全文获取类型
收费全文 | 49216篇 |
免费 | 4301篇 |
国内免费 | 1405篇 |
专业分类
电工技术 | 12254篇 |
技术理论 | 4篇 |
综合类 | 3783篇 |
化学工业 | 3721篇 |
金属工艺 | 1798篇 |
机械仪表 | 1488篇 |
建筑科学 | 8330篇 |
矿业工程 | 2390篇 |
能源动力 | 1268篇 |
轻工业 | 1891篇 |
水利工程 | 2721篇 |
石油天然气 | 2469篇 |
武器工业 | 227篇 |
无线电 | 2982篇 |
一般工业技术 | 2042篇 |
冶金工业 | 2014篇 |
原子能技术 | 510篇 |
自动化技术 | 5030篇 |
出版年
2025年 | 293篇 |
2024年 | 658篇 |
2023年 | 648篇 |
2022年 | 1026篇 |
2021年 | 1174篇 |
2020年 | 1222篇 |
2019年 | 947篇 |
2018年 | 828篇 |
2017年 | 1044篇 |
2016年 | 1223篇 |
2015年 | 1481篇 |
2014年 | 3401篇 |
2013年 | 2188篇 |
2012年 | 3519篇 |
2011年 | 3782篇 |
2010年 | 3097篇 |
2009年 | 3400篇 |
2008年 | 2931篇 |
2007年 | 3652篇 |
2006年 | 3377篇 |
2005年 | 2861篇 |
2004年 | 2397篇 |
2003年 | 2216篇 |
2002年 | 1779篇 |
2001年 | 1465篇 |
2000年 | 1208篇 |
1999年 | 860篇 |
1998年 | 554篇 |
1997年 | 387篇 |
1996年 | 317篇 |
1995年 | 298篇 |
1994年 | 175篇 |
1993年 | 95篇 |
1992年 | 80篇 |
1991年 | 67篇 |
1990年 | 45篇 |
1989年 | 45篇 |
1988年 | 49篇 |
1987年 | 15篇 |
1986年 | 19篇 |
1985年 | 17篇 |
1984年 | 22篇 |
1983年 | 7篇 |
1982年 | 8篇 |
1981年 | 11篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1958年 | 4篇 |
1956年 | 3篇 |
1955年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
We introduce a new probabilistic approach to dealing with uncertainty, based on the observation that probability theory does not require that every event be assigned a probability. For a nonmeasurable event (one to which we do not assign a probability), we can talk about only the inner measure and outer measure of the event. In addition to removing the requirement that every event be assigned a probability, our approach circumvents other criticisms of probability-based approaches to uncertainty. For example, the measure of belief in an event turns out to be represented by an interval (defined by the inner and outer measures), rather than by a single number. Further, this approach allows us to assign a belief (inner measure) to an event E without committing to a belief about its negation -E (since the inner measure of an event plus the inner measure of its negation is not necessarily one). Interestingly enough, inner measures induced by probability measures turn out to correspond in a precise sense to Dempster-Shafer belief functions. Hence, in addition to providing promising new conceptual tools for dealing with uncertainty, our approach shows that a key part of the important Dempster-Shafer theory of evidence is firmly rooted in classical probability theory. Cet article présente une nouvelle approche probabiliste en ce qui concerne le traitement de l'incertitude; celle-ci est basée sur l'observation que la théorie des probabilityés n'exige pas qu'une probabilityé soit assignée à chaque événement. Dans le cas d'un événement non mesurable (un événement pour lequel on n'assigne aucune probabilityé), nous ne pouvons discuter que de la mesure intérieure et de la mesure extérieure de l'évenément. En plus d'éliminer la nécessité d'assigner une probabilityéà l'événement, cette nouvelle approche apporte une réponse aux autres critiques des approches à l'incertitude basées sur des probabilityés. Par exemple, la mesure de croyance dans un événement est représentée par un intervalle (défini par la mesure intérieure et extérieure) plutǒt que par un nombre unique. De plus, cette approche nous permet d'assigner une croyance (mesure intérieure) à un événement E sans se compromettre vers une croyance à propos de sa négation -E (puisque la mesure intérieure d'un événement et la mesure intérieure de sa négation ne sont pas nécessairement une seule et unique mesure). II est intéressant de noter que les mesures intérieures qui résultent des mesures de probabilityé correspondent d'une manière précise aux fonctions de croyance de Dempster-Shafer. En plus de constituer un nouvel outil conceptuel prometteur dans le traitement de l'incertitude, cette approche démontre qu'une partie importante de la théorie de l'évidence de Dempster-Shafer est fermement ancrée dans la theorie classique des probabilityés. 相似文献
2.
