全文获取类型
收费全文 | 25907篇 |
免费 | 4959篇 |
国内免费 | 4501篇 |
专业分类
电工技术 | 1440篇 |
技术理论 | 2篇 |
综合类 | 2701篇 |
化学工业 | 1003篇 |
金属工艺 | 342篇 |
机械仪表 | 867篇 |
建筑科学 | 611篇 |
矿业工程 | 151篇 |
能源动力 | 330篇 |
轻工业 | 366篇 |
水利工程 | 128篇 |
石油天然气 | 170篇 |
武器工业 | 92篇 |
无线电 | 2882篇 |
一般工业技术 | 1591篇 |
冶金工业 | 1983篇 |
原子能技术 | 38篇 |
自动化技术 | 20670篇 |
出版年
2024年 | 757篇 |
2023年 | 2182篇 |
2022年 | 3339篇 |
2021年 | 3176篇 |
2020年 | 2592篇 |
2019年 | 1747篇 |
2018年 | 1231篇 |
2017年 | 1067篇 |
2016年 | 1094篇 |
2015年 | 1056篇 |
2014年 | 1456篇 |
2013年 | 1262篇 |
2012年 | 1272篇 |
2011年 | 1555篇 |
2010年 | 1248篇 |
2009年 | 1264篇 |
2008年 | 1273篇 |
2007年 | 1165篇 |
2006年 | 988篇 |
2005年 | 913篇 |
2004年 | 717篇 |
2003年 | 617篇 |
2002年 | 553篇 |
2001年 | 420篇 |
2000年 | 359篇 |
1999年 | 307篇 |
1998年 | 275篇 |
1997年 | 229篇 |
1996年 | 190篇 |
1995年 | 149篇 |
1994年 | 125篇 |
1993年 | 115篇 |
1992年 | 93篇 |
1991年 | 49篇 |
1990年 | 47篇 |
1989年 | 46篇 |
1988年 | 29篇 |
1987年 | 27篇 |
1986年 | 42篇 |
1966年 | 14篇 |
1965年 | 24篇 |
1964年 | 25篇 |
1963年 | 23篇 |
1962年 | 12篇 |
1961年 | 17篇 |
1959年 | 15篇 |
1958年 | 16篇 |
1957年 | 22篇 |
1956年 | 13篇 |
1955年 | 23篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
蛋白质亚细胞定位与其功能密切相关.蛋白质在细胞中的正确定位是细胞系统高度有序运转的前提保障.研究细胞中蛋白质定位的机制和规律,预测蛋白质的亚细胞定位,时于了解蛋白质的性质和功能,了解蛋白质之间的相互作用,探索生命的规律和奥秘具有重要意义.基于机器学习方法的蛋白质亚细胞定位预测是生物信息学研究的热点之一.从数据集的建立、蛋白质序列特征刻画和蛋白质亚细胞定位预测算法3个方面,总结和评述了在过去十几年里机器学习方法在蛋白质亚细胞定位研究中的应用情况和取得的成果,分析了机器学习方法在蛋白质亚细胞定位预测方面存在的问题和面临的挑战,指出了蛋白质亚细胞定位研究的主要方向. 相似文献
42.
基于双Kohonen神经网络的Web用户访问模式挖掘算法 总被引:1,自引:0,他引:1
本文根据Kohonen自组织特征映射神经网络中学习阶段的性质,运用双Kohonen神经网络组合成新的自组织训练挖掘模型,先使用粗调整训练,加快模型学习速度,紧接着使用微调整训练,提高模型学习精度。实验结果表明,本文提出的双Kohonen神经网络挖掘模型,相对于标准Kohonen神经网络在训练速度和收敛效果上都有一定程度的提高,改善了聚类效果,为挖掘用户的多种兴趣提供了一种可行的方法。 相似文献
43.
针对注射过程具有重复运行和非线性的特性,在对预测控制与迭代学习控制进行综合应用并加以改进的基础上,给出一种模型预测迭代学习复合控制新算法,研究了控制器的设计方案.同时,将迭代学习思想引入到预测步长的在线调整,提出了预测步长的迭代学习方法.仿真结果表明,该方法是有效的,其控制性能优于PID迭代学习控制系统. 相似文献
44.
新建地方本科院校计算机专业人才培养模式研究 总被引:4,自引:1,他引:3
新建地方本科院校应适应经济建设和社会发展对人才培养的要求。针对计算机专业人才培养过程中存在的问题和新建地方本科院校自身的特点,阐述了产学研合作是培养计算机专业应用型人才的重要途径,分析了新建地方本科院校产学研合作中存在的问题,探讨了新建地方本科院校计算机专业开展产学研合作教育的有效方式。 相似文献
45.
