全文获取类型
收费全文 | 50721篇 |
免费 | 6389篇 |
国内免费 | 3543篇 |
专业分类
电工技术 | 5004篇 |
技术理论 | 1篇 |
综合类 | 3899篇 |
化学工业 | 7400篇 |
金属工艺 | 2952篇 |
机械仪表 | 3291篇 |
建筑科学 | 4095篇 |
矿业工程 | 1742篇 |
能源动力 | 1499篇 |
轻工业 | 3877篇 |
水利工程 | 1359篇 |
石油天然气 | 2529篇 |
武器工业 | 670篇 |
无线电 | 6432篇 |
一般工业技术 | 5627篇 |
冶金工业 | 1875篇 |
原子能技术 | 487篇 |
自动化技术 | 7914篇 |
出版年
2024年 | 405篇 |
2023年 | 1387篇 |
2022年 | 2672篇 |
2021年 | 3633篇 |
2020年 | 2534篇 |
2019年 | 1900篇 |
2018年 | 1917篇 |
2017年 | 2122篇 |
2016年 | 1874篇 |
2015年 | 2530篇 |
2014年 | 3018篇 |
2013年 | 3396篇 |
2012年 | 3930篇 |
2011年 | 3993篇 |
2010年 | 3439篇 |
2009年 | 3238篇 |
2008年 | 3141篇 |
2007年 | 2823篇 |
2006年 | 2529篇 |
2005年 | 2220篇 |
2004年 | 1410篇 |
2003年 | 1074篇 |
2002年 | 986篇 |
2001年 | 837篇 |
2000年 | 758篇 |
1999年 | 653篇 |
1998年 | 423篇 |
1997年 | 375篇 |
1996年 | 331篇 |
1995年 | 261篇 |
1994年 | 224篇 |
1993年 | 138篇 |
1992年 | 118篇 |
1991年 | 81篇 |
1990年 | 61篇 |
1989年 | 46篇 |
1988年 | 33篇 |
1987年 | 24篇 |
1986年 | 32篇 |
1985年 | 11篇 |
1984年 | 11篇 |
1983年 | 4篇 |
1982年 | 11篇 |
1981年 | 6篇 |
1980年 | 14篇 |
1979年 | 12篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1959年 | 7篇 |
1951年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
In Role Based Access Control (RBAC) systems, it is necessary and important to update the role–permission assignments in order to reflect the evolutions of the system transactions. However, role updating is generally complex and challenging, especially for large-scale RBAC systems. This is because the resulting state is usually expected to meet various requirements and constraints. In this paper, we focus on a fundamental problem of role updating in RBAC, which determines whether there exists a valid role–permission assignment, i.e., whether it can satisfy all the requirements of the role updating and without violating any role–capacity or permission–capacity constraint. We formally define such a problem as the Role Updating Feasibility Problem (RUFP), and study the computational complexity of RUFP in different subcases. Our results show that although several subcases are solvable in linear time, this problem is NP-complete in the general case. 相似文献
72.
Recently, many local-feature based methods have been proposed for feature learning to obtain a better high-level representation of human behavior. Most of the previous research ignores the structural information existing among local features in the same video sequences, while it is an important clue to distinguish ambiguous actions. To address this issue, we propose a Laplacian group sparse coding for human behavior representation. Unlike traditional methods such as sparse coding, our approach prefers to encode a group of relevant features simultaneously and meanwhile allow as less atoms as possible to participate in the approximation so that video-level sparsity is guaranteed. By incorporating Laplacian regularization the method is capable to ensure the similar approximation of closely related local features and the structural information is successfully preserved. Thus, a compact but discriminative human behavior representation is achieved. Besides, the objective of our model is solved with a closed-form solution, which reduces the computational cost significantly. Promising results on several popular benchmark datasets prove the efficiency and effectiveness of our approach. 相似文献
73.
The HUB-CI model is investigated in a telerobotic system in a client/server network to manage the lifecycle of engineering design and prototyping. The purpose of this platform is to support collaborative engineering design and proof of concept to enhance distributed team collaboration and resource utilization. The suggested platform is exemplified in two collaboration support tools and a physical prototyping platform. Structured Co-Insight Management is developed to support innovative idea exchanges and the consensus decision-making during the design process. Conflict/error detection management helps preventing conflicts and errors during the lifecycle of design and development. Physical collaboration over the network occurs when a team controls the telerobot operation during prototyping and testing in design cycles. A pilot system is implemented with a group project for the design of an electronic circuit (including both hardware and software designs). The functional assessment method is used to compare this platform to other collaborative design tools. The system presented offers unique qualitative advantages as an integrated collaboration support system. 相似文献
74.
