全文获取类型
收费全文 | 93254篇 |
免费 | 5245篇 |
国内免费 | 1432篇 |
专业分类
电工技术 | 2455篇 |
综合类 | 2044篇 |
化学工业 | 17257篇 |
金属工艺 | 3730篇 |
机械仪表 | 5042篇 |
建筑科学 | 4330篇 |
矿业工程 | 672篇 |
能源动力 | 3308篇 |
轻工业 | 6220篇 |
水利工程 | 748篇 |
石油天然气 | 2056篇 |
武器工业 | 212篇 |
无线电 | 14814篇 |
一般工业技术 | 16277篇 |
冶金工业 | 7992篇 |
原子能技术 | 1084篇 |
自动化技术 | 11690篇 |
出版年
2024年 | 178篇 |
2023年 | 1001篇 |
2022年 | 1673篇 |
2021年 | 2566篇 |
2020年 | 1879篇 |
2019年 | 1774篇 |
2018年 | 2180篇 |
2017年 | 2330篇 |
2016年 | 2584篇 |
2015年 | 2467篇 |
2014年 | 3583篇 |
2013年 | 5600篇 |
2012年 | 5332篇 |
2011年 | 6227篇 |
2010年 | 4909篇 |
2009年 | 5121篇 |
2008年 | 4855篇 |
2007年 | 4318篇 |
2006年 | 4159篇 |
2005年 | 3646篇 |
2004年 | 3050篇 |
2003年 | 2792篇 |
2002年 | 2708篇 |
2001年 | 2206篇 |
2000年 | 2175篇 |
1999年 | 2247篇 |
1998年 | 3299篇 |
1997年 | 2328篇 |
1996年 | 2088篇 |
1995年 | 1663篇 |
1994年 | 1284篇 |
1993年 | 1195篇 |
1992年 | 836篇 |
1991年 | 761篇 |
1990年 | 685篇 |
1989年 | 591篇 |
1988年 | 485篇 |
1987年 | 384篇 |
1986年 | 348篇 |
1985年 | 298篇 |
1984年 | 263篇 |
1983年 | 197篇 |
1982年 | 202篇 |
1981年 | 159篇 |
1980年 | 160篇 |
1979年 | 121篇 |
1978年 | 106篇 |
1977年 | 143篇 |
1976年 | 183篇 |
1975年 | 87篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
在互联网发展的基础上,物联网可将信息的交流与沟通扩展到任何物体与物体之间,故其将成为新媒体时代改变人类生活的新变量。在探索智能化信息交互与设计的过程中,文章紧跟物联网的发展趋势,不断思索物联网的崛起给新媒体时代的文化、生产与生活带来的需求、挑战与可能性,同时指出了在这样的背景下,物联网这个新媒体时代的新形势对信息设计所带来的新启示。 相似文献
992.
目前在互联网上有海量的室外场景照片,它们不仅内容覆盖面广,对同一场景有大量不同视点和光照条件下的采样,而且获取成本很低.如何利用这些照片中包含的丰富场景信息,快速、方便地构造各种逼真的虚拟场景,是互联网迅猛发展给虚拟现实、计算机图形学和计算机视觉带来的新的研究课题之一.文中分析、总结了近年来国内外互联网图像的真实场景几何建模、自然光照建模和材质反射属性建模的最新研究进展,并对其未来的发展趋势提出了一些看法. 相似文献
993.
城市建筑点云的自适应分割方法 总被引:1,自引:0,他引:1
自动地提取城市建筑点云数据中的高层次结构是城市数字化等应用的重要基础步骤.通过提出"自适应分割"的概念来自动地获取三维城市建筑点云的一种灵活、层次化的结构表示.由于城市建筑的单元分布大都呈一种级联或者交错的形式,与之前采用全局规则格点进行分析的方法不同,文中采用一种自适应的方法对建筑点云进行分析;也可将自适应分割的概念用于建筑图像的分析上.最后给出了在不同类型的建筑点云和图像进行分析的结果以及一些相关的应用. 相似文献
994.
