全文获取类型
收费全文 | 87995篇 |
免费 | 10027篇 |
国内免费 | 6405篇 |
专业分类
电工技术 | 8120篇 |
技术理论 | 2篇 |
综合类 | 8826篇 |
化学工业 | 10998篇 |
金属工艺 | 5919篇 |
机械仪表 | 6579篇 |
建筑科学 | 6926篇 |
矿业工程 | 3580篇 |
能源动力 | 2509篇 |
轻工业 | 7968篇 |
水利工程 | 2882篇 |
石油天然气 | 3778篇 |
武器工业 | 1232篇 |
无线电 | 9525篇 |
一般工业技术 | 7385篇 |
冶金工业 | 3540篇 |
原子能技术 | 1409篇 |
自动化技术 | 13249篇 |
出版年
2024年 | 310篇 |
2023年 | 1259篇 |
2022年 | 3083篇 |
2021年 | 4014篇 |
2020年 | 2853篇 |
2019年 | 2138篇 |
2018年 | 2360篇 |
2017年 | 2663篇 |
2016年 | 2297篇 |
2015年 | 3798篇 |
2014年 | 5040篇 |
2013年 | 5959篇 |
2012年 | 7248篇 |
2011年 | 7550篇 |
2010年 | 7184篇 |
2009年 | 6750篇 |
2008年 | 7067篇 |
2007年 | 7054篇 |
2006年 | 5960篇 |
2005年 | 4866篇 |
2004年 | 3577篇 |
2003年 | 2505篇 |
2002年 | 2274篇 |
2001年 | 1967篇 |
2000年 | 1684篇 |
1999年 | 876篇 |
1998年 | 424篇 |
1997年 | 315篇 |
1996年 | 298篇 |
1995年 | 189篇 |
1994年 | 171篇 |
1993年 | 116篇 |
1992年 | 105篇 |
1991年 | 69篇 |
1990年 | 78篇 |
1989年 | 63篇 |
1988年 | 39篇 |
1987年 | 34篇 |
1986年 | 20篇 |
1985年 | 7篇 |
1984年 | 14篇 |
1983年 | 15篇 |
1982年 | 14篇 |
1981年 | 25篇 |
1980年 | 23篇 |
1979年 | 16篇 |
1976年 | 5篇 |
1965年 | 6篇 |
1959年 | 15篇 |
1951年 | 17篇 |
排序方式: 共有10000条查询结果,搜索用时 546 毫秒
11.
针对软件定义网络中,控制器无法保证下发的网络策略能够在转发设备上得到正确执行的安全问题,提出一种新的转发路径监控安全方案。首先以控制器的全局视图能力为基础,设计了基于OpenFlow协议的路径凭据交互处理机制;然后采用哈希链和消息验证码作为生成和处理转发路径凭据信息的关键技术;最后在此基础上,对Ryu控制器和Open vSwitch开源交换机进行深度优化,添加相应处理流程,建立轻量级的路径安全机制。测试结果表明,该机制能够有效保证数据转发路径安全,吞吐量消耗比SDN数据层可信转发方案(SDNsec)降低20%以上,更适用于路径复杂的网络环境,但时延和CPU使用率的浮动超过15%,有待进一步优化。 相似文献
12.
13.
The traditional ciphertext policy attribute-based encryption (CP-ABE) has two problems:one is that the access policy must be embedded in the ciphertext and sent, which leads to the disclosure of user爷 s privacy information, the other is that it does not support collaborative decryption, which cannot meet the actual demand of conditional collaborative decryption among multiple users. In order to deal with the above two problems at the same time, a fine-grained cooperative access control scheme with hidden policies (FCAC-HP) is proposed based on the existing CP-ABE schemes combined with blockchain technology. In FCAC-HP scheme, users are grouped by group identifier so that only users within the same group can cooperate. In the data encryption stage, the access policy is encrypted and then embedded in the ciphertext to protect the privacy information of the access policy. In the data access stage, the anonymous attribute matching technology is introduced so that only matched users can decrypt ciphertext data to improve the efficiency of the system. In this process, a smart contract is used to execute the
verification algorithm to ensure the credibility of the results. In terms of security, FCAC-HP scheme is based on the prime subgroup discriminative assumption and is proved to be indistinguishable under chosen plaintext attack (CPA) by dual system encryption technology. Experimental verification and analysis show that FCAC-HP scheme improves computational efficiency while implementing complex functions. 相似文献
14.
15.
