全文获取类型
收费全文 | 104401篇 |
免费 | 14822篇 |
国内免费 | 9849篇 |
专业分类
电工技术 | 15322篇 |
技术理论 | 9篇 |
综合类 | 11826篇 |
化学工业 | 3829篇 |
金属工艺 | 2850篇 |
机械仪表 | 5251篇 |
建筑科学 | 4167篇 |
矿业工程 | 2503篇 |
能源动力 | 2050篇 |
轻工业 | 1455篇 |
水利工程 | 1955篇 |
石油天然气 | 1834篇 |
武器工业 | 1035篇 |
无线电 | 21524篇 |
一般工业技术 | 5303篇 |
冶金工业 | 3778篇 |
原子能技术 | 307篇 |
自动化技术 | 44074篇 |
出版年
2024年 | 368篇 |
2023年 | 2131篇 |
2022年 | 4057篇 |
2021年 | 4578篇 |
2020年 | 4617篇 |
2019年 | 3275篇 |
2018年 | 2741篇 |
2017年 | 3279篇 |
2016年 | 3431篇 |
2015年 | 4013篇 |
2014年 | 6855篇 |
2013年 | 6089篇 |
2012年 | 7853篇 |
2011年 | 8451篇 |
2010年 | 6491篇 |
2009年 | 6863篇 |
2008年 | 7142篇 |
2007年 | 7901篇 |
2006年 | 6673篇 |
2005年 | 6030篇 |
2004年 | 5069篇 |
2003年 | 4431篇 |
2002年 | 3508篇 |
2001年 | 2968篇 |
2000年 | 2285篇 |
1999年 | 1858篇 |
1998年 | 1338篇 |
1997年 | 1098篇 |
1996年 | 909篇 |
1995年 | 723篇 |
1994年 | 546篇 |
1993年 | 384篇 |
1992年 | 251篇 |
1991年 | 160篇 |
1990年 | 148篇 |
1989年 | 131篇 |
1988年 | 94篇 |
1987年 | 35篇 |
1986年 | 40篇 |
1985年 | 46篇 |
1984年 | 29篇 |
1983年 | 28篇 |
1982年 | 32篇 |
1981年 | 12篇 |
1980年 | 7篇 |
1979年 | 14篇 |
1977年 | 12篇 |
1975年 | 7篇 |
1959年 | 6篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
51.
探索五种异喹啉类生物碱抗肝癌的作用机制。借助TCMSP、String、venny数据库与WebGestalt在线分析软件获取靶点并进行蛋白互作网络(PPI)、基因本体(GO)、基因相互作用(KEGG)功能富集分析,利用Cytoscape软件构建网络。同时查阅文献并进行归纳、整理和分析得到小檗碱型中的小檗碱、双苄基类生物碱的粉防己碱、苯菲啶喹啉类的血根碱、吗啡烷类中的青藤碱和吡咯菲里啶中的石蒜碱等几种常见的生物碱,根据结构作用机制阐述每一类代表性异喹啉类生物碱治疗肝癌的潜力及抗肝癌作用机制。五个活性成分共筛选得到52个作用靶标如p53(抑癌基因)、NCOA2(核受体共激活剂2)、IL-2(白介素2),主要涉及钙离子信号通路、雌激素受体信号通路和PI3K/Akt信号传导途径等通路。通过网络药理学和文献收集证实异喹啉类生物碱可能参与调控PI3K-Akt通路等,可以通过多靶点、多通路对肝癌产生治疗作用,为进一步研究异喹啉类生物碱抗肝癌的临床研究提供参考和依据。 相似文献
52.
Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra-lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture. 相似文献
53.
Yu-Ting Liu Xian-Bin Li Hui Zheng Nian-Ke Chen Xue-Peng Wang Xu-Lin Zhang Hong-Bo Sun Shengbai Zhang 《Advanced functional materials》2021,31(21):2009803
Phase change memory (PCM) is an emerging non-volatile data storage technology concerned by the semiconductor industry. To improve the performances, previous efforts have mainly focused on partially replacing or doping elements in the flagship Ge-Sb-Te (GST) alloy based on experimental “trial-and-error” methods. Here, the current largest scale PCM materials searching is reported, starting with 124 515 candidate materials, using a rational high-throughput screening strategy consisting of criteria related to PCM characteristics. In the results, there are 158 candidates screened for PCM materials, of which ≈68% are not employed. By further analyses, including cohesive energy, bond angle analyses, and Born effective charge, there are 52 materials with properties similar to the GST system, including Ge2Bi2Te5, GeAs4Te7, GeAs2Te4, so on and other candidates that have not been reported, such as TlBiTe2, TlSbTe2, CdPb3Se4, etc. Compared with GST, materials with close cohesive energy include AgBiTe2, TlSbTe2, As2Te3, TlBiTe2, etc., indicating possible low power consumption. Through further melt-quenching molecular dynamic calculation and structural/electronic analyses, Ge2Bi2Te5, CdPb3Se4, MnBi2Te4, and TlBiTe2 are found suitable for optical/electrical PCM applications, which further verifies the effectiveness of this strategy. The present study will accelerate the exploration and development of advanced PCM materials for current and future big-data applications. 相似文献
54.
