全文获取类型
收费全文 | 73898篇 |
免费 | 5430篇 |
国内免费 | 2809篇 |
专业分类
电工技术 | 3911篇 |
技术理论 | 6篇 |
综合类 | 4476篇 |
化学工业 | 12778篇 |
金属工艺 | 3973篇 |
机械仪表 | 4819篇 |
建筑科学 | 5214篇 |
矿业工程 | 2412篇 |
能源动力 | 2245篇 |
轻工业 | 4824篇 |
水利工程 | 1012篇 |
石油天然气 | 5308篇 |
武器工业 | 471篇 |
无线电 | 7676篇 |
一般工业技术 | 9474篇 |
冶金工业 | 3956篇 |
原子能技术 | 755篇 |
自动化技术 | 8827篇 |
出版年
2024年 | 303篇 |
2023年 | 1278篇 |
2022年 | 2120篇 |
2021年 | 2926篇 |
2020年 | 2209篇 |
2019年 | 1974篇 |
2018年 | 2312篇 |
2017年 | 2512篇 |
2016年 | 2085篇 |
2015年 | 2712篇 |
2014年 | 3466篇 |
2013年 | 4235篇 |
2012年 | 4363篇 |
2011年 | 4880篇 |
2010年 | 4192篇 |
2009年 | 3976篇 |
2008年 | 3869篇 |
2007年 | 3728篇 |
2006年 | 3811篇 |
2005年 | 3452篇 |
2004年 | 2301篇 |
2003年 | 2093篇 |
2002年 | 1874篇 |
2001年 | 1645篇 |
2000年 | 1809篇 |
1999年 | 2075篇 |
1998年 | 1776篇 |
1997年 | 1438篇 |
1996年 | 1418篇 |
1995年 | 1194篇 |
1994年 | 964篇 |
1993年 | 719篇 |
1992年 | 550篇 |
1991年 | 430篇 |
1990年 | 331篇 |
1989年 | 258篇 |
1988年 | 226篇 |
1987年 | 143篇 |
1986年 | 121篇 |
1985年 | 98篇 |
1984年 | 66篇 |
1983年 | 40篇 |
1982年 | 42篇 |
1981年 | 30篇 |
1980年 | 25篇 |
1979年 | 13篇 |
1977年 | 7篇 |
1976年 | 8篇 |
1975年 | 5篇 |
1945年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
112.
Defense frontier analysis of quantum cryptographic systems 总被引:1,自引:0,他引:1
When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92. 相似文献
113.
Generalized spin filters, including several directional filters such as the directional median filter and the directional binary filter, are proposed for removal of the noise of fringe patterns and the extraction of fringe skeletons with the help of fringe-orientation maps (FOM's). The generalized spin filters can filter off noise on fringe patterns and binary fringe patterns efficiently, without distortion of fringe features. A quadrantal angle filter is developed to filter off the FOM. With these new filters, the derivative-sign binary image (DSBI) method for extraction of fringe skeletons is improved considerably. The improved DSBI method can extract high-density skeletons as well as common density skeletons. 相似文献
114.
Summary Catechin binds strongly to both poly(vinylpyrrolidone) and poly(L-proline) in dilute aqueous solution, inducing a collapse of the more flexible poly(vinylpyrrolidone) chains, but forming a microgel with the more extended poly(L-proline) chains. Low concentrations of poly(L-proline) inhibit the discoloration of aqueous solutions of catechin, thereby implicating the ortho hydroxyyl groups in the catechol moiety in the binding process. Modeling shows that the likely binding sites on poly(L-proline) arise from two minor local conformations. These minor conformations are less frequent in poly(-hydroxy-L-proline) than in poly(L-proline), which may explain why catechin interacts more strongly with poly(L-proline) than with poly(-hydroxy-L-proline). 相似文献
115.
