全文获取类型
收费全文 | 21836篇 |
免费 | 2163篇 |
国内免费 | 1071篇 |
专业分类
电工技术 | 1389篇 |
技术理论 | 1篇 |
综合类 | 1354篇 |
化学工业 | 3481篇 |
金属工艺 | 1353篇 |
机械仪表 | 1375篇 |
建筑科学 | 2071篇 |
矿业工程 | 617篇 |
能源动力 | 657篇 |
轻工业 | 1240篇 |
水利工程 | 384篇 |
石油天然气 | 1345篇 |
武器工业 | 143篇 |
无线电 | 2743篇 |
一般工业技术 | 2602篇 |
冶金工业 | 982篇 |
原子能技术 | 300篇 |
自动化技术 | 3033篇 |
出版年
2024年 | 126篇 |
2023年 | 392篇 |
2022年 | 781篇 |
2021年 | 1112篇 |
2020年 | 764篇 |
2019年 | 618篇 |
2018年 | 640篇 |
2017年 | 753篇 |
2016年 | 659篇 |
2015年 | 940篇 |
2014年 | 1120篇 |
2013年 | 1363篇 |
2012年 | 1416篇 |
2011年 | 1502篇 |
2010年 | 1360篇 |
2009年 | 1229篇 |
2008年 | 1213篇 |
2007年 | 1090篇 |
2006年 | 1181篇 |
2005年 | 1024篇 |
2004年 | 678篇 |
2003年 | 604篇 |
2002年 | 632篇 |
2001年 | 502篇 |
2000年 | 528篇 |
1999年 | 554篇 |
1998年 | 449篇 |
1997年 | 355篇 |
1996年 | 342篇 |
1995年 | 272篇 |
1994年 | 215篇 |
1993年 | 145篇 |
1992年 | 115篇 |
1991年 | 116篇 |
1990年 | 77篇 |
1989年 | 63篇 |
1988年 | 30篇 |
1987年 | 32篇 |
1986年 | 19篇 |
1985年 | 15篇 |
1984年 | 7篇 |
1983年 | 11篇 |
1982年 | 6篇 |
1981年 | 4篇 |
1980年 | 11篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1965年 | 1篇 |
1959年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
In this work, we have put forth two different protocols to address a concrete secure multi-party computational (MPC) problem related to a triangle, of which the coordinates of the three vertices are confidentially kept by the three participants, respectively. The three parties wish to collaboratively compute the area of this triangle while preserving their own coordinate privacy. As one of the merits, our protocols employ weaker assumptions of the existence of pseudorandom generators. In particular, unlike massive secure MPC protocols that rely a lot on oblivious transfer, ours utilize a new computing idea called “pseudorandom-then-rounding” method to avoid this burdensome obstacle. The two protocols are based on different theorems, while they both make use of the same underlying idea. At last, we provide a detailed proof for the first protocol by a series of security reductions of our newly defined games, which seems somewhat stronger than the previous simulation-based proofs and a proof sketch for the second one. Analysis and discussion about the reasons are provided as well to round off our work. 相似文献
22.
23.
在ASP.NET 2.0中自动化构建数据访问层 总被引:2,自引:0,他引:2
龚赤兵 《计算机应用与软件》2009,26(6):141-142,180
使用ASP.NET2.0所提供的BuildProvider类,将自动化构建的数据访问层源代码编译到程序集中,使得开发者利用Ob-jectDataSource控件,可以简单、快速地实现三层架构的Web应用。 相似文献
24.
光交箱端口状态对通信网络的正常运行具有重要作用,由于光交箱内部布线杂乱,容易对端口产生排线遮挡问题,导致传统的光交箱端口图像识别操作不便。文中提出了一种基于AR技术的光交箱资源校准技术,该技术可以对实时视频自适应选取关键帧,然后对关键帧进行光交箱端口状态和文字识别,最后返回加权融合后的识别结果,并利用实时AR交互指引巡检人员处理被遮挡端口,这不仅能提升巡检人员的工作效率,还能提高实时识别准确率。将该校准技术应用到光交箱端口的智能检测中,能对光交箱的端口识别提供极大便利。 相似文献
25.
To evaluate the impact of zinc sulfate (ZnSO4) concentration on the structural properties of the films, Cd1-xZnxS thin films were formed on glass substrates using chemical bath deposition (CBD) in this study. The effect of ZnSO4 precursor concentration on the surface morphology, optical properties, and morphological structure of the Cd1-xZnxS films was investigated. To study the impact of zinc doping content on the performance metrics of Cu(In1-xGax)Se2 (CIGS) cells in the experimental group and to improve the buffer layer thickness, simulations were run using one-dimensional solar cell capacitance simulator (SCAPS-1D) software. 相似文献
26.
Gong Biyao Xing Tianzhang Liu Zhidan Wang Junfeng Liu Xiuya 《Mobile Networks and Applications》2022,27(4):1520-1530
Mobile Networks and Applications - Although federated learning has been widely used in collaborative training of machine learning models, its practical uses are still challenged by heterogeneous... 相似文献
27.
Zhang Tianheng Zhao Jianli Sun Qiuxia Zhang Bin Chen Jianjian Gong Maoguo 《Applied Intelligence》2022,52(7):7761-7776
Applied Intelligence - In recent years, low-rank tensor completion has been widely used in color image recovery. Tensor Train (TT), as a balanced tensor rank minimization method, has achieved good... 相似文献
28.
29.
Let G1 and G2 be two connected graphs. The Kronecker product G1×G2 has vertex set V(G1×G2)=V(G1)×V(G2) and the edge set . In this paper, we show that if G is a bipartite graph with κ(G)=δ(G), then G×Kn(n?3) is super-κ. 相似文献
30.
Artificial immune systems (AIS) are computational systems inspired by the principles and processes of the vertebrate immune system. The AIS‐based algorithms typically exploit the immune system's characteristics of learning and adaptability to solve some complicated problems. Although, several AIS‐based algorithms have proposed to solve multi‐objective optimization problems (MOPs), little focus have been placed on the issues that adaptively use the online discovered solutions. Here, we proposed an adaptive selection scheme and an adaptive ranks clone scheme by the online discovered solutions in different ranks. Accordingly, the dynamic information of the online antibody population is efficiently exploited, which is beneficial to the search process. Furthermore, it has been widely approved that one‐off deletion could not obtain excellent diversity in the final population; therefore, a k‐nearest neighbor list (where k is the number of objectives) is established and maintained to eliminate the solutions in the archive population. The k‐nearest neighbors of each antibody are founded and stored in a list memory. Once an antibody with minimal product of k‐nearest neighbors is deleted, the neighborhood relations of the remaining antibodies in the list memory are updated. Finally, the proposed algorithm is tested on 10 well‐known and frequently used multi‐objective problems and two many‐objective problems with 4, 6, and 8 objectives. Compared with five other state‐of‐the‐art multi‐objective algorithms, namely NSGA‐II, SPEA2, IBEA, HYPE, and NNIA, our method achieves comparable results in terms of convergence, diversity metrics, and computational time. 相似文献