全文获取类型
收费全文 | 36469篇 |
免费 | 5998篇 |
国内免费 | 1858篇 |
专业分类
电工技术 | 2394篇 |
技术理论 | 1篇 |
综合类 | 3424篇 |
化学工业 | 2618篇 |
金属工艺 | 755篇 |
机械仪表 | 2888篇 |
建筑科学 | 1323篇 |
矿业工程 | 375篇 |
能源动力 | 525篇 |
轻工业 | 772篇 |
水利工程 | 438篇 |
石油天然气 | 433篇 |
武器工业 | 394篇 |
无线电 | 3876篇 |
一般工业技术 | 1395篇 |
冶金工业 | 680篇 |
原子能技术 | 404篇 |
自动化技术 | 21630篇 |
出版年
2024年 | 27篇 |
2023年 | 216篇 |
2022年 | 528篇 |
2021年 | 601篇 |
2020年 | 619篇 |
2019年 | 568篇 |
2018年 | 757篇 |
2017年 | 698篇 |
2016年 | 879篇 |
2015年 | 759篇 |
2014年 | 4512篇 |
2013年 | 3239篇 |
2012年 | 4249篇 |
2011年 | 4850篇 |
2010年 | 4007篇 |
2009年 | 3698篇 |
2008年 | 2168篇 |
2007年 | 1616篇 |
2006年 | 1463篇 |
2005年 | 1436篇 |
2004年 | 1294篇 |
2003年 | 1235篇 |
2002年 | 934篇 |
2001年 | 728篇 |
2000年 | 558篇 |
1999年 | 472篇 |
1998年 | 356篇 |
1997年 | 269篇 |
1996年 | 239篇 |
1995年 | 232篇 |
1994年 | 154篇 |
1993年 | 136篇 |
1992年 | 84篇 |
1991年 | 74篇 |
1990年 | 63篇 |
1989年 | 68篇 |
1988年 | 53篇 |
1987年 | 47篇 |
1986年 | 43篇 |
1985年 | 64篇 |
1984年 | 45篇 |
1983年 | 39篇 |
1982年 | 35篇 |
1981年 | 42篇 |
1980年 | 26篇 |
1979年 | 18篇 |
1978年 | 25篇 |
1977年 | 21篇 |
1976年 | 36篇 |
1975年 | 14篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
死亡风险预测指根据病人临床体征监测数据来预测未来一段时间的死亡风险。对于ICU病患,通过死亡风险预测可以有针对性地对病人做出临床诊断,以及合理安排有限的医疗资源。基于临床使用的MEWS和Glasgow昏迷评分量表,针对ICU病人临床监测的17项生理参数,提出一种基于多通道的ICU脑血管疾病死亡风险预测模型。引入多通道概念应用于BiLSTM模型,用于突出每个生理参数对死亡风险预测的作用。采用Attention机制用于提高模型预测精度。实验数据来自MIMIC [Ⅲ]数据库,从中提取3?080位脑血管疾病患者的16?260条记录用于此次研究,除了六组超参数实验之外,将所提模型与LSTM、Multichannel-BiLSTM、逻辑回归(logistic regression)和支持向量机(support vector machine, SVM)四种模型进行了对比分析,准确率Accuracy、灵敏度Sensitive、特异性Specificity、AUC-ROC和AUC-PRC作为评价指标,实验结果表明,所提模型性能优于其他模型,AUC值达到94.3%。 相似文献
2.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
3.
为了开发β受体阻断剂新药(S)-噻吗洛尔半水合物,采用3-吗啉-4-氯-1,2,5-噻二唑为起始原料,经水解反应得到中间体1(3-吗啉-4-羟基-1,2,5-噻二唑)。中间体1与R-环氧氯丙烷发生醚化反应,经后处理及重结晶得到中间体2 {(R)-4-[4-(环氧乙烷-2-基甲氧基)-1,2,5-噻二唑-3-基]吗啉}。中间体2经胺化反应、马来酸成盐及重结晶得到(S)-马来酸噻吗洛尔。(S)-马来酸噻吗洛尔经游离、纯水转晶得到符合药典标准的(S)-噻吗洛尔半水合物,总收率14.05%且e.e.值为99.66%。最终成品经IR、1H-NMR、13C-NMR、MS、TGA、DSC表征,并优化各步反应条件。结果表明:以三乙胺为醚化反应缚酸剂75 ℃反应最佳;以乙醇为胺化反应溶剂46 ℃反应16 h最佳;S-噻吗洛尔的转晶拆分以水作溶剂,比传统不对称合成工艺安全稳定,操作简单,适合工业化生产。 相似文献
4.
