全文获取类型
收费全文 | 21807篇 |
免费 | 2536篇 |
国内免费 | 1103篇 |
专业分类
电工技术 | 913篇 |
综合类 | 2138篇 |
化学工业 | 2282篇 |
金属工艺 | 966篇 |
机械仪表 | 663篇 |
建筑科学 | 738篇 |
矿业工程 | 434篇 |
能源动力 | 351篇 |
轻工业 | 5038篇 |
水利工程 | 340篇 |
石油天然气 | 1000篇 |
武器工业 | 268篇 |
无线电 | 1823篇 |
一般工业技术 | 1534篇 |
冶金工业 | 980篇 |
原子能技术 | 123篇 |
自动化技术 | 5855篇 |
出版年
2025年 | 206篇 |
2024年 | 485篇 |
2023年 | 500篇 |
2022年 | 623篇 |
2021年 | 733篇 |
2020年 | 851篇 |
2019年 | 855篇 |
2018年 | 787篇 |
2017年 | 825篇 |
2016年 | 837篇 |
2015年 | 899篇 |
2014年 | 1217篇 |
2013年 | 1309篇 |
2012年 | 1520篇 |
2011年 | 1554篇 |
2010年 | 1240篇 |
2009年 | 1197篇 |
2008年 | 1155篇 |
2007年 | 1339篇 |
2006年 | 1111篇 |
2005年 | 975篇 |
2004年 | 760篇 |
2003年 | 654篇 |
2002年 | 575篇 |
2001年 | 457篇 |
2000年 | 418篇 |
1999年 | 360篇 |
1998年 | 292篇 |
1997年 | 269篇 |
1996年 | 251篇 |
1995年 | 215篇 |
1994年 | 199篇 |
1993年 | 143篇 |
1992年 | 136篇 |
1991年 | 106篇 |
1990年 | 90篇 |
1989年 | 68篇 |
1988年 | 53篇 |
1987年 | 37篇 |
1986年 | 25篇 |
1985年 | 23篇 |
1984年 | 21篇 |
1983年 | 16篇 |
1982年 | 12篇 |
1981年 | 8篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1960年 | 3篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Buffalo milk Cheddar cheese samples of different ages were analysed for compositional attributes (CA), ripening indices (RI) and Instron Textural Profile (ITP). All samples were compositionally alike, except for pH and salt-in-moisture (SM) contents. RI showed significant variations. CA and RI showed highly significant correlations within themselves and with each other, except for moisture with pH, SM with moisture, MNFS, Fat and FDM and Fat with MNFS. The ITPs of cheeses showed significant variations and had highly significant intercorrelations indicating their interdependence. CA (except moisture and MNFS) and RI showed a highly significant correlationship with ITPs. Moisture content showed a highly significant correlationship with all ITPs, except cohesiveness and springiness, where it was significant. MNFS content showed significant correlations only with hardness and brittleness. Stepwise regression analysis revealed that MI was the most predominant factor influencing cheese texture, followed by pH, SM, FDM and TVFA. Knowing Ca and RI, the textural properties of cheeses can be forecast through mathematical equations. Similarly the age of cheese can also be predicted if RI and/or textural properties are known. 相似文献
2.
Bhupesh C. Roy Motonobu Goto & Tsutomu Hirose 《International Journal of Food Science & Technology》1996,31(2):137-141
Tomato seed oil was extracted with supercritical carbon dioxide in a semibatch-flow extractor within the temperature range 313–343 K and the pressure range 10.8–24.5MPa. The extraction rates increased with pressure, but decreased with temperature increase because of the variation in solvent density and resultant differences in oil solubility. The fatty acid composition of the extracted oil was similar to that of soybean oil. 相似文献
3.
It has recently been shown that authenticated Byzantine agreement,
in which more than a third of the parties are corrupted, cannot be
securely realized under concurrent or parallel (stateless)
composition. This result puts into question any usage of
authenticated Byzantine agreement in a setting where many
executions take place. In particular, this is true for the whole
body of work of secure multi-party protocols in the case that a
third or more of the parties are corrupted. This is because these
protocols strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated Byzantine
agreement. We remark that it was accepted folklore that the use of
a broadcast channel (or authenticated Byzantine agreement) is
actually essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are corrupted.
In this paper we show that this folklore is false. We present a
mild relaxation of the definition of secure computation allowing
abort. Our new definition captures all the central security issues
of secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the definition is
in decoupling the issue of agreement from these issues. We
then show that this relaxation suffices for achieving secure
computation in a point-to-point network. That is, we show that
secure multi-party computation for this definition can be achieved
for any number of corrupted parties and without a
broadcast channel (or trusted pre-processing phase as required for
running authenticated Byzantine agreement). Furthermore, this is
achieved by just replacing the broadcast channel in known
protocols with a very simple and efficient echo-broadcast
protocol. An important corollary of our result is the ability to
obtain multi-party protocols that remain secure under composition,
without assuming a broadcast channel. 相似文献
4.
5.
6.
谢树新 《数字社区&智能家居》2009,(17)
已有文献中的支持向量机SMO算法推导过程计算复杂,该文给出一个简洁推导。整个推导过程没有复杂的计算,除了误差函数外,不需引入其它中间变量。 相似文献
7.
Céline Casenave Author vitae 《Automatica》2011,47(10):2273-2278
We present a time-continuous identification method for nonlinear dynamic Volterra models of the form HX=f(u,X)+v with H, a causal convolution operator. It is mainly based on a suitable parameterization of H deduced from the so-called diffusive representation, which is devoted to state representations of integral operators. Following this approach, the complex dynamic nature of H can be summarized by a few numerical parameters on which the identification of the dynamic part of the model will focus. The method is validated on a physical numerical example. 相似文献
8.
Bih-Sheue Shieh 《Information Sciences》2011,181(4):832-841
The work examines the feasibility of minimizing a linear objective function subject to a max-t fuzzy relation equation constraint, where t is a continuous/Archimedean t-norm. Conventional methods for solving this problem are significantly improved by, first separating the problem into two sub-problems according to the availability of positive coefficients. This decomposition is thus more easily handled than in previous literature. Next, based on use of the maximum solution of the constraint equation, the sub-problem with non-positive coefficients is solved and the size of the sub-problem with positive coefficients reduced as well. This step is unique among conventional methods, owing to its ability to determine as many optimal variables as possible. Additionally, several rules are developed for simplifying the remaining problem. Finally, those undecided optimal variables are obtained using the covering problem rather than the branch-and-bound methods. Three illustrative examples demonstrate that the proposed approach outperforms conventional schemes. Its potential applications are discussed as well. 相似文献
9.
《国际计算机数学杂志》2012,89(5):1012-1029
Many problems in mathematics and engineering lead to Fredholm integral equations of the first kind, e.g. signal and image processing. These kinds of equations are difficult to solve numerically since they are ill-posed. Therefore, regularization is required to obtain a reasonable approximate solution. This paper presents a new regularization method based on a weighted H1 seminorm. Details of numerical implementation are given. Numerical examples, including one-dimensional and two-dimensional integral equations, are presented to illustrate the efficiency of the proposed approach. Numerical results show that the proposed regularization method can restore edges as well as details. 相似文献
10.