全文获取类型
收费全文 | 8921篇 |
免费 | 2031篇 |
国内免费 | 1330篇 |
专业分类
电工技术 | 479篇 |
综合类 | 1025篇 |
化学工业 | 615篇 |
金属工艺 | 234篇 |
机械仪表 | 491篇 |
建筑科学 | 415篇 |
矿业工程 | 192篇 |
能源动力 | 85篇 |
轻工业 | 444篇 |
水利工程 | 112篇 |
石油天然气 | 196篇 |
武器工业 | 293篇 |
无线电 | 1629篇 |
一般工业技术 | 644篇 |
冶金工业 | 626篇 |
原子能技术 | 174篇 |
自动化技术 | 4628篇 |
出版年
2024年 | 78篇 |
2023年 | 334篇 |
2022年 | 615篇 |
2021年 | 630篇 |
2020年 | 569篇 |
2019年 | 427篇 |
2018年 | 327篇 |
2017年 | 398篇 |
2016年 | 331篇 |
2015年 | 452篇 |
2014年 | 634篇 |
2013年 | 650篇 |
2012年 | 762篇 |
2011年 | 773篇 |
2010年 | 627篇 |
2009年 | 567篇 |
2008年 | 607篇 |
2007年 | 683篇 |
2006年 | 536篇 |
2005年 | 472篇 |
2004年 | 341篇 |
2003年 | 306篇 |
2002年 | 195篇 |
2001年 | 166篇 |
2000年 | 136篇 |
1999年 | 111篇 |
1998年 | 66篇 |
1997年 | 81篇 |
1996年 | 82篇 |
1995年 | 54篇 |
1994年 | 55篇 |
1993年 | 30篇 |
1992年 | 24篇 |
1991年 | 20篇 |
1990年 | 25篇 |
1989年 | 17篇 |
1988年 | 19篇 |
1987年 | 13篇 |
1986年 | 15篇 |
1985年 | 7篇 |
1984年 | 6篇 |
1983年 | 5篇 |
1982年 | 8篇 |
1981年 | 6篇 |
1980年 | 2篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1966年 | 2篇 |
1956年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
2.
Bernette Maria Oosterlaken Heiner Friedrich Gijsbertus de With 《Microscopy research and technique》2022,85(1):412-417
Transmission electron microscopy (TEM) is an important analysis technique to visualize (bio)macromolecules and their assemblies, including collagen fibers. Many protocols for TEM sample preparation of collagen involve one or more washing steps to remove excess salts from the dispersion that could hamper analysis when dried on a TEM grid. Such protocols are not standardized and washing times as well as washing solvents vary from procedure to procedure, with each research group typically having their own protocol. Here, we investigate the influence of washing with water, ethanol, but also methanol and 2-propanol, for both mineralized and unmineralized collagen samples via a protocol based on centrifugation. Washing with water maintains the hydrated collagen structure and the characteristic banding pattern can be clearly observed. Conversely, washing with ethanol results in dehydration of the fibrils, often leading to aggregation of the fibers and a less obvious banding pattern, already within 1 min of ethanol exposure. As we show, this process is fully reversible. Similar observations were made for methanol and propanol. Based on these results, a standardized washing protocol for collagenous samples is proposed. 相似文献
3.
In actual engineering scenarios, limited fault data leads to insufficient model training and over-fitting, which negatively affects the diagnostic performance of intelligent diagnostic models. To solve the problem, this paper proposes a variational information constrained generative adversarial network (VICGAN) for effective machine fault diagnosis. Firstly, by incorporating the encoder into the discriminator to map the deep features, an improved generative adversarial network with stronger data synthesis capability is established. Secondly, to promote the stable training of the model and guarantee better convergence, a variational information constraint technique is utilized, which constrains the input signals and deep features of the discriminator using the information bottleneck method. In addition, a representation matching module is added to impose restrictions on the generator, avoiding the mode collapse problem and boosting the sample diversity. Two rolling bearing datasets are utilized to verify the effectiveness and stability of the presented network, which demonstrates that the presented network has an admirable ability in processing fault diagnosis with few samples, and performs better than state-of-the-art approaches. 相似文献
4.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。 相似文献
5.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time. 相似文献
6.
7.
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time of encryption and decryption. Our experiments result demonstrates that the NTRU-type public-key cryptosystem over the binary field is relatively practical and effective. 相似文献
8.
The integration of reinforcement learning (RL) and imitation learning (IL) is an important problem that has long been studied in the field of intelligent robotics. RL optimizes policies to maximize the cumulative reward, whereas IL attempts to extract general knowledge about the trajectories demonstrated by experts, i.e, demonstrators. Because each has its own drawbacks, many methods combining them and compensating for each set of drawbacks have been explored thus far. However, many of these methods are heuristic and do not have a solid theoretical basis. This paper presents a new theory for integrating RL and IL by extending the probabilistic graphical model (PGM) framework for RL, control as inference. We develop a new PGM for RL with multiple types of rewards, called probabilistic graphical model for Markov decision processes with multiple optimality emissions (pMDP-MO). Furthermore, we demonstrate that the integrated learning method of RL and IL can be formulated as a probabilistic inference of policies on pMDP-MO by considering the discriminator in generative adversarial imitation learning (GAIL) as an additional optimality emission. We adapt the GAIL and task-achievement reward to our proposed framework, achieving significantly better performance than policies trained with baseline methods. 相似文献
9.
讨论了3种制样方法对直流辉光放电质谱法(dc-GDMS)检测氮化硼中的Na、Mg、Al、Si等27种杂质元素的影响。3种制样方法分别如下所示:方法1,直接把氮化硼压在铟薄片上;方法2,把氮化硼压在铟薄片上后,再盖上一层铟罩;方法3,把压碎后的氮化硼放在针状钽勺上。在优化的辉光放电参数下对比了3种不同制样方法对基体信号强度的影响。试验表明:在方法1中,当氮化硼尺寸约为3mm×3mm,厚度小于1mm时,基体11B的信号可达1.8×107 cps;在方法2中,选择铟孔大小合适的铟罩,基体11B的信号可达1.0×107 cps;方法3获得基体信号强度比方法1、方法2高一个数量级。大部分元素在中分辨率下可获得较好的结果,而对于在高分辨率下也较难分离的元素,可选择丰度较低的同位素在中分辨率下进行测定,如Ge选择70Ge+,Se选择82Se+,Cd选择111Cd+,Sn选择119Sn+,Ag选择109Ag+,Pt选择194Pt+。氮化硼中的杂质元素含量可通过样品片中待测元素含量减去来自于铟薄片或钽勺中该元素贡献的含量来计算获得。将样品平行测定5次,相对标准偏差均在20%以内。对于Al、Si、Ti等元素的测定,3种制样方法的测定结果基本一致;方法1、方法2中检测到的In含量较大,使得铟中的Ni、Cu对氮化硼的测定值影响较大;方法3由于钽中Fe、Cu的贡献导致氮化硼中Fe、Cu的检测值较大,但方法3获得的基体信号强度大,可降低部分元素的检出限,如Cr、Mn、Ga、Ge等。综上所述,方法3为优选方法。 相似文献
10.