全文获取类型
收费全文 | 78708篇 |
免费 | 9315篇 |
国内免费 | 5901篇 |
专业分类
电工技术 | 7213篇 |
技术理论 | 2篇 |
综合类 | 7542篇 |
化学工业 | 10240篇 |
金属工艺 | 4642篇 |
机械仪表 | 5622篇 |
建筑科学 | 6267篇 |
矿业工程 | 3216篇 |
能源动力 | 2221篇 |
轻工业 | 7373篇 |
水利工程 | 2163篇 |
石油天然气 | 3501篇 |
武器工业 | 1142篇 |
无线电 | 9415篇 |
一般工业技术 | 7364篇 |
冶金工业 | 2920篇 |
原子能技术 | 1126篇 |
自动化技术 | 11955篇 |
出版年
2024年 | 483篇 |
2023年 | 1400篇 |
2022年 | 3010篇 |
2021年 | 4170篇 |
2020年 | 3006篇 |
2019年 | 2267篇 |
2018年 | 2392篇 |
2017年 | 2736篇 |
2016年 | 2507篇 |
2015年 | 3856篇 |
2014年 | 4772篇 |
2013年 | 5553篇 |
2012年 | 6742篇 |
2011年 | 6954篇 |
2010年 | 6341篇 |
2009年 | 6017篇 |
2008年 | 5715篇 |
2007年 | 5594篇 |
2006年 | 4974篇 |
2005年 | 3906篇 |
2004年 | 2802篇 |
2003年 | 1868篇 |
2002年 | 1773篇 |
2001年 | 1464篇 |
2000年 | 1128篇 |
1999年 | 658篇 |
1998年 | 345篇 |
1997年 | 274篇 |
1996年 | 241篇 |
1995年 | 221篇 |
1994年 | 154篇 |
1993年 | 90篇 |
1992年 | 91篇 |
1991年 | 64篇 |
1990年 | 50篇 |
1989年 | 43篇 |
1988年 | 27篇 |
1987年 | 21篇 |
1986年 | 21篇 |
1985年 | 12篇 |
1984年 | 15篇 |
1982年 | 13篇 |
1981年 | 15篇 |
1980年 | 22篇 |
1979年 | 16篇 |
1978年 | 7篇 |
1977年 | 9篇 |
1976年 | 18篇 |
1959年 | 14篇 |
1951年 | 16篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
52.
MENG Fan-Jun XU Bin-Shi ZHU Sheng MA Shi-Ming ZHANG Wei ZHU Zi-Xin National Key Laboratory for Remanufacturing Beijng China 《材料热处理学报》2004,(5)
Fe-Al intermetallics with remarkable high-temperatureintensity and excellent erosion,high-temperatureoxidation and sulfuration resistance are potential lowcost high-temperature structural material.ProducingFe-Al/WC composite coating by high velocity arcspraying(HVAS)on structural materials would notonly obviate the problems faced in fabrication of thesealloys into useful shapes,but also allow the effectiveuse of their outstanding high-temperature performance,which might thus promisingly mak… 相似文献
53.
54.
55.
56.
混合高斯模型背景法作为运动目标检测的一种经典方法,已经广泛应用于智能视频监控系统中。但是,传统的混合高斯模型背景法容易将阴影误检测为运动目标的一部分。因此,针对该方法在区分阴影和运动目标方面的不足,提出了一种将混合高斯模型背景法和HSV空间阴影抑制相结合的运动目标检测算法。这种改进算法首先将颜色空间转换到HSV空间,初步提取运动目标,然后再利用阴影的灰度值比背景中的灰度值小,而前景的灰度值比背景中灰度值大的特性,检测出运动目标中的阴影。实验结果表明,这种改进的算法明显提高了检测效果,有效抑制了阴影对运动目标检测的干扰,算法实时性也较好。 相似文献
57.
58.
Weiran Liu Jianwei Liu Qianhong Wu Bo Qin Yan Li 《International Journal of Information Security》2016,15(1):35-50
We focus on practical Hierarchical Identity-Based Broadcast Encryption (HIBBE) with semantic security against adaptively chosen-ciphertext attacks (CCA2) in the standard model. We achieve this goal in two steps. First, we propose a new HIBBE scheme that is secure against chosen-plaintext attacks (CPA). Compared with the existing HIBBE scheme that is built from composite-order bilinear groups, our construction is based on prime-order bilinear groups. The much better efficiency of group operations in prime-order bilinear groups makes our proposed HIBBE scheme more practical. Then, we convert it into a CCA2-secure scheme at the cost of a one-time signature. Instead of extending one user hierarchy in the Canetti–Halevi–Katz approach from CPA-secure (\(l+1\))-Hierarchical Identity-Based Encryption [(\(l+1\))-HIBE] to CCA2-secure \(l\)-HIBE, our construction merely adds one on-the-fly dummy user in the basic scheme. We formally prove the security of these two schemes in the standard model. Comprehensive theoretical analyses and experimental results demonstrate that the proposed HIBBE schemes achieve desirable performance. 相似文献
59.
60.
Bartels–Stewart algorithm is an effective and widely used method with an O(n 3) time complexity for solving a static Sylvester equation. When applied to time-varying Sylvester equation, the computation burden increases intensively with the decrease of sampling period and cannot satisfy continuous realtime calculation requirements. Gradient-based recurrent neural network are able to solve the time-varying Sylvester equation in real time but there always exists an estimation error. In contrast, the recently proposed Zhang neural network has been proven to converge to the solution of the Sylvester equation ideally when time goes to infinity. However, this neural network with the suggested activation functions never converges to the desired value in finite time, which may limit its applications in realtime processing. To tackle this problem, a sign-bi-power activation function is proposed in this paper to accelerate Zhang neural network to finite-time convergence. The global convergence and finite-time convergence property are proven in theory. The upper bound of the convergence time is derived analytically. Simulations are performed to evaluate the performance of the neural network with the proposed activation function. In addition, the proposed strategy is applied to online calculating the pseudo-inverse of a matrix and nonlinear control of an inverted pendulum system. Both theoretical analysis and numerical simulations validate the effectiveness of proposed activation function. 相似文献