全文获取类型
收费全文 | 3332篇 |
免费 | 199篇 |
国内免费 | 17篇 |
专业分类
电工技术 | 50篇 |
综合类 | 8篇 |
化学工业 | 830篇 |
金属工艺 | 58篇 |
机械仪表 | 130篇 |
建筑科学 | 74篇 |
矿业工程 | 2篇 |
能源动力 | 275篇 |
轻工业 | 316篇 |
水利工程 | 21篇 |
石油天然气 | 39篇 |
无线电 | 375篇 |
一般工业技术 | 660篇 |
冶金工业 | 119篇 |
原子能技术 | 20篇 |
自动化技术 | 571篇 |
出版年
2024年 | 15篇 |
2023年 | 104篇 |
2022年 | 212篇 |
2021年 | 271篇 |
2020年 | 191篇 |
2019年 | 189篇 |
2018年 | 233篇 |
2017年 | 180篇 |
2016年 | 207篇 |
2015年 | 130篇 |
2014年 | 200篇 |
2013年 | 296篇 |
2012年 | 177篇 |
2011年 | 188篇 |
2010年 | 143篇 |
2009年 | 124篇 |
2008年 | 95篇 |
2007年 | 85篇 |
2006年 | 75篇 |
2005年 | 49篇 |
2004年 | 30篇 |
2003年 | 32篇 |
2002年 | 22篇 |
2001年 | 26篇 |
2000年 | 16篇 |
1999年 | 18篇 |
1998年 | 42篇 |
1997年 | 20篇 |
1996年 | 22篇 |
1995年 | 19篇 |
1994年 | 18篇 |
1993年 | 11篇 |
1992年 | 9篇 |
1991年 | 7篇 |
1990年 | 9篇 |
1989年 | 8篇 |
1988年 | 5篇 |
1987年 | 8篇 |
1986年 | 7篇 |
1985年 | 9篇 |
1984年 | 9篇 |
1983年 | 5篇 |
1981年 | 8篇 |
1980年 | 2篇 |
1979年 | 7篇 |
1978年 | 3篇 |
1977年 | 3篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1974年 | 2篇 |
排序方式: 共有3548条查询结果,搜索用时 0 毫秒
21.
Neural Processing Letters - The motivation behind this paper is to explore the issue of synchronization of fractional order neutral type fuzzy cellular neural networks with state feedback control.... 相似文献
22.
Multimedia Tools and Applications - Nowadays, web users frequently explore multimedia contents to satisfy their information needs. The exploration approaches usually provide linear interaction... 相似文献
23.
Ultra-high molecular weight polyethylene (UHMWPE) is extensively used in frictional applications due to its advanced wear resistance. This advanced polymer is reinforced with hard particulate fillers for further developments against wear conditions. Since elevated temperatures prevail in the service conditions, wear behavior of UHMWPE composites is an important issue for the engineering applications. In the present work, UHMWPE-based composites including silicon carbide (SiC) fillers were fabricated in a compression molding chamber. In the specimen preparation stage, molding pressure, filler amount, and filler particle size were varied to investigate the influence of these variables. Upon deciding the optimum parameters from the wear tests conducted at room temperature, the wear experiments were repeated for the optimum specimen at elevated temperatures, such as 40 and 60°C. According to the results, the wear behavior of the SiC/UHMWPE composites is heavily changed by the effect of elevated temperature. Adhesive effect is pronounced at elevated temperatures while the wear characteristics possess the abrasive effect in the sliding path. In addition, the composites exhibit an accelerated material loss as temperature increases during the frictional system. 相似文献
24.
Omar?N.?Al-BoeridiEmail author S.?M.?Syed Ahmad S.?P.?Koh 《Neural computing & applications》2015,26(6):1505-1513
An off-line handwriting recognition (OFHR) system is a computerized system that is capable of intelligently converting human handwritten data extracted from scanned paper documents into an equivalent text format. This paper studies a proposed OFHR for Malaysian bank cheques written in the Malay language. The proposed system comprised of three components, namely a character recognition system (CRS), a hybrid decision system and lexical word classification system. Two types of feature extraction techniques have been used in the system, namely statistical and geometrical. Experiments show that the statistical feature is reliable, accessible and offers results that are more accurate. The CRS in this system was implemented using two individual classifiers, namely an adaptive multilayer feed-forward back-propagation neural network and support vector machine. The results of this study are very promising and could generalize to the entire Malay lexical dictionary in future work toward scaled-up applications. 相似文献
25.
