全文获取类型
收费全文 | 9216篇 |
免费 | 739篇 |
国内免费 | 595篇 |
专业分类
电工技术 | 469篇 |
综合类 | 561篇 |
化学工业 | 1526篇 |
金属工艺 | 629篇 |
机械仪表 | 500篇 |
建筑科学 | 870篇 |
矿业工程 | 402篇 |
能源动力 | 236篇 |
轻工业 | 509篇 |
水利工程 | 178篇 |
石油天然气 | 749篇 |
武器工业 | 64篇 |
无线电 | 1062篇 |
一般工业技术 | 1048篇 |
冶金工业 | 474篇 |
原子能技术 | 81篇 |
自动化技术 | 1192篇 |
出版年
2024年 | 54篇 |
2023年 | 157篇 |
2022年 | 330篇 |
2021年 | 407篇 |
2020年 | 333篇 |
2019年 | 299篇 |
2018年 | 297篇 |
2017年 | 324篇 |
2016年 | 294篇 |
2015年 | 392篇 |
2014年 | 452篇 |
2013年 | 596篇 |
2012年 | 597篇 |
2011年 | 626篇 |
2010年 | 565篇 |
2009年 | 525篇 |
2008年 | 461篇 |
2007年 | 508篇 |
2006年 | 496篇 |
2005年 | 423篇 |
2004年 | 286篇 |
2003年 | 236篇 |
2002年 | 194篇 |
2001年 | 184篇 |
2000年 | 207篇 |
1999年 | 257篇 |
1998年 | 204篇 |
1997年 | 169篇 |
1996年 | 145篇 |
1995年 | 127篇 |
1994年 | 113篇 |
1993年 | 74篇 |
1992年 | 56篇 |
1991年 | 44篇 |
1990年 | 30篇 |
1989年 | 26篇 |
1988年 | 22篇 |
1987年 | 6篇 |
1986年 | 11篇 |
1985年 | 8篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1980年 | 3篇 |
1977年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
92.
金刚石涂层工具一直是金刚石膜工具应用研究的主流.制约其产业化的主要因素是涂层的附着力低和微晶金刚石涂层工具的加工精度差.通过对衬底的有效预处理和CVD沉积过程控制的研究,开发在硬质合金基体上沉积高结合强度、低粗糙度的金刚石涂层新技术,对于实现CVD金刚石涂层刀具高效、高精度切削加工具有重要意义.对旨在提高金刚石涂层附着力的预处理技术,本文探索了将酸蚀脱钴+等离子体刻蚀处理衬底法.利用优化的沉积工艺,在酸浸+等离子刻蚀处理的YG6刀片上沉积的两层金刚石复合膜表面粗糙度为0.13μm,附着力压痕测试临界载荷大于1500N.金刚石涂层工具的切削加工性能明显高于无涂层硬质合金工具.在加工ZAlSi12合金时,单层和两层金刚石涂层车刀片的切削寿命分别是无涂层车刀片切削寿命的21倍和28倍. 相似文献
93.
In this paper, we propose a new compact fourth-order accurate method for solving the two-dimensional fourth-order elliptic boundary value problem with third-order nonlinear derivative terms. We use only 9-point single computational cell in the scheme. The proposed method is then employed to solve Navier–Stokes equations of motion in terms of streamfunction–velocity formulation, and the lid-driven square cavity problem. We describe the derivation of the method in details and also discuss how our streamfunction–velocity formulation is able to handle boundary conditions in terms of normal derivatives. Numerical results show that the proposed method enables us to obtain oscillation-free high accuracy solution. 相似文献
94.
95.
为了解决骨骼参数难以测量的问题,提出一种利用网格分割结果计算参数的方法.首先对骨骼网格模型在提取少量特征点的基础上进行语义分割;然后将分割得到的模板借助基于Laplacian变形的非刚性配准,指导同类骨骼模型实现快速兼容性分割;最后结合网格分割结果及特征点计算出骨骼的主要形态参数.实验结果表明,该方法仅需少量的用户交互就能获得较好的测量效果,结合模板的策略也支持大批量骨骼模型的参数测定. 相似文献
96.
With the advent of the powerful editing software and sophisticated digital cameras, it is now possible to manipulate images. Copy-move is one of the most common methods for image manipulation. Several methods have been proposed to detect and locate the tampered regions, while many methods failed when the copied region undergone some geometric transformations before being pasted, because of the de-synchronization in the searching procedure. This paper presents an efficient technique for detecting the copy-move forgery under geometric transforms. Firstly, the forged image is divided into overlapping circular blocks, and Polar Complex Exponential Transform (PCET) is employed to each block to extract the invariant features, thus, the PCET kernels represent each block. Secondly, the Approximate Nearest Neighbor (ANN) Searching Problem is used for identifying the potential similar blocks by means of locality sensitive hashing (LSH). In order to make the algorithm more robust, morphological operations are applied to remove the wrong similar blocks. Experimental results show that our proposed technique is robust to geometric transformations with low computational complexity. 相似文献
97.
In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero. 相似文献
98.
Qian?LiEmail author Wenjia?Niu Gang?Li Endong?Tong Yue?Hu Ping?Liu Li?Guo 《Journal of Network and Systems Management》2015,23(3):474-501
With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sensor nodes that are in a normal status. Currently, two kinds of approaches exist to identify the substitute sensor nodes: the most common approach is to prepare redundancy nodes, though the involved tasks such as maintaining redundancy nodes, i.e., relocating the new node, lead to an extra burden on the wireless sensor networks. More recently, other approaches without using redundancy nodes are emerging, and they merely select the substitute nodes in a sensor node’s perspective i.e., migrating the service of faulty node to it’s nearest sensor node, though usually neglecting the requirements of the application level. Even a few work consider the need of the application level, they perform at packets granularity and don’t fit well at service granularity. In this paper, we aim to remove these limitations in the wireless sensor network with the service-oriented architecture. Instead of deploying redundancy nodes, the proposed mechanism replaces the faulty sensor node with consideration of the similarity on the application level, as well as on the sensor level. On the application level, we apply the Bloom Filter for its high efficiency and low space costs. While on the sensor level, we design an objective solution via the coefficient of a variation as an evaluation for choosing the substitute on the sensor level. 相似文献
99.
在数据采集系统中,按需采集是平衡数据数量、提高数据质量的有效手段。本文所提出的自适应数据采集算法是基于有限采样点的一元线性回归拟合,通过实时地对采集到的数据进行分析,不断修正采样周期,使得采样周期能够快速、准确地适应被测对象的动态变化。MATLAB软件仿真表明,本方法对于被测量加速变化具有较强的动态捕捉能力,能够在降低平均采样频率的前提下减小采样失真度,且与同类方法相比失真度低,稳定性高,是测控系统中实时数据采集的一种较好的代替方案。 相似文献
100.