全文获取类型
收费全文 | 664篇 |
免费 | 160篇 |
国内免费 | 45篇 |
专业分类
电工技术 | 119篇 |
综合类 | 84篇 |
化学工业 | 65篇 |
金属工艺 | 15篇 |
机械仪表 | 31篇 |
建筑科学 | 54篇 |
矿业工程 | 13篇 |
能源动力 | 29篇 |
轻工业 | 13篇 |
水利工程 | 13篇 |
石油天然气 | 10篇 |
武器工业 | 14篇 |
无线电 | 125篇 |
一般工业技术 | 134篇 |
冶金工业 | 16篇 |
原子能技术 | 8篇 |
自动化技术 | 126篇 |
出版年
2024年 | 2篇 |
2023年 | 5篇 |
2022年 | 12篇 |
2021年 | 13篇 |
2020年 | 40篇 |
2019年 | 59篇 |
2018年 | 24篇 |
2017年 | 45篇 |
2016年 | 44篇 |
2015年 | 47篇 |
2014年 | 40篇 |
2013年 | 43篇 |
2012年 | 57篇 |
2011年 | 31篇 |
2010年 | 29篇 |
2009年 | 34篇 |
2008年 | 17篇 |
2007年 | 31篇 |
2006年 | 29篇 |
2005年 | 18篇 |
2004年 | 20篇 |
2003年 | 44篇 |
2002年 | 38篇 |
2001年 | 41篇 |
2000年 | 32篇 |
1999年 | 19篇 |
1998年 | 17篇 |
1997年 | 14篇 |
1996年 | 7篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 5篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1987年 | 1篇 |
1979年 | 1篇 |
1960年 | 1篇 |
排序方式: 共有869条查询结果,搜索用时 78 毫秒
1.
2.
电磁波在包含各向异性媒质多层介质中传播的分析 总被引:1,自引:0,他引:1
对电磁波在包含各向异性媒质多层介质中的传播进行分析,给出了闭合形式的解,该结构可用作法拉第旋转器,与其它准光元件组合构成的准光环行器或隔离器。也可用作辐射口径,通过改变磁化场方向和强度实现波束扫描或极化变化,给出了法拉第旋转角计算结果和实验结果。 相似文献
3.
4.
本文提出了依缓冲库调速CIMS可靠性分析的位相结构方法,从闭环排队网络出发,利用准生灭过程理论,给出了系统的各种可靠性指标和生产指标,讨论了系统局部运行期的们相特征,最后给出了两个数据算例。 相似文献
5.
Abstract. We propose the quasi‐maximum likelihood method to estimate the parameters of an RCA(1) process, i.e. a random coefficient autoregressive time series of order 1. The strong consistency and the asymptotic normality of the estimators are derived under optimal conditions. 相似文献
6.
7.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious. 相似文献
8.
A Discrete‐Time Global Quasi‐Sliding Mode Control Scheme with Bounded External Disturbance Rejection 下载免费PDF全文
J. S. Chen 《Asian journal of control》2014,16(6):1839-1848
A global quasi‐sliding mode control (GQSMC) scheme is introduced to ensure zigzag motion with a smaller bound than that offered by Gao's method and to provide disturbance rejection throughout the entire response in discrete time. The design of an augmented forcing function is followed by three conditions in discrete time extended from global sliding mode control (GSMC) in continuous time. Furthermore, we adopt a switching gain, which is auto‐tuned as a function of sliding surface s(k), such that chattering phenomena can be considerably alleviated during the steady‐state, significantly reducing switching control applied to the plant. The proposed GQSMC scheme can provide more advantages such as an even distribution of the control input throughout the entire response and an improvement in the accuracy and speed of the desired performance, guaranteeing a quasi‐sliding mode throughout the entire response. In addition, we also consider the input disturbance rejection according to the norm‐bounded exogenous signal. Results from both the simulation and the experiments are reported. The results further verify that we can use the global sliding surface to curtail reaching the phase stage. 相似文献
9.
给出了多输出k阶拟Bent函数的一种构造方法.该方法通过组合两个无共同变元函数而构造出多输出k阶拟Bent函数.同时,还讨论了所构造的这类多输出k阶拟Bent函数的代数次数,非线性性,平衡性,扩散性及稳定性等密码学性质.这些性质来显示,多输出拟Bent函数是一类密码学性质良好的多输出函数.用作分组密码体制的非线性组合器时,能有效地抵抗差分分析和线性分析的攻击.另外,它还可应用于多输出前馈网等方面. 相似文献
10.
针对电子战中各种信号混叠严重难以分离的现象,在盲源分离开关算法基础上提出一种新的盲信源分离拟开关算法.该算法引入单位对称加权滑动向量来加权每次迭代所得的分离信号作为源信号,用峭度取代原算法的峭度符号位作为判断函数来自适应选择加权相应激活函数,以此优化学习算法,结合信号分选的具体应用,给出了迭代结束的评判方法.计算机仿真实验表明,在强噪声背景影响下,该算法能够更加有效地分离空间未知多源线性混叠信号,且在分离效果、稳定性、处理速度和抗噪性能上都比原算法有较大改进. 相似文献