全文获取类型
收费全文 | 13247篇 |
免费 | 1164篇 |
国内免费 | 599篇 |
专业分类
电工技术 | 797篇 |
技术理论 | 1篇 |
综合类 | 811篇 |
化学工业 | 2074篇 |
金属工艺 | 866篇 |
机械仪表 | 758篇 |
建筑科学 | 920篇 |
矿业工程 | 348篇 |
能源动力 | 409篇 |
轻工业 | 842篇 |
水利工程 | 233篇 |
石油天然气 | 821篇 |
武器工业 | 93篇 |
无线电 | 1669篇 |
一般工业技术 | 1630篇 |
冶金工业 | 789篇 |
原子能技术 | 165篇 |
自动化技术 | 1784篇 |
出版年
2024年 | 61篇 |
2023年 | 194篇 |
2022年 | 320篇 |
2021年 | 507篇 |
2020年 | 375篇 |
2019年 | 332篇 |
2018年 | 408篇 |
2017年 | 429篇 |
2016年 | 386篇 |
2015年 | 492篇 |
2014年 | 637篇 |
2013年 | 697篇 |
2012年 | 801篇 |
2011年 | 828篇 |
2010年 | 722篇 |
2009年 | 717篇 |
2008年 | 717篇 |
2007年 | 735篇 |
2006年 | 715篇 |
2005年 | 606篇 |
2004年 | 400篇 |
2003年 | 461篇 |
2002年 | 449篇 |
2001年 | 391篇 |
2000年 | 372篇 |
1999年 | 369篇 |
1998年 | 339篇 |
1997年 | 316篇 |
1996年 | 307篇 |
1995年 | 211篇 |
1994年 | 170篇 |
1993年 | 125篇 |
1992年 | 94篇 |
1991年 | 81篇 |
1990年 | 66篇 |
1989年 | 45篇 |
1988年 | 33篇 |
1987年 | 25篇 |
1986年 | 19篇 |
1985年 | 12篇 |
1984年 | 11篇 |
1983年 | 9篇 |
1982年 | 7篇 |
1981年 | 4篇 |
1980年 | 5篇 |
1979年 | 3篇 |
1973年 | 2篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
101.
C Mao R Vig TK Venkatachalam EA Sudbeck FM Uckun 《Canadian Metallurgical Quarterly》1998,8(16):2213-2218
102.
数字水印技术作为数字媒体版权保护的重要手段越来越引起人们的重视。文章讨论了数字水印的概念、特征,重点介绍了数字水印的鲁棒性及影响数字水印鲁棒性的因素,总结和分析了数字水印主要攻击方式并提出相应的应对措施。 相似文献
103.
104.
王茂 《电脑编程技巧与维护》2012,(8):92-93
色彩模式是在数字处理过程中处理色彩的基本标准,其是以颜色模型为基础,利用数字定量对颜色进行描述的方法。针对图形图像制作软件中的色彩模式进行分析。 相似文献
105.
Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao 《计算机系统科学与工程》2021,39(3):373-390
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier. 相似文献
106.
The application of cross‐corpus for speech emotion recognition (SER) via domain adaptation methods have gain high acknowledgment for developing good robust emotion recognition systems using different corpora or datasets. However, the issue of cross‐lingual still remains a challenge in SER and needs more attention to resolve the scenario of applying different language types in both training and testing. In this paper, we propose a triple attentive asymmetric convolutional neural network to address the recognition of emotions for cross‐lingual and cross‐corpus speech in an unsupervised approach. The proposed method adopts the joint supervision of softmax loss and center loss to learn high power discriminative feature representations for target domain via the use of high quality pseudo‐labels. The proposed model uses three attentive convolutional neural networks asymmetrically, where two of the networks are used to artificially label unlabeled target samples as a result of their predictions from training on source labeled samples and the other network is used to obtain salient target discriminative features from the pseudo‐labeled target samples. We evaluate our proposed method on three different language types (i.e., English, German, and Italian) data sets. The experimental results indicate that, our proposed method achieves higher prediction accuracy over other state‐of‐the‐art methods. 相似文献
107.
Yang Shuo Mao Xinjun Wang Qiuzhen Huang Yuhong 《Journal of Intelligent and Robotic Systems》2021,103(1):1-17
Journal of Intelligent & Robotic Systems - In this work, we present a new mathematic model for the flight of a bird-scale flapping-wing aerial vehicle, in which the impacts of the wing inertia... 相似文献
108.
研制了基于PC/104总线为核心的嵌入式预充电电源控制系统,重点阐述了该控制系统的硬件结构与软件设计;该控制系统以SBC-4680为控制系统主板,通过PC/104总线控制PCM-5120模拟量输入输出卡,控制PCM-5134的IO和定时计数卡,同时制作相应的接口电路及看门狗电路,在DOS操作系统中,利用C++编写底层软件,控制中采用PID算法及特殊数据处理方法,利用VB编写上位机操作界面与图形显示软件,实现与底层软件的以太网通信、信号的实时传输、显示与处理;实验证明,采用此预充电控制系统以后,使高压电源的波头质量得到极大提高,既消除了震荡,又避免了电压跌落等情况的出现,同时该电源的控制精度达到1%,因此,该控制系统完全满足电源控制及保护需要。 相似文献
109.
This paper deals with the problem of reliable control for discrete time systems with actuator failures. The actuator is assumed to fail occasionally and can recover over a time interval. During the time of suffering failures, the considered closed‐loop system is assumed unstable. Using an average dwell time method and under the condition that the activation time ratio between the system without actuator failures and the system with actuator failures is not less than a specified constant, an observer‐based feedback controller is developed in terms of linear matrix inequalities such that the resulting closed‐loop system is exponentially stable. An example is included to demonstrate the effectiveness of the proposed approach. 相似文献
110.
本文对一个新的PASCAL结构编辑编辑器PSE(PASCAL Structured Editor)的系统结构和功能进行了概括的描述。在设计和实现PSE时,作者提出了一种新的程序内部表示法,即所谓“文本-树”表示。与以往的程序内部表示相较,这种表示方法具有占用内存量小,光标控制及编辑操作简便以及无须进行内部语法树与行式文件间的转换等特点。实践证明,基于此种表示的语法制导编辑器是易于实现的,其工作效率是较高的。 相似文献