全文获取类型
收费全文 | 57398篇 |
免费 | 10451篇 |
国内免费 | 3699篇 |
专业分类
电工技术 | 5523篇 |
技术理论 | 3篇 |
综合类 | 6185篇 |
化学工业 | 2940篇 |
金属工艺 | 1617篇 |
机械仪表 | 3635篇 |
建筑科学 | 1770篇 |
矿业工程 | 1158篇 |
能源动力 | 1587篇 |
轻工业 | 1109篇 |
水利工程 | 968篇 |
石油天然气 | 990篇 |
武器工业 | 564篇 |
无线电 | 9701篇 |
一般工业技术 | 3662篇 |
冶金工业 | 1234篇 |
原子能技术 | 222篇 |
自动化技术 | 28680篇 |
出版年
2025年 | 124篇 |
2024年 | 2038篇 |
2023年 | 1975篇 |
2022年 | 2560篇 |
2021年 | 2885篇 |
2020年 | 2925篇 |
2019年 | 2182篇 |
2018年 | 1699篇 |
2017年 | 1864篇 |
2016年 | 1969篇 |
2015年 | 2137篇 |
2014年 | 2917篇 |
2013年 | 3280篇 |
2012年 | 3521篇 |
2011年 | 3863篇 |
2010年 | 3006篇 |
2009年 | 3469篇 |
2008年 | 3768篇 |
2007年 | 3995篇 |
2006年 | 3367篇 |
2005年 | 3050篇 |
2004年 | 2516篇 |
2003年 | 2105篇 |
2002年 | 1801篇 |
2001年 | 1574篇 |
2000年 | 1375篇 |
1999年 | 1187篇 |
1998年 | 981篇 |
1997年 | 808篇 |
1996年 | 648篇 |
1995年 | 504篇 |
1994年 | 374篇 |
1993年 | 288篇 |
1992年 | 199篇 |
1991年 | 114篇 |
1990年 | 88篇 |
1989年 | 59篇 |
1988年 | 36篇 |
1987年 | 30篇 |
1986年 | 40篇 |
1985年 | 54篇 |
1984年 | 41篇 |
1983年 | 41篇 |
1982年 | 42篇 |
1981年 | 4篇 |
1980年 | 5篇 |
1979年 | 10篇 |
1978年 | 4篇 |
1959年 | 4篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Jake Cobb Author Vitae Author Vitae 《Journal of Systems and Software》2008,81(9):1539-1558
Web proxy caches are used to reduce the strain of contemporary web traffic on web servers and network bandwidth providers. In this research, a novel approach to web proxy cache replacement which utilizes neural networks for replacement decisions is developed and analyzed. Neural networks are trained to classify cacheable objects from real world data sets using information known to be important in web proxy caching, such as frequency and recency. Correct classification ratios between 0.85 and 0.88 are obtained both for data used for training and data not used for training. Our approach is compared with Least Recently Used (LRU), Least Frequently Used (LFU) and the optimal case which always rates an object with the number of future requests. Performance is evaluated in simulation for various neural network structures and cache conditions. The final neural networks achieve hit rates that are 86.60% of the optimal in the worst case and 100% of the optimal in the best case. Byte-hit rates are 93.36% of the optimal in the worst case and 99.92% of the optimal in the best case. We examine the input-to-output mappings of individual neural networks and analyze the resulting caching strategy with respect to specific cache conditions. 相似文献
32.
基于内容的图像检索已经成为图像检索的一个重要研究方向。其中利用形状特征可以实现形状较为明显的各类图像库的检索。该文对图像形状特征的提取和描述方法进行了较深入地研究,选取其中一部分特征值,分别利用BP神经网络和支持向量机进行形状识别,取得令人满意的实验效果。 相似文献
33.
