全文获取类型
收费全文 | 143725篇 |
免费 | 18895篇 |
国内免费 | 13692篇 |
专业分类
电工技术 | 18953篇 |
技术理论 | 21篇 |
综合类 | 17999篇 |
化学工业 | 4171篇 |
金属工艺 | 2515篇 |
机械仪表 | 7342篇 |
建筑科学 | 7299篇 |
矿业工程 | 3672篇 |
能源动力 | 2448篇 |
轻工业 | 1970篇 |
水利工程 | 3237篇 |
石油天然气 | 2438篇 |
武器工业 | 1884篇 |
无线电 | 27974篇 |
一般工业技术 | 6627篇 |
冶金工业 | 3332篇 |
原子能技术 | 342篇 |
自动化技术 | 64088篇 |
出版年
2024年 | 646篇 |
2023年 | 2537篇 |
2022年 | 4845篇 |
2021年 | 5495篇 |
2020年 | 5763篇 |
2019年 | 4071篇 |
2018年 | 3569篇 |
2017年 | 4276篇 |
2016年 | 4711篇 |
2015年 | 5552篇 |
2014年 | 9787篇 |
2013年 | 8852篇 |
2012年 | 11215篇 |
2011年 | 11533篇 |
2010年 | 8970篇 |
2009年 | 9591篇 |
2008年 | 10142篇 |
2007年 | 11211篇 |
2006年 | 9599篇 |
2005年 | 8606篇 |
2004年 | 7217篇 |
2003年 | 6305篇 |
2002年 | 4714篇 |
2001年 | 3962篇 |
2000年 | 3160篇 |
1999年 | 2406篇 |
1998年 | 1692篇 |
1997年 | 1366篇 |
1996年 | 1103篇 |
1995年 | 847篇 |
1994年 | 676篇 |
1993年 | 461篇 |
1992年 | 293篇 |
1991年 | 207篇 |
1990年 | 152篇 |
1989年 | 150篇 |
1988年 | 103篇 |
1987年 | 56篇 |
1986年 | 54篇 |
1985年 | 63篇 |
1984年 | 58篇 |
1983年 | 49篇 |
1982年 | 47篇 |
1981年 | 26篇 |
1980年 | 24篇 |
1979年 | 25篇 |
1977年 | 9篇 |
1965年 | 10篇 |
1964年 | 12篇 |
1961年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
在钻井过程中,常常钻遇不同宽度的井下地层裂缝。钻遇裂缝时容易发生钻井液漏失现象,甚至发生钻井液失返现象,严重影响了安全、高效钻井。目前裂缝封堵的方法常存在封堵成功率不高、堵漏承压能力低的问题,其中一个重要的原因是对井下地层的裂缝宽度等特征认识不清。基于地层裂缝产生的岩石力学机理,确定影响裂缝宽度关键的6个力学和工程因素,并利用神经网络计算的非线性、大数据特点建立了井下地层裂缝宽度的分析模型,模型包含输入层、输出层和3个隐藏层。通过该模型诊断井下裂缝宽度,提高了计算精度,平均误差仅为2.09%,最大误差为5.88%,解决钻井现场仅凭经验判断裂缝误差较大和依靠成像测井成本较高的问题。同时根据神经网络模型诊断得到的裂缝宽度优化堵漏材料的粒径配比,提高了裂缝内的架桥封堵强度和架桥的稳定性,封堵层的承压能力达到12.8 MPa,反向承压能力达到4.5 MPa。现场堵漏试验最高憋压10 MPa,经过封堵作业后大排量循环不漏,达到了裂缝性地层高效堵漏的目的,堵漏一次成功。 相似文献
62.
Bin Zhang Xuesong Jiang Fei Shen Xueming He Yong Fang Qiuhui Hu 《International Journal of Food Science & Technology》2021,56(6):2588-2595
This work intends to develop an online experimental system for screening of deoxynivalenol (DON) contamination in whole wheat meals by visible/near-infrared (Vis/NIR) spectroscopy and computer vision coupling technology. Spectral and image information of samples with various DON levels was collected at speed of 0.15 m s−1 on a conveyor belt. The two-type data were then integrated and subjected to chemometric analysis. Discriminant analysis showed that samples could be classified by setting 1000 μg kg−1 as the cut-off value. The best correct classified rate obtained in prediction was 93.55% based on fusion of spectral and image features, with reduced prediction uncertainty as compared to single feature. However, quantification of DON by quantitative analysis was not successful due to poor model performance. These results indicate that, although not accurate enough to provide conclusive result, this coupling technology could be adopted for rapid screening of DON contamination in cereals and feeds during processing. 相似文献
63.
Previous experimental results indicate that the humidification conditions at the anode have an impact on the liquid water distribution in the cathode gas diffusion layer. Numerical simulations are developed to reproduce and analyze this effect. Results consistent with the experimental results are first obtained by playing with the partition coefficients of an advanced pore network model computing the liquid water formation and transfer in the cathode gas diffusion layer (GDL) for a large range of operating conditions. Then, a model for the full anode – cathode assembly is developed by combining the pore network model of the cathode GDL and a 1D model describing the heat and water transfer in the various components of the anode-cathode assembly. This enables one to generalize the dry – wet regime diagram introduced in a previous work by incorporating the effect of the humidity condition at the anode. 相似文献
64.
