全文获取类型
收费全文 | 9017篇 |
免费 | 732篇 |
国内免费 | 293篇 |
专业分类
电工技术 | 546篇 |
技术理论 | 1篇 |
综合类 | 658篇 |
化学工业 | 1450篇 |
金属工艺 | 416篇 |
机械仪表 | 569篇 |
建筑科学 | 588篇 |
矿业工程 | 289篇 |
能源动力 | 265篇 |
轻工业 | 804篇 |
水利工程 | 162篇 |
石油天然气 | 498篇 |
武器工业 | 77篇 |
无线电 | 834篇 |
一般工业技术 | 1006篇 |
冶金工业 | 703篇 |
原子能技术 | 65篇 |
自动化技术 | 1111篇 |
出版年
2024年 | 29篇 |
2023年 | 121篇 |
2022年 | 203篇 |
2021年 | 312篇 |
2020年 | 221篇 |
2019年 | 202篇 |
2018年 | 251篇 |
2017年 | 288篇 |
2016年 | 255篇 |
2015年 | 307篇 |
2014年 | 447篇 |
2013年 | 594篇 |
2012年 | 639篇 |
2011年 | 674篇 |
2010年 | 582篇 |
2009年 | 533篇 |
2008年 | 569篇 |
2007年 | 517篇 |
2006年 | 528篇 |
2005年 | 421篇 |
2004年 | 292篇 |
2003年 | 238篇 |
2002年 | 205篇 |
2001年 | 222篇 |
2000年 | 187篇 |
1999年 | 185篇 |
1998年 | 252篇 |
1997年 | 178篇 |
1996年 | 125篇 |
1995年 | 102篇 |
1994年 | 86篇 |
1993年 | 62篇 |
1992年 | 34篇 |
1991年 | 26篇 |
1990年 | 19篇 |
1989年 | 19篇 |
1988年 | 21篇 |
1987年 | 12篇 |
1986年 | 10篇 |
1985年 | 7篇 |
1984年 | 3篇 |
1983年 | 11篇 |
1982年 | 9篇 |
1980年 | 3篇 |
1979年 | 7篇 |
1978年 | 3篇 |
1977年 | 10篇 |
1976年 | 11篇 |
1975年 | 2篇 |
1974年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
本文研究了TiO2掺入对CaO稳定ZrO2(简称CaSZ-NiCr)金属陶瓷烧结特性的影响,测定了CaSZ-NiCr-TiO2金属陶瓷烧结样品的密度和显微硬度,结果表明,TiO2的掺入能提高CaSZ-NICr金属陶瓷的烧结密度和显微硬度,对CaSZ-NiCr金属陶瓷有助烧结作用.金相观察表明,TiO3的掺入改变了NiCr相在金属陶瓷中的形貌,说明了NiCr与CaSZ的浸润性有一定的改善.XRD和EPMA分析结果显示,TiO2偏聚在NiCr金属相中,不影响CaSZ的稳定性. 相似文献
62.
Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao 《计算机系统科学与工程》2021,39(3):373-390
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier. 相似文献
63.
Muñoz-Montoro A. J. Suarez-Dou D. Cortina R. Canadas-Quesada F. J. Combarro E. F. 《The Journal of supercomputing》2021,77(8):8135-8150
The Journal of Supercomputing - In this paper, we propose a parallel source separation system designed to extract heart and lung sounds from single-channel mixtures. The proposed system is based on... 相似文献
64.
Neural Computing and Applications - In this paper, one concerns with the problem of trajectory tracking control for an underactuated unmanned surface vehicle subject to uncertain dynamics and input... 相似文献
65.
The explosive growth of Chinese electronic market has made it possible for companies to better understand consumers?? opinion towards their products in a timely fashion through their online reviews. This study proposes a framework for extracting knowledge from online reviews through text mining and econometric analysis. Specifically, we extract product features, detect topics, and identify determinants of customer satisfaction. An experiment on the online reviews from a Chinese leading B2C (Business-to-Customer) website demonstrated the feasibility of the proposed method. We also present some findings about the characteristics of Chinese reviewers. 相似文献
66.
This paper presents an indirect adaptive controller combined with hysteresis compensation to achieve high accuracy positioning control of piezoceramic actuators and illustrates the results with an atomic force microscope (AFM) application. A dynamic model of a piezoceramic actuator system in AFM is derived and analyzed. A feedforward controller based on the Preisach model is proposed to compensate for the nonlinear hysteresis effects. Then an indirect adaptive controller is designed to achieve desired tracking performance as well as deal with the uncompensated nonlinearity from hysteresis and the system parameter variation due to creep. Experimental results indicate that the proposed controller can significantly improve the positioning control accuracy of the piezoceramic actuator as well as achieve high image quality of the AFM system. The maximum scanning error was reduced from 2µm to 0.3µm in comparison with a proportional‐integral‐derivative (PID) controller. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
67.
Jinguang Han Willy Susilo Yi Mu Jun Yan 《International Journal of Information Security》2012,11(6):389-401
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption. 相似文献
68.
Jia Zhu Fangpei Zhang Yuanhao Cui Junsheng Mu Ronghui Zhang Xiaojun Jing 《北京理工大学学报(英文版)》2021,30(1):60-68
Joint radar and communication(JRC) technology is gradually becoming an essential approach to alleviating spectral congestion. Radar and communications systems were designed with common spectral and hardware resources to reduce size, improve performance, reduce cost, and decongest the spectrum. Various approaches have been proposed to achieve the coexistence of radar and communication systems. This paper mainly focuses on the research directions of radar communication coexistence(RCC) and dual-function radar communication systems(DFRC) in JRC technology. We summarize and analyze the existing research problems in the JRC era. According to the characteristics and advantages of JRC technology, we highlight several potentials in military and commercial applications. 相似文献
69.
70.
以Al粉和Ni粉为主要原料,采用自蔓延高温合成技术,制备Ni—Al基金属间化合物。绘制了热爆反应曲线、描述了热爆反应的过程,分析了热爆反应机理及产物的显微组织特征,研究了热爆反应的边界条件以及各种反应参数对热爆反应的影响。研究结果表明,升温速率和颗粒尺寸对热爆反应均有不同程度的影响。提高升温速率、减小颗粒尺寸均可缩短热爆反应的起始时间,降低热爆反应的起始温度。初步确定了反应起始温度低于Ni—Al系的最低共晶温度(640℃),Ni—A1系的热爆反应是由固一固扩散反应引发的,Ni-32Al的反应产物为单相、均一的NiAl相。 相似文献