全文获取类型
收费全文 | 27311篇 |
免费 | 3117篇 |
国内免费 | 2164篇 |
专业分类
电工技术 | 2930篇 |
技术理论 | 6篇 |
综合类 | 2525篇 |
化学工业 | 1010篇 |
金属工艺 | 390篇 |
机械仪表 | 2015篇 |
建筑科学 | 1123篇 |
矿业工程 | 432篇 |
能源动力 | 381篇 |
轻工业 | 2862篇 |
水利工程 | 346篇 |
石油天然气 | 1176篇 |
武器工业 | 263篇 |
无线电 | 4160篇 |
一般工业技术 | 1909篇 |
冶金工业 | 590篇 |
原子能技术 | 142篇 |
自动化技术 | 10332篇 |
出版年
2024年 | 105篇 |
2023年 | 525篇 |
2022年 | 955篇 |
2021年 | 1195篇 |
2020年 | 1265篇 |
2019年 | 929篇 |
2018年 | 841篇 |
2017年 | 1085篇 |
2016年 | 1079篇 |
2015年 | 1169篇 |
2014年 | 1805篇 |
2013年 | 1799篇 |
2012年 | 2089篇 |
2011年 | 2185篇 |
2010年 | 1522篇 |
2009年 | 1421篇 |
2008年 | 1344篇 |
2007年 | 1613篇 |
2006年 | 1418篇 |
2005年 | 1214篇 |
2004年 | 1080篇 |
2003年 | 1038篇 |
2002年 | 999篇 |
2001年 | 850篇 |
2000年 | 784篇 |
1999年 | 536篇 |
1998年 | 381篇 |
1997年 | 268篇 |
1996年 | 171篇 |
1995年 | 160篇 |
1994年 | 116篇 |
1993年 | 96篇 |
1992年 | 80篇 |
1991年 | 70篇 |
1990年 | 56篇 |
1989年 | 52篇 |
1988年 | 34篇 |
1987年 | 27篇 |
1986年 | 29篇 |
1985年 | 15篇 |
1984年 | 27篇 |
1983年 | 14篇 |
1982年 | 23篇 |
1981年 | 23篇 |
1980年 | 27篇 |
1979年 | 14篇 |
1978年 | 14篇 |
1977年 | 8篇 |
1961年 | 4篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 156 毫秒
1.
目的 了解公众对网络食品药品谣言信息及虚假宣传甄别能力和行为态度,探索防范谣言传播、维护社会稳定的有效措施和途径。方法 采用随机抽样研究方法,对贵州省某少数民族自治州公众开展食品药品网络谣言及虚假宣传辨识能力、行为态度问卷调查。结果 当地公众食品药品网络谣言及虚假宣传辨识能力总体较低,经济发展落后地区的青少年人群对网络谣言及虚假宣传的辨识能力较弱。大部分公众处理网络食品药品安全信息较为理性,更愿意通过国家监管部门权威网站了解信息,基本具备了确认信息真实性的主观意识,但辟除谣言的行动能力不高。结论 地方党委政府及有关部门应加强食品药品网络谣言和虚假宣传治理,加大当地谣言及虚假宣传的监测和系统性分析研究,有针对性、预判性地进行治理和科普宣传。 相似文献
2.
Ya Gu Quanmin Zhu Hassan Nouri 《International Journal of Adaptive Control and Signal Processing》2022,36(1):138-154
This article presents a state-space model with time-delay to map the relationship between known input-output data for discrete systems. For the given input-output data, a model identification algorithm combining parameter estimation and state estimation is proposed in line with the causality constraints. Consequently, this article proposes a least squares parameter estimation algorithm, and analyzes its convergence for the studied systems to prove that the parameter estimation errors converge to zero under the persistent excitation conditions. In control system design, the U-model based control is introduced to provide a unilateral platform to improve the design efficiency and generality. A simulation portfolio from modeling to control is provided with computational experiments to validate the derived results. 相似文献
3.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
4.
Currently, the efficient detection of fingerprints is essential for the crime investigations. Revealing fingerprints is commonly achieved with fluorescent organic compounds but they are not efficient for fingerprint detection on porous or reflective surfaces. In order to solve the problem of collecting fingerprints on porous/reflective surfaces, inorganic phosphors have been employed, since they have characteristics of variable color emission, afterglow, high chemical stability and nano-size, which allow the fingerprint detection on any porous or non-porous surfaces. Due to these last properties, this review presents a summary about the use of phosphorescent and fluorescent phosphors for the detection of latent fingerprints. First, we discussed the main physical and chemical characteristics of the fingerprints which permit their detection and collection from any surface. After this, we presented the main morphological, structural and luminescent properties of the phosphorescent and fluorescent phosphors that allow their use for fingerprint detection. Later, we demonstrated with pictures of fingerprints (with and without light emission from the phosphors deposited on them) that both, phosphorescent and fluorescent phosphors can be used to visualize fingerprints with high resolution and high contrast without interference of the background surface, which is ideal for its collection and registration in the Automated Fingerprint Identification System (AFIS). We believe that this review could be useful to understand how to select an appropriate phosphorescent or fluorescent material for fingerprint detection depending on the type of surface (porous or non-porous, reflective or not reflective) where the fingerprint is deposited. 相似文献
5.
