全文获取类型
收费全文 | 12815篇 |
免费 | 685篇 |
国内免费 | 42篇 |
专业分类
电工技术 | 171篇 |
综合类 | 15篇 |
化学工业 | 2685篇 |
金属工艺 | 450篇 |
机械仪表 | 939篇 |
建筑科学 | 230篇 |
矿业工程 | 3篇 |
能源动力 | 439篇 |
轻工业 | 1106篇 |
水利工程 | 83篇 |
石油天然气 | 13篇 |
无线电 | 2347篇 |
一般工业技术 | 2745篇 |
冶金工业 | 707篇 |
原子能技术 | 167篇 |
自动化技术 | 1442篇 |
出版年
2024年 | 13篇 |
2023年 | 165篇 |
2022年 | 232篇 |
2021年 | 441篇 |
2020年 | 283篇 |
2019年 | 327篇 |
2018年 | 367篇 |
2017年 | 420篇 |
2016年 | 458篇 |
2015年 | 381篇 |
2014年 | 556篇 |
2013年 | 826篇 |
2012年 | 833篇 |
2011年 | 1015篇 |
2010年 | 735篇 |
2009年 | 782篇 |
2008年 | 722篇 |
2007年 | 569篇 |
2006年 | 494篇 |
2005年 | 446篇 |
2004年 | 413篇 |
2003年 | 368篇 |
2002年 | 383篇 |
2001年 | 292篇 |
2000年 | 261篇 |
1999年 | 244篇 |
1998年 | 363篇 |
1997年 | 237篇 |
1996年 | 179篇 |
1995年 | 123篇 |
1994年 | 111篇 |
1993年 | 91篇 |
1992年 | 65篇 |
1991年 | 56篇 |
1990年 | 50篇 |
1989年 | 57篇 |
1988年 | 30篇 |
1987年 | 39篇 |
1986年 | 18篇 |
1985年 | 30篇 |
1984年 | 16篇 |
1983年 | 7篇 |
1982年 | 8篇 |
1981年 | 10篇 |
1980年 | 3篇 |
1979年 | 2篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 5篇 |
1973年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
161.
We present a secure routing protocol that is immune to Sybil attacks and that can tolerate collusion of Byzantine routers. It can tolerate either initial collusion of Byzantine routers or runtime collusion of non-adjacent Byzantine routers, both in the absence of runtime collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also simultaneously tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, it guarantees a bound on the difference between the calculated distance and the actual shortest distance. The bound depends on the number of Byzantine routers on a path. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes. 相似文献
162.
163.
164.
Output feedback regulation of upper triangular nonlinear systems with uncertain time‐varying delays in states and input 下载免费PDF全文
In this paper, an output feedback controller is studied to regulate a class of upper triangular nonlinear systems with uncertain time‐varying delays. The key features of our considered system are that there are uncertain time‐varying delays in both states and input and the high‐order nonlinearity is in a more relaxed form over the previous results. Theoretical analysis and numerical example are presented to show the benefits of our controller. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
165.
166.
Lee Jae-Gu Choi Kyung-Chan Yeon Seung-Ho Kim Jeong Won Ko Young-Woong 《Multimedia Tools and Applications》2017,76(23):25477-25494
Multimedia Tools and Applications - In digital pathology, image similarity algorithms are used to find cancer in tissue cells from medical images. However, it is very difficult to apply image... 相似文献
167.
Jino Heo Min-Sung Kang Chang-Ho Hong Hyeon Yang Seong-Gon Choi 《Quantum Information Processing》2017,16(1):24
We propose quantum information processing schemes based on cavity quantum electrodynamics (QED) for quantum communication. First, to generate entangled states (Bell and Greenberger–Horne–Zeilinger [GHZ] states) between flying photons and three-level atoms inside optical cavities, we utilize a controlled phase flip (CPF) gate that can be implemented via cavity QED). Subsequently, we present an entanglement swapping scheme that can be realized using single-qubit measurements and CPF gates via optical cavities. These schemes can be directly applied to construct an entanglement channel for a communication system between two users. Consequently, it is possible for the trust center, having quantum nodes, to accomplish the linked channel (entanglement channel) between the two separate long-distance users via the distribution of Bell states and entanglement swapping. Furthermore, in our schemes, the main physical component is the CPF gate between the photons and the three-level atoms in cavity QED, which is feasible in practice. Thus, our schemes can be experimentally realized with current technology. 相似文献
168.
This work suggests a method for systematically constructing a software-level environment model for safety checking automotive operating systems by introducing a constraint specification language, OSEK_CSL. OSEK_CSL is designed to specify the usage constraints of automotive operating systems using a pre-defined set of constraint types identified from the international standard OSEK/VDX. Each constraint specified in OSEK_CSL is interpreted as either a regular language or a context-free language that can be checked by a finite automaton or a pushdown automaton. The set of usage constraints is used to systematically classify the universal usage model of OSEK-/VDX-based operating systems and to generate test sequences with varying degrees of constraint satisfaction using LTL model checking. With pre-defined constraint patterns and the full support of automation, test engineers can choose the degree of constraint satisfaction and generate test cases using combinatorial intersections of selected constraints that cover all corner cases classified by constraints. A series of experiments on an open-source automotive operating system show that our approach finds safety issues more effectively than conventional specification-based testing, scenario-based testing, and conformance testing. 相似文献
169.
Target sales rebate (TSR) contracts have been shown to be useful in coordinating supply chains with risk-neutral agents. However, there have been few studies on the cases with risk sensitive agents. As a result, based on the classic Markowitz portfolio theory in finance, we carry out in this paper a mean–variance (MV) analysis of supply chains under TSR contracts. We study a supply chain with a single supplier and a single risk averse retailer. We propose TSR contracts for achieving coordination. We demonstrate how TSR contracts can coordinate the supply chain which takes into consideration the degree of risk aversion of the retailer. We find that the supplier can coordinate the channel with flexible TSR contracts. In addition, we extend the supply chain model to include sales effort decision of the retailer. Conditions for TSR contracts to coordinate the supply chain with sales effort of retailer are also derived. 相似文献
170.
We propose a novel 2D image-based approach that can simultaneously handle illumination and pose variations to enhance face recognition rate. It is much simpler, requires much less computational effort than the methods based on 3D models, and provides a comparable or better recognition rate. 相似文献