全文获取类型
收费全文 | 64282篇 |
免费 | 6611篇 |
国内免费 | 4212篇 |
专业分类
电工技术 | 5545篇 |
技术理论 | 5篇 |
综合类 | 5426篇 |
化学工业 | 9115篇 |
金属工艺 | 3811篇 |
机械仪表 | 4303篇 |
建筑科学 | 5458篇 |
矿业工程 | 1695篇 |
能源动力 | 1834篇 |
轻工业 | 4875篇 |
水利工程 | 1526篇 |
石油天然气 | 2849篇 |
武器工业 | 711篇 |
无线电 | 7939篇 |
一般工业技术 | 7077篇 |
冶金工业 | 2257篇 |
原子能技术 | 835篇 |
自动化技术 | 9844篇 |
出版年
2024年 | 377篇 |
2023年 | 1109篇 |
2022年 | 2193篇 |
2021年 | 3045篇 |
2020年 | 2287篇 |
2019年 | 1761篇 |
2018年 | 1813篇 |
2017年 | 2111篇 |
2016年 | 1968篇 |
2015年 | 2746篇 |
2014年 | 3411篇 |
2013年 | 4014篇 |
2012年 | 4809篇 |
2011年 | 4973篇 |
2010年 | 4508篇 |
2009年 | 4426篇 |
2008年 | 4478篇 |
2007年 | 4002篇 |
2006年 | 3797篇 |
2005年 | 3048篇 |
2004年 | 2195篇 |
2003年 | 1913篇 |
2002年 | 2232篇 |
2001年 | 1965篇 |
2000年 | 1478篇 |
1999年 | 1079篇 |
1998年 | 695篇 |
1997年 | 562篇 |
1996年 | 476篇 |
1995年 | 375篇 |
1994年 | 282篇 |
1993年 | 216篇 |
1992年 | 181篇 |
1991年 | 134篇 |
1990年 | 95篇 |
1989年 | 90篇 |
1988年 | 64篇 |
1987年 | 48篇 |
1986年 | 25篇 |
1985年 | 26篇 |
1984年 | 16篇 |
1983年 | 9篇 |
1982年 | 16篇 |
1981年 | 13篇 |
1980年 | 15篇 |
1979年 | 8篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1959年 | 5篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
131.
京杭大运河是非物质文化遗产,在堤防加固工程中河道沿线设置了人行健身步道和自行车道,道路采用了彩色露骨料透水混凝土.文章通过对京杭大运河堤防加固工程中彩色露骨料透水混凝土的施工介绍,提供了海绵城市在水利工程中的应用案例,供同行借鉴参考. 相似文献
132.
133.
Applied Intelligence - Personnel performance is a key factor to maintain core competitive advantages. Thus, predicting personnel future performance is a significant research domain in human... 相似文献
134.
水下相机对海洋生物科学研究有重要意义,其控制系统的设计关键在于光源控制方案以及电源效率的提高;提出并实现了一种基于低功耗微控制器、高亮LED光源以及LED控制驱动器MAX16802B的水下相机控制系统,详细介绍了系统组成,并给出了基于低功耗策略的硬件和软件优化设计方案;实验结果表明,该设计方案电路结构简单,稳定性好,电源效率达75%以上,能够满足长时间水下拍摄工作;在实际海下测试中,按20分钟的拍摄间隔需求,水下相机可连续工作2个月以上。 相似文献
135.
飞机环控试验台须模拟流量0~14000kg/h、压力0~2.5MPa和常温~500℃的空气环境;项目要求测控范围广、精度±1%且不超调;空气状态具有非线性、时变等特点,且控制参数之间存在复杂耦合;针对以上难点,设计了分布式测控系统,提出了改进的智能PID控制方案;通过遗传算法分段整定PID参数,离线建立PID数据库,使系统能够根据控制目标值选择最优PID初值;在此基础上,结合模糊推理在线调整PID参数,使系统具有了自适应性,能在具体工况和干扰下达到很好的控制效果;实际应用中完全满足了指标要求,解决了传统PID的控制难点,对类似的复杂系统有一定借鉴意义。 相似文献
136.
Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things 总被引:2,自引:2,他引:0
The effective strategy of Internet of Things (IoT) can help firms to grasp the emerging opportunities from the IoT and then improve their competitive advantage. In this article, based on organizational capability perspective, we provide a theoretical framework which classifies IoT strategies into four archetypes from two dimensions of managers’ strategic intent and industrial driving force, and propose that market-based exploratory capabilities play a more important role for firms adopting get-ahead strategy, and market-based exploitative capabilities play a more important role for firms adopting catch-up strategy in market. The technology-based exploratory capabilities play a more important role for firms adopting get-ahead strategy in technology, and technology-based exploitative capabilities play a more important role for firms adopting catch-up strategy in technology. Especially, external industry information sharing more efficiently contributes to the enhancement of both market-based and technology-based exploratory capabilities, and internal industry information sharing more efficiently contributes to the enhancement of both market-based and technology-based exploitative capabilities. 相似文献
137.
138.
In this paper, we study the existence and asymptotic stability in the pth moment of the mild solutions to impulsive stochastic neutral partial differential equations with infinite delays. Sufficient conditions ensuring the stability of the impulsive stochastic system are established. The results are obtained via the Banach fixed point theorem. 相似文献
139.
Qishi Wu Mengxia Zhu Yi Gu Patrick Brown Xukang Lu Wuyin Lin Yangang Liu 《Journal of Grid Computing》2012,10(3):367-393
Next-generation scientific applications feature complex workflows comprised of many computing modules with intricate inter-module dependencies. Supporting such scientific workflows in wide-area networks especially Grids and optimizing their performance are crucial to the success of collaborative scientific discovery. We develop a Scientific Workflow Automation and Management Platform (SWAMP), which enables scientists to conveniently assemble, execute, monitor, control, and steer computing workflows in distributed environments via a unified web-based user interface. The SWAMP architecture is built entirely on a seamless composition of web services: the functionalities of its own are provided and its interactions with other tools or systems are enabled through web services for easy access over standard Internet protocols while being independent of different platforms and programming languages. SWAMP also incorporates a class of efficient workflow mapping schemes to achieve optimal end-to-end performance based on rigorous performance modeling and algorithm design. The performance superiority of SWAMP over existing workflow mapping schemes is justified by extensive simulations, and the system efficacy is illustrated by large-scale experiments on real-life scientific workflows for climate modeling through effective system implementation, deployment, and testing on the Open Science Grid. 相似文献
140.
Jinguang Han Willy Susilo Yi Mu Jun Yan 《International Journal of Information Security》2012,11(6):389-401
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption. 相似文献