6.
Structural health monitoring system based on multi-agent coordination and fusion for large structure
In practical applications of structural health monitoring technology, a large number of distributed sensors are usually adopted to monitor the big dimension structures and different kinds of damage. The monitored structures are usually divided into different sub-structures and monitored by different sensor sets. Under this situation, how to manage the distributed sensor set and fuse different methods to obtain a fast and accurate evaluation result is an important problem to be addressed deeply. In the paper, a multi-agent fusion and coordination system is presented to deal with the damage identification for the strain distribution and joint failure in the large structure. Firstly, the monitoring system is adopted to distributedly monitor two kinds of damages, and it self-judges whether the static load happens in the monitored sub-region, and focuses on the static load on the sub-region boundary to obtain the sensor network information with blackboard model. Then, the improved contract net protocol is used to dynamically distribute the damage evaluation module for monitoring two kinds of damage uninterruptedly. Lastly, a reliable assessment for the whole structure is given by combing various heterogeneous classifiers strengths with voting-based fusion. The proposed multi-agent system is illustrated through a large aerospace aluminum plate structure experiment. The result shows that the method can significantly improve the monitoring performance for the large-scale structure. 相似文献
7.
PC2425破碎机是较为常用的锤式破碎机规格之一,主要用于石灰石的破碎,台时产量800~1 000 t,出料粒度≤70 mm,筛余5%,配套4 500~5 000 t水泥生产线。PC2425破碎机篦条为易损件,由于物料的冲击会导致篦条变形,但其原有的弓形架与篦条型式,更换时很难将篦条从弓形架中抽出,导致更换非常不便。此次改造,用户最初适量降低破碎机的出料粒度,以提高生料磨的产量及降低生料粉磨的电耗,虽然通过调整篦条与锤头的间距及篦条间隙可以达到降低出料粒度的要求。但是为了彻底解决篦条更换困难问题,重新设计了篦架结构。 相似文献
8.
Ting Cui Ling Xu Feng Ding Ahmed Alsaedi Tasawar Hayat 《International Journal of Adaptive Control and Signal Processing》2020,34(11):1658-1676
Parameter estimation plays an important role in the field of system control. This article is concerned with the parameter estimation methods for multivariable systems in the state-space form. For the sake of solving the identification complexity caused by a large number of parameters in multivariable systems, we decompose the original multivariable system into some subsystems containing fewer parameters and study identification algorithms to estimate the parameters of each subsystem. By taking the maximum likelihood criterion function as the fitness function of the differential evolution algorithm, we present a maximum likelihood-based differential evolution (ML-DE) algorithm for parameter estimation. To improve the parameter estimation accuracy, we introduce the adaptive mutation factor and the adaptive crossover factor into the ML-DE algorithm and propose a maximum likelihood-based adaptive differential evolution algorithm. The simulation study indicates the efficiency of the proposed algorithms. 相似文献
9.
10.
Most real-world vehicle nodes can be structured into an interconnected network of vehicles. Through structuring these services and vehicle device interactions into multiple types, such internet of vehicles becomes multidimensional heterogeneous overlay networks. The heterogeneousness of the overlays makes it difficult for the overlay networks to coordinate with each other to improve their performance. Therefore, it poses an interesting but critical challenge to the effective analysis of heterogeneous virtual vehicular networks. A variety of virtual vehicular networks can be easily deployed onto the native network by applying the concept of SDN (Software Defined Networking). These virtual networks reflect their heterogeneousness due to their different performance goals, and they compete for the same physical resources of the underlying network, so that a sub-optimal performance of the virtual networks may be achieved. Therefore, we propose a Deep Reinforcement Learning (DRL) approach to make the virtual networks cooperate with each other through the SDN controller. A cooperative solution based on the asymmetric Nash bargaining is proposed for co-existing virtual networks to improve their performance. Moreover, the Markov Chain model and DRL resolution are introduced to leverage the heterogeneous performance goals of virtual networks. The implementation of the approach is introduced, and simulation results confirm the performance improvement of the latency sensitive, loss-rate sensitive and throughput sensitive heterogeneous vehicular networks using our cooperative solution. 相似文献