A variety of computational tasks in early vision can be formulated through lattice networks. The cooperative action of these networks depends upon the topology of interconnections, both feedforward and recurrent ones. The Gabor-like impulse response of a 2nd-order lattice network (i.e. with nearest and next-to-nearest interconnections) is analysed in detail, pointing out how a near-optimal filtering behaviour in space and frequency domains can be achieved through excitatory/inhibitory interactions without impairing the stability of the system. These architectures can be mapped, very efficiently at transistor level, on VLSI structures operating as analogue perceptual engines. The hardware implementation of early vision tasks can, indeed, be tackled by combining these perceptual agents through suitable weighted sums. Various implementation strategies have been pursued with reference to: (i) the algorithm-circuit mapping (current-mode and transconductor approaches); (ii) the degree of programmability (fixed, selectable and tunable); and (iii) the implementation technology (2 and 0.8 gate lengths). Applications of the perceptual engine to machine vision algorithms are discussed. 相似文献
34.
The twisted cube is an important variant of the most popular hypercube network for parallel processing. In this paper, we consider the problem of embedding multi-dimensional meshes into twisted cubes in a systematic way. We present a recursive method for embedding a family of disjoint multi-dimensional meshes into a twisted cube with dilation 1 and expansion 1. We also prove that a single multi-dimensional mesh can be embedded into a twisted cube with dilation 2 and expansion 1. Our work extends some previously known results. 相似文献
35.
A scanning electron microscope (SEM) is a sophisticated equipment employed for fine imaging of a variety of surfaces. In this study, prediction models of SEM were constructed by using a generalized regression neural network (GRNN) and genetic algorithm (GA). The SEM components examined include condenser lens 1 and 2 and objective lens (coarse and fine) referred to as CL1, CL2, OL-Coarse, and OL-Fine. For a systematic modeling of SEM resolution (R), a face-centered Box–Wilson experiment was conducted. Two sets of data were collected with or without the adjustment of magnification. Root-mean-squared prediction error of optimized GRNN models are GA 0.481 and 1.96×10-12 for non-adjusted and adjusted data, respectively. The optimized models demonstrated a much improved prediction over statistical regression models. The optimized models were used to optimize parameters particularly under best tuned SEM environment. For the variations in CL2 and OL-Coarse, the highest R could be achieved at all conditions except a larger CL2 either at smaller or larger OL-Coarse. For the variations in CL1 and CL2, the highest R was obtained at all conditions but larger CL2 and smaller CL1. 相似文献
36.
?smail Dinçer 《Advances in Engineering Software》2011,42(4):160-171
Determination of deformation modulus and coefficient of subgrade reaction of soils have major importance, whether the projects are in design, and construction or compaction assessment stage of earth filling structures. Plate load test is one of the frequently used method to directly determine the parameters but the method is both costly and time consuming. For this reason, this paper is concerned with the applications of artificial neural networks (ANN) and simple-multiple regression analysis to predict deformation modulus and coefficient of subgrade reaction of compacted soils from compaction parameters (such as maximum dry density (MDD) and optimum moisture content (OMC), field dry density (FDD), and field moisture content (FMC)). Regression analysis and artificial neural network estimation indicated that there are acceptable correlations between deformation modulus and coefficient of subgrade reaction and these parameters. Artificial neural networks model exhibits higher performance than traditional statistical model for predicting deformation modulus and coefficient of subgrade reaction. 相似文献
37.
Qian MaAuthor VitaeShengyuan XuAuthor Vitae Yun ZouAuthor Vitae 《Neurocomputing》2011,74(17):3404-3411
This paper addresses the problems of stability and synchronization for a class of Markovian jump neural networks with partly unknown transition probabilities. We first study the stability analysis problem for a single neural network and present a sufficient condition guaranteeing the mean square asymptotic stability. Then based on the Lyapunov functional method and the Kronecker product technique, the chaos synchronization problem of an array of coupled networks is considered. Both the stability and the synchronization conditions are delay-dependent, which are expressed in terms of linear matrix inequalities. The effectiveness of the developed methods is shown by simulation examples. 相似文献
38.
为满足非接触化、小型化、集成化、数字化、智能化等现代检测技术的发展要求,从成本、工作原理、灵敏度等方面综合考虑,现采用以光电定位模块为核心的光电定位技术,以无线传感器网络作为数据传输与管理的技术手段,构建了无线光电定位网络,并进行了实验分析.可实现多点实时监测、异地显示测量数据、数据网络化管理等特殊需求;涵盖了多学科领... 相似文献
39.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA. 相似文献
40.