全文获取类型
收费全文 | 357183篇 |
免费 | 27911篇 |
国内免费 | 15708篇 |
专业分类
电工技术 | 20871篇 |
技术理论 | 45篇 |
综合类 | 25379篇 |
化学工业 | 59628篇 |
金属工艺 | 20781篇 |
机械仪表 | 22453篇 |
建筑科学 | 27616篇 |
矿业工程 | 11678篇 |
能源动力 | 9698篇 |
轻工业 | 24014篇 |
水利工程 | 6742篇 |
石油天然气 | 23418篇 |
武器工业 | 2797篇 |
无线电 | 38776篇 |
一般工业技术 | 39352篇 |
冶金工业 | 18522篇 |
原子能技术 | 3624篇 |
自动化技术 | 45408篇 |
出版年
2024年 | 1459篇 |
2023年 | 5567篇 |
2022年 | 9863篇 |
2021年 | 13866篇 |
2020年 | 10429篇 |
2019年 | 8542篇 |
2018年 | 9853篇 |
2017年 | 11058篇 |
2016年 | 10127篇 |
2015年 | 13863篇 |
2014年 | 17440篇 |
2013年 | 20891篇 |
2012年 | 22686篇 |
2011年 | 25167篇 |
2010年 | 22236篇 |
2009年 | 21057篇 |
2008年 | 20638篇 |
2007年 | 19685篇 |
2006年 | 20052篇 |
2005年 | 17650篇 |
2004年 | 11960篇 |
2003年 | 10690篇 |
2002年 | 9893篇 |
2001年 | 8811篇 |
2000年 | 8755篇 |
1999年 | 9389篇 |
1998年 | 7181篇 |
1997年 | 6138篇 |
1996年 | 5813篇 |
1995年 | 4785篇 |
1994年 | 3887篇 |
1993年 | 2622篇 |
1992年 | 2073篇 |
1991年 | 1569篇 |
1990年 | 1233篇 |
1989年 | 995篇 |
1988年 | 830篇 |
1987年 | 524篇 |
1986年 | 410篇 |
1985年 | 258篇 |
1984年 | 206篇 |
1983年 | 164篇 |
1982年 | 128篇 |
1981年 | 76篇 |
1980年 | 96篇 |
1979年 | 43篇 |
1978年 | 17篇 |
1977年 | 23篇 |
1976年 | 28篇 |
1973年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
991.
提权攻击是针对Linux系统的一种重要攻击手段。根据提权攻击所利用的漏洞类型,一般可将其分为应用层提权攻击和内核提权攻击。现有的防御技术已经能够防御基本的应用层提权攻击,但是并不能完全防御内核提权攻击,内核提权攻击仍是Linux系统面临的一个重要威胁。内核提权攻击一般通过利用内核提权漏洞进行攻击。针对内核提权攻击,分析研究了基本的内核提权漏洞利用原理以及权限提升方法,并对典型的内核提权攻击防御技术进行了分析。最后通过实验对SELinux针对内核提权攻击的防御效果进行了分析验证,并针对发现的问题指出了下一步具有可行性的研究方向。 相似文献
992.
Qingguo?Meng Nan?ZhangEmail author Xuejiao?Zhao Fangling?Li Xin?Guan 《Electronic Markets》2016,26(1):15-29
Since the 1980s, the development of information and communication technologies (ICTs) has greatly changed people’s modes of production and lifestyle, and it has also had a significant influence on traditional social structures. Microblogs – a type of social media application such as Twitter or Weibo – have served as an important platform for network governance in some local governments in China. This study makes an attempt to answer the following questions: What types of strategies should governments implement on social media platforms during public emergencies? What are the effects of these strategies? Based on the case of the Shifang Incident, which was a large-scale environmental protest that occurred in Shifang, China in 2012, we analyze all the messages posted during the incident on the official microblog of the Shifang government and examine the public feedback by using an online big data analysis tool. In line with the time sequence and the extent of the conflict, we divide the Shifang Incident into three phases: the fermentation period, the confrontation period, and the digestion period. In addition, we classify government strategies on social media into five categories: introducing, appealing, explaining, rumor-refuting, and decision-making. The analysis results show that different government strategies are applied to different phases of the incident and that the responses of the public also vary during different periods. 相似文献
993.
Finite‐time asynchronous
filtering for discrete‐time Markov jump systems over a lossy network 下载免费PDF全文
This paper is concerned with the problem of finite‐time asynchronous filtering for a class of discrete‐time Markov jump systems. The communication links between the system and filter are assumed to be unreliable, which lead to the simultaneous occurrences of packet dropouts, time delays, sensor nonlinearity and nonsynchronous modes. The objective is to design a filter that ensures not only the mean‐square stochastic finite‐time bounded but also a prescribed level of performance for the underlying error system over a lossy network. With the help of the Lyapunov–Krasovskii approach and stochastic analysis theory, sufficient conditions are established for the existence of an admissible filter. By using a novel simple matrix decoupling approach, a desired asynchronous filter can be constructed. Finally, a numerical example is presented and a pulse‐width‐modulation‐driven boost converter model is employed to demonstrate the effectiveness of the proposed approach. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
994.
