全文获取类型
收费全文 | 25011篇 |
免费 | 2542篇 |
国内免费 | 1582篇 |
专业分类
电工技术 | 1610篇 |
技术理论 | 2篇 |
综合类 | 3069篇 |
化学工业 | 1199篇 |
金属工艺 | 574篇 |
机械仪表 | 1753篇 |
建筑科学 | 3378篇 |
矿业工程 | 874篇 |
能源动力 | 625篇 |
轻工业 | 695篇 |
水利工程 | 650篇 |
石油天然气 | 535篇 |
武器工业 | 174篇 |
无线电 | 2136篇 |
一般工业技术 | 1312篇 |
冶金工业 | 569篇 |
原子能技术 | 160篇 |
自动化技术 | 9820篇 |
出版年
2024年 | 58篇 |
2023年 | 178篇 |
2022年 | 350篇 |
2021年 | 473篇 |
2020年 | 571篇 |
2019年 | 503篇 |
2018年 | 494篇 |
2017年 | 600篇 |
2016年 | 880篇 |
2015年 | 971篇 |
2014年 | 2071篇 |
2013年 | 1524篇 |
2012年 | 1784篇 |
2011年 | 1961篇 |
2010年 | 1652篇 |
2009年 | 1549篇 |
2008年 | 1631篇 |
2007年 | 2007篇 |
2006年 | 1773篇 |
2005年 | 1541篇 |
2004年 | 1240篇 |
2003年 | 1044篇 |
2002年 | 736篇 |
2001年 | 569篇 |
2000年 | 497篇 |
1999年 | 404篇 |
1998年 | 304篇 |
1997年 | 268篇 |
1996年 | 266篇 |
1995年 | 268篇 |
1994年 | 185篇 |
1993年 | 121篇 |
1992年 | 109篇 |
1991年 | 109篇 |
1990年 | 74篇 |
1989年 | 86篇 |
1988年 | 68篇 |
1987年 | 35篇 |
1986年 | 22篇 |
1985年 | 25篇 |
1984年 | 27篇 |
1983年 | 16篇 |
1982年 | 6篇 |
1981年 | 12篇 |
1979年 | 6篇 |
1977年 | 7篇 |
1976年 | 7篇 |
1963年 | 10篇 |
1961年 | 8篇 |
1957年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
3.
High dimensionality in real-world multi-reservoir systems greatly hinders the application and popularity of evolutionary algorithms, especially for systems with heterogeneous units. An efficient hierarchical optimization framework is presented for search space reduction, determining the best water distributions, not only between cascade reservoirs, but also among different types of hydropower units. The framework is applied to the Three Gorges Project (TGP) system and the results demonstrate that the difficulties of multi-reservoir optimization caused by high dimensionality can be effectively solved by the proposed hierarchical method. For the day studied, power output could be increased by 6.79 GWh using an optimal decision with the same amount of water actually used; while the same amount of power could be generated with 2.59 × 107 m3 less water compared to the historical policy. The methodology proposed is general in that it can be used for other reservoir systems and other types of heterogeneous unit generators. 相似文献
4.
Reliability based criteria are quite popular for optimal sensor network design. We present a modified definition of system reliability for sensor network design for two applications: reliable estimation of variables in a steady state linear flow process, and reliable fault detection and diagnosis for any process. Unlike the weakest-link based definition of system reliability in the literature, the proposed definition considers the entire system and is consistent with the reliability concept used in classical reliability literature. For each application, dual approaches for defining system reliability are proposed, and their analogy with the reliability problem in the classical reliability literature is established. Using examples and stochastic simulations, the advantage of using the proposed system reliability in contrast to the existing definition is illustrated. Part II of this series of articles presents methods for efficient generation of the system reliability function and its use in optimization-based approaches for designing optimal sensor networks. 相似文献
5.
Facial Expression Recognition (FER) is an important subject of human–computer interaction and has long been a research area of great interest. Accurate Facial Expression Sequence Interception (FESI) and discriminative expression feature extraction are two enormous challenges for the video-based FER. This paper proposes a framework of FER for the intercepted video sequences by using feature point movement trend and feature block texture variation. Firstly, the feature points are marked by Active Appearance Model (AAM) and the most representative 24 of them are selected. Secondly, facial expression sequence is intercepted from the face video by determining two key frames whose emotional intensities are minimum and maximum, respectively. Thirdly, the trend curve which represents the Euclidean distance variations between any two selected feature points is fitted, and the slopes of specific points on the trend curve are calculated. Finally, combining Slope Set which is composed by the calculated slopes with the proposed Feature Block Texture Difference (FBTD) which refers to the texture variation of facial patch, the final expressional feature are formed and inputted to One-dimensional Convolution Neural Network (1DCNN) for FER. Five experiments are conducted in this research, and three average FER rates 95.2%, 96.5%, and 97% for Beihang University (BHU) facial expression database, MMI facial expression database, and the combination of two databases, respectively, have shown the significant advantages of the proposed method over the existing ones. 相似文献
6.
