全文获取类型
收费全文 | 3222篇 |
免费 | 293篇 |
国内免费 | 255篇 |
专业分类
电工技术 | 64篇 |
综合类 | 207篇 |
化学工业 | 144篇 |
金属工艺 | 195篇 |
机械仪表 | 204篇 |
建筑科学 | 405篇 |
矿业工程 | 34篇 |
能源动力 | 41篇 |
轻工业 | 115篇 |
水利工程 | 87篇 |
石油天然气 | 122篇 |
武器工业 | 27篇 |
无线电 | 434篇 |
一般工业技术 | 208篇 |
冶金工业 | 39篇 |
原子能技术 | 41篇 |
自动化技术 | 1403篇 |
出版年
2024年 | 13篇 |
2023年 | 54篇 |
2022年 | 95篇 |
2021年 | 120篇 |
2020年 | 114篇 |
2019年 | 108篇 |
2018年 | 83篇 |
2017年 | 105篇 |
2016年 | 121篇 |
2015年 | 149篇 |
2014年 | 248篇 |
2013年 | 205篇 |
2012年 | 237篇 |
2011年 | 257篇 |
2010年 | 192篇 |
2009年 | 211篇 |
2008年 | 200篇 |
2007年 | 178篇 |
2006年 | 181篇 |
2005年 | 146篇 |
2004年 | 126篇 |
2003年 | 115篇 |
2002年 | 85篇 |
2001年 | 67篇 |
2000年 | 71篇 |
1999年 | 31篇 |
1998年 | 46篇 |
1997年 | 26篇 |
1996年 | 42篇 |
1995年 | 42篇 |
1994年 | 27篇 |
1993年 | 17篇 |
1992年 | 7篇 |
1991年 | 9篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 6篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 7篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 6篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1977年 | 1篇 |
1972年 | 1篇 |
1966年 | 1篇 |
1961年 | 1篇 |
排序方式: 共有3770条查询结果,搜索用时 15 毫秒
91.
Clustering analysis of temporal gene expression data is widely used to study dynamic biological systems, such as identifying sets of genes that are regulated by the same mechanism. However, most temporal gene expression data often contain noise, missing data points, and non-uniformly sampled time points, which imposes challenges for traditional clustering methods of extracting meaningful information. In this paper, we introduce an improved clustering approach based on the regularized spline regression and an energy based similarity measure. The proposed approach models each gene expression profile as a B-spline expansion, for which the spline coefficients are estimated by regularized least squares scheme on the observed data. To compensate the inadequate information from noisy and short gene expression data, we use its correlated genes as the test set to choose the optimal number of basis and the regularization parameter. We show that this treatment can help to avoid over-fitting. After fitting the continuous representations of gene expression profiles, we use an energy based similarity measure for clustering. The energy based measure can include the temporal information and relative changes of the time series using the first and second derivatives of the time series. We demonstrate that our method is robust to noise and can produce meaningful clustering results. 相似文献
92.
索引技术是时态数据库查询优化的重要方法之一。分析了时态数据库中的不确定时态信息以及基于不确定时态信息的索引技术,并详细讨论了能处理时间变元的改进的4R-tree索引技术的建立过程。 相似文献
93.
94.
In this paper, we introduce a concept of Annotation Based Query Answer, and a method for its computation, which can answer queries on relational databases that may violate a set of functional dependencies. In this approach, inconsistency is viewed as a property of data and described with annotations. To be more precise, every piece of data in a relation can have zero or more annotations with it and annotations are propagated along with queries from the source to the output. With annotations, inconsistent da... 相似文献
95.
96.
Asaf Shabtai Author Vitae Uri Kanonov Author Vitae Author Vitae 《Journal of Systems and Software》2010,83(8):1524-1537
In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of sent SMSs) and events (e.g., software installation) are integrated with a mobile device security domain knowledge-base (i.e., an ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions are then monitored to detect suspicious temporal patterns and to issue an alert. These patterns are compatible with a set of predefined classes of malware as defined by a security expert (or the owner) employing a set of time and value constraints. The goal is to identify malicious behavior that other defensive technologies (e.g., antivirus or firewall) failed to detect. Since the abstraction derivation process is complex, the KBTA method was adapted for mobile devices that are limited in resources (i.e., CPU, memory, battery). To evaluate the proposed modified KBTA method a lightweight host-based intrusion detection system (HIDS), combined with central management capabilities for Android-based mobile phones, was developed. Evaluation results demonstrated the effectiveness of the new approach in detecting malicious applications on mobile devices (detection rate above 94% in most scenarios) and the feasibility of running such a system on mobile devices (CPU consumption was 3% on average). 相似文献
97.
描述了高速嵌入式系统中电源分布网络(Power distribution network,PDN)的组成和特性。解释了目标阻抗和电源分布网络阻抗的概念,以及它们与电源完整性之间的关系。以OMAP5910为例,说明了在实际设计中如何选择、放置去耦电容。最后,给出了板级实现方案。 相似文献
98.
提出一种借助系统调用实现基于信息流的完整性度量的方法。该方法将度量过程分为离线阶段和运行阶段。在离线阶段,软件执行的系统调用被监控和记录,结合系统调用和信息流的关系抽象出软件的信息流基准值。在运行阶段,分析软件运行时的系统调用信息,获得软件运行时的信息流,根据信息流基准值检查软件的信息流是否出现异常,度量软件的完整性。为了验证方法的可行性,文章以Apache服务器为例,实现该方法的原型系统。实验表明该方法能够发现软件运行时完整性被破坏而出现的异常信息流。 相似文献
99.
Combining temporal partitioning and temporal placement techniques for communication cost improvement
In this paper, we present a typical temporal partitioning methodology that temporally partitions a data flow graph on reconfigurable system. Our approach optimizes the communication cost of the design. This aim can be reached by minimizing the transfer of data required between design partitions and the routing cost between FPGA modules. Consequently, our algorithm is composed by two main steps. The first step aims to find a temporal partitioning of the graph. This step gives the optimal solution in term of communication cost. Next, our approach builds the best architecture, on a partially reconfigurable FPGA, that gives the lowest routing cost between modules. The proposed methodology was tested on several examples on the Xilinx Virtex-II pro. The results show significant reduction in the communication cost compared with others famous approaches used in this field. 相似文献
100.