全文获取类型
收费全文 | 12188篇 |
免费 | 923篇 |
国内免费 | 109篇 |
专业分类
电工技术 | 217篇 |
综合类 | 57篇 |
化学工业 | 3310篇 |
金属工艺 | 301篇 |
机械仪表 | 530篇 |
建筑科学 | 459篇 |
矿业工程 | 26篇 |
能源动力 | 756篇 |
轻工业 | 1112篇 |
水利工程 | 242篇 |
石油天然气 | 182篇 |
武器工业 | 6篇 |
无线电 | 1228篇 |
一般工业技术 | 2093篇 |
冶金工业 | 310篇 |
原子能技术 | 91篇 |
自动化技术 | 2300篇 |
出版年
2024年 | 48篇 |
2023年 | 232篇 |
2022年 | 405篇 |
2021年 | 745篇 |
2020年 | 693篇 |
2019年 | 841篇 |
2018年 | 990篇 |
2017年 | 919篇 |
2016年 | 904篇 |
2015年 | 544篇 |
2014年 | 909篇 |
2013年 | 1371篇 |
2012年 | 902篇 |
2011年 | 960篇 |
2010年 | 615篇 |
2009年 | 546篇 |
2008年 | 323篇 |
2007年 | 255篇 |
2006年 | 191篇 |
2005年 | 129篇 |
2004年 | 122篇 |
2003年 | 72篇 |
2002年 | 73篇 |
2001年 | 40篇 |
2000年 | 36篇 |
1999年 | 42篇 |
1998年 | 26篇 |
1997年 | 24篇 |
1996年 | 29篇 |
1995年 | 29篇 |
1994年 | 13篇 |
1993年 | 21篇 |
1992年 | 14篇 |
1991年 | 21篇 |
1990年 | 20篇 |
1989年 | 16篇 |
1988年 | 9篇 |
1987年 | 7篇 |
1986年 | 10篇 |
1985年 | 8篇 |
1984年 | 20篇 |
1983年 | 12篇 |
1982年 | 9篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1979年 | 7篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1973年 | 2篇 |
1967年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
991.
This paper presents a computer-based method for the optimal design of three-dimensional Reinforced Concrete (RC) structures having beams subjected to shear force and bending moment, columns subjected to biaxial moments, biaxial shears and axial loads, and shear walls subjected to pure shear. Regarding the beams and columns, the design variables are the width, depth and area of longitudinal reinforcement of member sections. The design variables for the shear walls are the thickness of the wall, the area of vertical reinforcement, horizontal distance between the vertical stirrups, the area of horizontal reinforcement, vertical space between the horizontal stirrups, and the area of vertical flexural reinforcement. The Optimality Criteria (OC) method is applied to minimize the cost of the concrete, steel and formwork for the structure. ACI code [1] provisions concerning the strength and ductility of beams, columns and shear walls are taken as constraints. The constraints also impose upper and lower bounds on the dimensions of beams and columns, and on shear wall thickness, reinforcement area and the maximum and minimum vertical and horizontal spaces between the stirrups of the shear walls. Sensitivity analysis is conducted for both internal forces and the capacities of the sections of the beams, columns and shear walls. The features of the design method are illustrated by a solved example. 相似文献
992.
Ali Najafi Aria Alasty Ramin Vatankhah Mohammad Eghtesad Farhang Daneshmand 《Asian journal of control》2017,19(6):2219-2225
Boundary stabilization of vibrating three‐dimensional Cosserat elastic solids are studied using mathematical tools, such as operator theory and semigroup techniques. The advantages of the boundary control laws for both boundary stabilization problems are investigated. The boundary stabilization problems are studied using a Lyapunov stability method and LaSalle's invariant set theorem. Numerical simulations are provided to illustrate the effectiveness and performance of the designed control scheme. 相似文献
993.
This paper deals with the robust finite time tracking of desired trajectories for a wide group of robotic manipulators in spite of unknown disturbances, uncertainties, and saturations of actuators while only manipulator's positions are available and its velocities are not measurable physically. A new form of chattering‐free second order fast nonsingular terminal sliding mode control scheme is introduced to design input torques for fulfilling the determined tracking objective in the adjustable total finite settling time. The proposed control algorithm is incorporated with two nonlinear observers to estimate disturbances and velocities of joints within finite settling times. The global finite time stability of the closed‐loop manipulator is analytically proved. Finally, a numerical simulation is carried out to verify the effectiveness of the designed input torques. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
994.
