全文获取类型
收费全文 | 10485篇 |
免费 | 389篇 |
国内免费 | 164篇 |
专业分类
电工技术 | 88篇 |
综合类 | 127篇 |
化学工业 | 230篇 |
金属工艺 | 72篇 |
机械仪表 | 112篇 |
建筑科学 | 72篇 |
矿业工程 | 13篇 |
能源动力 | 373篇 |
轻工业 | 64篇 |
水利工程 | 23篇 |
石油天然气 | 17篇 |
武器工业 | 2篇 |
无线电 | 951篇 |
一般工业技术 | 734篇 |
冶金工业 | 26篇 |
原子能技术 | 43篇 |
自动化技术 | 8091篇 |
出版年
2024年 | 10篇 |
2023年 | 77篇 |
2022年 | 173篇 |
2021年 | 260篇 |
2020年 | 261篇 |
2019年 | 228篇 |
2018年 | 291篇 |
2017年 | 783篇 |
2016年 | 850篇 |
2015年 | 602篇 |
2014年 | 951篇 |
2013年 | 716篇 |
2012年 | 622篇 |
2011年 | 716篇 |
2010年 | 559篇 |
2009年 | 633篇 |
2008年 | 371篇 |
2007年 | 462篇 |
2006年 | 394篇 |
2005年 | 323篇 |
2004年 | 163篇 |
2003年 | 198篇 |
2002年 | 201篇 |
2001年 | 203篇 |
2000年 | 145篇 |
1999年 | 157篇 |
1998年 | 110篇 |
1997年 | 87篇 |
1996年 | 66篇 |
1995年 | 48篇 |
1994年 | 31篇 |
1993年 | 44篇 |
1992年 | 32篇 |
1991年 | 34篇 |
1990年 | 27篇 |
1989年 | 15篇 |
1988年 | 12篇 |
1987年 | 12篇 |
1986年 | 12篇 |
1985年 | 22篇 |
1984年 | 22篇 |
1983年 | 22篇 |
1982年 | 24篇 |
1981年 | 21篇 |
1980年 | 9篇 |
1979年 | 14篇 |
1978年 | 10篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1974年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
1.
Mobile Networks and Applications - With the rapid development of Internet of things, the traditional city model is no longer applicable. Therefore, the emerging concept of smart city meets the... 相似文献
2.
Wireless Personal Communications - The Internet of Medical Things (IoMT) is the array of medical instruments and related technologies that link Information Technology (IT) systems in... 相似文献
3.
Mixed reality can overlay and display 3D digital content in the real world, convey abstract concepts to users, and promote the understanding of complex tasks. However, the abstract graphics overlaid on the physical space may cause a certain cognitive load for local users and reduce the efficiency of collaboration. To improve the efficiency of remote collaboration, we conducted an elicitation study on assembly tasks, explored the user needs for collaboration, and defined the design goals of our remote collaboration method. Inspired by the mirror-neuron mechanism, we present an imitative collaboration method that allows local users to imitate the interaction behavior of remote users to complete tasks. We also propose a series of interaction methods for remote users to select, copy, and interact with the local point clouds to facilitate the expression of collaboration intentions. Finally, the results of a user study evaluating our imitative collaboration method on assembly tasks are reported, confirming that our method improves collaboration efficiency while reducing the cognitive load of local users. 相似文献
4.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
5.
《Ceramics International》2022,48(6):7748-7758
Micromechanics model, finite element (FE) simulation of microindentation and machine learning were deployed to predict the mechanical properties of Cu–Al2O3 nanocomposites. The micromechanical model was developed based on the rule of mixture and grain and grain boundary sizes evolution to predict the elastic modulus of the produced nanocomposites. Then, a FE model was developed to simulate the microindentation test. The input for the FE model was the elastic modulus that was computed using the micromechanics model and wide range of yield and tangent stresses values. Finally, the output load-displacement response from the FE model, the elastic modulus, the yield and tangent strengths used for the FE simulations, and the residual indentation depth were used to train the machine learning model (Random vector functional link network) for the prediction of the yield and tangent stresses of the produced nanocomposites. Cu–Al2O3 nanocomposites with different Al2O3 concentration were manufactured using insitu chemical method to validate the proposed model. After training the model, the microindentation experimental load-displacement curve for Cu–Al2O3 nanocomposites was fed to the machine learning model and the mechanical properties were obtained. The obtained mechanical properties were in very good agreement with the experimental ones achieving 0.99 coefficient of determination R2 for the yield strength. 相似文献
6.
When a laser beam induces surface tension gradient at the free surface of a liquid, a weak surface depression is expected and has been observed. Here we report giant depression and rupture in “optothermocapillary fluids” under the illumination of laser and sunlight. Computational fluid dynamics models were developed to understand the surface deformation and provided desirable physical parameters of the fluid for maximum deformation. New optothermocapillary fluids were created by mixing transparent lamp oil with different candle dyes. They can be cut open by sunlight and be patterned to different shapes and sizes using an ordinary laser show projector or a common laser pointer. Laser driving and elevation of optothermocapillary fluids, in addition to the manipulation of different droplets on their surface, were demonstrated as an efficient controlling method and platform for optofluidic operations. The fundamental understanding of light-induced giant depression and creation of new optothermocapillary fluids encourage the fundamental research and applications of optofluidics. 相似文献
7.
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks. In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks. Cryptanalysis in both types of attacks is performed by only one selected image. Moreover, we have suggested some improvements in the algorithm to defeat attacks. 相似文献
8.
Vijayalakshmi A Rajesh Kanna B Vijayalakshmi C 《Microscopy research and technique》2022,85(2):685-696
Malaria is a major public health concern, affecting over 3.2 billion people in 91 countries. The advent of digital microscopy and Machine learning with the aim of automating Plasmodium falciparum diagnosis extensively depends on the extracted image features. The color of the cells, plasma, and stained artifacts influence the topological, geometrical, and statistical parameters being used to extract image features. During microscopic image acquisition, custom adjustments to the condenser and color temperature controls often have an influence on the extracted statistical features. But, our human visual system sub-consciously adjusts the color and retains the originality in a different lighting environment. Despite the use of appropriate image preprocessing, findings from the literature indicate that statistical feature variations exist, allowing the risk of P. falciparum misinterpretation. In order to eliminate this pervasive variation, the current work focuses on preprocessing the extracted statistical features rather than the prepossessing of the source image. It begins with the augmentation of series images for a microscopic field by inducing illumination variations during the microscopic image acquisition stage. A set of such image series is analyzed using a Nonlinear Regression Model to generalize the relationship between microscopic images acquired with variable ambient brightness and a specific feature. The projection point of the centroid feature onto the brightness parameter is identified in the model and it is denoted as the optimum brightness factor (OBF). Using the model, the feature correction factor (CF) is calculated from the rate of change of feature values over the interval OBF, and the brightness of the test image is processed. The present work has investigated OBF for selected image textural features, namely Contrast, Homogeneity, Entropy, Energy, and Correlation individually from its co-occurrence matrices. For performance analysis, the best state-of-the-art method uses selected texture as a subset feature to evaluate the effectiveness of P. falciparum malaria classification. Then, the impact of proposed feature processing is evaluated on 274 blood smear images with and without Feature Correction (FC). As a result, the “p” value is less than .05, which leads to the result that it is highly significant and the classification accuracy and F-score of P. falciparum malaria are increased. 相似文献
9.
10.