全文获取类型
收费全文 | 4022篇 |
免费 | 238篇 |
国内免费 | 23篇 |
专业分类
电工技术 | 77篇 |
综合类 | 14篇 |
化学工业 | 1019篇 |
金属工艺 | 75篇 |
机械仪表 | 110篇 |
建筑科学 | 157篇 |
矿业工程 | 11篇 |
能源动力 | 326篇 |
轻工业 | 463篇 |
水利工程 | 49篇 |
石油天然气 | 33篇 |
无线电 | 480篇 |
一般工业技术 | 692篇 |
冶金工业 | 157篇 |
原子能技术 | 26篇 |
自动化技术 | 594篇 |
出版年
2024年 | 15篇 |
2023年 | 106篇 |
2022年 | 197篇 |
2021年 | 305篇 |
2020年 | 206篇 |
2019年 | 187篇 |
2018年 | 254篇 |
2017年 | 241篇 |
2016年 | 226篇 |
2015年 | 153篇 |
2014年 | 228篇 |
2013年 | 348篇 |
2012年 | 263篇 |
2011年 | 311篇 |
2010年 | 192篇 |
2009年 | 198篇 |
2008年 | 128篇 |
2007年 | 113篇 |
2006年 | 77篇 |
2005年 | 55篇 |
2004年 | 51篇 |
2003年 | 55篇 |
2002年 | 39篇 |
2001年 | 31篇 |
2000年 | 25篇 |
1999年 | 23篇 |
1998年 | 28篇 |
1997年 | 26篇 |
1996年 | 25篇 |
1995年 | 26篇 |
1994年 | 21篇 |
1993年 | 11篇 |
1992年 | 14篇 |
1991年 | 8篇 |
1990年 | 9篇 |
1989年 | 7篇 |
1988年 | 5篇 |
1987年 | 4篇 |
1986年 | 9篇 |
1985年 | 10篇 |
1984年 | 11篇 |
1983年 | 10篇 |
1982年 | 10篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1972年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有4283条查询结果,搜索用时 15 毫秒
91.
Hasan Çimen 《Advances in Engineering Software》2009,40(8):751-758
In this study, structured singular values are used in a different way from those commonly used in the robust control literature. It is shown that subject to conditions based on structured singular values, each local area controller can be designed independently. A MATLAB? program is developed to plot inverse structured singular values of multi input multi output (MIMO) system relative error matrix. This plot can be used to predict the stability of the global system with decentralised controller. Therefore decentralised controller design problem can be translated into an equivalent problem of decentralized controller design for a MIMO control system. 相似文献
92.
Mohsin Bilal Hasan Mujtaba Muhammad Arfan Jaffar 《Multimedia Tools and Applications》2016,75(11):6533-6548
We propose a modified particle swarm optimization (MPSO) based method for Pseudo De-convolution of the ill-posed inverse problem namely, the space-variant image degradation (SVD). In this paper, SVD is simulated by the pseudo convolution of different sub-regions of the image with different known blurring kernels and additive random noise with unknown variance. Two heuristic modifications are proposed in PSO: 1) Initialization of the swarm and 2) Mutation of the global best. Fuzzy logic is applied for the computation of regularization parameter (RP) to cater for the sensitivity of the problem. The computation of RP is crucial due to the additive noise in the SVD image. Thus mathematical morphology (MM) is applied for better extraction of spatial activity from the distorted image. The performance of the proposed method is evaluated with different test images and noise powers. Comparative analysis demonstrates the superiority of proposed restoration, in terms of quantitative measures, over well-known existing and state-of-the-art SVD approaches. 相似文献
93.
The security of cryptographic systems is a major concern for cryptosystem designers, even though cryptography algorithms have been improved. Side-channel attacks, by taking advantage of physical vulnerabilities of cryptosystems, aim to gain secret information. Several approaches have been proposed to analyze side-channel information, among which machine learning is known as a promising method. Machine learning in terms of neural networks learns the signature (power consumption and electromagnetic emission) of an instruction, and then recognizes it automatically. In this paper, a novel experimental investigation was conducted on field-programmable gate array (FPGA) implementation of elliptic curve cryptography (ECC), to explore the efficiency of side-channel information characterization based on a learning vector quantization (LVQ) neural network. The main characteristics of LVQ as a multi-class classifier are that it has the ability to learn complex non-linear input-output relationships, use sequential training procedures, and adapt to the data. Experimental results show the performance of multi-class classification based on LVQ as a powerful and promising approach of side-channel data characterization. 相似文献
94.
Berna?Tektas?Sivrikaya Ferhan?Cebi Hasan?Hüseyin?Turan Nihat?Kasap Dursun?DelenEmail author 《Information Systems Frontiers》2017,19(5):975-991
We study the long-term generation capacity investment problem of an independent power generation company (GenCo) that functions in an environment where GenCos perform business with both bilateral contracts (BC) and transactions in the day-ahead market (DAM). A fuzzy mixed integer linear programming model with a fuzzy objective and fuzzy constraints is developed to incorporate the impacts of imprecision/uncertainty in the economic environment on the calculation of the optimal value of the GenCo’s objective function. In formulating the fuzzy objective function we also include the potential impacts of climate change on the energy output of hydroelectric power plants. In addition to formulating and solving the capacity planning/investment problem, we also performed scenario-based (sensitivity) analysis to explore how investment decisions of the GenCos change when fuzziness (tolerance) in the maximum energy output of hydroelectric units and/or drought expectation increases. The proposed model is novel and investigates the effects of factors like drought expectations of climate changes, hydroelectric power plant investments, and other power generation technology investment options. 相似文献
95.