75.
节理化岩体力学参数是矿山工程地质和稳定性分析的重要基础数据,一般在实验室通过单轴、三轴试验只能得到岩石的力学参数,无法得到岩体的力学参数。目前,利用岩石力学参数确定岩体力学参数的方法较多,但都过于烦琐或准确度不高,急需一种新的简易确定方法。因此,通过利用基于广义Hoek-Brown准则的地质强度指标(GSI法),并结合相应的岩土分析软件,强度折剪岩石力学参数值,从而得到岩体的力学参数。通过将该方法应用于赤峰中色白音诺尔矿业有限公司岩体力学参数的计算中,证明采用该方法考虑岩体的结构面和完整性,可较为准确地反映节理化岩体的力学特性,且方便可行,具有工程实用价值。? 相似文献
76.
Three-dimensionally ordered long-range macroporous carbon structures were prepared using commercially available phenolic resin
by utilizing sacrificial colloidal silica crystalline arrays as templates that were subsequently removed by HF etching after
pyrolysis in an argon atmosphere. SEM, TEM, and BET were employed to characterize the morphology and the surface area of the
porous carbon structures. The pore size (150–1000 nm) and BET surface area, which reflect pore volume (298.6 m2/g (1.32 cm3/g) ∼ 93.7 m2/g (0.12 cm3/g)), of the macroporous carbon structures produced were approximately proportional to the size (150–1000 nm) of the sacrificial
silica sphere templates used (annealing temp. 550°C). The achieved 550 nm porous carbon structures were examined to function
as potential catalyst carriers and were successfully impregnated with Ag or Pt-Ru on their inner walls after borohydride reduction
at room temperature. In addition, porous carbon patterns were fabricated using the ‘micromolding in capillary’ technique,
which has potential applications in the microreaction technology. 相似文献
77.
Hao Yuan Yi-min Liu Guo-zhu Pan Gang Zhang Jun Zhou Zhan-jun Zhang 《Quantum Information Processing》2014,13(11):2535-2549
A quantum identity authentication scheme based on ping-pong technique without entanglements is proposed. It can verify the legitimate user’s identity and update the initial authentication key for reuse. The security of the proposed scheme is extensively analyzed and accordingly confirmed in the case of general individual attacks. The present scheme owns high efficiency due to the use of single-particle states in a two-way quantum channel. Moreover, the scheme is economical and feasible with present-day technique. 相似文献
78.
Hao Yang Bin Jiang Youmin Zhang 《International Journal of Control, Automation and Systems》2014,12(1):29-36
This paper studies the fault tolerant formation keeping problem of multi-agent systems with consideration of shortest connection topology. This is motivated by the requirement of low communication cost which largely depends on the communication length. Given a formation shape, a connection topology design method and its reconfiguration strategy are proposed in the sense that the whole connection path is shortest despite of communication faults. A control framework that combines the individual formation controller of each agent and connection topology is further presented. The stability of the whole system process is analyzed by switched system theories. Simulation results of unmanned aerial vehicles (UAVs) show the effectiveness of the proposed strategy. 相似文献
79.
在基础设施网络(如电力网、互联网等)设施中,往往会出现关键节点,主要表现为节点流量大、在网络中位置关键等,其性能不稳定将制约网络部分区域的功能。因此从提高关键基础设施的性能和安全性的角度出发,针对关键基础设施的检测成为一个重要的研究课题。提出了一种新颖的基于分布相似度迁移的互联网关键路由设备的检测算法,其目的是自动地检测当前互联网线路中的关键路由设备。在真实环境中,不同线路中不同路由设备的行为特征由于若干客观因素(网络状态、路由设备性能等)导致其分布通常不相同。因此,所提方法主要基于路由之间的分布相似度迁移:首先在目标域(当前路由)中通过谱聚类方法自动判断出可疑的路由设备,然后通过提出的基于分布相似度迁移的分类器对上一步中检测出的可疑路由设备进行分类。在华为公司提供的真实数据集上进行的测试表明,所提方法能够有效发现线路中的关键路由设备,同时能够根据不同线路之间的分布相似度迁移来提高分类结果。 相似文献
80.
孙浩 《计算机与数字工程》2014,(3):433-434
介绍了应用线性矩阵不等式(LMI)解决一类时滞系统H∞控制问题,给出了基于Lyapunov第二法的H∞稳定条件,通过求解锥补线性化问题,得到相应的控制器,使得闭环系统稳定且满足H∞性能指标.并通过实例给出了仿真结果. 相似文献