show good predictive capability in estimating the emissions. However, excellent accuracy is achieved when using
back-propagation neural networks with Levenberg–Marquardt algorithm in estimating emissions for various hydrogen engine operating
conditions with the predicted values less than 6% of percentage average root mean square error. 相似文献
55.
This paper addresses the explicit synchronisation of heterogeneous dynamics networks via three-layer communication framework. The main contribution is to propose an explicit synchronisation algorithm, in which the synchronisation errors of all the agents are decoupled. By constructing a three-layer node model, the proposed algorithm removes the assumptions that the topology is fixed and the synchronisation process is coupled. By introducing appropriate assumptions, the algorithm leads to a class of explicit synchronisation protocols based on the states of agents in different layers. It is proved in the sense of Lyapunov that, if the dwell time is larger than a threshold, the explicit synchronisation can be achieved for closed-loop heterogeneous dynamics networks under switching topologies. The results are further extended to the cases in which the switching topologies are only frequently but not always connected. Simulation results are presented with four single-link manipulators to verify the theoretical analysis. 相似文献
56.
The purpose of the present study was to examine the prevalence of cyber-bullying through Facebook in a sample of 226 Greek university undergraduates, and to explore whether big five personality characteristics, narcissism, as well as attitudes toward Facebook, technological knowledge and skills were predictive of such behavior. Participants completed a self-report questionnaire measuring the above constructs. Results indicated that almost one third of the sample reported Facebook bullying engagement at least once during the past month, with male students reporting more frequent involvement than females. Bullying through Facebook was predicted by low Agreeableness and more time spent on Facebook only for males, whereas for females none of the studied variables predicted engagement in Facebook bullying. Findings are discussed in terms of prevention and intervention strategies. 相似文献
57.
The objective of this study is to provide a framework for relocating or reconfiguring existing pollution monitoring station networks by using feature selection and data mining techniques. This methodology enables a partial redesign based on the maximization of the available information that is gathered by the pollution networks by the optimal data mining technique. It also considers requirements of the decision makers, like potential target places, etc.Since this methodology is based on the quality of forecasting, it can also be useful for auditing and forecasting. A case study is included in this paper. In light of the prediction results, a new way to relocate the existing monitoring station is proposed. 相似文献
58.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed. 相似文献
59.
Ralf Steinmetz Author VitaeAndré KönigAuthor Vitae 《Performance Evaluation》2011,68(9):750-767
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments. 相似文献
60.
This paper investigates packet scheduling in the context of Self-Optimizing Networks, and demonstrates how to improve coverage dynamically by adjusting the scheduling strategy. We focus on α-fair schedulers, and we provide methods for calculating the scheduling gain, including several closed form formulas. Scheduling gain is analyzed for different fading models, with a particular focus on the frequency-selective channel. We then propose a coverage-capacity self-optimization algorithm based on α-fair schedulers. A use case illustrates the implementation of the algorithm and simulation results show that important coverage gains are achieved at the expense of very little computing power. 相似文献