全文获取类型
收费全文 | 9971篇 |
免费 | 740篇 |
国内免费 | 344篇 |
专业分类
电工技术 | 382篇 |
综合类 | 414篇 |
化学工业 | 1625篇 |
金属工艺 | 540篇 |
机械仪表 | 632篇 |
建筑科学 | 544篇 |
矿业工程 | 189篇 |
能源动力 | 336篇 |
轻工业 | 471篇 |
水利工程 | 157篇 |
石油天然气 | 310篇 |
武器工业 | 35篇 |
无线电 | 1464篇 |
一般工业技术 | 1628篇 |
冶金工业 | 899篇 |
原子能技术 | 100篇 |
自动化技术 | 1329篇 |
出版年
2024年 | 43篇 |
2023年 | 142篇 |
2022年 | 264篇 |
2021年 | 351篇 |
2020年 | 276篇 |
2019年 | 282篇 |
2018年 | 274篇 |
2017年 | 281篇 |
2016年 | 265篇 |
2015年 | 364篇 |
2014年 | 422篇 |
2013年 | 610篇 |
2012年 | 565篇 |
2011年 | 613篇 |
2010年 | 509篇 |
2009年 | 542篇 |
2008年 | 483篇 |
2007年 | 479篇 |
2006年 | 432篇 |
2005年 | 410篇 |
2004年 | 285篇 |
2003年 | 277篇 |
2002年 | 267篇 |
2001年 | 255篇 |
2000年 | 218篇 |
1999年 | 273篇 |
1998年 | 274篇 |
1997年 | 224篇 |
1996年 | 190篇 |
1995年 | 165篇 |
1994年 | 141篇 |
1993年 | 109篇 |
1992年 | 95篇 |
1991年 | 82篇 |
1990年 | 64篇 |
1989年 | 68篇 |
1988年 | 59篇 |
1987年 | 51篇 |
1986年 | 38篇 |
1985年 | 43篇 |
1984年 | 33篇 |
1983年 | 22篇 |
1982年 | 35篇 |
1981年 | 26篇 |
1980年 | 17篇 |
1979年 | 15篇 |
1977年 | 20篇 |
1976年 | 19篇 |
1974年 | 19篇 |
1973年 | 14篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
针对片状颗粒厚度检测的实际需求,结合机器视觉、图像处理和嵌入式技术,设计与实现了一套基于高性能ARM11的微片状颗粒厚度检测系统。该系统以QT和S3C6410为软硬件平台,提出了利用轮廓提取和最小矩形边界框相结合的方法计算片状颗粒厚度。结果表明,该检测系统具有处理速度快,测量精度高和成本低廉等优点,满足了对颗粒厚度测量的需求。 相似文献
32.
间接竞争ELISA方法用于脱落酸的检测 总被引:1,自引:0,他引:1
该文研制了植物激素脱落酸(ABA)间接竞争酶联免疫试剂盒,该试剂盒可对ABA进行快速检测.文中成功制备了脱落酸和牛血清蛋白的交联物(ABA-BSA),并对交联物的浓度、抗体稀释度、酶标二抗稀释度对实验的影响进行了考察.结果表明,该试剂盒具有高灵敏性,最低检出浓度为1.38 ng/mL,在10ns/mL~1 000 ng/mL之间,吸光度与浓度的对数呈良好的线性关系.样品添加回收率在95.98%~102.25%之间,平均回收率为100.18%,变异系数(CV)在1.27%~4.68%之间,平均变异系数为3.18%. 相似文献
34.
Hsiang-Cheh Huang Chi-Ming Chu Jeng-Shyang Pan 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(4):333-343
Applications for robust watermarking is one of the major branches in digital rights management (DRM) systems and related researches.
Based on existing experiences to evaluate the applicability of robust watermarking, it is generally agreed that three parameters
or requirements, including the quality of watermarked contents, the survivability of extracted watermark after deliberate
or unintentional attacks, and the number of bits embedded, need to be considered. However, performances relating to these
three parameters conflict with each other, and the trade off must be searched for. In this paper, we take all the three requirements
into consideration, and add the flexibility to meet the specific design in implementation. With the aid of genetic algorithm,
we design an applicable system that would obtain the good quality, acceptable survivability, and reasonable capacity after
watermarking. Simulation results present the effectiveness in practical implementation and possible application of the proposed
algorithm. 相似文献
35.
Zan Wu Zhang Qiaochu Xu Hu Liao Fuyou Guo Zhongxun Deng Jianan Wan Jing Zhu Hao Chen Lin Sun Qingqing Ding Shijin Zhou Peng Bao Wenzhong Zhang David Wei 《Nano Research》2018,11(7):3739-3745
Nano Research - A spin-coating method was applied to obtain thinner and smoother PEO/LiClO4 polymer electrolyte films (EFs) with a lower level of crystallization than those obtained using a... 相似文献
36.
With today’s global digital environment, the Internet is readily accessible anytime from everywhere, so does the digital image
manipulation software; thus, digital data is easy to be tampered without notice. Under this circumstance, integrity verification
has become an important issue in the digital world. The aim of this paper is to present an in-depth review and analysis on
the methods of detecting image tampering. We introduce the notion of content-based image authentication and the features required
to design an effective authentication scheme. We review major algorithms and frequently used security mechanisms found in
the open literature. We also analyze and discuss the performance trade-offs and related security issues among existing technologies. 相似文献
37.
基于LDA模型的新闻话题的演化 总被引:1,自引:0,他引:1
新闻话题及演化的研究可以帮助人们快速了解和获取新闻内容。提出了一种挖掘新闻话题随时间变化的方法,通过话题抽取和话题关联实现话题的演化。首先应用LDA(Latent Dirichlet Allocation Model)对不同时间段的文集进行话题的自动抽取,话题数目在不同时间段是可变的;计算相邻时间段中任意两个话题的分布距离实现话题的关联。实验结果证明该方法不但可以描述同一个话题随时间的演化过程,还可以描述话题内容随时间的变化,反映了话题(或子话题)之间多对多的演化关系。 相似文献
38.
This paper presents a general method to formulate monotonically convergent algorithms for identifying optimal control fields to manipulate quantum dynamics phenomena beyond the linear dipole interaction. The method, facilitated by a field-dependent dipole moment operator, is based on an integral equation of the first kind arising from the Heisenberg equation of motion for tracking a time-dependent, dynamical invariant observable associated with a reference control field. 相似文献
39.
Wu J. Chen S. Li G. Istepanian R.H. Chu J. 《Automatic Control, IEEE Transactions on》2001,46(7):1162-1166
The pole-sensitivity approach is employed to investigate the stability issue of the discrete-time control system, where a digital controller implemented with finite word length (FWL), is used. A stability related measure is derived, which is more accurate in estimating the closed-loop stability robustness of an FWL implemented controller than some existing measures for the pole-sensitivity analysis. This improved stability measure thus provides a better criterion to find the optimal realizations for a generic controller structure that includes output-feedback and observer-based controllers. A numerical example is used to verify the theoretical analysis and to illustrate the design procedure 相似文献
40.
For the problem of classifying an element (e.g., an unknown pattern) into one of two given categories where the associated observables are distributed according to one of two known multivariate normal populations having a common covariance matrix, it is shown that the minimum Bayes risk is a strict monotonic function of certain separability or statistical distance measures regardless of the a priori probabilities and the assigned loss function. However, for the associated conditional expected losses, strict monotonicity holds, if and only if a certain condition dependent on these probabilities and the given loss function is satisfied. These results remain valid for classification problems in which the observable can be transformed by a one-to-one differentiable mapping to normality. 相似文献