全文获取类型
收费全文 | 92314篇 |
免费 | 12743篇 |
国内免费 | 7484篇 |
专业分类
电工技术 | 7752篇 |
技术理论 | 5篇 |
综合类 | 10533篇 |
化学工业 | 4590篇 |
金属工艺 | 2122篇 |
机械仪表 | 5561篇 |
建筑科学 | 6997篇 |
矿业工程 | 2996篇 |
能源动力 | 1475篇 |
轻工业 | 9017篇 |
水利工程 | 2570篇 |
石油天然气 | 5415篇 |
武器工业 | 1708篇 |
无线电 | 13956篇 |
一般工业技术 | 5951篇 |
冶金工业 | 2392篇 |
原子能技术 | 765篇 |
自动化技术 | 28736篇 |
出版年
2024年 | 793篇 |
2023年 | 2129篇 |
2022年 | 3607篇 |
2021年 | 4027篇 |
2020年 | 4093篇 |
2019年 | 3205篇 |
2018年 | 2894篇 |
2017年 | 3484篇 |
2016年 | 3972篇 |
2015年 | 4347篇 |
2014年 | 6986篇 |
2013年 | 5986篇 |
2012年 | 7557篇 |
2011年 | 7918篇 |
2010年 | 5938篇 |
2009年 | 5872篇 |
2008年 | 5665篇 |
2007年 | 6479篇 |
2006年 | 5367篇 |
2005年 | 4644篇 |
2004年 | 3580篇 |
2003年 | 2987篇 |
2002年 | 2200篇 |
2001年 | 1740篇 |
2000年 | 1363篇 |
1999年 | 1109篇 |
1998年 | 850篇 |
1997年 | 706篇 |
1996年 | 618篇 |
1995年 | 470篇 |
1994年 | 339篇 |
1993年 | 272篇 |
1992年 | 226篇 |
1991年 | 198篇 |
1990年 | 140篇 |
1989年 | 117篇 |
1988年 | 79篇 |
1987年 | 60篇 |
1986年 | 58篇 |
1985年 | 50篇 |
1984年 | 54篇 |
1983年 | 52篇 |
1982年 | 31篇 |
1981年 | 33篇 |
1980年 | 21篇 |
1979年 | 17篇 |
1978年 | 15篇 |
1963年 | 15篇 |
1962年 | 14篇 |
1959年 | 15篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.
952.
953.
基于虚拟机的运行时入侵检测技术研究 总被引:1,自引:0,他引:1
入侵检测技术通常分为误用检测和异常检测两类,误用检测根据攻击模式库检测已知的攻击行为,但却难以防范未知的攻击行为;异常检测技术虽然可以预测偏离正常值阈区间的潜在攻击行为,但却存在较高的误报现象。在虚拟机监视器中对虚拟机操作系统的运行行为进行带外监控,避免了操作系统内监控模块被病毒感染的难题;通过监视虚拟机的运行时行为,对之作组合序列的合法性分析,扩展了误用检测防范长时间段攻击行为的能力,识别通过合法系统调用进行的恶意攻击。测试数据表明,该技术能够较好地检测出复杂组合攻击行为。 相似文献
954.
基于ITSQEM的IT服务质量研究 总被引:1,自引:0,他引:1
在SERVQUAL模型以及软件工程产品质量模型的基础上,结合IT服务质量的内涵和范畴,提出了IT服务质量评价模型(ITSQEM);并对该模型特性及子特性进行分析,提出了模型裁剪原则以及相应指标项的度量方法,使得质量评价更具有实用性和可操作性。 相似文献
955.
The Si-Sr binary system has been thermodynamically reassessed in the present work based on the critically reviewed experimental data available in the literature, especially newly published experimental phase diagram data in the Si-rich side. The liquid phase has been modeled with both the substitutional solution model and the associate model, and two sets of self-consistent thermodynamic parameters that describe the system are thus obtained. The shortcomings of the previous assessment are removed, and a better agreement with experimental data is achieved compared with the previous assessment. 相似文献
956.
957.
