全文获取类型
收费全文 | 103847篇 |
免费 | 11620篇 |
国内免费 | 7297篇 |
专业分类
电工技术 | 9147篇 |
技术理论 | 2篇 |
综合类 | 9608篇 |
化学工业 | 13308篇 |
金属工艺 | 6828篇 |
机械仪表 | 7349篇 |
建筑科学 | 8051篇 |
矿业工程 | 3672篇 |
能源动力 | 3128篇 |
轻工业 | 8860篇 |
水利工程 | 3211篇 |
石油天然气 | 4530篇 |
武器工业 | 1367篇 |
无线电 | 11970篇 |
一般工业技术 | 9928篇 |
冶金工业 | 4642篇 |
原子能技术 | 1543篇 |
自动化技术 | 15620篇 |
出版年
2024年 | 499篇 |
2023年 | 1491篇 |
2022年 | 3204篇 |
2021年 | 4384篇 |
2020年 | 3248篇 |
2019年 | 2417篇 |
2018年 | 2676篇 |
2017年 | 3230篇 |
2016年 | 3049篇 |
2015年 | 4446篇 |
2014年 | 5722篇 |
2013年 | 6633篇 |
2012年 | 8383篇 |
2011年 | 8751篇 |
2010年 | 8285篇 |
2009年 | 7936篇 |
2008年 | 7933篇 |
2007年 | 7613篇 |
2006年 | 6700篇 |
2005年 | 5464篇 |
2004年 | 4095篇 |
2003年 | 3462篇 |
2002年 | 3549篇 |
2001年 | 3221篇 |
2000年 | 2023篇 |
1999年 | 1253篇 |
1998年 | 615篇 |
1997年 | 547篇 |
1996年 | 451篇 |
1995年 | 345篇 |
1994年 | 271篇 |
1993年 | 186篇 |
1992年 | 132篇 |
1991年 | 108篇 |
1990年 | 95篇 |
1989年 | 79篇 |
1988年 | 45篇 |
1987年 | 41篇 |
1986年 | 28篇 |
1985年 | 10篇 |
1984年 | 14篇 |
1983年 | 20篇 |
1982年 | 14篇 |
1981年 | 16篇 |
1980年 | 26篇 |
1979年 | 9篇 |
1978年 | 6篇 |
1977年 | 5篇 |
1959年 | 12篇 |
1951年 | 14篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
81.
82.
In this paper, a single-iteration strategy is proposed for the design of a multi-loop PI controller to achieve the desired gain and phase margins for two-input and two-output (TITO) processes. To handle loop interactions, a TITO system is converted into two equivalent single loops with uncertainties drawn from interactions. The maximum uncertainty is estimated for the initial controller design in one loop and single-input and single-output (SISO) controller design is applied. This controller is substituted to other equivalent loop for design, and finally, the first loop controller is refined on knowledge of other loop controller. For SISO controller tuning, a new method is presented to determine the achievable gain and phase margins as well as the relevant controller parameters. Examples are given for illustration and comparison. 相似文献
83.
Contaminant intrusion in a water distribution network is a complex but a commonly observed phenomenon, which depends on three elements – a pathway, a driving force and a contamination source. However, the data on these elements are generally incomplete, non-specific and uncertain. In an earlier work, Sadiq, Kleiner, and Rajani (2006) have successfully applied traditional Dempster–Shafer theory (DST) to estimate the “risk” of contaminant intrusion in a water distribution network based on limited uncertain information. However, the method used for generating basic probability assignment (BPA) was not very flexible, and did not handle and process uncertain information effectively. In this paper, a more pragmatic method is proposed that utilizes “soft” computing flexibility to generate BPAs from uncertain information. This paper compares these two methods through numerical examples, and demonstrates the efficiency and effectiveness of modified method. 相似文献
84.
85.
For motion compensated de-interlace, the accuracy and reliability of the motion vectors have a significant impact on the performance
of the motion compensated interpolation. In order to improve the robustness of motion vector, a novel motion estimation algorithm
with center-biased diamond search and its parallel VLSI architecture are proposed in this paper. Experiments show that it
works better than conventional motion estimation algorithms in terms of motion compensation error and robustness, and its
architecture overcomes the irregular data flow and achieves high efficiency. It also efficiently reuses data and reduces the
control overhead. So, it is highly suitable for HDTV applications. 相似文献
86.
In this paper, we propose a general optimization-based model for classification. Then we show that some well-known optimization-based methods for classification, which were developed by Shi et al. [Data mining in credit card portfolio management: a multiple criteria decision making approac. In: Koksalan M, Zionts S, editors. Multiple criteria decision making in the new millennium. Berlin: Springer; 2001. p. 427–36] and Freed and Glover [A linear programming approach to the discriminant problem. Decision Sciences 1981; 12: 68–79; Simple but powerful goal programming models for discriminant problems. European Journal of Operational Research 1981; 7: 44–60], are special cases of our model. Moreover, three new models, MCQP (multi-criteria indefinite quadratic programming), MCCQP (multi-criteria concave quadratic programming) and MCVQP (multi-criteria convex programming), are developed based on the general model. We also propose algorithms for MCQP and MCCQP, respectively. Then we apply these models to three real-life problems: credit card accounts, VIP mail-box and social endowment insurance classification. Extensive experiments are done to compare the efficiency of these methods. 相似文献
87.
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles 总被引:1,自引:0,他引:1
DENG Robert 《中国科学:信息科学(英文版)》2010,(3):593-606
Up to now, it is still an open question of how to construct a chosen-ciphertext secure unidirectional proxy re-encryption scheme in the adaptive corruption model. To address this problem, we propose a new unidirectional proxy re-encryption scheme, and prove its chosen-ciphertext security in the adaptive corruption model without random oracles. Compared with the best known unidirectional proxy re-encryption scheme proposed by Libert and Vergnaud in PKC’08, our scheme enjoys the advantages of both higher effi... 相似文献
88.
89.
90.