Gang Zheng Xiaoxuan Yu Haizuo Zhou Xinyu Yang Wei Guo Pengbo Yang 《Geotextiles and Geomembranes》2021,49(1):180-187
Incompressible dipping substrata are commonly encountered in engineering practice. Compared to horizontal underlying strata, the inclined underlying stratum increase the risk of collapse of embankments reinforced with columns because it weakens the restraint of the column base. The objective of this study is to investigate the effectiveness of geosynthetics on improving the embankment stability when the underlying stratum is inclined. The influence of geosynthetic tensile stiffness on the ultimate surcharge and failure mechanism is studied. A deep-seated failure with column tilting occurs when the geosynthetic tensile stiffness is low, whereas a lateral sliding occurs when the geosynthetic tensile stiffness is high. To illustrate the contribution of geosynthetics, the distribution of the lateral pressures acting on the columns is analyzed. 相似文献
16.
Crystallographic characteristics and microwave dielectric properties of Ni-modified MgTa2O6 ceramics
Liang Shi Xueying Wang Rui Peng Gang Wang Cheng Liu Xiaolei Shi Dainan Zhang Huaiwu Zhang 《Ceramics International》2021,47(16):22514-22521
Ni2+ modified MgTa2O6 ceramics with a trirutile phase and space group P42/mnm were obtained. The correlations between crystallographic characteristics and microwave dielectric performance of MgTa2O6 ceramics were systematically studied based on the chemistry bond theory (PVL theory) for the first time. The results indicate that the introduction of Ni2+ causes a change in polarizability and the Mg–O bond ionicity, which contributes to the variation of dielectric constant. Moreover, the lattice energy, and packing fraction, full width at half maximum of the Raman peak of Ta–O bond, as the quantitative characterization of crystallographic parameters, regulate the dielectric loss of MgTa2O6 ceramics in GHz frequency band. In addition, the study of sintering behavior shows that the densification and micromorphology are the crucial factors affecting the microwave dielectric performance. Typically, Ni2+ doping on the A-site of MgTa2O6 can effectively promote the Q × f values to 173,000 GHz (at 7.43 GHz), which ensures its applicability in 5G communication technology. 相似文献
17.
针对基于容积脉搏波(PPG)提取运动心率时,传统心率提取算法由于运动噪声干扰使测量结果误差大、实时性不好的问题,提出一种抗运动干扰的实时心率提取方法。该方法通过实时小波去噪,同时结合三轴加速度信号(ACC)对运动进行分类训练,计算各运动状态心率增益,对实时心率值进行补偿。实验结果表明,通过与同时采集的ECG信号计算出的实时心率进行对比,绝对误差率仅为1.2%左右。相比传统心率提取算法,该算法具有抗干扰性强,实时准确的特点。 相似文献
18.
Liyan Wen Gang Tao Bin Jiang 《International Journal of Adaptive Control and Signal Processing》2021,35(3):373-400
In this article, adaptive compensation designs are developed for nonlinear systems with uncertainties from the system functions and persistent actuator failures of characterizations that (i) some unknown system inputs are stuck at some unknown fixed or varying values at unknown time instants and (ii) the failure pattern always switches from one to another and the switching does not stop. Such a controlled plant is described by an uncertain time-varying nonlinear system, and some robust adaptive feedback linearization based failure compensation results are studied for closed-loop system stabilization and bounded output tracking for some specific conditions. To improve the tracking performance in the presence of persistent actuator failures, a new adaptive control scheme is developed, using the failure indicator function which contains the failure pattern and failure time in the formulation. Detailed stability and tracking performance are shown. Simulation results are shown to verify the effectiveness of the proposed adaptive actuator failure compensation method. 相似文献
19.
Rachana R. Borkute Sren Woelke Gang Pei Anca Dorhoi 《International journal of molecular sciences》2021,22(9)
Neutrophils readily infiltrate infection foci, phagocytose and usually destroy microbes. In tuberculosis (TB), a chronic pulmonary infection caused by Mycobacterium tuberculosis (Mtb), neutrophils harbor bacilli, are abundant in tissue lesions, and their abundances in blood correlate with poor disease outcomes in patients. The biology of these innate immune cells in TB is complex. Neutrophils have been assigned host-beneficial as well as deleterious roles. The short lifespan of neutrophils purified from blood poses challenges to cell biology studies, leaving intracellular biological processes and the precise consequences of Mtb–neutrophil interactions ill-defined. The phenotypic heterogeneity of neutrophils, and their propensity to engage in cellular cross-talk and to exert various functions during homeostasis and disease, have recently been reported, and such observations are newly emerging in TB. Here, we review the interactions of neutrophils with Mtb, including subcellular events and cell fate upon infection, and summarize the cross-talks between neutrophils and lung-residing and -recruited cells. We highlight the roles of neutrophils in TB pathophysiology, discussing recent findings from distinct models of pulmonary TB, and emphasize technical advances that could facilitate the discovery of novel neutrophil-related disease mechanisms and enrich our knowledge of TB pathogenesis. 相似文献
20.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view. 相似文献