全文获取类型
收费全文 | 54905篇 |
免费 | 6296篇 |
国内免费 | 4535篇 |
专业分类
电工技术 | 6757篇 |
技术理论 | 10篇 |
综合类 | 6781篇 |
化学工业 | 2184篇 |
金属工艺 | 1166篇 |
机械仪表 | 2598篇 |
建筑科学 | 3438篇 |
矿业工程 | 1526篇 |
能源动力 | 1264篇 |
轻工业 | 1431篇 |
水利工程 | 1741篇 |
石油天然气 | 1386篇 |
武器工业 | 988篇 |
无线电 | 8317篇 |
一般工业技术 | 3271篇 |
冶金工业 | 2204篇 |
原子能技术 | 516篇 |
自动化技术 | 20158篇 |
出版年
2024年 | 269篇 |
2023年 | 739篇 |
2022年 | 1479篇 |
2021年 | 1764篇 |
2020年 | 1816篇 |
2019年 | 1356篇 |
2018年 | 1248篇 |
2017年 | 1682篇 |
2016年 | 1933篇 |
2015年 | 2102篇 |
2014年 | 3799篇 |
2013年 | 3690篇 |
2012年 | 4158篇 |
2011年 | 4364篇 |
2010年 | 3362篇 |
2009年 | 3600篇 |
2008年 | 3686篇 |
2007年 | 4080篇 |
2006年 | 3667篇 |
2005年 | 3222篇 |
2004年 | 2760篇 |
2003年 | 2378篇 |
2002年 | 1851篇 |
2001年 | 1499篇 |
2000年 | 1184篇 |
1999年 | 822篇 |
1998年 | 563篇 |
1997年 | 483篇 |
1996年 | 407篇 |
1995年 | 324篇 |
1994年 | 307篇 |
1993年 | 217篇 |
1992年 | 151篇 |
1991年 | 127篇 |
1990年 | 79篇 |
1989年 | 94篇 |
1988年 | 74篇 |
1987年 | 44篇 |
1986年 | 43篇 |
1985年 | 42篇 |
1984年 | 49篇 |
1983年 | 34篇 |
1982年 | 30篇 |
1981年 | 15篇 |
1980年 | 20篇 |
1979年 | 17篇 |
1977年 | 8篇 |
1965年 | 10篇 |
1964年 | 13篇 |
1959年 | 10篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
STLING Mikael 《中国科学:信息科学(英文版)》2011,(5):1087-1093
Silicon carbide (SiC) semiconductor devices for high power applications are now commercially available as discrete devices. Recently Schottky diodes are offered by both USA and Europe based companies. Active switching devices such as bipolar junction transistors (BJTs), field effect transistors (JFETs and MOSFETs) are now reaching the market. The interest is rapidly growing for these devices in high power and high temperature applications. The main advantages of wide bandgap semiconductors are their very hi... 相似文献
62.
CHEN KenLe & ZHANG JinWen National Key Laboratory of Micro/Nano Fabrication Technology 《中国科学:信息科学(英文版)》2011,(2)
63.
Yao-Tien Chen Author Vitae 《Pattern recognition》2010,43(11):3699-3711
This paper proposes an alternative criterion derived from the Bayesian risk classification error for image segmentation. The proposed model introduces a region-based force determined through the difference of the posterior image densities for the different classes, a term based on the prior probability derived from Kullback-Leibler information number, and a regularity term adopted to avoid the generation of excessively irregular and small segmented regions. Compared with other level set methods, the proposed approach relies on the optimum decision of pixel classification and the estimates of prior probabilities; thus the approach has more reliability in theory and practice. Experiments show that the proposed approach is able to extract the complicated shapes of targets and robust for various types of medical images. Moreover, the algorithm can be easily extendable for multiphase segmentation. 相似文献
64.
赵阳 《网络安全技术与应用》2011,(12):60-62,64
网络技术的发展以及应用深刻地影响着人类社会,在给人类带来巨大便利的同时也带来了诸如网络信息安全问题等隐患,这不仅在技术层面给我们提出新的问题,在法律层面也提出了更高的要求。本文介绍了对网络信息安全问题进行法理探讨的背景,并且在分析了国内外研究现状的基础上提出在法律层面解决网络信息安全问题的初步构想。 相似文献
65.
宋光 《数字社区&智能家居》2011,(6)
在社会日益发展的今天,传统的图书馆服务模式已经无法适用新形势的发展要求,数字化、网络化等计算机信息技术的出现并应用,促使图书馆从传统功能模式向开放式、网络式的信息服务模式转变,由单一功能向多功能转变,从根本上推动了图书馆事业的发展。 相似文献
66.
Z.A. Aboeleneen 《Mathematics and computers in simulation》2010,81(1):26-36
Based on generalized order statistics from Weibull distribution the approach of Bayesian and non-Bayesian estimation are discussed. We present a simple and efficient simulational algorithm for generating a generalized order statistics sample from any continuous distribution. Specializations to Bayesian and non-Bayesian estimators, some lifetime parameters and confidence intervals of progressive II censoring and record values are obtained and compared with the existing results. Two examples are given to illustrate the proposed estimators and the simulation algorithm. 相似文献
67.
搜索引擎的发展给我们的工作和生活带来了便利,同时给我们的个人信息安全带来了威胁。该文从搜索引擎的原理出发,简要分析了个人信息泄露的途径,并提出了避免信息泄露的思路和方法。 相似文献
68.
Sharon Christensen William J. Caelli William D. Duncan 《Information & Communications Technology Law》2010,19(1):61-85
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia. 相似文献
69.
Sangmun Shin Nguyen Khoa Viet Truong Byung Rae Cho Sung Hoon Hong 《Computers & Industrial Engineering》2011
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed. 相似文献
70.
The problem of transporting patients or elderly people has been widely studied in literature and is usually modeled as a dial-a-ride problem (DARP). In this paper we analyze the corresponding problem arising in the daily operation of the Austrian Red Cross. This nongovernmental organization is the largest organization performing patient transportation in Austria. The aim is to design vehicle routes to serve partially dynamic transportation requests using a fixed vehicle fleet. Each request requires transportation from a patient's home location to a hospital (outbound request) or back home from the hospital (inbound request). Some of these requests are known in advance. Some requests are dynamic in the sense that they appear during the day without any prior information. Finally, some inbound requests are stochastic. More precisely, with a certain probability each outbound request causes a corresponding inbound request on the same day. Some stochastic information about these return transports is available from historical data. The purpose of this study is to investigate, whether using this information in designing the routes has a significant positive effect on the solution quality. The problem is modeled as a dynamic stochastic dial-a-ride problem with expected return transports. We propose four different modifications of metaheuristic solution approaches for this problem. In detail, we test dynamic versions of variable neighborhood search (VNS) and stochastic VNS (S-VNS) as well as modified versions of the multiple plan approach (MPA) and the multiple scenario approach (MSA). Tests are performed using 12 sets of test instances based on a real road network. Various demand scenarios are generated based on the available real data. Results show that using the stochastic information on return transports leads to average improvements of around 15%. Moreover, improvements of up to 41% can be achieved for some test instances. 相似文献