全文获取类型
收费全文 | 26987篇 |
免费 | 1163篇 |
国内免费 | 1349篇 |
专业分类
电工技术 | 837篇 |
技术理论 | 1篇 |
综合类 | 1881篇 |
化学工业 | 572篇 |
金属工艺 | 418篇 |
机械仪表 | 2488篇 |
建筑科学 | 1786篇 |
矿业工程 | 570篇 |
能源动力 | 444篇 |
轻工业 | 470篇 |
水利工程 | 361篇 |
石油天然气 | 337篇 |
武器工业 | 211篇 |
无线电 | 2680篇 |
一般工业技术 | 1213篇 |
冶金工业 | 837篇 |
原子能技术 | 275篇 |
自动化技术 | 14118篇 |
出版年
2024年 | 19篇 |
2023年 | 129篇 |
2022年 | 243篇 |
2021年 | 326篇 |
2020年 | 337篇 |
2019年 | 254篇 |
2018年 | 290篇 |
2017年 | 403篇 |
2016年 | 550篇 |
2015年 | 550篇 |
2014年 | 1476篇 |
2013年 | 1359篇 |
2012年 | 1655篇 |
2011年 | 2327篇 |
2010年 | 1622篇 |
2009年 | 1402篇 |
2008年 | 1644篇 |
2007年 | 2041篇 |
2006年 | 1970篇 |
2005年 | 1798篇 |
2004年 | 1531篇 |
2003年 | 1531篇 |
2002年 | 1211篇 |
2001年 | 930篇 |
2000年 | 773篇 |
1999年 | 638篇 |
1998年 | 533篇 |
1997年 | 405篇 |
1996年 | 327篇 |
1995年 | 247篇 |
1994年 | 184篇 |
1993年 | 133篇 |
1992年 | 105篇 |
1991年 | 88篇 |
1990年 | 46篇 |
1989年 | 67篇 |
1988年 | 49篇 |
1987年 | 39篇 |
1986年 | 39篇 |
1985年 | 52篇 |
1984年 | 44篇 |
1983年 | 29篇 |
1982年 | 24篇 |
1981年 | 27篇 |
1980年 | 11篇 |
1979年 | 8篇 |
1977年 | 6篇 |
1976年 | 4篇 |
1975年 | 6篇 |
1973年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 203 毫秒
12.
针对领域自适应问题中源域和目标域的联合分布差异最小化问题,提出两阶段领域自适应学习方法.在第一阶段考虑样本标签和数据结构的判别信息,通过学习一个共享投影变换,使投影后的共享空间中边缘分布的差异最小.第二阶段利用源域标记数据和目标域非标记数据学习一个带结构风险的自适应分类器,不仅能最小化源域和目标域条件分布差异,还能进一步保持源域和目标域边缘分布的流形一致性.在3个基准数据集上的实验表明,文中方法在平均分类准确率和Kappa系数两项评价指标上均表现较优. 相似文献
13.
《Measurement》2015
The modeling of solar radiation for forecasting its availability is a key tool for managing photovoltaic (PV) plants and, hence, is of primary importance for energy production in a smart grid scenario. However, the variability of the weather phenomena is an unavoidable obstacle in the prediction of the energy produced by the solar radiation conversion. The use of the data collected in the past can be useful to capture the daily and seasonal variability, while measurement of the recent past can be exploited to provide a short term prediction. It is well known that a good measurement of the solar radiation requires not only a high class radiometer, but also a correct management of the instrument. In order to reduce the cost related to the management of the monitoring apparatus, a solution could be to evaluate the PV plant performance using data collected by public weather station installed near the plant. In this paper, two experiments are conducted. In the first, the plausibility of the short term prediction of the solar radiation, based on data collected in the near past on the same site is investigated. In the second experiment, the same prediction is operated using data collected by a public weather station located at ten kilometers from the solar plant. Several prediction techniques belonging from both computational intelligence and statistical fields have been challenged in this task. In particular, Support Vector Machine for Regression, Extreme Learning Machine and Autoregressive models have been used and compared with the persistence and the k-NN predictors. The prediction accuracy achieved in the two experimental conditions are then compared and the results are discussed. 相似文献
14.
Risk allocation decisions are of critical importance in project management. The present study proposes an explanation for how risk allocation in a contract motivates a contractor to cooperate with a project owner. Theories of risk allocation and trust were used to motivate the research. Using a survey methodology, we collected data concerning 124 construction projects in China. We found that risk allocation influenced the contractor’s role behavior through the contractor’s feeling of being trusted but not the contractor’s trust in the owner. Feeling of being trusted partially mediated the effect of risk allocation on the contractor’s in-role (i.e., contractual) behavior and fully mediated the effect on extra-role behavior. The study introduces a social and psychological view of the impacts of risk allocation to the project and engineering management literature. We contribute to theory by arguing and demonstrating the mediating effect of trust on the relationship between risk allocation and contractor behavior. From a practical standpoint, we conclude that contractual risk allocation has a significant impact on building a trusting relationship between owners and contractors and that contractors who feel trusted perform both contractually mandated actions and actions external to the contract more diligently, resulting in the likelihood of improved outcomes for both parties. 相似文献
15.
无刷同步电机的励磁系统对励磁电流的测量是制约该励磁方式发展的一大障碍。设计了一个射频系统可以用来解决同步电机的励磁电流的测量问题。该系统可以方便地检测到同步电机励磁机的整流二极管的工作状态并且可以动态地显示励磁电流,极大地方便了运行人员做出判断,而且结构简单、方便实用。 相似文献
16.
This work considers the problem of increasing the performance of the ciphers based on Data-Dependent (DD) operations (DDO)
for VLSI implementations. New minimum size primitives are proposed to design DDOs. Using advanced DDOs instead of DD permutations
(DDP) in the DDP-based iterative ciphers Cobra-H64 and Cobra-H128 the number of rounds has been significantly reduced yielding
enhancement of the “performance per cost” value and retaining security at the level of indistinguishability from a random
transformation. To obtain further enhancement of this parameter a new crypto-scheme based on the advanced DDOs is proposed.
The FPGA implementation of the proposed crypto-scheme achieves higher throughput value and minimizes the allocated resources
than the conventional designs. Design of the DDO boxes of different orders is considered and their ASIC implementation is
estimated. 相似文献
17.
首先介绍了信息社会的基本特征,并围绕信息的接入、信息的发布、知识产权、隐私权、信息安全和文化多元性等阐述了信息伦理的内容和概念。最后介绍了信息对人类生活的影响,主要包括交往方式、信息处理方式、学习方式、商业运作方式、医疗方式、产品设计方式、科研方式和政府工作方式等。 相似文献
18.
19.
服务质量测量技术及其应用 总被引:3,自引:0,他引:3
文章在概述服务质量测量技术的基础上,介绍了服务质量测量技术的服务质量性能评估、网络推测、网络定位等应用,并给出了服务质量测量的一般数学模型。 相似文献
20.
Christian Stephan Bernd 《AEUE-International Journal of Electronics and Communications》2006,60(1):20-24
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented. 相似文献