全文获取类型
收费全文 | 57961篇 |
免费 | 8181篇 |
国内免费 | 7995篇 |
专业分类
电工技术 | 986篇 |
技术理论 | 3篇 |
综合类 | 4336篇 |
化学工业 | 1116篇 |
金属工艺 | 489篇 |
机械仪表 | 1467篇 |
建筑科学 | 396篇 |
矿业工程 | 195篇 |
能源动力 | 1135篇 |
轻工业 | 309篇 |
水利工程 | 74篇 |
石油天然气 | 89篇 |
武器工业 | 92篇 |
无线电 | 9923篇 |
一般工业技术 | 2806篇 |
冶金工业 | 244篇 |
原子能技术 | 138篇 |
自动化技术 | 50339篇 |
出版年
2024年 | 317篇 |
2023年 | 1400篇 |
2022年 | 2586篇 |
2021年 | 2983篇 |
2020年 | 2891篇 |
2019年 | 2363篇 |
2018年 | 2584篇 |
2017年 | 3938篇 |
2016年 | 4290篇 |
2015年 | 3814篇 |
2014年 | 5485篇 |
2013年 | 4783篇 |
2012年 | 5779篇 |
2011年 | 5439篇 |
2010年 | 4528篇 |
2009年 | 4606篇 |
2008年 | 3466篇 |
2007年 | 3461篇 |
2006年 | 2672篇 |
2005年 | 1523篇 |
2004年 | 696篇 |
2003年 | 648篇 |
2002年 | 656篇 |
2001年 | 621篇 |
2000年 | 393篇 |
1999年 | 412篇 |
1998年 | 195篇 |
1997年 | 178篇 |
1996年 | 182篇 |
1995年 | 129篇 |
1994年 | 160篇 |
1993年 | 115篇 |
1992年 | 110篇 |
1991年 | 110篇 |
1990年 | 82篇 |
1989年 | 91篇 |
1988年 | 174篇 |
1987年 | 31篇 |
1986年 | 27篇 |
1985年 | 32篇 |
1984年 | 34篇 |
1983年 | 23篇 |
1982年 | 27篇 |
1981年 | 16篇 |
1980年 | 11篇 |
1979年 | 19篇 |
1978年 | 18篇 |
1977年 | 18篇 |
1975年 | 7篇 |
1974年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Every year, the rate at which technology is applied on areas of our everyday life is increasing at a steady pace. This rapid development drives the technology companies to design and fabricate their integrated circuits (ICs) in non-trustworthy outsourcing foundries to reduce the cost, thus, leaving space for a synchronous form of virus, known as Hardware Trojan (HT), to be developed. HTs leak encrypted information, degrade device performance or lead to total destruction. To reduce the risks associated with these viruses, various approaches have been developed aiming to prevent and detect them, based on conventional or machine learning methods. Ideally, any undesired modification made to an IC should be detectable by pre-silicon verification/simulation and post-silicon testing. The infected circuit can be inserted in different stages of the manufacturing process, rendering the detection of HTs a complicated procedure. In this paper, we present a comprehensive review of research dedicated to countermeasures against HTs embedded into ICs. The literature is grouped in four main categories; (a) conventional HT detection approaches, (b) machine learning for HT countermeasures, (c) design for security and (d) runtime monitor. 相似文献
82.
We study a two-stage stochastic and nonlinear optimization model for operating a power grid exposed to a natural disaster. Although this approach can be generalized to any natural hazard of continuous (and not instantaneous) nature, our focus is on wildfires. We assume that an approaching wildfire impacts the power grid by reducing the transmission capacity of its overhead lines. At the time when proactive decisions have to be taken, the severity of the wildfire is not known. This introduces uncertainty. In this paper, we extend previous work by more realistically capturing this uncertainty and by strengthening the mathematical programming formulation through standard reformulation techniques. With these reformulation techniques, the resulting two-stage, convex mixed-integer quadratically constrained programming formulation can be efficiently solved using commercial quadratic programming solvers as demonstrated on a case study on a modified version of the IEEE 123-bus test system with 100 scenarios. We also quantify the uncertainties through a second case study using the following three standard metrics of two-stage stochastic optimization: the expected value of perfect information, the expected result of using the expected value solution and the value of the stochastic solution. 相似文献
83.
In order to perform multi-dimensional data aggregation operations efficiently in edge computing-based Internet of things (IoT) systems, a new efficient privacy-preserving multi-dimensional data aggregation (EPMDA) scheme is proposed in this paper. EPMDA scheme is characterized by employing the homomorphic Paillier encryption and SM9 signature algorithm. To improve the computation efficiency of the Paillier encryption operation, EPMDA scheme generates a pre-computed modular exponentiation table of each dimensional data,and the Paillier encryption operation can be implemented by using only several modular multiplications. For the multi-dimensional data, the scheme concatenates zeros between two adjacent dimensional data to avoid data overflow in the sum operation of ciphertexts. To enhance security, EPMDA scheme sets random number at the high address of the exponent. Moreover, the scheme utilizes SM9 signature scheme to guarantee device authentication and data integrity. The performance evaluation and comparison show that EPMDA scheme is more efficient than the existing multi-dimensional data aggregation schemes. 相似文献
84.