T. -C. Sun 《Structural and Multidisciplinary Optimization》1996,11(2):113-119
This paper analyses the design sensitivity of a suspension system with material and geometric nonlinearities for a motorcycle structure. The main procedures include nonlinear structural analysis, formulation of the problem with nonlinear dynamic response, design sensitivity analysis, and optimization. The incremental finite element method is used in structural analysis. The stiffness and damping parameters of the suspension system are considered as design variables. The maximum amplitude of nonlinear transient response at the seat is taken as the objective function during the optimization simulation. A more realistic finite element model for the motorcycle structure with elasto-damping elements of different material models is presented. A comparison is made of the optimum designs with and without geometric nonlinear response and is discussed.Nomenclature A
amplitude of the excitation function
-
a
0,a
1
time integration constants for the Newmark method
-
t+t
C
s
secant viscous damping matrix at timet+t
-
t
C
T
tangent viscous damping matrix at timet
- C
linear part of
t
C
T
-
D
i
0
initial value of thei-th design variable
-
D
i
instanenous value of thei-th design variables
-
t+t
F(t–1)
total internal force vector at the end of iteration (i–1) and timet+t
-
t+t
F
(NL)
(i–1)
nonlinear part of
t+t
F(i–1)
-
f
frequency of the excitation function
-
t+t
K
s
secant stiffness matrix at timet+t
-
t
K
T
tangent stiffness matrix at timet
- K
linear part of
t
K
T
-
effective stiffness matrix at timet
-
L
distance between the wheel centres
- M
constant mass matrix
-
m
T
number of solution time steps
-
NC
number of constraint equations
- Q
nonlinear dynamic equilibrium equation of the structural system
-
t+t
R
external applied load vector at timet+t
-
t
e
active time interval for the excitation function
-
t
U
displacement vector of the finite element assemblage at timet
-
velocity of the finite element assemblage at timet
-
t
Ü
acceleration vector of the finite element assemblage at timet
-
t+t
U
(i)
displacement vector of the finite element assemblage at the end of iterationi and timet+t
-
velocity vector of the finite element assemblage at the end of iterationi and timet+t
-
t+t
Ü(i)
acceleration vector of the finite element assemblage at the end of iterationi and timet+t
- U
(i)
vector of displacement increments from the end of iteration (i–1) to the end of iterationi at timet+t
- V
driving speed of motorcycle
- x
vector of design variable
- ()
quantities of variation
- 0
objective function
-
i
i-th constraint equation 相似文献
116.
FacetAtlas: multifaceted visualization for rich text corpora 总被引:1,自引:0,他引:1
Cao N Sun J Lin YR Gotz D Liu S Qu H 《IEEE transactions on visualization and computer graphics》2010,16(6):1172-1181
Documents in rich text corpora usually contain multiple facets of information. For example, an article about a specific disease often consists of different facets such as symptom, treatment, cause, diagnosis, prognosis, and prevention. Thus, documents may have different relations based on different facets. Powerful search tools have been developed to help users locate lists of individual documents that are most related to specific keywords. However, there is a lack of effective analysis tools that reveal the multifaceted relations of documents within or cross the document clusters. In this paper, we present FacetAtlas, a multifaceted visualization technique for visually analyzing rich text corpora. FacetAtlas combines search technology with advanced visual analytical tools to convey both global and local patterns simultaneously. We describe several unique aspects of FacetAtlas, including (1) node cliques and multifaceted edges, (2) an optimized density map, and (3) automated opacity pattern enhancement for highlighting visual patterns, (4) interactive context switch between facets. In addition, we demonstrate the power of FacetAtlas through a case study that targets patient education in the health care domain. Our evaluation shows the benefits of this work, especially in support of complex multifaceted data analysis. 相似文献
117.
118.
Ruijuan Zheng Mingchuan Zhang Qingtao Wu Shibao Sun Jiexin Pu 《International Journal of Information Security》2010,9(1):1-17
With the rapid development of network technologies and deteriorating of network environment, traditional single-net security
system cannot satisfy the security requirement. The excellent security performance of biological systems impels the bio-inspired
network security theory to be a hot research area currently. Based on Bio-inspired Multidimensional Network Security Model
we have put forward, we have advanced Bio-inspired Multi-Net Security system by implementing the functional distribution of
different subnets of different transient states in Multi-Net Paralleling structure. Firstly, parameter estimation and modified
algorithms of Hidden Markov Model are introduced to construct the mathematical mode of B-MNS; secondly, the integrated performance
of our modified B-MNS has been tested and its simulation has been carried out. So the feasibility, validity and high efficiency
of our model have been demonstrated theoretically, and practically. 相似文献
119.
CAD软件与基于多边形的3D软件之间数据转换需求不断增加,但是CAD模型复杂度和精细度却越来越高,数据转换的难度变大.为了解决这一难题,结合PolyTrans,分析如何解决一般3D软件难以导入大型的IGES(Initial Graphics Exchange Specifi-cation)文件的问题.从PolyTrans模型简化模块的理论依据着手,研究如何控制多边形的数量、降低文件的复杂性和减少文件的数量,使大型CAD装配模型能顺利地以单个实体形式导入Lightwave、3DS MAX以及Maya类的3D软件.并结合具体科研项目,给出了模型优化前后各指标参数对比情况. 相似文献
120.
Robust Stabilization Over Communication Channels in the Presence of Unstructured Uncertainty 总被引:1,自引:0,他引:1
This technical note is concerned with the problem of controlling plants over communication channels, where the plant is subject to two types of unstructured uncertainty: additive uncertainty and stable coprime factor uncertainty. Necessary lower bounds on the rate of transmission (or channel capacity) C, for robust stabilization, are computed explicitly. In particular, it is shown that the lower bound in the additive uncertainty case corresponds to a fixed point of a particular function. In the stable coprime factor uncertainty case, the derivation relies on linear fractional transformation concepts. The results are important in determining the minimum channel capacity needed in order to stabilize plants subject to unstructured uncertainty over communication channels. For instance, the bounds obtained can be used to analyze the effect of uncertainty on the channel capacity. An illustrative example is provided. 相似文献