Sedigheh Moghavvemi Tanuosha Paramanathan Nurliana Md Rahin Manal Sharabati 《Behaviour & Information Technology》2017,36(10):1081-1100
Research on utilising social networks for teaching and learning is relatively scarce in the context of information systems. There is far more emphasis on studying the usage of social networks towards fulfilling individuals’ basic social needs. This study uses the unified theory of acceptance and use of technology (UTAUT2) to analyse students’ intention to use and use of e-learning via Facebook. It incorporates playfulness into the UTAUT2 model and categorises the determinants of intention to use e-learning via Facebook into three categories, namely, hedonic values, utilitarian values, and communication values. The data were collected in a two-stage survey from 170 undergraduate students, and the model was tested using structural equation modelling. We found that hedonic motivation, perceived playfulness, and performance expectancy were strong determinants of students’ intention to use e-learning, while habit and facilitating conditions all positively affected students’ use of e-learning via Facebook. The results of this study report new knowledge that academic institutions can utilise to create appropriate e-learning environments for teaching and learning. A number of theoretical and managerial implications for universities’ implementation technologies were also identified. 相似文献
96.
97.
Adi Md Sikin Markus Walkling-Ribeiro Syed S. H. Rizvi 《Food and Bioprocess Technology》2017,10(12):2132-2145
Individual and combined effects of high pressure nitrous oxide (HPN2O), heat, and antimicrobials on the inactivation of Escherichia coli, Listeria innocua, and Bacillus atrophaeus endospores in milk were all evaluated after 20-min treatments. Stand-alone milk treatments with HPN2O (15.2 MPa), heat (45 and 65 °C), or nisin (50 and 150 IU mL?1) resulted in log10 reductions ranging only from 0.1 to 2.1 for E. coli and L. innocua. Combining HPN2O (15.2 MPa) with heat (65 °C) inactivated 6.0 and 5.1 log10 in the vegetative bacteria, respectively. Similarly, reductions of 5.9 and ≥ 6.0 log10 of respective E. coli and L. innocua cells in milk were achieved through a combination of HPN2O (15.2 MPa), heat (65 °C), and nisin (150 IU mL?1). A 2.5 log10 cycle inactivation of spores was obtained by HPN2O, nisin (at both 50 and 150 IU mL?1), and lysozyme (50 μg mL?1) at 85 °C. Combining these processing techniques resulted in significantly greater microbial inactivation (p < 0.05) than the sum of individual reductions from each treatment alone, indicating synergistic effects. HPN2O irrespective of processing temperatures did not cause any occurrence of sub-lethally injured cells or disruption in colloidal stability of milk at 65 and 85 °C (p ≥ 0.05). Color and pH changes in milk following the most demanding treatment conditions were minimal. 相似文献
98.
Ladislav J. Kohout Isabel Stabile Hasan Kalantar F. San-Andres John Anderson 《Reliable Computing》1995,1(2):109-140
The paper continues a series of papers and a monograph [33], where we have described the conceptual structures as well as the basic architecture of a knowledge-based systemCunaid. 相似文献
99.
Cellular automata are used to model dynamical phenomena by focusing on their local behavior which depends on the neighboring cells in order to express their global behavior. The geometrical structure of the models suggests the algebraic structure of cellular automata. After modeling the dynamical phenomena, it is sometimes an important problem to be able to move backwards in order to understand it better. This is only possible if cellular automata is reversible. In this paper, 2D finite cellular automata defined by local rules based on hexagonal cell structure are studied. Rule matrix of the hexagonal finite cellular automaton is obtained. The rank of rule matrices representing the 2D hexagonal finite cellular automata via an algorithm is computed. It is a well known fact that determining the reversibility of a 2D cellular automata is a very difficult problem in general. Here, the reversibility problem of this family of 2D hexagonal cellular automata is also resolved completely. 相似文献
100.
The calculation of the degree d of an approximate greatest common divisor of two inexact polynomials f(y) and g(y) reduces to the determination of the rank loss of a resultant matrix, the entries of which are functions of the coefficients of f(y) and g(y). This paper considers this issue by describing two methods to calculate d, such that knowledge of the noise level imposed on the coefficients of f(y) and g(y) is not assumed. One method uses the residual of a linear algebraic equation whose coefficient matrix and right hand side vector are derived from the Sylvester resultant matrix S(f,g), and the other method uses the first principal angle between a line and a hyperplane, the equations of which are calculated from S(f,g). Computational results on inexact polynomials whose exact forms have multiple roots of high degree are shown and very good results are obtained. These results are compared with the rank loss of S(f,g) for the calculation of d, and it is shown that this method yields incorrect results for these examples. 相似文献