Ayesha Kulsoom Di Xiao Aqeel-ur-Rehman Syed Ali Abbas 《Multimedia Tools and Applications》2016,75(1):1-23
A novel image encryption algorithm in streaming mode is proposed which exhaustively employs an entire set of DNA complementary rules alongwith one dimensional chaotic maps. The proposed algorithm is highly efficient due to encrypting the subset of digital image which contains 92.125 % of information. DNA addition operation is carried out on this MSB part. The core idea of the proposed scheme is to scramble the whole image by means of piecewise linear chaotic map (PWLCM) followed by decomposition of image into most significant bits (MSB) and least significant bits (LSB). The logistic sequence is XORed with the decoded MSB and LSB parts separately and finally these two parts are combined to get the ciphered image. The parameters for PWLCM, logistic map and selection of different DNA rules for encoding and decoding of both parts of an image are derived from 128-bit MD5 hash of the plain image. Simulated experimental results in terms of quantitative and qualitative ways prove the encryption quality. Efficiency and robustness against different noises make the proposed cipher a good candidate for real time applications. 相似文献
26.
27.
Rotman lenses are used to obtain multiple beams from a single array. Although the beams produced by the feed antennas at focal points have no path length errors, the beams produced by feed antennas at off focal points may have large path length errors. These path length errors cause deterioration in the multiple beams. In this article, two novel methods are introduced to obtain feed curves which reduce the path length errors of off focal feed points significantly, compared with the commonly used circular and elliptical feed curves. The first method obtains feed curve points based on having zero path length error at three chosen points of the radiating array for each beam direction. The second method uses the particle swarm optimization method for obtaining optimum feed points for each beam direction. The results show that there is a very significant drop in the level of the maximum path length errors (in the order of about 1:4). © 2012 Wiley Periodicals, Inc. Int J RF and Microwave CAE 23: 634–638, 2013. 相似文献
28.
讨论了以基于前缀封闭集合的Heyting代数的直觉解释的线性μ-演算(IμTL)作为描述“假设-保证”的逻辑基础的问题,提出了一个基于IμTL的“假设-保证”规则.该规则比往常应用线性时序逻辑(LTL)作为规范语言的那些规则具有更好的表达能力,扩展了对形如“always ?”等安全性质的“假设-保证”的范围,具备更一般的“假设-保证”推理能力及对循环推理的支持. 相似文献
29.
Allon Rai Sangita Ale Syed S. Rizvi Aasia Riasat 《通讯和计算机》2009,6(10):37-43,53
With the tremendous applications of the wireless sensor network, self-localization has become one of the challenging subject matter that has gained attention of many researchers in the field of wireless sensor network. Localization is the process of assigning or computing the location of the sensor nodes in a sensor network. As the sensor nodes are deployed randomly, we do not have any knowledge about their location in advance. As a result, this becomes very important that they localize themselves as manual deployment of sensor node is not feasible. Also, in WSN the main problem is the power as the sensor nodes have very limited power source. This paper provides a novel solution for localizing the sensor nodes using controlled power of the beacon nodes such that we will have longer life of the beacon nodes which plays a vital role in the process of localization as it is the only special nodes that has the information about its location when they are deployed such that the remaining ordinary nodes can localize themselves in accordance with these beacon node. We develop a novel model that first finds the distance of the sensor nodes then it finds the location of the unknown sensor nodes in power efficient manner. Our simulation results show the effectiveness of the proposed methodology in terms of controlled and reduced power. 相似文献
30.
Adnan Hasan Bdair Aighuraibawi Selvakumar Manickam Rosni Abdullah Zaid Abdi Alkareem Alyasseri Ayman Khallel Dilovan Asaad Zebari Hussam Mohammed Jasim Mazin Mohammed Abed Zainb Hussein Arif 《计算机系统科学与工程》2023,47(1):553-574
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS. 相似文献