In this article, we consider the project critical path problem in an environment with hybrid uncertainty. In this environment, the duration of activities are considered as random fuzzy variables that have probability and fuzzy natures, simultaneously. To obtain a robust critical path with this kind of uncertainty a chance constraints programming model is used. This model is converted to a deterministic model in two stages. In the first stage, the uncertain model is converted to a model with interval parameters by alpha-cut method and distribution function concepts. In the second stage, the interval model is converted to a deterministic model by robust optimization and min-max regret criterion and ultimately a genetic algorithm with a proposed exact algorithm are applied to solve the final model. Finally, some numerical examples are given to show the efficiency of the solution procedure. 相似文献
995.
Benyamin Norouzi Seyed Mohammad Seyedzadeh Sattar Mirzakuchaki Mohammad Reza Mosavi 《Multimedia Systems》2014,20(1):45-64
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms. 相似文献
996.
With the high availability of digital video contents on the internet, users need more assistance to access digital videos. Various researches have been done about video summarization and semantic video analysis to help to satisfy these needs. These works are developing condensed versions of a full length video stream through the identification of the most important and pertinent content within the stream. Most of the existing works in these areas are mainly focused on event mining. Event mining from video streams improves the accessibility and reusability of large media collections, and it has been an active area of research with notable recent progress. Event mining includes a wide range of multimedia domains such as surveillance, meetings, broadcast, news, sports, documentary, and films, as well as personal and online media collections. Due to the variety and plenty of Event mining techniques, in this paper we suggest an analytical framework to classify event mining techniques and to evaluate them based on important functional measures. This framework could lead to empirical and technical comparison of event mining methods and development of more efficient structures at future. 相似文献
997.
We propose a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector's underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector. Experiments with real malware and antivirus interfaces on Windows operating systems justify the effectiveness of our approach. 相似文献
998.
Recommender systems are powerful tools that allow companies to present personalized offers to their customers and defined as a system which recommends an appropriate product or service after learning the customers’ preferences and desires. Extracting users’ preferences through their buying behavior and history of purchased products is the most important element of such systems. Due to users’ unlimited and unpredictable desires, identifying their preferences is very complicated process. In most researches, less attention has been paid to user’s preferences varieties in different product categories. This may decrease quality of recommended items. In this paper, we introduced a technique of recommendation in the context of online retail store which extracts user preferences in each product category separately and provides more personalized recommendations through employing product taxonomy, attributes of product categories, web usage mining and combination of two well-known filtering methods: collaborative and content-based filtering. Experimental results show that proposed technique improves quality, as compared to similar approaches. 相似文献
999.
Javidan Kazemi Kordestani Ali Ahmadi Mohammad Reza Meybodi 《Applied Intelligence》2014,41(4):1150-1169
A new variant of Differential Evolution (DE), called ADE-Grid, is presented in this paper which adapts the mutation strategy, crossover rate (CR) and scale factor (F) during the run. In ADE-Grid, learning automata (LA), which are powerful decision making machines, are used to determine the proper value of the parameters CR and F, and the suitable strategy for the construction of a mutant vector for each individual, adaptively. The proposed automata based DE is able to maintain the diversity among the individuals and encourage them to move toward several promising areas of the search space as well as the best found position. Numerical experiments are conducted on a set of twenty four well-known benchmark functions and one real-world engineering problem. The performance comparison between ADE-Grid and other state-of-the-art DE variants indicates that ADE-Grid is a viable approach for optimization. The results also show that the proposed ADE-Grid improves the performance of DE in terms of both convergence speed and quality of final solution. 相似文献
1000.
In this paper, the problem of fault detection for continuous‐time switched systems under asynchronous switching is investigated. The designed fault detection filter is assumed to be asynchronous with the original systems. Attention is focused on designing a fault detection filter such that the estimation error between the residual and the fault is minimized in the sense of H ∞ norm. By employing piecewise Lyapunov function and average dwell time techniques, a sufficient condition for the existence of such a filter is exploited in terms of certain linear matrix inequalities. Finally, an example of a switched electrical circuit is provided to illustrate the effectiveness of the proposed approach. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献