根据南通大学独立学院培养应用型人才的目标,学院对高级语言程序设计课程提出了新的要求.为了进行课程改革,文章详细分析了高级语言程序设计课程存在的问题,提出了拟编新教材的具体方案,总结了新编教材所应具备的特色. 相似文献
995.
Alexander Gatch Dimitry Gorsky Zy Biesinger Eric Bruestle Kelley Lee Curt Karboski Meredith L. Bartron Tyler Wagner 《Journal of Great Lakes research》2021,47(2):486-493
Restoration of a wild-produced lake trout Salvelinus namaycush population in Lake Ontario has not been successful despite the adult population often meeting or exceeding restoration targets. Lack of high-quality spawning habitat in Lake Ontario is suggested as one impediment to recruitment of wild lake trout, although the quantity and location of spawning habitat is poorly understood. If high-quality spawning habitat is limited in Lake Ontario, lake trout may be using uncommon spawning locations such as rivers. Anecdotal angler accounts point to the Niagara River as a lake trout spawning location. To better understand the potential of the Niagara River as a spawning location, egg and juvenile fish collections were conducted 12–14 river kilometers from the mouth of the Niagara River from 2010 to 2012; and mature female lake trout with surgically implanted acoustic tags were monitored from 2015 to 2019. Genetic analyses confirmed 60% of collected eggs and 93% of collected post-hatch juvenile fish in the Niagara River were lake trout. Tagged female lake trout returned to the Niagara River over consecutive years during the spawning season. The short duration of lake trout presence in the river (mean = 56 days/year) suggests female lake trout use the Niagara River primarily for spawning. Diversity in spawning locations may provide lake trout population’s resilience against environmental variability through a portfolio effect. Improved identification of riverine spawning locations, including their overall contribution to wild recruitment, may be a useful tool for managers to restore a wild-produced population of lake trout in Lake Ontario. 相似文献
996.
Greer Robert A. Lee Kyungsun Fencl Amanda Sneegas Gretchen 《Water Resources Management》2021,35(11):3497-3511
Water Resources Management - Public–private partnerships (PPPs) have grown in popularity as a method to leverage private sector actors in the production of government services. With the... 相似文献
997.
A knowledge-based system (KBS) for diagnosis of multiple defects in injection molding is presented. The general scheme for knowledge representation based on fuzzy set theory has been shown useful in representing inexact and incomplete information for developing the KBS. An optimality criterion is created for selecting a simple and best cover to explain the given problem. An efficient search algorithm for finding such cover is also discussed. 相似文献
998.
Moon Ho Lee Jong Oh Park Yasuhiko Yasuda 《Multidimensional Systems and Signal Processing》1990,1(4):389-398
in this paper, simple 1-D and 2-D systolic array for realizing the discrete cosine transform (DCT) based on the discrete Fourier transform (DFT) fo an input sequence are presented. The proposed arrays are obtained by a simple modified DFT (MDFT) and an inverse DFT (IDFT) version of the Goertzel algorithm combined with Kung's approach. The 1-D array requiresN cells, one multiplier and takesN clock cycles to produce a completeN-point DCT. The 2-D array takes N clock cycles, faster than the 1-D array, but the area complexity is larger. A continuous flow of input data is allowed and no idle time is required between the input sequences. 相似文献
999.
Several Ni-Al-Mo-based eutectic superalloys were rapidly solidified using a chilled block melt spinning process. The effects of rapid solidification on the microstructure were studied using optical microscopy, transmission electron microscopy (TEM), and scanning transmission electron microscopy (STEM). Results showed, except for the alloy containing chromium, that the microstructure varied as a function of ribbon thickness from segregationless solidification at the wheel side of the ribbon to dendritic solidification at the free side. In addition, alloys with the same solidification rate showed a large variation in microstructure depending upon the solid state cooling rate. The rapidly solidified eutectic Ni-Al-Mo alloy with a small amount of rhenium and vanadium did not show any improvement on delaying or prohibiting the formation of the embrittling-NiMo phase on ageing at 1000 C. This was determined from microstructural as well as chemical analysis using STEM. Differential thermal analysis was used to obtain melting temperature,-Ni3Al solvus, and heat of formation for the alloys. 相似文献
1000.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship. 相似文献