全文获取类型
收费全文 | 12807篇 |
免费 | 393篇 |
国内免费 | 58篇 |
专业分类
电工技术 | 260篇 |
综合类 | 16篇 |
化学工业 | 2274篇 |
金属工艺 | 367篇 |
机械仪表 | 361篇 |
建筑科学 | 219篇 |
矿业工程 | 73篇 |
能源动力 | 703篇 |
轻工业 | 1171篇 |
水利工程 | 190篇 |
石油天然气 | 82篇 |
无线电 | 1623篇 |
一般工业技术 | 2771篇 |
冶金工业 | 1544篇 |
原子能技术 | 198篇 |
自动化技术 | 1406篇 |
出版年
2024年 | 39篇 |
2023年 | 177篇 |
2022年 | 505篇 |
2021年 | 504篇 |
2020年 | 409篇 |
2019年 | 407篇 |
2018年 | 553篇 |
2017年 | 512篇 |
2016年 | 483篇 |
2015年 | 280篇 |
2014年 | 446篇 |
2013年 | 886篇 |
2012年 | 518篇 |
2011年 | 676篇 |
2010年 | 540篇 |
2009年 | 531篇 |
2008年 | 476篇 |
2007年 | 389篇 |
2006年 | 331篇 |
2005年 | 263篇 |
2004年 | 244篇 |
2003年 | 219篇 |
2002年 | 180篇 |
2001年 | 143篇 |
2000年 | 147篇 |
1999年 | 156篇 |
1998年 | 355篇 |
1997年 | 231篇 |
1996年 | 251篇 |
1995年 | 219篇 |
1994年 | 182篇 |
1993年 | 171篇 |
1992年 | 143篇 |
1991年 | 151篇 |
1990年 | 114篇 |
1989年 | 108篇 |
1988年 | 130篇 |
1987年 | 109篇 |
1986年 | 89篇 |
1985年 | 115篇 |
1984年 | 94篇 |
1983年 | 107篇 |
1982年 | 99篇 |
1981年 | 88篇 |
1980年 | 78篇 |
1979年 | 54篇 |
1978年 | 46篇 |
1977年 | 56篇 |
1976年 | 76篇 |
1975年 | 32篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
高速公路施工区车辆强制换道耗时生存模型 总被引:1,自引:0,他引:1
为研究高速公路施工区车辆强制换道行为及其影响因素,采用生存分析中的半参数分析方法建立强制换道耗时的乘法风险率模型.通过无人机拍摄采集高速公路施工区的车辆换道耗时及其影响因素数据,最终确立换道耗时Cox比例风险模型,对换道耗时数据进行Cox回归建模分析.结果表明:近77%的换道车辆在10 s内完成换道;小型车和中型车经养护施工区的换道耗时未发现显著性差别;对于相同的换道耗时,平峰期的累积生存率明显低于高峰期和过渡时期,而高峰期的累积生存率最高.建立的强制换道耗时生存模型可有效的定量分析车型和交通时段对高速公路施工区车辆换道行为的影响,可为高速公路施工区交通管理控制及车辆换道行为建模及仿真奠定一定的理论基础. 相似文献
112.
The oxidation behavior of a normalized 2.25Cr-1Mo steel tempered previously for 10 hr at different temperatures between 873 and 1023 K has been studied up to a maximum duration of 1000 hr in air at 773–973 K. The oxidation resistance of the steel was found to decrease significantly with the temperature of tempering. Tempering of this steel is reported to cause microstructural changes involving precipitation of Cr as carbides and a decrease in the effective (free) Cr contents, that could influence the oxidation resistance of the Cr-containing alloys. Relative compositions across the thickness of the oxide scales, as analyzed by SEM/EDX and SIMS, suggest that a less Cr-rich (and less protective) and thicker scale on the steel formed because previous tempering caused extensive depletion of free Cr. 相似文献
113.
A. K. Singh S. Saptharishi B. Basu J. A. Sekhar 《JOM Journal of the Minerals, Metals and Materials Society》2002,54(11):76-80
A study to determine the most optimal heating element for any given processing configuration yields a surprisingly simple
log-linear dependence of the productivity on the heating-element temperature. Aluminum, iron, and aluminum-oxide processing
efficiencies are studied for conditions that span heat treating to melting. The authors note that, in general, the highest
element temperature that may effectively be used for a given heating process is the high-productivity solution. 相似文献
114.
115.
Need and importance of modelling in human body vibration research studies are well established. The study of biodynamic responses of human beings can be classified into experimental and analytical methods. In the past few decades, plenty of mathematical models have been developed based on the diverse field measurements to describe the biodynamic responses of human beings. In this paper, a complete study on lumped parameter model derived from 50th percentile anthropometric data for a seated 54- kg Indian male subject without backrest support under free un-damped conditions has been carried out considering human body segments to be of ellipsoidal shape. Conventional lumped parameter modelling considers the human body as several rigid masses interconnected by springs and dampers. In this study, concept of mass of interconnecting springs has been incorporated and eigenvalues thus obtained are found to be closer to the values reported in the literature. Results obtained clearly establish decoupling of vertical and fore-and-aft oscillations. 相似文献
116.
