全文获取类型
收费全文 | 47420篇 |
免费 | 5646篇 |
国内免费 | 3422篇 |
专业分类
电工技术 | 9082篇 |
技术理论 | 3篇 |
综合类 | 5094篇 |
化学工业 | 784篇 |
金属工艺 | 390篇 |
机械仪表 | 2327篇 |
建筑科学 | 1091篇 |
矿业工程 | 796篇 |
能源动力 | 666篇 |
轻工业 | 368篇 |
水利工程 | 621篇 |
石油天然气 | 391篇 |
武器工业 | 500篇 |
无线电 | 13680篇 |
一般工业技术 | 1788篇 |
冶金工业 | 943篇 |
原子能技术 | 133篇 |
自动化技术 | 17831篇 |
出版年
2024年 | 143篇 |
2023年 | 636篇 |
2022年 | 1021篇 |
2021年 | 1330篇 |
2020年 | 1430篇 |
2019年 | 1134篇 |
2018年 | 1068篇 |
2017年 | 1468篇 |
2016年 | 1605篇 |
2015年 | 2032篇 |
2014年 | 3205篇 |
2013年 | 2787篇 |
2012年 | 3697篇 |
2011年 | 3695篇 |
2010年 | 2914篇 |
2009年 | 2830篇 |
2008年 | 3151篇 |
2007年 | 3420篇 |
2006年 | 2997篇 |
2005年 | 2870篇 |
2004年 | 2445篇 |
2003年 | 2321篇 |
2002年 | 1684篇 |
2001年 | 1398篇 |
2000年 | 1045篇 |
1999年 | 883篇 |
1998年 | 607篇 |
1997年 | 522篇 |
1996年 | 465篇 |
1995年 | 408篇 |
1994年 | 303篇 |
1993年 | 189篇 |
1992年 | 137篇 |
1991年 | 90篇 |
1990年 | 61篇 |
1989年 | 66篇 |
1988年 | 49篇 |
1987年 | 26篇 |
1986年 | 23篇 |
1985年 | 32篇 |
1984年 | 35篇 |
1983年 | 21篇 |
1982年 | 27篇 |
1981年 | 18篇 |
1980年 | 17篇 |
1979年 | 20篇 |
1978年 | 14篇 |
1977年 | 16篇 |
1964年 | 13篇 |
1955年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
11.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
12.
The intermittent wind power in isolated hybrid distributed generation (IHDG) may cause serious problems associated with frequency (f) and power (P) fluctuation. Energy storage devices such as battery, super capacitor, and superconducting magnetic energy storage (SMES) may be used to reduce these fluctuations associated with f and P. This paper presents a study of IHDG power system for improving both f and P deviation profiles with the help of SMES. The studied IHDG power system is consisted of wind turbine generator and diesel engine generator. Both f and P control problems of the studied power system model are addressed in presence or absence of SMES. Fuzzy logic based proportional–integral–derivative (PID) controller with SMES is used for the purpose of minimization of f and P deviations. The different tunable parameters of the PID controller and those of the SMES are tuned by a novel quasi-oppositional harmony search algorithm. Performance study of the IHDG power system model is carried out under different perturbation conditions. The results demonstrate minimum f and P deviations may be achieved by using the proposed fuzzy logic based PID controller along with SMES. 相似文献
13.
14.
Social media-based screening is a well-known practice to both recruiters and job seekers. Little is known, however, about how job seekers present themselves on social media, i.e. ‘self-disclosure’, for employment purposes. This study builds on the theories of hyperpersonal computer-mediated communication, self-efficacy and social exchange to examine job seekers’ professional online image concerns, social media self-efficacy, and perceptions of social media effectiveness in the job search as predictors of inappropriate and career-oriented self-disclosures on these media. Findings from a sample of 3374 Italian respondents showed that career-oriented self-disclosure was predicted by all three factors, whereas inappropriate self-disclosure was only predicted by social media self-efficacy. Furthermore, the relationship between professional online image concerns and inappropriate self-disclosure was moderated by age, education and work experience, but not by gender. Theoretical and practical implications are discussed, and directions for future research are suggested. 相似文献
15.
