全文获取类型
收费全文 | 27753篇 |
免费 | 2080篇 |
国内免费 | 2505篇 |
专业分类
电工技术 | 1248篇 |
技术理论 | 2篇 |
综合类 | 1622篇 |
化学工业 | 822篇 |
金属工艺 | 789篇 |
机械仪表 | 2231篇 |
建筑科学 | 983篇 |
矿业工程 | 400篇 |
能源动力 | 485篇 |
轻工业 | 395篇 |
水利工程 | 205篇 |
石油天然气 | 218篇 |
武器工业 | 220篇 |
无线电 | 4241篇 |
一般工业技术 | 1039篇 |
冶金工业 | 411篇 |
原子能技术 | 147篇 |
自动化技术 | 16880篇 |
出版年
2024年 | 56篇 |
2023年 | 300篇 |
2022年 | 535篇 |
2021年 | 779篇 |
2020年 | 724篇 |
2019年 | 547篇 |
2018年 | 507篇 |
2017年 | 524篇 |
2016年 | 607篇 |
2015年 | 703篇 |
2014年 | 1351篇 |
2013年 | 1398篇 |
2012年 | 1758篇 |
2011年 | 2353篇 |
2010年 | 1583篇 |
2009年 | 1597篇 |
2008年 | 1825篇 |
2007年 | 2153篇 |
2006年 | 1977篇 |
2005年 | 1886篇 |
2004年 | 1527篇 |
2003年 | 1460篇 |
2002年 | 1218篇 |
2001年 | 921篇 |
2000年 | 805篇 |
1999年 | 727篇 |
1998年 | 563篇 |
1997年 | 488篇 |
1996年 | 410篇 |
1995年 | 290篇 |
1994年 | 212篇 |
1993年 | 168篇 |
1992年 | 109篇 |
1991年 | 52篇 |
1990年 | 57篇 |
1989年 | 41篇 |
1988年 | 33篇 |
1987年 | 16篇 |
1986年 | 17篇 |
1985年 | 9篇 |
1984年 | 16篇 |
1983年 | 11篇 |
1982年 | 8篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1977年 | 3篇 |
1972年 | 2篇 |
1971年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
樊兆峰 《徐州工程学院学报》2011,(2):28-31,48
针对酚水稀释过程中酚水流量不便测量的工程情况,提出了一种基于RBF(径向基)神经网络的预测控制方法.在酚水罐每个液位变化周期内使用计算机定时测量液位高度,并将这些高度值作为目标输出,在每个循环结束时训练RBF网络,利用RBF网络的逼近能力来实时预测酚水流量,从而控制清水的配比,实现酚水质量浓度的稳定.该方法可避免测量误差带来的干扰,提高控制精度. 相似文献
32.
针对改进的粒子群算法缺乏理论上稳定性证明及其相应的参数选择问题.利用李雅普诺夫稳定性理论对个体决策粒子群算法给予稳定性证明,并给出相应的参数选择方式,改变传统粒子群算法只能从仿真角度说明该算法的稳定性。采用几个常用的测试函数进行仿真实验,与其他改进的粒子群算法相比,结果表明该算法具有更好的性能。 相似文献
33.
Recent museum exhibitions are becoming a means by which to satisfy visitor demands. In order to provide visitor-centric exhibitions, artwork must be analyzed based on the behavior of visitors, and not merely according to museum professionals' points of view. This study aims to analyze the relationship between museum visitors and artwork via a network analysis based on visitor behavior using object detection techniques. Cameras installed in a museum recorded visitors, and an object detector with a content-based image-retrieval technique tracked visitors from the videos. The durations spent with different artworks were measured, and the data was converted into a bipartite graph. The relationships between different artwork types were analyzed with a visitor-centered artwork network. Based on the visitors’ behavior, significant artworks were identified and the artwork network was compared to the arrangement of the museum. The tendency of edges in the artwork network was also examined considering visitors' preferences for artworks. The method used here makes it possible to collect quantitative data, with the results possibly used as a basis and for reference when analyzing artwork in a visitor-centered approach. 相似文献
34.
Response time (RT) of Networked Automation Systems (NAS) is affected by timing imperfections induced due to the network, computing and hardware components. Guaranteeing RT in the presence of such timing imperfections is essential for building dependable NAS, and to avoid costly upgrades after deployment in industries.This investigation proposes a methodology and work-flow that combines modelling, simulation, verification, experiments, and software tools to verify the RT of the NAS during the design, rather than after deployment. The RT evaluation work-flow has three phases: model building, modelling and verification. During the model building phase component reaction times are specified and their timing performance is measured by combining experiments with simulation. During the modelling phase, component based mathematical models that capture the network architecture and inter-connection are proposed. Composition of the component models gives the NAS model required for studying the RT performance on system level. Finally, in the verification step, the NAS formal models are abstracted as UPPAAL timed automata with their timing interfaces. To model timing interfaces, the action patterns, and their timing wrapper are proposed. The formal model of high level of abstraction is used to verify the total response time of the NAS where the reactions to be verified are specified using a subset of timed computation tree logic (TCTL) in UPPAAL model checker. The proposed approach is illustrated on an industrial steam boiler deployment. 相似文献
35.
