全文获取类型
收费全文 | 35146篇 |
免费 | 4294篇 |
国内免费 | 3080篇 |
专业分类
电工技术 | 1806篇 |
技术理论 | 6篇 |
综合类 | 5453篇 |
化学工业 | 3195篇 |
金属工艺 | 1702篇 |
机械仪表 | 1621篇 |
建筑科学 | 2075篇 |
矿业工程 | 786篇 |
能源动力 | 2729篇 |
轻工业 | 874篇 |
水利工程 | 1473篇 |
石油天然气 | 2885篇 |
武器工业 | 355篇 |
无线电 | 2735篇 |
一般工业技术 | 5416篇 |
冶金工业 | 873篇 |
原子能技术 | 461篇 |
自动化技术 | 8075篇 |
出版年
2024年 | 56篇 |
2023年 | 949篇 |
2022年 | 1308篇 |
2021年 | 1363篇 |
2020年 | 1564篇 |
2019年 | 1527篇 |
2018年 | 1372篇 |
2017年 | 1460篇 |
2016年 | 1397篇 |
2015年 | 1289篇 |
2014年 | 1753篇 |
2013年 | 2396篇 |
2012年 | 2345篇 |
2011年 | 2443篇 |
2010年 | 1848篇 |
2009年 | 1864篇 |
2008年 | 1835篇 |
2007年 | 1975篇 |
2006年 | 1856篇 |
2005年 | 1554篇 |
2004年 | 1359篇 |
2003年 | 1159篇 |
2002年 | 1042篇 |
2001年 | 817篇 |
2000年 | 783篇 |
1999年 | 745篇 |
1998年 | 611篇 |
1997年 | 554篇 |
1996年 | 533篇 |
1995年 | 508篇 |
1994年 | 431篇 |
1993年 | 327篇 |
1992年 | 289篇 |
1991年 | 250篇 |
1990年 | 209篇 |
1989年 | 173篇 |
1988年 | 134篇 |
1987年 | 85篇 |
1986年 | 78篇 |
1985年 | 50篇 |
1984年 | 44篇 |
1983年 | 27篇 |
1982年 | 39篇 |
1981年 | 34篇 |
1980年 | 16篇 |
1979年 | 25篇 |
1978年 | 14篇 |
1977年 | 7篇 |
1959年 | 5篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method. 相似文献
82.
罗玲 《计算机工程与应用》2019,55(1):233-240
针对嵌入式机载软件设计中存在的典型缺陷问题,结合嵌入式机载软件任务调度特性,提出采用随机Petri网对嵌入式机载软件设计进行仿真验证的可靠性检测方法,以提高嵌入式机载软件设计的可靠性。该方法采用随机Petri网对嵌入式机载软件系统行为建模,并给出典型缺陷的检测策略和判定准则,然后通过对Petri网模型进行仿真验证,检测系统是否存在此类设计缺陷;并给出了软件设计的运行流程的仿真验证算法,以支持对相应设计的可靠性检测。通过与其他可靠性检测方法的比较,表明了该方法的有效性。 相似文献
83.
84.
《等离子体科学和技术》2019,21(11):115403-44
In this paper, a honeycomb structure jet array with seven jet units was adopted to generate plasmas. Both the average discharge power and the emission intensity of the main excited species increase with increasing applied voltage. There are three stages of discharge evolution at different applied voltages: initial discharge, uniform discharge and strong coupling discharge.The spatial distribution of the emission intensity of the excited species can be divided into three categories: growth class, weakening class and variation class. The gas temperature along the whole plasma plume at different applied voltages is maintained at around 320K and can be widely used in heat-labile applications. 相似文献
85.
Huamin Zhang 《Computers & Mathematics with Applications》2019,77(5):1233-1244
Inspired by the gradient-based and inversion-free iterations, a new quasi gradient-based inversion-free iterative algorithm is proposed for solving the nonlinear matrix equation . The convergence proof of the suggested algorithm is given. Several matrix norm inequalities are established to depict the convergence properties of this algorithm. Three numerical examples are given to illustrate the effectiveness of the suggested algorithms. 相似文献
86.
Antoni Ferragut Johanna D. García-Saldaña Claudia Valls 《Dynamical Systems: An International Journal》2019,34(2):301-333
We provide normal forms and the global phase portraits on the Poincaré disk of the Abel quadratic differential equations of the second kind having a symmetry with respect to an axis or to the origin. Moreover, we also provide the bifurcation diagrams for these global phase portraits. 相似文献
87.
Differential evolution is primarily designed and used to solve continuous optimization problems. Therefore, it has not been widely considered as applicable for real-world problems that are characterized by permutation-based combinatorial domains. Many algorithms for solving discrete problems using differential evolution have been proposed, some of which have achieved promising results. However, to enhance their performance, they require improvements in many aspects, such as their convergence speeds, computational times and capabilities to solve large discrete problems. In this paper, we present a new mapping method that may be used with differential evolution to solve combinatorial optimization problems. This paper focuses specifically on the mapping component and its effect on the performance of differential evolution. Our method maps continuous variables to discrete ones, while at the same time, it directs the discrete solutions produced towards optimality, by using the best solution in each generation as a guide. To judge its performance, its solutions for instances of well-known discrete problems, namely: 0/1 knapsack, traveling salesman and traveling thief problems, are compared with those obtained by 8 other state-of-the-art mapping techniques. To do this, all mapping techniques are used with the same differential evolution settings. The results demonstrated that our technique significantly outperforms the other mapping methods in terms of the average error from the best-known solution for the traveling salesman problems, and achieves promising results for both the 0/1 knapsack and the traveling thief problems. 相似文献
88.
G. Inglese 《Inverse Problems in Science & Engineering》2019,27(4):439-459
We deal with the mathematical model of the incremental degradation of the internal coating (e.g. a polymeric material) of a metallic pipe in which a fluid flows relatively fast. The fluid drags solid impurities so that longitudinal scratches, inaccessible to any direct inspection procedure, are produced on the coating. Time evolution of this kind of defects can be reconstructed from the knowledge of a sequence of temperature maps of the external surface. The time-varying orthogonal section of this damaged interface is determined as a function of time and polar angle through the identification of a suitable effective heat transfer coefficient by means of Thin Plate Approximation. 相似文献
89.
This paper deals with the determination of an initial condition in degenerate hyperbolic equation from final observations. With the aim of reducing the execution time, this inverse problem is solved using an approach based on double regularization: a Tikhonov’s regularization and regularization in equation by viscose-elasticity. So, we obtain a sequence of weak solutions of degenerate linear viscose-elastic problems. Firstly, we prove the existence and uniqueness of each term of this sequence. Secondly, we prove the convergence of this sequence to the weak solution of the initial problem. Also we present some numerical experiments to show the performance of this approach. 相似文献
90.
利用扫描电镜、X射线衍射仪和电子背散射衍射仪等设备研究了热轧态316L不锈钢金属间相(σ相和χ相)在固溶过程中的微结构演变规律,同时,利用高温激光共聚焦显微镜对金属间相回溶的全过程进行了原位在线观察,确定了最佳固溶温度。结果表明,固溶过程中发生了γ+σ+χ→γ+σ+χ+α/FeCr→γ+α/FeCr的相变过程。金属间相的回溶从1033.1℃开始到1149.5℃结束,回溶时间为21s,消除金属间相的最佳固溶温度约为1150℃。固溶处理前,基体中分布的带状组织形态不规则,χ相和σ相的面积比分别为0.46%和0.94%;固溶处理后,带状组织形态一致,主要分布铁素体和FeCr相,而χ相和σ相不可见。 相似文献