全文获取类型
收费全文 | 28141篇 |
免费 | 2462篇 |
国内免费 | 1427篇 |
专业分类
电工技术 | 1751篇 |
技术理论 | 1篇 |
综合类 | 2013篇 |
化学工业 | 4660篇 |
金属工艺 | 1456篇 |
机械仪表 | 1789篇 |
建筑科学 | 2242篇 |
矿业工程 | 915篇 |
能源动力 | 767篇 |
轻工业 | 2479篇 |
水利工程 | 543篇 |
石油天然气 | 1760篇 |
武器工业 | 206篇 |
无线电 | 2803篇 |
一般工业技术 | 3000篇 |
冶金工业 | 1322篇 |
原子能技术 | 320篇 |
自动化技术 | 4003篇 |
出版年
2024年 | 142篇 |
2023年 | 505篇 |
2022年 | 893篇 |
2021年 | 1207篇 |
2020年 | 868篇 |
2019年 | 743篇 |
2018年 | 845篇 |
2017年 | 935篇 |
2016年 | 831篇 |
2015年 | 1111篇 |
2014年 | 1480篇 |
2013年 | 1797篇 |
2012年 | 1868篇 |
2011年 | 2149篇 |
2010年 | 1832篇 |
2009年 | 1780篇 |
2008年 | 1798篇 |
2007年 | 1629篇 |
2006年 | 1551篇 |
2005年 | 1394篇 |
2004年 | 935篇 |
2003年 | 764篇 |
2002年 | 718篇 |
2001年 | 628篇 |
2000年 | 613篇 |
1999年 | 584篇 |
1998年 | 454篇 |
1997年 | 419篇 |
1996年 | 358篇 |
1995年 | 289篇 |
1994年 | 259篇 |
1993年 | 172篇 |
1992年 | 148篇 |
1991年 | 82篇 |
1990年 | 67篇 |
1989年 | 38篇 |
1988年 | 47篇 |
1987年 | 28篇 |
1986年 | 15篇 |
1985年 | 7篇 |
1984年 | 13篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 7篇 |
1980年 | 6篇 |
1979年 | 2篇 |
1959年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
针对繁多异构的移动客户端接入Web应用系统的问题,提出一个基于REST(Representational State Transfer)的解决方法并给出一个基于MVC(Model-View-Controller)模式的具体的开发框架,通过RESTful Web服务连接移动客户端的View/Controller层与Web系统的Model层。定义了由Web系统的model层定义RESTful Web服务的具体方法和规则。理论分析与实际应用说明了该方法的有效性。 相似文献
72.
73.
应用程序通过操作系统的系统调用对文件描述符进行操作并管理文件资源。如果应用程序对资源描述符的管理出现错误并发生描述符泄漏,会严重影响系统的可用性。据此,提出了一种检查程序是否会导致描述符泄漏的类型系统,给出了描述符操作方法的语义和类型约束,证明了类型系统的可靠性定理。此外,还初步讨论了该类型系统在并发程序下的扩展。 相似文献
74.
《尚书·禹贡》中所载“九州”是中国先民对中国古代宏观地理的最早认知。结合近年来相关研究成果对其中荆梁二州的分布
地域进行界定,可以发现二州之间相互毗邻;同时,以考古资料为依托分别对荆梁二州在公元前2000 年前后所形成的农业类型进
行描述分析发现,两者之间既存在相同之处,又存在差异之处。梁州农业类型的形成既有来自北方的影响,又有来自临近的荆州的
影响,荆梁二州之间早在新石器时代便开始产生零星的农业文化传播与交流,而这一传播交流的实现大体存在两条路径。川东鄂
西地区的山地或是《尚书·禹贡》荆梁二州的农业文化分界线。 相似文献
75.