The causes of lightning outage are subdivided into direct lightning strokes and induced lightning strokes, which are identified by the characteristics of the lightning overvoltage. In the past, lightning protection devices were directed mainly toward the latter, and attention has been focused on the installation of lightning protection devices, ground wires, and reinforcement of insulators. However, lightning outages continue to occur. Thus it is extremely important to clarify the fault characteristics of lightning surges and to study the effectiveness of various lightning protection devices by considering both direct lightning stroke and induced lightning stroke in order to prevent lightning outage in the future. In this research, the electromagnetic transients program (EMTP) has been applied to the direct lightning stroke, and the induced lightning outage analysis program for multiple conductor systems has been applied to the induced lightning stroke to study the effectiveness of lightning protection devices provided by combination of various lightning protection devices. The most effective lightning protection schemes are analyzed and evaluated based on verification tests on the full scale models as well as economic considerations. 相似文献
3.
Sanghoon Lee Chris Podilchuk Vidhya Krishnan Alan C. Bovik 《The Journal of VLSI Signal Processing》2003,34(1-2):149-166
By exploiting new human-machine interface techniques, such as visual eyetrackers, it should be possible to develop more efficient visual multimedia services associated with low bandwidth, dynamic channel adaptation and robust visual data transmission. In this paper, we introduce foveation-based error resilience and unequal error protection techniques over highly error-prone mobile networks. Each frame is spatially divided into foveated and background layers according to perceptual importance. Perceptual importance is determined either through an eye tracker or by manually selecting a region of interest. We attempt to improve reconstructed visual quality by maintaining the high visual source throughput of the foveated layer using foveation-based error resilience and error correction using a combination of turbo codes and ARQ (automatic reQuest). In order to alleviate the degradation of visual quality, a foveation based bitstream partitioning is developed. In an effort to increase the source throughput of the foveated layer, we develop unequal delay-constrained ARQ (automatic reQuest) and rate compatible punctured turbo codes where the punctual pattern of RCPC (rate compatible punctured convolutional) codes in H.223 Annex C is used. In the simulation, the visual quality is significantly increased in the area of interest using foveation-based error resilience and unequal error protection; (as much as 3 dB FPSNR (foveal peak signal to noise ratio) improvement) at 40% packet error rate. Over real-fading statistics measured in the downtown area of Austin, Texas, the visual quality is increased up to 1.5 dB in PSNR and 1.8 dB in FPSNR at a channel SNR of 5 dB. 相似文献
4.
5.
TAN Zuo-wen 《通讯和计算机》2007,4(5):40-46
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the proxy group can produce the signcryption cryptogram. combines the functionality of threshold proxy signing and encryption. The proposed scheme combines the functionality of both threshold proxy signing and encryption, and provides fair protection for the sender and the proxy agents. This scheme is secure against attack of public key substitution. It also satisfies security properties such as confidentiality and authenticity. 相似文献
6.
W. Fischer 《Progress in Organic Coatings》1993,22(1-4):181-193
Corrosion protection of organic coated steel is determined by free corrosion potential measurements and impedance spectroscopy. The results are classified by means of very basic considerations and evaluation figures are developed. These electrochemical data are correlated with the extent of the corrosion for each coating system. The evaluation figures are used for ranking coating systems and this ranking is correlated with the ranking with reference to the results of standardized and exposure tests. 相似文献
7.
阐述了热贡艺术的总体特征,包括其渊源、现状、文化内涵,探讨了热贡艺术产业化的现状及必要性,提出了热贡艺术产业化的运作思路。 相似文献
8.
新型城镇化背景下欠发达地区传统文化保护的关键取决于其能否在保护文化资本和环境资本的基础上,实现经济资本的提升、文化价值观念及生活方式的转变.通过对张家口市下花园区段家堡村传统文化的调查研究,提出转变观念,主动保护、挖掘和丰富欠发达地区传统文化特色,提升旅游开发优势,带动地区经济发展,实现新型城镇化的同时更好地保护传统文化. 相似文献
9.
《Information Security Journal: A Global Perspective》2013,22(4-6):191-196
ABSTRACTEmbedding a hidden stream of bits in a cover file to prevent illegal use is called digital watermarking. The cover file could be a text, image, video, or audio. In this study, we propose invisible watermarking based on the text included in a webpage. Watermarks are based on predefined structural and syntactic rules, which are encrypted and then converted into zero-width control characters using binary model classification before embedding into a webpage. This concept means that HTML (Hyper Text Markup Language) is used as a cover file to embed the hashed and transparent zero-width watermarks. We have implemented the proposed invisible watermarking against various attacks to reach optimum robustness. 相似文献
10.
在分析了数字版权研究现状和功能框架的基础上,设计了基于多重数字水印和密码的版权管理模型;该模型采用数字内容和许可证各自单独封装、独立分发的方式,使得只有购买了许可证的特定用户才能使用数字内容,实现了水印作品的许可交易;另外,内容服务器采用的对数字作品加载两次水印,对数字内容部分签名加密,未加密部分签名的方案,在有效保证数字内容安全传输的基础上又减少了计算量和存储量;分析表明该模型有显著的优点和很好的安全性。 相似文献