Emma Layton Anna-Marie Fairhurst Sam Griffiths-Jones Richard K. Grencis Ian S. Roberts 《International journal of molecular sciences》2020,21(23)
In eukaryotes, microRNAs (miRNAs) have roles in development, homeostasis, disease and the immune response. Recent work has shown that plant and mammalian miRNAs also mediate cross-kingdom and cross-domain communications. However, these studies remain controversial and are lacking critical mechanistic explanations. Bacteria do not produce miRNAs themselves, and therefore it is unclear how these eukaryotic RNA molecules could function in the bacterial recipient. In this review, we compare and contrast the biogenesis and functions of regulatory RNAs in eukaryotes and bacteria. As a result, we discovered several conserved features and homologous components in these distinct pathways. These findings enabled us to propose novel mechanisms to explain how eukaryotic miRNAs could function in bacteria. Further understanding in this area is necessary to validate the findings of existing studies and could facilitate the use of miRNAs as novel tools for the directed remodelling of the human microbiota. 相似文献
16.
针对空空宽带高速通信的需求,设计了小型化机载激光通信系统。仿真分析了300 km、2.5 Gb/s无线激光链路性能,并通过运动仿真台模拟机动环境测试了系统的跟踪与通信性能,其中粗跟踪误差为533.2 μrad(1σ),精跟踪误差为3.6 μrad(1σ),测试数据传输240 s,通信误码率为2.82×10-9。仿真与实验验证了该系统用于远距离空空无线激光通信的可行性。 相似文献
17.
针对新闻文本领域,该文提出一种基于查询的自动文本摘要技术,更加有针对性地满足用户信息需求。根据句子的TF-IDF、与查询句的相似度等要素,计算句子权重,并根据句子指示的时间给定不同的时序权重系数,使得最近发生的新闻内容具有更高的权重,最后使用最大边界相关的方法选择摘要句。通过与基于TF-IDF、Text-Rank、LDA等六种方法的对比,该摘要方法ROUGE评测指标上优于其他方法。从结合评测结果及摘要示例可以看出,该文提出的方法可以有效地从新闻文档集中摘取核心信息,满足用户查询内容的信息需求。 相似文献
18.
AbstractMulti-agent systems need to communicate to coordinate a shared task. We show that a recurrent neural network (RNN) can learn a communication protocol for coordination, even if the actions to coordinate are performed steps after the communication phase. We show that a separation of tasks with different temporal scale is necessary for successful learning. We contribute a hierarchical deep reinforcement learning model for multi-agent systems that separates the communication and coordination task from the action picking through a hierarchical policy. We further on show, that a separation of concerns in communication is beneficial but not necessary. As a testbed, we propose the Dungeon Lever Game and we extend the Differentiable Inter-Agent Learning (DIAL) framework. We present and compare results from different model variations on the Dungeon Lever Game. 相似文献
19.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view. 相似文献
20.
This paper presents a control design for the one‐phase Stefan problem under actuator delay via a backstepping method. The Stefan problem represents a liquid‐solid phase change phenomenon which describes the time evolution of a material's temperature profile and the interface position. The actuator delay is modeled by a first‐order hyperbolic partial differential equation (PDE), resulting in a cascaded transport‐diffusion PDE system defined on a time‐varying spatial domain described by an ordinary differential equation (ODE). Two nonlinear backstepping transformations are utilized for the control design. The setpoint restriction is given to guarantee a physical constraint on the proposed controller for the melting process. This constraint ensures the exponential convergence of the moving interface to a setpoint and the exponential stability of the temperature equilibrium profile and the delayed controller in the norm. Furthermore, robustness analysis with respect to the delay mismatch between the plant and the controller is studied, which provides analogous results to the exact compensation by restricting the control gain. 相似文献