Self-recoverable fragile watermarking is meant for accurate tamper localization as well as image recovery with superior visual quality. However, most of the existing state of art approaches perform authentication and recovery on block basis owing to which the entire block is categorized as tampered in case of alteration of one or more pixels of it. This, results in staircase formation of tamper detected regions, hence lacking in accuracy. Furthermore, the visual quality of the recovered image also deteriorates as an approximate value is assigned to all the block pixels corresponding to the altered region. The proposed watermarking scheme performs both authentication and recovery pixelwise. The authentication of each pixel is done via multi level tamper detection(MLTD) through three authentication bits based on value, location and neighbourhood information. The domain for image recovery is chosen dynamically based on the content of the block, may it be in spatial domain for smooth blocks or frequency domain for the rough ones. This provides high accuracy in recovery. As the embedding of recovery information is done in the frequency domain, the imperceptibility of the watermarked image scheme remains high. Also, embedding of authentication information in the spatial domain maintains its fragile nature. Even for higher tampering ratios, the lost content is rebuilt with high peak signal to noise ratio(PSNR) of the recovered image. The probabilities of false rejection and false acceptance head towards the ideal value for most of the empirical analysis. Comparative study via metric evaluation of probability of false rejection (PFR), probability of false acceptance (PFA) and PSNR of recovered image for different standard test cover images demonstrate the efficacy of the proposed scheme over other existing state of art approaches. Further, the security of the proposed scheme remains high due to usage of multi-layered secret keys and chaos based random mapping handling worst tamper scenarios. 相似文献
117.
Nikolaos Gianniotis Christoph Schnörr Christian Molkenthin Sanjay Singh Bora 《Pattern Analysis & Applications》2016,19(2):475-485
Variational methods are employed in situations where exact Bayesian inference becomes intractable due to the difficulty in performing certain integrals. Typically, variational methods postulate a tractable posterior and formulate a lower bound on the desired integral to be approximated, e.g. marginal likelihood. The lower bound is then optimised with respect to its free parameters, the so-called variational parameters. However, this is not always possible as for certain integrals it is very challenging (or tedious) to come up with a suitable lower bound. Here, we propose a simple scheme that overcomes some of the awkward cases where the usual variational treatment becomes difficult. The scheme relies on a rewriting of the lower bound on the model log-likelihood. We demonstrate the proposed scheme on a number of synthetic and real examples, as well as on a real geophysical model for which the standard variational approaches are inapplicable. 相似文献
118.
Ruchir Gupta Nitin Singha Yatindra Nath Singh 《Peer-to-Peer Networking and Applications》2016,9(6):1101-1113
Free riding is a major problem in peer-to-peer networks. Reputation management systems are generally employed to overcome this problem. In this paper, a new reputation based scheme called probabilistic resource allocation is proposed. This strategy probabilistically decide whether to provide the resource to requesting peer or not. Aforesaid method gives selection preference to higher reputation peers and at the same time provides some finite probability of interaction between those peers who don’t have good reputation about each other. This avoids disconnection between the aforesaid peers. The proposed scheme also introduces a new mechanism for resource distribution which not only allocates resources based on peers’ reputation but simultaneously maximizes network utility also. Algorithm for formation of interest groups based upon both similarity of interests and reputation between peers is also presented. 相似文献
119.
Arun Lakhotia Andrew Walenstein Craig Miles Anshuman Singh 《Journal in Computer Virology》2013,9(3):109-123
VILO is a lazy learner system designed for malware classification and triage. It implements a nearest neighbor (NN) algorithm with similarities computed over Term Frequency $\times $ Inverse Document Frequency (TFIDF) weighted opcode mnemonic permutation features (N-perms). Being an NN-classifier, VILO makes minimal structural assumptions about class boundaries, and thus is well suited for the constantly changing malware population. This paper presents an extensive study of application of VILO in malware analysis. Our experiments demonstrate that (a) VILO is a rapid learner of malware families, i.e., VILO’s learning curve stabilizes at high accuracies quickly (training on less than 20 variants per family is sufficient); (b) similarity scores derived from TDIDF weighted features should primarily be treated as ordinal measurements; and (c) VILO with N-perm feature vectors outperforms traditional N-gram feature vectors when used to classify real-world malware into their respective families. 相似文献
120.
Manpreet Singh UCOE Manjeet Singh Patterh UCOE 《Information Security Journal: A Global Perspective》2013,22(6):332-343
ABSTRACT It is difficult to define reliable security policy components that should be applied to validate a secure computing environment. The job gets further complicated when one has to deal with multiple policies in single computing environment. This paper demonstrates how we can overcome the difficulties of defining reliable security components by using evaluation criteria. In this paper we use common criteria to derive the security functional components for a multipolicy-based network computing environment. In the verification process, the derived policy components are related to the specific security objectives of the network communication environment. The evidence listed in the case study supports the claims that the proposed network security policy interpretation framework is a complete and cohesive set of requirements. 相似文献