《Journal of the European Ceramic Society》2022,42(13):5864-5873
Current grain growth models have evolved to account for the relationship between grain boundary energy/mobility anisotropy and the five degrees of grain boundary character. However, the role of grain boundary networks on overall growth kinetics remains poorly understood. To experimentally investigate this problem, a highly textured Al2O3 was fabricated by colloidal casting in a strong magnetic field to engineer a unique spatial distribution of grain boundary character. Microstructural evolution was quantified and compared to an untextured sample. From this comparison, a prevalence of (0001)/(0001) terminated grain boundaries with anisotropic networks were identified in the textured sample. These boundaries and their networks were found to be driving grain growth at a faster rate than predicted by models. These findings will allow better modelling of grain growth in real systems by experimentally exploring the impact thereon of grain boundary plane anisotropy and relative energy/mobility differences between neighboring boundaries. 相似文献
66.
The rate of penetration (ROP) model is of great importance in achieving a high efficiency in the complex geological drilling process. In this paper, a novel two-level intelligent modeling method is proposed for the ROP considering the drilling characteristics of data incompleteness, couplings, and strong nonlinearities. Firstly, a piecewise cubic Hermite interpolation method is introduced to complete the lost drilling data. Then, a formation drillability (FD) fusion submodel is established by using Nadaboost extreme learning machine (Nadaboost-ELM) algorithm, and the mutual information method is used to obtain the parameters, strongly correlated with the ROP. Finally, a ROP submodel is established by a neural network with radial basis function optimized by the improved particle swarm optimization (RBFNN-IPSO). This two-level ROP model is applied to a real drilling process and the proposed method shows the best performance in ROP prediction as compared with conventional methods. The proposed ROP model provides the basis for intelligent optimization and control in the complex geological drilling process. 相似文献
67.
针对现有混合入侵检测模型仅定性选取特征而导致检测精度较低的问题,同时为了充分结合误用检测模型和异常检测模型的优势,提出一种采用信息增益率的混合入侵检测模型.首先,利用信息增益率定量地选择特征子集,最大程度地保留样本信息;其次,采用余弦时变粒子群算法确定支持向量机参数构建误用检测模型,使其更好地平衡粒子在全局和局部的搜索能力,然后,选取灰狼算法确定单类支持向量机参数构建异常检测模型,以此来提高对最优参数的搜索效率和精细程度,综合提高混合入侵检测模型对攻击的检测效果;最后,通过两种数据集进行仿真实验,验证了所提混合入侵检测模型具有较好的检测性能. 相似文献
68.
In the field of images and imaging, super-resolution (SR) reconstruction of images is a technique that converts one or more low-resolution (LR) images into a highresolution (HR) image. The classical two types of SR methods are mainly based on applying a single image or multiple images captured by a single camera. Microarray camera has the characteristics of small size, multi views, and the possibility of applying to portable devices. It has become a research hotspot in image processing. In this paper, we propose a SR reconstruction of images based on a microarray camera for sharpening and registration processing of array images. The array images are interpolated to obtain a HR image initially followed by a convolution neural network (CNN) procedure for enhancement. The convolution layers of our convolution neural network are 3×3 or 1×1 layers, of which the 1×1 layers are used to improve the network performance particularly. A bottleneck structure is applied to reduce the parameter numbers of the nonlinear mapping and to improve the nonlinear capability of the whole network. Finally, we use a 3×3 deconvolution layer to significantly reduce the number of parameters compared to the deconvolution layer of FSRCNN-s. The experiments show that the proposed method can not only ameliorate effectively the texture quality of the target image based on the array images information, but also further enhance the quality of the initial high resolution image by the improved CNN. 相似文献
69.
在现有的时间银行系统中,时间币的发行功能和结算功能完全集中到一个中心节点上。这种极度中心化的功能结构,不仅存在容易发生中心节点单点失效、数据容易被篡改等信息安全问题,还存在着时间币的发行和流通缺乏透明度以及时间币的结算依赖中心化的结算机构等问题。针对这些问题,提出了一种基于区块链技术的解决方法。首先,将时间币的发行功能和结算功能从中心节点上分离出来;然后,利用具有分布式去中心化、集体维护和不可篡改等特性的区块链技术,将分离出来的发行功能逐步去中心化,将分离出来的结算功能去中心化,形成公益时间链(PWTB);最终,PWTB利用区块链技术以去中心化的方式将时间银行系统由单个节点维护账本变成由集体维护一个分布式的共享账本,使时间币的发行和流通公开透明,时间币的结算不依赖某个中心化的节点。安全分析表明所设计的PWTB能够实现安全的信息传输与存储,以及数据的共享。 相似文献
70.
王文宇 《信息安全与通信保密》2021,(2)
个人信息因其自身携带隐私特性,与每个个体息息相关。个人信息保护不当,影响公众权益、企业利益以及社会秩序。在互联网、大数据、5G万物互联的时代,个人信息被广泛收集和使用,必须妥善解决个人信息保护问题,才能保障整个数据产业健康发展。而现有的个人信息保护方法或技术,不足以应对新形势下的保护诉求。基于数据运营安全的个人信息保护,针对当前个人信息保护的新形势和新诉求,提出结合人工智能,通过数据运营安全对结构化、半结构化、非结构化的个人信息流动的保护,涵盖从生产到运维,从采集、传输、存储、处理、分析、共享、销毁全生命周期保护,深入数据运营中内嵌防护,同时与业务解耦,达到保护个人信息安全的目标。 相似文献