To save bandwidth and storage space as well as speed up data transmission, people usually perform lossy compression on images. Although the JPEG standard is a simple and effective compression method, it usually introduces various visually unpleasing artifacts, especially the notorious blocking artifacts. In recent years, deep convolutional neural networks (CNNs) have seen remarkable development in compression artifacts reduction. Despite the excellent performance, most deep CNNs suffer from heavy computation due to very deep and wide architectures. In this paper, we propose an enhanced wide-activated residual network (EWARN) for efficient and accurate image deblocking. Specifically, we propose an enhanced wide-activated residual block (EWARB) as basic construction module. Our EWARB gives rise to larger activation width, better use of interdependencies among channels, and more informative and discriminative non-linearity activation features without more parameters than residual block (RB) and wide-activated residual block (WARB). Furthermore, we introduce an overlapping patches extraction and combination (OPEC) strategy into our network in a full convolution way, leading to large receptive field, enforced compatibility among adjacent blocks, and efficient deblocking. Extensive experiments demonstrate that our EWARN outperforms several state-of-the-art methods quantitatively and qualitatively with relatively small model size and less running time, achieving a good trade-off between performance and complexity. 相似文献
55.
This paper proposes an approach to improve the performance of no-reference video quality assessment for sports videos with dynamic motion scenes using an efficient spatiotemporal model. In the proposed method, we divide the video sequences into video blocks and apply a 3D shearlet transform that can efficiently extract primary spatiotemporal features to capture dynamic natural motion scene statistics from the incoming video blocks. The concatenation of a deep residual bidirectional gated recurrent neural network and logistic regression is used to learn the spatiotemporal correlation more robustly and predict the perceptual quality score. In addition, conditional video block-wise constraints are incorporated into the objective function to improve quality estimation performance for the entire video. The experimental results show that the proposed method extracts spatiotemporal motion information more effectively and predicts the video quality with higher accuracy than the conventional no-reference video quality assessment methods. 相似文献
56.
Due to the severe outdoor PM2.5 pollution in China, many people have installed air-cleaning systems in homes. To make the systems run automatically and intelligently, we developed a recurrent neural network (RNN) that uses historical data to predict the future indoor PM2.5 concentration. The RNN architecture includes an autoencoder and a recurrent part. We used data measured in an apartment over the course of an entire year to train and test the RNN. The data include indoor/outdoor PM2.5 concentration, environmental parameters and time of day. By comparing three different input strategies, we found that a strategy employing historical PM2.5 and time of day as inputs performed best. With this strategy, the model can be applied to predict the relatively stable trend of indoor PM2.5 concentration in advance. When the input length is 2 h and the prediction horizon is 30 min, the median prediction error is 8.3 µg/m3 for the whole test set. For times with indoor PM2.5 concentrations between (20,50] µg/m3 and (50,100] µg/m3, the median prediction error is 8.3 and 9.2 µg/m3, respectively. The low prediction error between the ground-truth and predicted values shows that the RNN can predict indoor PM2.5 concentrations with satisfactory performance. 相似文献
57.
58.
59.
Jiming Xu Howard M. Heys 《International Journal of Circuit Theory and Applications》2019,47(6):971-990
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library. 相似文献
60.
This article develops practical methods for Bayesian inference in the autoregressive fractionally integrated moving average (ARFIMA) model using the exact likelihood function, any proper prior distribution, and time series that may have thousands of observations. These methods utilize sequentially adaptive Bayesian learning, a sequential Monte Carlo algorithm that can exploit massively parallel desktop computing with graphics processing units (GPUs). The article identifies and solves several problems in the computation of the likelihood function that apparently have not been addressed in the literature. Four applications illustrate the utility of the approach. The most ambitious is an ARFIMA(2,d,2) model for the Campito tree ring time series (length 5405), for which the methods developed in the article provide an essentially uncorrelated sample of size 16,384 from the exact posterior distribution in under four hours. Less ambitious applications take as little as 4 minutes without exploiting GPUs. 相似文献