Deficiencies of the performance-based iterative learning control (ILC) for the non-regular systems are investigated in detail, then a faster control input updating and lifting technique is introduced in the design of performance index based ILCs for the partial non-regular systems. Two ldnds of optimal ILCs based on different performance indices are considered. Finally, simulation examples are given to illustrate the feasibility of the proposed learning controls. 相似文献
46.
Distance learning's interfaces—from corresponding through the postal service to the televised talking head—have traditionally been designed from the top down, supporting banking models of learning or, in writing instruction, current-traditional rhetoric pedagogies. Due to temporal and spatial constraints, these interface designs often support (or encourage) one-way communication from the instructor to the student. Students mostly interact with the instructor by asking questions or submitting work, and they tend to have little correspondence with other peers. These methods clearly privilege the instructor's knowledge and evaluation. Furthermore, these interface designs empower the instructor to gaze upon the students and assess them—often not as a corporeal body but as a corpus of texts. Thus, each interface adopted for distance learning sets up a power dynamic in which the capability to share the roles of creating knowledge is juxtaposed with the instructor's capability to normalize the students and reify their own authority through their gaze. In this article we examine the traditional classroom interface through the correspondence course interface, the simulated classroom interface, and the synchronous video interface to raise questions about the infrastructures of distance learning and their implications for student learning. 相似文献
47.
Luc Pronzato Author Vitae 《Automatica》2008,44(2):303-325
This paper traces the strong relations between experimental design and control, such as the use of optimal inputs to obtain precise parameter estimation in dynamical systems and the introduction of suitably designed perturbations in adaptive control. The mathematical background of optimal experimental design is briefly presented, and the role of experimental design in the asymptotic properties of estimators is emphasized. Although most of the paper concerns parametric models, some results are also presented for statistical learning and prediction with nonparametric models. 相似文献
48.
目前,制约竞争情报发展的一个关键问题就是情报的收集与分析手段比较落后,远远不能胜任竞争情报系统所蕴含的特点和功效。本文将竞争情报作为一种特殊的知识,吸纳知识发现理论成果和方法,提升现有竞争情报系统的构造技术,真正做到快速、全面、准确和智能化的竞争情报生成和利用。 相似文献
49.
In this paper, a finite-time optimal tracking control scheme based on integral reinforcement learning is developed for partially unknown nonlinear systems. In order to realize the prescribed performance, the original system is transformed into an equivalent unconstrained system so as to a composite system is constructed. Subsequently, a modified nonlinear quadratic performance function containing the auxiliary tracking error is designed. Furthermore, the technique of experience replay is used to update the critic neural network, which eliminates the persistent of excitation condition in traditional optimal methods. By combining the prescribed performance control with the finite-time optimization control technique, the tracking error is driven to a desired performance in finite time. Consequently, it has been shown that all signals in the partially unknown nonlinear system are semiglobally practical finite-time stable by stability analysis. Finally, the provided comparative simulation results verify the effectiveness of the developed control scheme. 相似文献
50.
The rapid development of network communication along with the drastic increase in the number of smart devices has triggered a surge in network traffic, which can contain private data and in turn affect user privacy. Recently, Federated Learning (FL) has been proposed in Intrusion Detection Systems (IDS) to ensure attack detection, privacy preservation, and cost reduction, which are crucial issues in traditional centralized machine-learning-based IDS. However, FL-based approaches still exhibit vulnerabilities that can be exploited by adversaries to compromise user data. At the same time, meta-models (including the blending models) have been recognized as one of the solutions to improve generalization for attack detection and classification since they enhance generalization and predictive performances by combining multiple base models. Therefore, in this paper, we propose a Federated Blending model-driven IDS framework for the Internet of Things (IoT) and Industrial IoT (IIoT), called F-BIDS, in order to further protect the privacy of existing ML-based IDS. The proposition consists of a Decision Tree (DT) and Random Forest (RF) as base classifiers to first produce the meta-data. Then, the meta-classifier, which is a Neural Networks (NN) model, uses the meta-data during the federated training step, and finally, it makes the final classification on the test set. Specifically, in contrast to the classical FL approaches, the federated meta-classifier is trained on the meta-data (composite data) instead of user-sensitive data to further enhance privacy. To evaluate the performance of F-BIDS, we used the most recent and open cyber-security datasets, called Edge-IIoTset (published in 2022) and InSDN (in 2020). We chose these datasets because they are recent datasets and contain a large amount of network traffic including both malicious and benign traffic. 相似文献