An integrated approach to measure the cost efficiency of the postal network of Universal Service Provider is proposed. An integrated approach enables the measurement of cost efficiency for delivery and non-delivery postal network units. The proposed approach is verified and tested on the postal network of the selected provider and the results were derived by using Data Envelopment Analysis (DEA). The results show that the main sources of inefficiency are inadequate allocation of resources relative to the network units. In addition, the study indicates that economies of scale have a positive impact on the efficiency of postal network units. 相似文献
5.
Communication between organizations is formalized as process choreographies in daily business. While the correct ordering of exchanged messages can be modeled and enacted with current choreography techniques, no approach exists to describe and automate the exchange of data between processes in a choreography using messages. This paper describes an entirely model-driven approach for BPMN introducing a few concepts that suffice to model data retrieval, data transformation, message exchange, and correlation – four aspects of data exchange. For automation, this work utilizes a recent concept to enact data dependencies in internal processes. We present a modeling guideline to derive local process models from a given choreography; their operational semantics allows to correctly enact the entire choreography from the derived models only including the exchange of data. Targeting on successful interactions, we discuss means to ensure correct process choreography modeling. Finally, we implemented our approach by extending the camunda BPM platform with our approach and show its feasibility by realizing all service interaction patterns using only model-based concepts. 相似文献
6.
目前网络上的服装图像数量增长迅猛,对于大量服装图像实现智能分类的需求日益增加。将基于区域的全卷积网络(Region-Based Fully Convolutional Networks,R-FCN)引入到服装图像识别中,针对服装图像分类中网络训练时间长、形变服装图像识别率低的问题,提出一种新颖的改进框架HSR-FCN。新框架将R-FCN中的区域建议网络和HyperNet网络相融合,改变图片特征学习方式,使得HSR-FCN可以在更短的训练时间内达到更高的准确率。在模型中引入了空间转换网络,对输入服装图像和特征图进行了空间变换及对齐,加强了对多角度服装和形变服装的特征学习。实验结果表明,改进后的HSR-FCN模型有效地加强了对形变服装图像的学习,且在训练时间更短的情况下,比原来的网络模型R-FCN平均准确率提高了大约3个百分点,达到96.69%。 相似文献
7.
Fault detection, isolation and optimal control have long been applied to industry. These techniques have proven various successful theoretical results and industrial applications. Fault diagnosis is considered as the merge of fault detection (that indicates if there is a fault) and fault isolation (that determines where the fault is), and it has important effects on the operation of complex dynamical systems specific to modern industry applications such as industrial electronics, business management systems, energy, and public sectors. Since the resources are always limited in real-world industrial applications, the solutions to optimally use them under various constraints are of high actuality. In this context, the optimal tuning of linear and nonlinear controllers is a systematic way to meet the performance specifications expressed as optimization problems that target the minimization of integral- or sum-type objective functions, where the tuning parameters of the controllers are the vector variables of the objective functions. The nature-inspired optimization algorithms give efficient solutions to such optimization problems. This paper presents an overview on recent developments in machine learning, data mining and evolving soft computing techniques for fault diagnosis and on nature-inspired optimal control. The generic theory is discussed along with illustrative industrial process applications that include a real liquid level control application, wind turbines and a nonlinear servo system. New research challenges with strong industrial impact are highlighted. 相似文献
8.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors. 相似文献
9.
《International Journal of Hydrogen Energy》2021,46(59):30267-30287
This work aims to improve the existing monitoring systems MS for two grid-connected PV stations GCPVS of URERMS ADRAR, to eliminate its limitations. This improvement consists of developing an MS which is used for two PV stations with different configurations. This MS contains new LabVIEW-based monitoring software for visualizing real-time measured data and evaluating GCPVS performance. In addition, it illustrates the 2D and 3D real-time relationships of PV system parameters, which allow us to understand the dynamic behavior of PV system components. This developed monitoring software synchronizes also the various data acquisition units DAU of GCPVS, allowing simultaneous data access.To perform a reliable performance analysis and a comparative study of different GCPVS based on accurate measurements, the sensor's calibration is performed with its DAU. The MS autonomy is ensured by integrating developed PV-UPS. A graphical user interface is provided for the evaluation of PV-UPS performance. 相似文献
10.
针对平面并联机构无奇异位置工作空间求解困难、过程繁琐、计算量大等问题,提出了基于CAD求解平面并联机构工作空间的三维螺旋扫描方法。将[n]自由度平面并联机构分解成[n]条支链进行独立分析,得到每条支链下末端执行器的可达区域,再将所有支链可达区域取交集即为平面并联机构工作空间。应用SolidWorks软件建立平面并联机构模型,进行几何特征处理,通过自动求解器求解,将求解过程图形化,快速得到同轴布局5R机构和平面3-RPR并联机构的无奇异位置工作空间。通过同轴布局5R机构的运动学实验,验证了该求解方法的可行性。 相似文献