刘红梅 《电子制作.电脑维护与应用》2015,(4):131-133
为切实提高汽车专业教学水平,建立全方位教学体系,设计基于网络的汽车构造实验教学辅助系统。系统充分利用学校现有计算机网络平台,利用多媒体和网络开发技术,开发或整合多媒体资料,开辟学习交流平台,依据课程学习规律和认知特点,建立起方便快捷、生动有趣的实验教学辅助系统。该系统基于现有教材,又高于教学内容,不仅对于传授汽车zai新技术和剖析专业难点,调动学习积极性,具有重要补充和推动作用,而且对于教学示范中心创建工作,也具有重要意义。 相似文献
36.
在多种类病毒的相互作用下,网络信道破坏程度呈现较强的非线性特点,不能准确约束病毒在相互作用下的破坏性.传统的网络破坏程度估计的过程中,仅仅以单一病毒破坏程度叠加的方式去计算参数,计算具有较强的主观性,没有准确描述不同病毒的破坏作用,对评估结果误差影响较大.为解决上述问题,提出一种基于粒子滤波算法的多种类病毒相互作用下网络信道破坏程度估计方法,利用欧式距离方法对全部病毒进行分类,获取不同类型病毒的网络信道破坏程度值.通过粒子滤波算法对单一个体约束的优势,将每一个不同类型的病毒看作一个粒子,并进行训练.根据训练结果,利用粒子滤波算法对当前时刻网络信道破坏程度进行估计,完成整体评估.实验结果表明,利用改进算法进行多种类病毒相互作用下网络信道破坏程度估计,能够有效提高估计的准确率. 相似文献
37.
《Advanced Engineering Informatics》2015,29(3):714-726
This paper presents a methodology for comparing the performance of model-reduction strategies to be used with a diagnostic methodology for leak detection in water distribution networks. The goal is to find reduction strategies that are suitable for error-domain model falsification, a model based data interpretation methodology. Twelve reduction strategies are derived from five strategy categories. Categories differ according to the manner in which nodes are selected for deletion. A node is selected for deletion according to: (1) the diameter of the pipes; (2) the number of pipes linked to a node; (3) the angle of the pipes in the case of two-pipe nodes; (4) the distribution of the water demand; and, (5) a pair-wise combination of some categories.The methodology is illustrated using part of a real network. Performance is evaluated first by judging the equivalency of the reduced network with the initial network (before the application of any reduction procedure) and secondly, by assessing the compatibility with the diagnostic methodology. The results show that for each reduction strategy the equivalency of networks is verified. Computational time can be reduced to less than 20% of the non-reduced network in the best case. Results of diagnostic performance show that the performance decreases when using reduced networks. The reduction strategy with the best diagnostic performance is that based on the angle of two-pipe nodes, with an angle threshold of 165°. In addition, the sensitivity of the performance of the reduced networks to variation in leak intensity is evaluated. Results show that the reduction strategies where the number of nodes is significantly reduced are the most sensitive.Finally this paper describes a Pareto analysis that is used to select the reduction strategy that is a good compromise between reduction of computational time and performance of the diagnosis. In this context, the extension strategy is the most attractive. 相似文献
38.
局域网环境下利用DHCP欺骗技术实现DNS劫持攻击 总被引:1,自引:0,他引:1
利用DHCP协议的缺陷,实现对局域网计算机的DNS劫持攻击,并给出将此类攻击应用于网站钓鱼的实现方法,旨在引起人们对局域网安全问题的重视。 相似文献
39.
独立学院计算机基础课程教学多会出现学生学习兴趣不浓的问题,结合计算机基础的课程特点,分析目前计算机基础教学的现状,阐述学生学习兴趣不浓的原因,经教学实践提出增强学生学习兴趣的若干方法,为提高学生计算机基础课程学习兴趣提供新的思路。 相似文献
40.
姜传贤 《计算机光盘软件与应用》2011,(14)
时代和社会的发展对人才发展提出了更高的要求,高校计算机专业课程的教学内容、教学方法也需要更新以适应人才培养的模式,本文从师皇角度对教学中基本问题进行了积极的思考。 相似文献