Feifei?Li Ke?Yi Yufei?Tao Bin?YaoEmail author Yang?Li Dong?Xie Min?Wang 《The VLDB Journal The International Journal on Very Large Data Bases》2016,25(3):317-338
Aggregate similarity search, also known as aggregate nearest-neighbor (Ann) query, finds many useful applications in spatial and multimedia databases. Given a group Q of M query objects, it retrieves from a database the objects most similar to Q, where the similarity is an aggregation (e.g., \({{\mathrm{sum}}}\), \(\max \)) of the distances between each retrieved object p and all the objects in Q. In this paper, we propose an added flexibility to the query definition, where the similarity is an aggregation over the distances between p and any subset of \(\phi M\) objects in Q for some support \(0< \phi \le 1\). We call this new definition flexible aggregate similarity search and accordingly refer to a query as a flexible aggregate nearest-neighbor ( Fann ) query. We present algorithms for answering Fann queries exactly and approximately. Our approximation algorithms are especially appealing, which are simple, highly efficient, and work well in both low and high dimensions. They also return near-optimal answers with guaranteed constant-factor approximations in any dimensions. Extensive experiments on large real and synthetic datasets from 2 to 74 dimensions have demonstrated their superior efficiency and high quality. 相似文献
995.
996.
Haojie Li Yue Guan Lijuan Liu Fanglin Wang Ling Wang 《Multimedia Tools and Applications》2016,75(15):8939-8954
As a new information sharing platform, microblog has got explosive growth in recent years and has become an important source for public opinion mining. A variety of information like the reviews of brands/products or the trends of events can be socially sensed from such kind of data. However, it is still a challenging task to search relevant microblogs as the user generated content tends to be mixed with noise. Besides short text, image is getting popular in microblogs due to its power in visual information conveying. In this paper, we leverage textual and visual cues integratedly and propose a general re-ranking approach for microblog retrieval via multi-graph semi-supervised learning. We argue that the different types of information in microblogs correspond to different relationships among microblogs and each type of the relationship can be represented as a similarity graph. We then integrate different graphs into a unified framework and solve them simultaneously for microblog re-ranking. Extensive experiments on a recently published Brand-Social-Net dataset showed the effectiveness of the proposed method and marginal improvements have been achieved in accuracy as compared to the single graph model based method. 相似文献
997.
The design and test of dual/triple‐mode bandpass filter based on temporal coupled‐mode theory 下载免费PDF全文
Hui Xu Jiong‐Jiong Mo Xiu‐Qin Xu Xu Ding Zhi‐Yu Wang Yong‐Heng Shang Li‐Ping Wang Fa‐Xin Yu 《国际射频与微波计算机辅助工程杂志》2016,26(7):609-622
In this article, the design and test of both a K‐band dual‐mode bandpass filter (BPF) pair and a K‐band triple‐mode BPF are presented based on N‐mode temporal coupled‐mode theory (CMT). The expressions of transmission and reflection responses are analytically derived. All the parameters in the expressions have clear physical meanings and are easily optimized to reach the required filter performance. Aided by eigenmode simulations, concrete structures of the three integrated BPFs are designed and optimized to approach the calculated physical parameters. After the fabrications and measurements of the three BPFs, extended upper/lower stopband with high stopband rejections are achieved, and by increasing the number of resonant modes, improved frequency selectivity and better passband flatness are obtained. The analytical analysis well predicts the simulation and measurement results, which provides an efficient way for BPF designs. © 2016 Wiley Periodicals, Inc. Int J RF and Microwave CAE 26:609–622, 2016. 相似文献
998.
Exponential Stability of Switched Time-varying Delayed Neural Networks with All Modes Being Unstable
This paper aims to design an appropriate switching law to stabilize the switched neural networks with time-varying delays when all subsystems are unstable. By using the discretized Lyapunov function approach and the extended comparison principle for impulsive systems, the stability of switched delayed neural networks composed full of unstable subsystems is analyzed and a computable sufficient condition is derived in the framework of dwell time. The effectiveness of the proposed results is illustrated by a numerical example. 相似文献
999.
Based on advantages of basic non-negative sparse coding (NNSC) model, and considered the prior class constraint of image features, a novel NNSC model is discussed here. In this NNSC model, the sparseness criteria is selected as a two-parameter density estimation model and the dispersion ratio of within-class and between-class is used as the class constraint. Utilizing this NNSC model, image features can be extracted successfully. Further, the feature recognition task by using different classifiers can be implemented well. Simulation results prove that our NNSC model proposed is indeed effective in extracting image features and recognition task in application. 相似文献
1000.