全文获取类型
收费全文 | 2756篇 |
免费 | 229篇 |
国内免费 | 126篇 |
专业分类
电工技术 | 114篇 |
综合类 | 611篇 |
化学工业 | 247篇 |
金属工艺 | 65篇 |
机械仪表 | 153篇 |
建筑科学 | 98篇 |
矿业工程 | 27篇 |
能源动力 | 58篇 |
轻工业 | 175篇 |
水利工程 | 31篇 |
石油天然气 | 112篇 |
武器工业 | 6篇 |
无线电 | 482篇 |
一般工业技术 | 141篇 |
冶金工业 | 15篇 |
原子能技术 | 4篇 |
自动化技术 | 772篇 |
出版年
2024年 | 4篇 |
2023年 | 26篇 |
2022年 | 38篇 |
2021年 | 57篇 |
2020年 | 76篇 |
2019年 | 33篇 |
2018年 | 39篇 |
2017年 | 50篇 |
2016年 | 72篇 |
2015年 | 54篇 |
2014年 | 194篇 |
2013年 | 277篇 |
2012年 | 546篇 |
2011年 | 492篇 |
2010年 | 345篇 |
2009年 | 341篇 |
2008年 | 186篇 |
2007年 | 138篇 |
2006年 | 55篇 |
2005年 | 26篇 |
2004年 | 10篇 |
2003年 | 11篇 |
2002年 | 12篇 |
2001年 | 5篇 |
2000年 | 5篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1986年 | 1篇 |
排序方式: 共有3111条查询结果,搜索用时 15 毫秒
91.
针对油田抽油机井故障诊断方法较落后的问题,提出一种基于改进PSO-BP网络的故障诊断系统.神经网络权值的训练采用改进的PSO算法,克服了BP学习算法收敛速度慢、易陷入局部极值的缺点.将该网络用于抽油机井的故障诊断,并与传统BP模型的故障诊断结果进行比较.结果表明:基于改进PSO-BP的故障诊断方法正确率达96%以上,可以在更短的时间内、用更少的迭代次数达到精度要求,为设备检修提供了可靠的依据. 相似文献
92.
为降低热误差对加工精度的影响,以减少补偿成本、简化数据采集、提高补偿精度为目标,提出采用灰色GM(0,N)模型进行数控机床热误差建模预测;以优化数据配置、改善补偿系统动态品质、提高鲁棒性为目的,建立了GM(0,N)优化模型。采用智能温度传感器和位移传感器采集了MCH63精密卧式加工中心温度数据和主轴3个方向热位移量,并根据采集数据构建热误差模型。试验结果表明:GM(0,N)建模方法简单,数据量少,运算时间短,预测精度较高;优化模型可根据在线输入的新数据不断修正模型本身,其精度高、鲁棒性强、通用性好,适合于在线建模。 相似文献
93.
94.
《Organic Electronics》2014,15(7):1465-1475
The flexible top-emitting white organic light-emitting diode (FTEWOLED) with a very high efficiency but a significant color alteration is achieved with a blue/red/blue sandwiched tri-emission-layer. The voltage-dependent recombination region alternation and the emission mechanism are systematically investigated through a delta-doping method and the time-resolved transient photoluminescence lifetime measurement. By locating the main exciton recombination region at the 4,4′,4″-Tris(carbazol-9-yl)-triphenylamine (TCTA) and 9,9-spirobifluoren-2-yl-diphenyl-phosphine oxide (SPPO1) interface, replacing the carrier-trapping red dopant guest with an orange guest that utilizes energy transfer mechanism, and using a P–I–N structure together with the FIrpic blue guest dopant to balance the electron and hole carriers, an extremely color stable and a very high efficient FTEWOLED is fabricated, with the resulting high current and power efficiencies of 22.7 cd/A and 14.27 lm/W, and a warm white illumination with a small chromaticity variation of (−0.0087, +0.0015) over a broad luminance range of more than four orders of magnitude. In addition, the performances can be further improved to 23,340 cd/m2, 24.49 cd/A and 15.39 lm/W with a slight concentration alteration of the orange emitter. 相似文献
95.
An approach is proposed for producing compressed sensing (CS) matrices via multidimensional pseudo-random sequences. The columns of these matrices are binary Gold code vectors where zeros are replaced by ?1. This technique is mainly applied to restore sub-Nyquist-sampled sparse signals, especially image reconstruction using block CS. First, for the specific requirements of message length and compression ratio, a set Λ which includes all preferred pairs of m-sequences is obtained by a searching algorithm. Then a sensing matrix A M×N is produced by using structured hardware circuits. In order to better characterize the correlation between any two columns of A, the average coherence is defined and the restricted isometry property (RIP) condition is described accordingly. This RIP condition has strong adaptability to different sparse signals. The experimental results show that with constant values of N and M, the sparsity bound of A is higher than that of a random matrix. Also, the recovery probability may have a maximum increase of 20 % in a noisy environment. 相似文献
96.
97.
One of the key problems in radio frequency identification (RFID) is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed and it is shown that they cannot provide security against some RFID attacks. Strong authentication and strong integrity (SASI) is the first ultra-lightweight authentication protocol introduced rotation shift operation and RFID authentication protocol with permutation (RAPP) is a new ultra-lightweight authentication protocol with permutation. In this paper, we give the security analysis on these two protocols. An active attack is presented on RAPP, and using the property of the left rotation and permutation operations, we can deduce the relationship of bits of random number or secret keys at different positions, thus obtain all the secrets shared by the reader and the tag. A passive full-disclosure attack is proposed on SASI. Using SASI’s construction weakness, our attack can reveal all the secrets shared by the reader and tag by eavesdropping about 48 rounds of the authentication messages. 相似文献
98.
99.
Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently. 相似文献
100.
为了可靠地远程操作食品包装生产线上的工控机,设计了一种网络化PS/2接口终端,把键盘鼠标和工控主机分离,把外设和主机间的PS/2双向传输数据网络化,使得键盘和鼠标可以远程操控主机,并且在不同操作系统的主机间快速切换。此设计方便用户对工控主机的操控,增强了使用的灵活性。 相似文献