全文获取类型
收费全文 | 78980篇 |
免费 | 5270篇 |
国内免费 | 1664篇 |
专业分类
电工技术 | 4137篇 |
技术理论 | 7篇 |
综合类 | 4476篇 |
化学工业 | 13147篇 |
金属工艺 | 4233篇 |
机械仪表 | 5079篇 |
建筑科学 | 5251篇 |
矿业工程 | 2433篇 |
能源动力 | 2447篇 |
轻工业 | 5076篇 |
水利工程 | 1019篇 |
石油天然气 | 5426篇 |
武器工业 | 462篇 |
无线电 | 8409篇 |
一般工业技术 | 10286篇 |
冶金工业 | 3974篇 |
原子能技术 | 900篇 |
自动化技术 | 9152篇 |
出版年
2025年 | 139篇 |
2024年 | 1865篇 |
2023年 | 1620篇 |
2022年 | 2253篇 |
2021年 | 3125篇 |
2020年 | 2627篇 |
2019年 | 2365篇 |
2018年 | 2459篇 |
2017年 | 2617篇 |
2016年 | 2298篇 |
2015年 | 2806篇 |
2014年 | 3544篇 |
2013年 | 4282篇 |
2012年 | 4359篇 |
2011年 | 4869篇 |
2010年 | 4188篇 |
2009年 | 3971篇 |
2008年 | 3853篇 |
2007年 | 3742篇 |
2006年 | 3802篇 |
2005年 | 3442篇 |
2004年 | 2291篇 |
2003年 | 2084篇 |
2002年 | 1870篇 |
2001年 | 1636篇 |
2000年 | 1801篇 |
1999年 | 2059篇 |
1998年 | 1780篇 |
1997年 | 1431篇 |
1996年 | 1409篇 |
1995年 | 1189篇 |
1994年 | 963篇 |
1993年 | 721篇 |
1992年 | 548篇 |
1991年 | 432篇 |
1990年 | 327篇 |
1989年 | 258篇 |
1988年 | 229篇 |
1987年 | 141篇 |
1986年 | 122篇 |
1985年 | 99篇 |
1984年 | 71篇 |
1983年 | 44篇 |
1982年 | 47篇 |
1981年 | 33篇 |
1980年 | 26篇 |
1979年 | 13篇 |
1977年 | 7篇 |
1976年 | 8篇 |
1953年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
51.
52.
Ruijuan Zheng Mingchuan Zhang Qingtao Wu Shibao Sun Jiexin Pu 《International Journal of Information Security》2010,9(1):1-17
With the rapid development of network technologies and deteriorating of network environment, traditional single-net security
system cannot satisfy the security requirement. The excellent security performance of biological systems impels the bio-inspired
network security theory to be a hot research area currently. Based on Bio-inspired Multidimensional Network Security Model
we have put forward, we have advanced Bio-inspired Multi-Net Security system by implementing the functional distribution of
different subnets of different transient states in Multi-Net Paralleling structure. Firstly, parameter estimation and modified
algorithms of Hidden Markov Model are introduced to construct the mathematical mode of B-MNS; secondly, the integrated performance
of our modified B-MNS has been tested and its simulation has been carried out. So the feasibility, validity and high efficiency
of our model have been demonstrated theoretically, and practically. 相似文献
53.
CAD软件与基于多边形的3D软件之间数据转换需求不断增加,但是CAD模型复杂度和精细度却越来越高,数据转换的难度变大.为了解决这一难题,结合PolyTrans,分析如何解决一般3D软件难以导入大型的IGES(Initial Graphics Exchange Specifi-cation)文件的问题.从PolyTrans模型简化模块的理论依据着手,研究如何控制多边形的数量、降低文件的复杂性和减少文件的数量,使大型CAD装配模型能顺利地以单个实体形式导入Lightwave、3DS MAX以及Maya类的3D软件.并结合具体科研项目,给出了模型优化前后各指标参数对比情况. 相似文献
54.
Robust Stabilization Over Communication Channels in the Presence of Unstructured Uncertainty 总被引:1,自引:0,他引:1
This technical note is concerned with the problem of controlling plants over communication channels, where the plant is subject to two types of unstructured uncertainty: additive uncertainty and stable coprime factor uncertainty. Necessary lower bounds on the rate of transmission (or channel capacity) C, for robust stabilization, are computed explicitly. In particular, it is shown that the lower bound in the additive uncertainty case corresponds to a fixed point of a particular function. In the stable coprime factor uncertainty case, the derivation relies on linear fractional transformation concepts. The results are important in determining the minimum channel capacity needed in order to stabilize plants subject to unstructured uncertainty over communication channels. For instance, the bounds obtained can be used to analyze the effect of uncertainty on the channel capacity. An illustrative example is provided. 相似文献
55.
Duan Li Xiaoling Sun Jianjun Gao Shenshen Gu Xiaojin ZhengAuthor vitae 《Automatica》2011,47(9):2094-2098
Reachability is one of the most important behavioral properties of Petri nets. We propose in this paper a novel approach for solving the fundamental equation in the reachability analysis of acyclic Petri nets, which has been known to be NP-complete. More specifically, by adopting a revised version of the cell enumeration method for an arrangement of hyperplanes in discrete geometry, we develop an efficient solution scheme to identify firing count vector solution(s) to the fundamental equation on a bounded integer set, with a complexity bound of O((nu)n−m), where n is the number of transitions, m is the number of places and u is the upper bound of the number of firings for all individual transitions. 相似文献
56.
This paper aims to reduce the problems of incomplete data in computed tomography, which happens frequently in medical image process and analysis, e.g., when the high-density region of objects can only be penetrated by X-rays at a limited angular range. As the projection data are available only in an angular range, the incomplete data problem can be attributed to the limited angle problem, which is an ill-posed inverse problem. Image reconstruction based on total variation (TV) reduces the problem and gives better performance on edge-preserving reconstruction; however, the artificial parameter can only be determined through considerable experimentation. In this paper, an effective TV objective function is proposed to reduce the inverse problem in the limited angle tomography. This novel objective function provides a robust and effective reconstruction without any artificial parameter in the iterative processes, using the TV as a multiplicative constraint. The results demonstrate that this reconstruction strategy outperforms some previous ones. 相似文献
57.
Some of the relationships between optimal control and statistics are examined. We produce generalized, smoothing splines by solving an optimal control problem for linear control systems, minimizing the L2-norm of the control signal, while driving the scalar output of the control system close to given, prespecified interpolation points. We then prove a convergence result for the smoothing splines, using results from the theory of numerical quadrature. Finally, we show, in simulations, that our approach works in practice as well as in theory 相似文献
58.
近年来计算机犯罪案件呈迅速增长趋势,为有效控制和侦破此类案件,急需寻找一套行之有效的侦查办案途径.归纳各种犯罪手段,分别针对单机犯罪、专用网络犯罪和互联网犯罪,提出三种解决方案. 相似文献
59.
智能仪表的可靠性设计与评估技术 总被引:1,自引:0,他引:1
本文主要探讨智能仪表设计中最常采用的几种可靠性设计技术及其具体应用,详细介绍了其中的可靠性预计与可靠性分配技术具体方法和步骤,比较了现有的几种可靠性评估技术. 相似文献
60.
A new direct closed-loop identification method, which uses the output intersampling technique, is proposed in this note. By using the intersampled plant input-output data, the proposed method removes the traditional restrictive identifiability condition, and does not require an external persistently exciting (PE) test signal 相似文献