The design and test of dual/triple‐mode bandpass filter based on temporal coupled‐mode theory 下载免费PDF全文
Hui Xu Jiong‐Jiong Mo Xiu‐Qin Xu Xu Ding Zhi‐Yu Wang Yong‐Heng Shang Li‐Ping Wang Fa‐Xin Yu 《国际射频与微波计算机辅助工程杂志》2016,26(7):609-622
In this article, the design and test of both a K‐band dual‐mode bandpass filter (BPF) pair and a K‐band triple‐mode BPF are presented based on N‐mode temporal coupled‐mode theory (CMT). The expressions of transmission and reflection responses are analytically derived. All the parameters in the expressions have clear physical meanings and are easily optimized to reach the required filter performance. Aided by eigenmode simulations, concrete structures of the three integrated BPFs are designed and optimized to approach the calculated physical parameters. After the fabrications and measurements of the three BPFs, extended upper/lower stopband with high stopband rejections are achieved, and by increasing the number of resonant modes, improved frequency selectivity and better passband flatness are obtained. The analytical analysis well predicts the simulation and measurement results, which provides an efficient way for BPF designs. © 2016 Wiley Periodicals, Inc. Int J RF and Microwave CAE 26:609–622, 2016. 相似文献
76.
Bin Qin Fanping Zeng Kesong Yan 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(9):3497-3504
Binary relations play an important role in rough set theory. This paper investigates the similarity of binary relations based on L-fuzzy topologies, where L is a boolean algebra. First, rough approximations based on a boolean algebra are proposed through successor neighborhoods on binary relations. Next, L-fuzzy topologies induced by binary relations are investigated. Finally, similarity of binary relations is introduced by using the L-fuzzy topologies and the fact that every binary relation is solely similar to some preorder relation is proved. It is worth mentioning that similarity of binary relations are both originated in the L-fuzzy topology and independent of the L-fuzzy topology. 相似文献
77.
Li Dong-fen Wang Rui-jin Zhang Feng-li Baagyere Edward Qin Zhen Xiong Hu Zhan Huayi 《Quantum Information Processing》2016,15(11):4819-4837
Quantum Information Processing - With the advent of the Internet and information and communication technology, quantum teleportation has become an important field in information security and its... 相似文献
78.
Qin Fu Wei-Guo Gu Pan-Pan Gu Jian-Rong Wu 《International Journal of Control, Automation and Systems》2016,14(6):1455-1463
This paper deals with the problem of iterative learning control algorithm for a class of mixed distributed parameter systems. Here, the considered distributed parameter systems are composed of mixed hyperbolic-parabolic partial differential equations. The domain of the system is divided into two parts in which the system is hyperbolic and parabolic, respectively, with transmission conditions at the interface. According to the characteristics of the systems, iterative learning control laws are proposed for such mixed hyperbolic-parabolic distributed parameter systems based on P-type learning scheme. Using the contraction mapping method, it is shown that the scheme can guarantee the output tracking errors on L 2 space converge along the iteration axis. A simulation example illustrates the effectiveness of the proposed method. 相似文献
79.
Weiran Liu Jianwei Liu Qianhong Wu Bo Qin Yan Li 《International Journal of Information Security》2016,15(1):35-50
We focus on practical Hierarchical Identity-Based Broadcast Encryption (HIBBE) with semantic security against adaptively chosen-ciphertext attacks (CCA2) in the standard model. We achieve this goal in two steps. First, we propose a new HIBBE scheme that is secure against chosen-plaintext attacks (CPA). Compared with the existing HIBBE scheme that is built from composite-order bilinear groups, our construction is based on prime-order bilinear groups. The much better efficiency of group operations in prime-order bilinear groups makes our proposed HIBBE scheme more practical. Then, we convert it into a CCA2-secure scheme at the cost of a one-time signature. Instead of extending one user hierarchy in the Canetti–Halevi–Katz approach from CPA-secure (\(l+1\))-Hierarchical Identity-Based Encryption [(\(l+1\))-HIBE] to CCA2-secure \(l\)-HIBE, our construction merely adds one on-the-fly dummy user in the basic scheme. We formally prove the security of these two schemes in the standard model. Comprehensive theoretical analyses and experimental results demonstrate that the proposed HIBBE schemes achieve desirable performance. 相似文献
80.