全文获取类型
收费全文 | 4818篇 |
免费 | 486篇 |
国内免费 | 220篇 |
专业分类
电工技术 | 317篇 |
综合类 | 304篇 |
化学工业 | 790篇 |
金属工艺 | 326篇 |
机械仪表 | 287篇 |
建筑科学 | 460篇 |
矿业工程 | 170篇 |
能源动力 | 123篇 |
轻工业 | 276篇 |
水利工程 | 113篇 |
石油天然气 | 337篇 |
武器工业 | 32篇 |
无线电 | 541篇 |
一般工业技术 | 609篇 |
冶金工业 | 259篇 |
原子能技术 | 42篇 |
自动化技术 | 538篇 |
出版年
2024年 | 21篇 |
2023年 | 102篇 |
2022年 | 155篇 |
2021年 | 252篇 |
2020年 | 173篇 |
2019年 | 149篇 |
2018年 | 168篇 |
2017年 | 174篇 |
2016年 | 162篇 |
2015年 | 193篇 |
2014年 | 274篇 |
2013年 | 300篇 |
2012年 | 330篇 |
2011年 | 288篇 |
2010年 | 259篇 |
2009年 | 246篇 |
2008年 | 281篇 |
2007年 | 211篇 |
2006年 | 268篇 |
2005年 | 241篇 |
2004年 | 144篇 |
2003年 | 156篇 |
2002年 | 129篇 |
2001年 | 120篇 |
2000年 | 125篇 |
1999年 | 106篇 |
1998年 | 92篇 |
1997年 | 61篇 |
1996年 | 57篇 |
1995年 | 72篇 |
1994年 | 47篇 |
1993年 | 30篇 |
1992年 | 33篇 |
1991年 | 26篇 |
1990年 | 13篇 |
1989年 | 17篇 |
1988年 | 17篇 |
1987年 | 17篇 |
1986年 | 5篇 |
1985年 | 4篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有5524条查询结果,搜索用时 31 毫秒
101.
Zibo Wang Chaobin Huo Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li Bailing Wang 《计算机、材料和连续体(英文)》2023,75(2):2957-2979
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy. 相似文献
102.
Zixuan Wang Dongzhao Hao Yuefei Wang Jinwu Zhao Jiaxing Zhang Xi Rong Jiaojiao Zhang Jiwei Min Wei Qi Rongxin Su Mingxia He 《Small (Weinheim an der Bergstrasse, Germany)》2023,19(1):2204959
The self-assembly of peptidyl virus-like nanovesicles (pVLNs) composed of highly ordered peptide bilayer membranes that encapsulate the small interfering RNA (siRNA) is reported. The targeting and enzyme-responsive sequences on the bilayer's surface allow the pVLNs to enter cancer cells with high efficiency and control the release of genetic drugs in response to the subcellular environment. By transforming its structure in response to the highly expressed enzyme matrix metalloproteinase 7 (MMP-7) in cancer cells, it helps the siRNA escape from the lysosomes, resulting in a final silencing efficiency of 92%. Moreover, the pVLNs can serve as reconfigurable “Trojan horse” by transforming into membranes triggered by the MMP-7 and disrupting the cytoplasmic structure, thereby achieving synergistic anticancer effects and 96% cancer cell mortality with little damage to normal cells. The pVLNs benefit from their biocompatibility, targeting, and enzyme responsiveness, making them a promising platform for gene therapy and anticancer therapy. 相似文献
103.
介绍了齿条位移反馈控制器的设计,包括开环系统性能分析、系统建模和控制参数整定。设计的直接数字式PI控制器使得闭环控制系统的静、动态特性满足柴油机喷油电控的要求。 相似文献
104.
总结了一套供电企业面向对象信息模型.该套模型规范出供电企业管理信息系统主体信息内容、信息关系、信息处理形式和管理信息系统的主体功能结构,可供各供电企业在管理信息系统建设过程中参考.同时研究了该套模型的建设方法和设计思路. 相似文献
105.
武器发射时产生的脉冲噪声对人员和仪器会造成很大的危害,因此噪声测试在武器勤务性能考核巾具有重要意义,针对脉冲噪声信号特性,开发了一套基于VXI总线的噪声测试系统;详细介绍了系统硬件结构设计、基于LabWindows/CVI虚拟仪器开发平台的软件设计和系统功能;设计的系统具有存储容量大、采样率高和软件功能强等特点,能够用于各种武器单发或连发射击时的噪声测试,也可以用于武器非行驶状态下的稳态噪声测试;通过在试验中的应用,表明本系统操作简便,工作可靠. 相似文献
106.
静态检测中断驱动程序的数据竞争 总被引:1,自引:0,他引:1
直接运行于微控制器上的中断驱动程序中可能存在一种重要的程序错误:数据竞争.然而当前主流的数据竞争静态检测技术因其服务于多线程模型程序而不适用.设计简明、易用的中断特征描述语言可以使得竞争检测具有平台无关性;同时,提出了一个流敏感的、上下文敏感的、考虑中断驱动程序原子性、易变性和部分随机性的数据竞争检测算法.该算法具有高效、精确的特点.实验表明,其检测时间与代码规模基本呈线性关系,分析17850行代码仅用时3.6s;同时,相比于基于锁集技术的典型数据竞争检测方法,其准确率平均是后者的2.13倍. 相似文献
107.
The quality of plane layout design of the disc cutters for the full-face rock tunnel boring machine (TBM) directly affects the balance of force distribution on the cutter head during the excavating. Various layout patterns have been adopted in practice during the layout design of the disc cutters. Considering the engineering technical requirements and the corresponding structure design requirements of the cutter head, this study formulates a nonlinear multi-objective mathematical model with multiple constraints for the disc cutters plane layout design, and analyses the characteristics of a multi-spiral layout pattern, a dynamic star layout pattern and a stochastic layout pattern. And then a genetic algorithm is employed to solve a disc cutters’ multi-spiral layout problem, and a cooperative co-evolutionary genetic algorithm (CCGA) is utilized to solve a disc cutters’ star or stochastic layout problems. The emphasis was put on the study of superiority of three different layout patterns. Finally, an instance of the disc cutters’ plane layout design was solved by the proposed methods using three different kinds of layout patterns. Experimental results showed the effectiveness of the method of combining the mathematical model with the algorithms, and the pros and cons of the three layout patterns. 相似文献
108.
Ning-Hui Sun Jing Xing Zhi-Gang Huo Guang-Ming Tan Jin Xiong Bo Li Can Ma 《计算机科学技术学报》2011,26(3):352-362
Dawning Nebulae is a heterogeneous system composed of 9280 multi-core x86 CPUs and 4640 NVIDIA Fermi GPUs. With a Linpack
performance of 1.271 petaFLOPS, it was ranked the second in the TOP500 List released in June 2010. In this paper, key issues
in the system design of Dawning Nebulae are introduced. System tuning methodologies aiming at petaFLOPS Linpack result are
presented, including algorithmic optimization and communication improvement. The design of its file I/O subsystem, including
HVFS and the underlying DCFS3, is also described. Performance evaluations show that the Linpack efficiency of each node reaches
69.89%, and 1024-node aggregate read and write bandwidths exceed 100 GB/s and 70GB/s respectively. The success of Dawning
Nebulae has demonstrated the viability of CPU/GPU heterogeneous structure for future designs of supercomputers. 相似文献
109.
110.