随着我国石油需求量不断增加,致密油藏的开发也愈发重要。如何高效开发致密油藏是一项重点难点,其中致密油藏注天然气提高采收率是一个极具潜力的研究方向。因此,本文着重介绍以天然气作为能量补充介质在国内外的研究现状和应用现状,并且从两相特征等方面总结了理论研究中的一些机理,对致密油藏注天然气提高采收率的发展前景进行了一定的展望。 相似文献
7.
Amer Ibrahim Al-Omari Ibrahim M. Almanjahie Amal S. Hassan Heba F. Nagy 《计算机、材料和连续体(英文)》2020,64(2):835-857
In reliability analysis, the stress-strength model is often used to describe the life of
a component which has a random strength (X) and is subjected to a random stress (Y). In this
paper, we considered the problem of estimating the reliability R=P [Y<X] when the
distributions of both stress and strength are independent and follow exponentiated Pareto
distribution. The maximum likelihood estimator of the stress strength reliability is calculated
under simple random sample, ranked set sampling and median ranked set sampling methods.
Four different reliability estimators under median ranked set sampling are derived. Two
estimators are obtained when both strength and stress have an odd or an even set size. The
two other estimators are obtained when the strength has an odd size and the stress has an
even set size and vice versa. The performances of the suggested estimators are compared
with their competitors under simple random sample via a simulation study. The simulation
study revealed that the stress strength reliability estimates based on ranked set sampling and
median ranked set sampling are more efficient than their competitors via simple random
sample. In general, the stress strength reliability estimates based on median ranked set
sampling are smaller than the corresponding estimates under ranked set sampling and simple
random sample methods. 相似文献
8.
The veracity present in molecular data available in biological databases possesses new challenges for data analytics. The analysis of molecular data of various diseases can provide vital information for developing better understanding of the molecular mechanism of a disease. In this paper, an attempt has been made to propose a model that addresses the issue of veracity in data analytics for amino acid association patterns in protein sequences of Swine Influenza Virus. The veracity is caused by intra-sequential and inter-sequential biases present in the sequences due to varying degrees of relationships among amino acids. A complete dataset of 63,682 protein sequences is downloaded from NCBI and is refined. The refined dataset consists of 26,594 sequences which are employed in the present study. The type I fuzzy set is employed to explore amino acid association patterns in the dataset. The type I fuzzy support is refined to partially remove the inter-sequential biases causing veracity in data. The remaining inter-sequential biases present in refined fuzzy support are evaluated and eliminated using type II fuzzy set. Hence, it is concluded that a combination of type II fuzzy & refined fuzzy approach is the optimal approach for extracting a better picture of amino acid association patterns in the molecular dataset. 相似文献
9.
A Lattice Approach to Image Segmentation 总被引:1,自引:0,他引:1
Jean Serra 《Journal of Mathematical Imaging and Vision》2006,24(1):83-130
After a formal definition of segmentation as the largest partition of the space according to a criterion σ and a function
f, the notion of a morphological connection is reminded. It is used as an input to a central theorem of the paper (Theorem
8), that identifies segmentation with the connections that are based on connective criteria. Just as connections, the segmentations can then
be regrouped by suprema and infima. The generality of the theorem makes it valid for functions from any space to any other
one. Two propositions make precise the AND and OR combinations of connective criteria.
The soundness of the approach is demonstrated by listing a series of segmentation techniques. One considers first the cases
when the segmentation under study does not involve initial seeds. Various modes of regularity are discussed, which all derive
from Lipschitz functions. A second category of examples involves the presence of seeds around which the partition of the space
is organized. An overall proposition shows that these examples are a matter for the central theorem. Watershed and jump connection
based segmentations illustrate this type of situation. The third and last category of examples deals with cases when the segmentation
occurs in an indirect space, such as an histogram, and is then projected back on the actual space under study.
The relationships between filtering and segmentation are then investigated. A theoretical chapter introduces and studies the
two notions of a pulse opening and of a connected operator. The conditions under which a family of pulse openings can yield a connected filter are clarified. The ability of segmentations
to generate pyramids, or hierarchies, is analyzed. A distinction is made between weak hierarchies where the partitions increase
when going up in the pyramid, and the strong hierarchies where the various levels are structured as semi-groups, and particularly
as granulometric semi-groups.
The last section is based on one example, and goes back over the controversy about “lattice” versus “functional” optimization.
The problem is now tackled via a case of colour segmentation, where the saturation serves as a cursor between luminance and
hue. The emphasis is put on the difficulty of grouping the various necessary optimizations into a single one. 相似文献
10.
论文比较详细地阐述了涉密网主机系统所面临的安全隐患,提出了涉密网主机安全防护所要解决的几个技术问题,并就可能实现的技术方法进行了探讨和比较。 相似文献