全文获取类型
收费全文 | 9623篇 |
免费 | 692篇 |
国内免费 | 306篇 |
专业分类
电工技术 | 361篇 |
综合类 | 382篇 |
化学工业 | 1576篇 |
金属工艺 | 522篇 |
机械仪表 | 614篇 |
建筑科学 | 501篇 |
矿业工程 | 171篇 |
能源动力 | 313篇 |
轻工业 | 458篇 |
水利工程 | 149篇 |
石油天然气 | 298篇 |
武器工业 | 30篇 |
无线电 | 1433篇 |
一般工业技术 | 1566篇 |
冶金工业 | 885篇 |
原子能技术 | 92篇 |
自动化技术 | 1270篇 |
出版年
2024年 | 42篇 |
2023年 | 131篇 |
2022年 | 250篇 |
2021年 | 332篇 |
2020年 | 266篇 |
2019年 | 271篇 |
2018年 | 264篇 |
2017年 | 260篇 |
2016年 | 256篇 |
2015年 | 343篇 |
2014年 | 407篇 |
2013年 | 592篇 |
2012年 | 546篇 |
2011年 | 592篇 |
2010年 | 491篇 |
2009年 | 515篇 |
2008年 | 460篇 |
2007年 | 455篇 |
2006年 | 413篇 |
2005年 | 397篇 |
2004年 | 271篇 |
2003年 | 267篇 |
2002年 | 258篇 |
2001年 | 249篇 |
2000年 | 211篇 |
1999年 | 260篇 |
1998年 | 268篇 |
1997年 | 217篇 |
1996年 | 181篇 |
1995年 | 162篇 |
1994年 | 135篇 |
1993年 | 105篇 |
1992年 | 94篇 |
1991年 | 80篇 |
1990年 | 62篇 |
1989年 | 67篇 |
1988年 | 58篇 |
1987年 | 46篇 |
1986年 | 38篇 |
1985年 | 42篇 |
1984年 | 31篇 |
1983年 | 22篇 |
1982年 | 35篇 |
1981年 | 26篇 |
1980年 | 17篇 |
1979年 | 14篇 |
1977年 | 20篇 |
1976年 | 19篇 |
1974年 | 19篇 |
1973年 | 14篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
宋子健 《武汉理工大学学报(材料科学英文版)》2014,29(2):329-333
The applicability of the rapid iodide migration test was systematically studied. Comparative experimental tests of different test conditions, including several external voltages, test durations, concrete ages and mixing proportions, were carried out to make clear the transport behaviors of iodide under parallel electric fields. Numerical simulations were also done using the finite element method to found the correlation between chloride and iodide transport behaviors. The test and numerical results show that the chloride transport behaviors of RIM and RCM tests have a good correlation under the several conditions used in the present paper. Moreover, the influence of external conditions (external voltages, test durations) on the test results is small. Thus, it can be concluded that the RIM method is available to determine the chloride penetration resistance of the chloride-eroded structural concrete. 相似文献
22.
云计算应用正以势如破竹的态势进入到教育领域,云计算的推广有利于教育资源的共建共享,方便师生快捷地获取所需资源和服务,更高效地开展学习和科研工作.分析了现有网络资源的具体实际情况,利用云计算技术,探究资源整合的有效方式,整合校园网资源,探索适合于教师教学与科研、学生学习与成长,以及学校提升社会服务能力的校园私有云服务模式. 相似文献
23.
24.
针对片状颗粒厚度检测的实际需求,结合机器视觉、图像处理和嵌入式技术,设计与实现了一套基于高性能ARM11的微片状颗粒厚度检测系统。该系统以QT和S3C6410为软硬件平台,提出了利用轮廓提取和最小矩形边界框相结合的方法计算片状颗粒厚度。结果表明,该检测系统具有处理速度快,测量精度高和成本低廉等优点,满足了对颗粒厚度测量的需求。 相似文献
25.
Hsiang-Cheh Huang Chi-Ming Chu Jeng-Shyang Pan 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(4):333-343
Applications for robust watermarking is one of the major branches in digital rights management (DRM) systems and related researches.
Based on existing experiences to evaluate the applicability of robust watermarking, it is generally agreed that three parameters
or requirements, including the quality of watermarked contents, the survivability of extracted watermark after deliberate
or unintentional attacks, and the number of bits embedded, need to be considered. However, performances relating to these
three parameters conflict with each other, and the trade off must be searched for. In this paper, we take all the three requirements
into consideration, and add the flexibility to meet the specific design in implementation. With the aid of genetic algorithm,
we design an applicable system that would obtain the good quality, acceptable survivability, and reasonable capacity after
watermarking. Simulation results present the effectiveness in practical implementation and possible application of the proposed
algorithm. 相似文献
26.
With today’s global digital environment, the Internet is readily accessible anytime from everywhere, so does the digital image
manipulation software; thus, digital data is easy to be tampered without notice. Under this circumstance, integrity verification
has become an important issue in the digital world. The aim of this paper is to present an in-depth review and analysis on
the methods of detecting image tampering. We introduce the notion of content-based image authentication and the features required
to design an effective authentication scheme. We review major algorithms and frequently used security mechanisms found in
the open literature. We also analyze and discuss the performance trade-offs and related security issues among existing technologies. 相似文献
27.
基于LDA模型的新闻话题的演化 总被引:1,自引:0,他引:1
新闻话题及演化的研究可以帮助人们快速了解和获取新闻内容。提出了一种挖掘新闻话题随时间变化的方法,通过话题抽取和话题关联实现话题的演化。首先应用LDA(Latent Dirichlet Allocation Model)对不同时间段的文集进行话题的自动抽取,话题数目在不同时间段是可变的;计算相邻时间段中任意两个话题的分布距离实现话题的关联。实验结果证明该方法不但可以描述同一个话题随时间的演化过程,还可以描述话题内容随时间的变化,反映了话题(或子话题)之间多对多的演化关系。 相似文献
28.
This paper presents a general method to formulate monotonically convergent algorithms for identifying optimal control fields to manipulate quantum dynamics phenomena beyond the linear dipole interaction. The method, facilitated by a field-dependent dipole moment operator, is based on an integral equation of the first kind arising from the Heisenberg equation of motion for tracking a time-dependent, dynamical invariant observable associated with a reference control field. 相似文献
29.
Wu J. Chen S. Li G. Istepanian R.H. Chu J. 《Automatic Control, IEEE Transactions on》2001,46(7):1162-1166
The pole-sensitivity approach is employed to investigate the stability issue of the discrete-time control system, where a digital controller implemented with finite word length (FWL), is used. A stability related measure is derived, which is more accurate in estimating the closed-loop stability robustness of an FWL implemented controller than some existing measures for the pole-sensitivity analysis. This improved stability measure thus provides a better criterion to find the optimal realizations for a generic controller structure that includes output-feedback and observer-based controllers. A numerical example is used to verify the theoretical analysis and to illustrate the design procedure 相似文献
30.
For the problem of classifying an element (e.g., an unknown pattern) into one of two given categories where the associated observables are distributed according to one of two known multivariate normal populations having a common covariance matrix, it is shown that the minimum Bayes risk is a strict monotonic function of certain separability or statistical distance measures regardless of the a priori probabilities and the assigned loss function. However, for the associated conditional expected losses, strict monotonicity holds, if and only if a certain condition dependent on these probabilities and the given loss function is satisfied. These results remain valid for classification problems in which the observable can be transformed by a one-to-one differentiable mapping to normality. 相似文献