全文获取类型
收费全文 | 25070篇 |
免费 | 4726篇 |
国内免费 | 2628篇 |
专业分类
电工技术 | 2305篇 |
综合类 | 2578篇 |
化学工业 | 1567篇 |
金属工艺 | 770篇 |
机械仪表 | 1788篇 |
建筑科学 | 996篇 |
矿业工程 | 477篇 |
能源动力 | 423篇 |
轻工业 | 2714篇 |
水利工程 | 403篇 |
石油天然气 | 595篇 |
武器工业 | 430篇 |
无线电 | 3837篇 |
一般工业技术 | 1628篇 |
冶金工业 | 631篇 |
原子能技术 | 715篇 |
自动化技术 | 10567篇 |
出版年
2024年 | 116篇 |
2023年 | 720篇 |
2022年 | 1365篇 |
2021年 | 1432篇 |
2020年 | 1222篇 |
2019年 | 914篇 |
2018年 | 787篇 |
2017年 | 837篇 |
2016年 | 1014篇 |
2015年 | 1172篇 |
2014年 | 1638篇 |
2013年 | 1592篇 |
2012年 | 1985篇 |
2011年 | 2050篇 |
2010年 | 1574篇 |
2009年 | 1615篇 |
2008年 | 1718篇 |
2007年 | 2002篇 |
2006年 | 1704篇 |
2005年 | 1500篇 |
2004年 | 1207篇 |
2003年 | 991篇 |
2002年 | 759篇 |
2001年 | 567篇 |
2000年 | 440篇 |
1999年 | 327篇 |
1998年 | 249篇 |
1997年 | 173篇 |
1996年 | 114篇 |
1995年 | 109篇 |
1994年 | 106篇 |
1993年 | 73篇 |
1992年 | 57篇 |
1991年 | 41篇 |
1990年 | 63篇 |
1989年 | 36篇 |
1988年 | 23篇 |
1987年 | 23篇 |
1986年 | 23篇 |
1985年 | 13篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 20篇 |
1981年 | 17篇 |
1980年 | 4篇 |
1964年 | 4篇 |
1960年 | 3篇 |
1959年 | 3篇 |
1956年 | 3篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
针对目标估计过程需要大量人工参与、自动化程度低的问题,提出了基于数据质量评价的目标估计方法。利用目标数据质量评价方法,对不同传感器得到的目标数据质量进行科学、有效的测度和评价,并根据质量得分动态调整各数据源在目标估计过程中所占的权重,从而减少人工干预,提高目标估计效能。仿真试验结果证明了该方法的有效性。 相似文献
2.
3.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing. 相似文献
4.
《Current Opinion in Solid State & Materials Science》2022,26(6):101024
One of the main challenges in the laser powder bed fusion (LPBF) process is making dense and defect-free components. These porosity defects are dependent upon the melt pool geometry and the processing conditions. Power-velocity (PV) processing maps can aid in visualizing the effects of LPBF processing variables and mapping different defect regimes such as lack-of-fusion, under-melting, balling, and keyholing. This work presents an assessment of existing analytical equations and models that provide an estimate of the melt pool geometry as a function of material properties. The melt pool equations are then combined with defect criteria to provide a quick approximation of the PV processing maps for a variety of materials. Finally, the predictions of these processing maps are compared with experimental data from the literature. The predictive processing maps can be computed quickly and can be coupled with dimensionless numbers and high-throughput (HT) experiments for validation. The present work provides a boundary framework for designing the optimal processing parameters for new metals and alloys based on existing analytical solutions. 相似文献
5.
6.
7.
8.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method. 相似文献
9.
The combined effect of resistance spot welding and precipitation hardening on the localised corrosion of A286 superalloy is studied. The specimens tested by double loop electrochemical potentiokinetic reactivation were welded in the solution treated condition, and then subjected to different precipitation hardening treatments. For both base metal and weld nugget, the maximum localised corrosion is reached when η phase is clearly observable. The fact that the localised corrosion resistance of weld nugget is different from that shown by base metal may be explained by the segregation of Ni and Ti towards the interdendritic region of weld nugget (studied by using scanning electron microscope/energy dispersive X-ray analysis). 相似文献
10.