The defect of process equipments is a major factor that impairs the yields in the mass production of semiconductor wafer fabrication and it is a main supervision means to use high-resolution defect inspection tools to detect and monitor the defect damage. Due to the high investment costs of these inspection tools and the resulting decrease in the throughput, how to improve the sampling rate is an important issue for the associated inspection strategy. This paper proposes a new concept and implementation of virtual inspection (VI) to enhance the detection and monitoring of defect in semiconductor production process. The underlying theory of the VI concept is that the state variables identifications (SVIDs) of process equipments can reflect the process quality effectively and loyally. The approach of VI is to combine the application of the fault detection and classification (FDC), and the defect library and the re-engineering of inspection procedure to reach the full-scope of strategic objective. VI enables the defect monitoring to enter a new era by promoting the monitoring level of defect inspection from the previous lot-sampling basis to the wafer-sampling level, and hence upgrades the sampling strategy from random-sampling to full and right-sampling. In this study, various typical defect cases are utilized to illustrate how to create VI models and verify the reliability of the proposed approach. Furthermore, a feasible architecture of the VI implementation for mass production in semiconductor factory is presented in the paper. 相似文献
958.
This paper introduces a cylindricity evaluation algorithm based on support vector machine learning with a specific kernel function, referred to as SVR, as a viable alternative to traditional least square method (LSQ) and non-linear programming algorithm (NLP). Using the theory of support vector machine regression, the proposed algorithm in this paper provides more robust evaluation in terms of CPU time and accuracy than NLP and this is supported by computational experiments. Interestingly, it has been shown that the SVR significantly outperforms LSQ in terms of the accuracy while it can evaluate the cylindricity in a more robust fashion than NLP when the variance of the data points increases. The robust nature of the proposed algorithm is expected because it converts the original nonlinear problem with nonlinear constraints into other nonlinear problem with linear constraints. In addition, the proposed algorithm is programmed using Java Runtime Environment to provide users with a Web based open source environment. In a real-world setting, this would provide manufacturers with an algorithm that can be trusted to give the correct answer rather than making a good part rejected because of inaccurate computational results. 相似文献
959.
A neutral data envelopment analysis (DEA) model for cross-efficiency evaluation was recently proposed by Wang and Chin [Wang and Chin (2010b). A neutral DEA model for cross-efficiency evaluation and its extension. Expert Systems with Applications, 37(5), 3666–3675], which maximinimizes the relative efficiency of each output and effectively reduces the number of zero weights of outputs. Since a large number of zero weights may still exist among inputs, this paper proposes a simultaneously input- and output-oriented weight determination DEA model for the cross-efficiency evaluation. The new DEA model proves to reduce the number of zero weights for both inputs and outputs very significantly, as illustrated by numerical examples. The weights determined by the new DEA model are neutral, neither aggressive nor benevolent. 相似文献
960.
Admission control mechanism and performance analysis based on stochastic automata networks formalism
Lynda MokdadAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(4):594-602
IEEE 802.16 has been designed to support QoS (Quality of Service) in Wireless broadband Metropolitan Networks (WMAN), and specifically in the access networks. To achieve this, the IEEE 802.16.e amendment introduces the service differentiation by five service classes (UGS, ertPS, rtPS, nrtPS and BE). To maintain the QoS of active connections and to avoid any congestion in the network, an Admission Control (AC) is defined. AC aims to accept or reject a new connection according to the negotiated parameters and the availability of resources in the network. This mechanism is not standardized and let to the operators. We tackle this point, by proposing in this study a new Admission Control (AC) that improves the QoS of BE traffic by avoiding a strict bandwidth assignment of other traffics (rtPS and nrtPS) as is defined in major previous studies. The proposed mechanism is based on token bucket for rtPS, nrtPS and BE traffics in order to reduce lightly the number of accepted connections and to improve considerably the number of accepted BE connections. To evaluate the performance of the proposed scheme, we use PEPS (Performance Evaluation of Parallel Systems) which is a powerful tool based on models which can be described with Stochastic Automata Networks (SAN). PEPS can solve complex models with a large state space and with many synchronized events. Therefore, we show that this tool is suitable for wireless network, and specifically for the proposed scheme, toward numerical results we show as we expected that our proposed AC outperform the classical one by reducing lightly the performance of other service classes. 相似文献