全文获取类型
收费全文 | 62835篇 |
免费 | 8227篇 |
国内免费 | 6424篇 |
专业分类
电工技术 | 5622篇 |
技术理论 | 9篇 |
综合类 | 6847篇 |
化学工业 | 1769篇 |
金属工艺 | 726篇 |
机械仪表 | 3730篇 |
建筑科学 | 2511篇 |
矿业工程 | 1609篇 |
能源动力 | 853篇 |
轻工业 | 981篇 |
水利工程 | 1458篇 |
石油天然气 | 3066篇 |
武器工业 | 833篇 |
无线电 | 9446篇 |
一般工业技术 | 3211篇 |
冶金工业 | 1280篇 |
原子能技术 | 828篇 |
自动化技术 | 32707篇 |
出版年
2024年 | 337篇 |
2023年 | 936篇 |
2022年 | 1889篇 |
2021年 | 2324篇 |
2020年 | 2460篇 |
2019年 | 1961篇 |
2018年 | 1781篇 |
2017年 | 2156篇 |
2016年 | 2413篇 |
2015年 | 2738篇 |
2014年 | 4301篇 |
2013年 | 3955篇 |
2012年 | 4589篇 |
2011年 | 4941篇 |
2010年 | 3833篇 |
2009年 | 3823篇 |
2008年 | 4294篇 |
2007年 | 4844篇 |
2006年 | 4119篇 |
2005年 | 3690篇 |
2004年 | 3171篇 |
2003年 | 2636篇 |
2002年 | 2044篇 |
2001年 | 1540篇 |
2000年 | 1324篇 |
1999年 | 964篇 |
1998年 | 745篇 |
1997年 | 626篇 |
1996年 | 518篇 |
1995年 | 469篇 |
1994年 | 370篇 |
1993年 | 274篇 |
1992年 | 192篇 |
1991年 | 192篇 |
1990年 | 146篇 |
1989年 | 116篇 |
1988年 | 94篇 |
1987年 | 72篇 |
1986年 | 64篇 |
1985年 | 90篇 |
1984年 | 64篇 |
1983年 | 76篇 |
1982年 | 65篇 |
1981年 | 38篇 |
1980年 | 23篇 |
1979年 | 38篇 |
1978年 | 13篇 |
1977年 | 22篇 |
1976年 | 14篇 |
1964年 | 11篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
12.
本文以云杉八齿小蠹Ips typographus Linnaeus为例,经标本选取,观察虫体整体形态,绘制整体结构草图,电子显微镜观察局部、得到局部数字图像,分别建立虫体每一部分的高精度细节。把模型每部分拼装在一起组成整体模型,构建出了云杉八齿小蠹三维虚拟昆虫数字化模型。 相似文献
13.
This paper analyzes the problems existing in the teaching of data structure course, and puts forward the reform from the as-
pects of strengthening basic programming, visualized explanation of abstract theory, combination of C++, Java programming, ratio-
nal use of online platform, and stratification of exercises, aiming at improving students' practical ability, learning interest and self-
confidence. 相似文献
14.
In the first critical assessment of knowledge economy dynamic paths in Africa and the Middle East, but for a few exceptions, we find overwhelming support for diminishing cross-country disparities in knowledge-based economy dimensions. The paper employs all the four components of the World Bank's Knowledge Economy Index (KEI): economic incentives, innovation, education, and information infrastructure. The main finding suggests that sub-Saharan African (SSA) and the Middle East and North African (MENA) countries with low levels of KE dynamics and catching-up their counterparts of higher KE levels. We provide the speeds of integration and time necessary to achieve full (100%) integration. Policy implications are also discussed. 相似文献
15.
16.
18.
Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find a ppropriate d ata t o m odeling. F irst o f all, we use concept drift to make the partition of the life cycle of process object. Then, entity community detection is proposed to find changes. Finally, we propose stream-based real-time optimization of data sampling. Contributions of this paper are concept drift, community detection, and stream-based real-time computing. Experiments show the effectiveness and feasibility of our proposed adaptive data sampling mechanism for process object. 相似文献
19.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors. 相似文献
20.
Xiaopo Wu Yangming Shi Weibo Meng Xiaofei Ma Nian Fang 《International Journal of Satellite Communications and Networking》2019,37(3):283-291
Electromagnetic signal emitted by satellite communication (satcom) transmitters are used to identify specific individual uplink satcom terminals sharing the common transponder in real environment, which is known as specific emitter identification (SEI) that allows for early indications and warning (I&W) of the targets carrying satcom furnishment and furthermore the real time electromagnetic situation awareness in military operations. In this paper, the authors are the first to propose the identification of specific transmitters of satcom by using probabilistic neural networks (PNN) to reach the goal of target recognition. We have been devoted to the examination by exploring the feasibility of utilizing the Hilbert transform to signal preprocessing, applying the discrete wavelet transform to feature extraction, and employing the PNN to perform the classification of stationary signals. There are a total of 1000 sampling time series with binary phase shift keying (BPSK) modulation originated by five types of satcom transmitters in the test. The established PNNs classifier implements the data testing and finally yields satisfactory accuracy at 8 dB(±1 dB) carrier to noise ratio, which indicates the feasibility of our method, and even the keen insight of its application in military. 相似文献