Yaw control systems orientate the rotor of a wind turbine into the wind direction, optimize the wind power generated by wind turbines and alleviate the mechanical stresses on a wind turbine. Regarding the advantages of yaw control systems, a k-nearest neighbor classifier (k-NN) has been developed in order to forecast the yaw position parameter at 10-min intervals in this study. Air temperature, atmosphere pressure, wind direction, wind speed, rotor speed and wind power parameters are used in 2, 3, 4, 5 and 6-dimensional input spaces. The forecasting model using Manhattan distance metric for k = 3 uncovered the most accurate performance for atmosphere pressure, wind direction, wind speed and rotor speed inputs. However, the forecasting model using Euclidean distance metric for k = 1 brought out the most inconsistent results for atmosphere pressure and wind speed inputs. As a result of multi-tupled analyses, many feasible inferences were achieved for yaw position control systems. In addition, the yaw position forecasting model developed was compared with the persistence model and it surpassed the persistence model significantly in terms of the improvement percent. 相似文献
85.
Sleep modes are widely accepted as an effective technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, a proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for wireless access networks, computing variable percentages of energy savings. In this paper we characterize the maximum energy saving that can be achieved in a cellular wireless access network under a given performance constraint. In particular, our approach allows the derivation of realistic estimates of the energy-optimal density of base stations corresponding to a given user density, under a fixed performance constraint. Our results allow different sleep mode proposals to be measured against the maximum theoretically achievable improvement. We show, through numerical evaluation, the possible energy savings in today’s networks, and we further demonstrate that even with the development of highly energy-efficient hardware, a holistic approach incorporating system level techniques is essential to achieving maximum energy efficiency. 相似文献
86.
87.
《Ceramics International》2019,45(13):16166-16172
Cr2O3 is a well-known corrosion resistant oxide used in refractory applications. However, it can oxidize into toxic and water-soluble Cr(VI) compounds upon reaction with calcium aluminate cement phases in the presence of oxygen, which subsequently causes disposal problems after use. This study describes the extent to which chromium in the spinel Mg(Al,Cr)2O4 phase can be oxidized to Cr(VI) when it reacts with the calcium aluminate cement phases C12A7, CA, CA2 and free CaO at 1300 °C in air, using XRD, XPS and leaching tests (TRGS 613 standard) as analytical tools. On reaction with CaO, the Mg(Al,CrIII)2O4 spinel mainly transformed into hauyne (Ca4Al6CrVIO16) and Ca5Cr3O12 which contains both Cr(IV) and Cr(VI). The reaction of C12A7 and CA with the spinel phase also resulted in the formation of Ca4Al6CrO16. Conversely, the reaction of Mg(Al,CrIII)2O4 spinel with CA2 resulted in the formation of only a trace amount of Cr(VI). Water-soluble Cr(VI) leached in large quantities (>100 mg/L) from samples where the Mg(Al,CrIII)2O4 reacted with either C12A7 or CA. Almost no Cr(VI) leached from the sample when Mg(Al,CrIII)2O4 reacted with CaO, using the standard TRGS 613 leach test, but a significant amount of Cr(VI) was released into solution when leached with a HCl solution for 12 h. Both Cr(IV) and Cr(VI) present in the Ca5Cr3O12 dissolved into acidic solution. Only a small amount of Cr(VI) leached from the sample that resulted when spinel was reacted with CA2, even after a prolonged HCl leach. Cr(III) in spinel Mg(Al,Cr)2O4 is very stable and does not leach in either distilled water or acidic solution. 相似文献
88.
Evangelopoulos Xenophon Brockmeier Austin J. Mu Tingting Goulermas John Y. 《Machine Learning》2019,108(4):595-626
Machine Learning - We propose a set of highly scalable algorithms for the combinatorial data analysis problem of seriating similarity matrices. Seriation consists of finding a permutation of data... 相似文献
89.
相似用户挖掘是提高社交网络服务质量的重要途径,在面向大数据的社交网络时代,准确的相似用户挖掘对于用户和互联网企业等都有重要的意义,而根据用户自己的兴趣话题挖掘的相似用户更符合相似用户的要求。提出了一种基于用户兴趣话题进行相似用户挖掘的方法。该方法首先使用TextRank话题提取方法对用户进行兴趣话题提取,再对用户发表内容进行训练,计算出所有词之间的相似度。提出CP(Corresponding Position similarity)、CPW(Corresponding Position Weighted similarity)、AP(All Position similarity)、APW(All Position Weighted similarity)四种用户兴趣话题词相似度计算方法,通过用户和相似用户间关注、粉丝重合率验证相似用户挖掘效果,APW similarity的相似用户的关注/粉丝重合百分比为1.687%,优于提出的其他三种算法,分别提高了26.3%、2.8%、12.4%,并且比传统的文本相似度方法Jaccard相似度、编辑距离算法、余弦相似度分别提高了20.4%、21.2%、45.0%。因此APW方法可以更加有效地挖掘出用户的相似用户。 相似文献
90.
Journal of Computer Science and Technology - DOACROSS loops are significant parts in many important scientific and engineering applications, which are generally exploited pipeline/wave-front... 相似文献