全文获取类型
收费全文 | 682053篇 |
免费 | 69380篇 |
国内免费 | 49307篇 |
专业分类
电工技术 | 69886篇 |
技术理论 | 26篇 |
综合类 | 62772篇 |
化学工业 | 96029篇 |
金属工艺 | 32867篇 |
机械仪表 | 48219篇 |
建筑科学 | 46033篇 |
矿业工程 | 20423篇 |
能源动力 | 22894篇 |
轻工业 | 34600篇 |
水利工程 | 18777篇 |
石油天然气 | 27206篇 |
武器工业 | 8120篇 |
无线电 | 68730篇 |
一般工业技术 | 61126篇 |
冶金工业 | 25875篇 |
原子能技术 | 6301篇 |
自动化技术 | 150856篇 |
出版年
2024年 | 3039篇 |
2023年 | 10283篇 |
2022年 | 19297篇 |
2021年 | 22211篇 |
2020年 | 20898篇 |
2019年 | 18379篇 |
2018年 | 17343篇 |
2017年 | 22364篇 |
2016年 | 25467篇 |
2015年 | 27229篇 |
2014年 | 40690篇 |
2013年 | 41779篇 |
2012年 | 46232篇 |
2011年 | 50825篇 |
2010年 | 39736篇 |
2009年 | 42600篇 |
2008年 | 40760篇 |
2007年 | 48318篇 |
2006年 | 44237篇 |
2005年 | 37260篇 |
2004年 | 30462篇 |
2003年 | 27340篇 |
2002年 | 21948篇 |
2001年 | 17882篇 |
2000年 | 15696篇 |
1999年 | 12342篇 |
1998年 | 9733篇 |
1997年 | 8093篇 |
1996年 | 7065篇 |
1995年 | 6077篇 |
1994年 | 5274篇 |
1993年 | 3946篇 |
1992年 | 3136篇 |
1991年 | 2458篇 |
1990年 | 1941篇 |
1989年 | 1668篇 |
1988年 | 1143篇 |
1987年 | 802篇 |
1986年 | 645篇 |
1985年 | 641篇 |
1984年 | 635篇 |
1983年 | 440篇 |
1982年 | 455篇 |
1981年 | 318篇 |
1980年 | 283篇 |
1979年 | 242篇 |
1978年 | 147篇 |
1977年 | 144篇 |
1976年 | 84篇 |
1962年 | 90篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
This work is devoted to the stress–strain state of isotropic double curved shell with defect system. The construction is weakened by two non-through thickness (internal) cracks of different length and by a circular hole located between cracks. In this study we use the line-spring model. Within the framework of this model cracks are modeled as mathematical cuts of shell’s middle surface. This leads to a two-dimensional problem. The problem is reduced to a system of eight boundary integral equations. To ensure the uniqueness of solution an additional equation is added. In the numerical solution of the problem special quadrature formulas for singular integrals of Cauchy type and the finite difference method are applied. The influence of defects on each other for double curved shell has been investigated. The given theoretical results can be used for the calculation of structural elements with holes, cracks on the strength and fracture toughness in various branches of engineering. 相似文献
32.
33.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
34.
Though modeling and verifying Multi-Agent Systems (MASs) have long been under study, there are still challenges when many different aspects need to be considered simultaneously. In fact, various frameworks have been carried out for modeling and verifying MASs with respect to knowledge and social commitments independently. However, considering them under the same framework still needs further investigation, particularly from the verification perspective. In this article, we present a new technique for model checking the logic of knowledge and commitments (CTLKC+). The proposed technique is fully-automatic and reduction-based in which we transform the problem of model checking CTLKC+ into the problem of model checking an existing logic of action called ARCTL. Concretely, we construct a set of transformation rules to formally reduce the CTLKC+ model into an ARCTL model and CTLKC+ formulae into ARCTL formulae to get benefit from the extended version of NuSMV symbolic model checker of ARCTL. Compared to a recent approach that reduces the problem of model checking CTLKC+ to another logic of action called GCTL1, our technique has better scalability and efficiency. We also analyze the complexity of the proposed model checking technique. The results of this analysis reveal that the complexity of our reduction-based procedure is PSPACE-complete for local concurrent programs with respect to the size of these programs and the length of the formula being checked. From the time perspective, we prove that the complexity of the proposed approach is P-complete with regard to the size of the model and length of the formula, which makes it efficient. Finally, we implement our model checking approach on top of extended NuSMV and report verification results for the verification of the NetBill protocol, taken from business domain, against some desirable properties. The obtained results show the effectiveness of our model checking approach when the system scales up. 相似文献
35.
Data fitting with B-splines is a challenging problem in reverse engineering for CAD/CAM, virtual reality, data visualization, and many other fields. It is well-known that the fitting improves greatly if knots are considered as free variables. This leads, however, to a very difficult multimodal and multivariate continuous nonlinear optimization problem, the so-called knot adjustment problem. In this context, the present paper introduces an adapted elitist clonal selection algorithm for automatic knot adjustment of B-spline curves. Given a set of noisy data points, our method determines the number and location of knots automatically in order to obtain an extremely accurate fitting of data. In addition, our method minimizes the number of parameters required for this task. Our approach performs very well and in a fully automatic way even for the cases of underlying functions requiring identical multiple knots, such as functions with discontinuities and cusps. To evaluate its performance, it has been applied to three challenging test functions, and results have been compared with those from other alternative methods based on AIS and genetic algorithms. Our experimental results show that our proposal outperforms previous approaches in terms of accuracy and flexibility. Some other issues such as the parameter tuning, the complexity of the algorithm, and the CPU runtime are also discussed. 相似文献
36.
37.
ABSTRACTIn this paper, we review some algebraic control system. Precisely, linear and bilinear systems on Euclidean spaces and invariant and linear systems on Lie groups. The fourth classes of systems have a common issue: to any class, there exists an associated subgroup. From this object, we survey the controllability property. Especially, from those coming from our contribution to the theory. 相似文献
38.
Many argue that digital technologies have the potential to enhance the teaching and learning of mathematics. However, the availability of technology is not sufficient to realise this potential. The study reported takes a detailed approach to investigate the utility of the particular offerings of the available technologies in the teaching and learning of a specific area of mathematics, functions. Sixteen affordances identified in the data are described. The complexity of the process involved in resolving a situation where particular affordances would be useful so as they are perceived and enacted is detailed. Finally, a grounded theory framework arising from the data analysis from this study that can be used to explain, predict and guide action in other digital environments is presented. 相似文献
39.
介绍机械制造厂燃煤锅炉的烟尘特点,分析滤料失效的原因,提出一套针对该工况的滤料解决方案。介绍针对复杂工况条件所选用的纤维种类以及复合面层原料成分配比的确定,最终选用针刺工艺加工并对该新产品的基本性能进行了测试分析。 相似文献
40.
We introduce a new architecture for the design of a tool for modeling and simulation of continuous and hybrid systems. The environment includes a compiler based on Modelica, a modular and a causal standard specification language for physical systems modeling (the tool supports models composed using certain component classes defined in the Modelica Standard Library, and the instantiation, parameterization and connection of these MSL components are described using a subset of Modelica). Models are defined in Modelica and are translated into DEVS models. DEVS theory (originally defined for modeling and simulation of discrete event systems) was extended in order to permit defining these of models. The different steps in the compiling process are show, including how to model these dynamic systems under the discrete event abstraction, including examples of model simulation with their execution results. 相似文献