全文获取类型
收费全文 | 38127篇 |
免费 | 1381篇 |
国内免费 | 80篇 |
专业分类
电工技术 | 406篇 |
综合类 | 41篇 |
化学工业 | 7537篇 |
金属工艺 | 831篇 |
机械仪表 | 803篇 |
建筑科学 | 2066篇 |
矿业工程 | 121篇 |
能源动力 | 1090篇 |
轻工业 | 3006篇 |
水利工程 | 446篇 |
石油天然气 | 140篇 |
武器工业 | 5篇 |
无线电 | 2622篇 |
一般工业技术 | 6359篇 |
冶金工业 | 7015篇 |
原子能技术 | 345篇 |
自动化技术 | 6755篇 |
出版年
2023年 | 221篇 |
2022年 | 463篇 |
2021年 | 713篇 |
2020年 | 479篇 |
2019年 | 638篇 |
2018年 | 805篇 |
2017年 | 727篇 |
2016年 | 865篇 |
2015年 | 800篇 |
2014年 | 1074篇 |
2013年 | 2459篇 |
2012年 | 1733篇 |
2011年 | 2185篇 |
2010年 | 1708篇 |
2009年 | 1615篇 |
2008年 | 1890篇 |
2007年 | 1855篇 |
2006年 | 1673篇 |
2005年 | 1498篇 |
2004年 | 1224篇 |
2003年 | 1176篇 |
2002年 | 1086篇 |
2001年 | 729篇 |
2000年 | 579篇 |
1999年 | 633篇 |
1998年 | 695篇 |
1997年 | 630篇 |
1996年 | 594篇 |
1995年 | 609篇 |
1994年 | 558篇 |
1993年 | 542篇 |
1992年 | 527篇 |
1991年 | 311篇 |
1990年 | 433篇 |
1989年 | 407篇 |
1988年 | 349篇 |
1987年 | 391篇 |
1986年 | 329篇 |
1985年 | 441篇 |
1984年 | 442篇 |
1983年 | 330篇 |
1982年 | 309篇 |
1981年 | 296篇 |
1980年 | 286篇 |
1979年 | 285篇 |
1978年 | 259篇 |
1977年 | 247篇 |
1976年 | 225篇 |
1975年 | 203篇 |
1974年 | 181篇 |
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
111.
David Hocker Yicong Zheng Robert Kosut Todd Brun Herschel Rabitz 《Quantum Information Processing》2016,15(11):4361-4390
There is a rich variety of physics underlying the fundamental gating operations for quantum information processing (QIP). A key aspect of a QIP system is how noise may enter during quantum operations and how suppressing or correcting its effects can best be addressed. Quantum control techniques have been developed to specifically address this effort, although a detailed classification of the compatibility of controls schemes with noise sources found in common quantum systems has not yet been performed. This work numerically examines the performance of modern control methods for suppressing decoherence in the presence of noise forms found in viable quantum systems. The noise-averaged process matrix for controlled one-qubit and two-qubit operations are calculated across noise found in systems driven by Markovian open quantum dynamics. Rather than aiming to describe the absolute best control scheme for a given physical circumstance, this work serves instead to classify quantum control behavior across a large class of noise forms so that opportunities for improving QIP performance may be identified. 相似文献
112.
113.
Recommendations in location-based social networks: a survey 总被引:2,自引:0,他引:2
114.
115.
Tholén EA Platz D Forchheimer D Schuler V Tholén MO Hutter C Haviland DB 《The Review of scientific instruments》2011,82(2):026109
Nonlinear systems can be probed by driving them with two or more pure tones while measuring the intermodulation products of the drive tones in the response. We describe a digital lockin analyzer which is designed explicitly for this purpose. The analyzer is implemented on a field-programmable gate array, providing speed in analysis, real-time feedback, and stability in operation. The use of the analyzer is demonstrated for intermodulation atomic force microscopy. A generalization of the intermodulation spectral technique to arbitrary drive waveforms is discussed. 相似文献
116.
Backlash-like hysteresis is one of the nonsmooth and multi-valued nonlinearities usually existing in mechanical systems. The traditional identification method is quite difficult to be used to model the systems involved with such complex nonlinearities. In this paper, a nonsmooth recursive identification algorithm for the systems with backlash-like hysteresis is proposed. In this method, the concept of Clarke subgradient is introduced to approximate the gradients at nonsmooth points and the so-called bundle method is used to obtain the optimization search direction in nonsmooth cases. Then, a recursive algorithm based on the idea of bundle method is developed for parameter estimation. After that, the convergence analysis of the algorithm is investigated. Finally, simulation results to validate the proposed method on a simulated mechanical transmission system are presented. 相似文献
117.
S. Travis Waller David Fajardo Melissa Duell Vinayak Dixit 《Networks and Spatial Economics》2013,13(4):427-443
This work introduces a novel formulation of system optimal dynamic traffic assignment that captures strategic route choice in users under demand uncertainty. We define strategic route choice to be that users choose a path prior to knowing the true travel demand which will be experienced (therefore users consider the full set of possible demand scenarios). The problem is formulated based on previous work by Ziliaskopoulos (Transp Sci 34(1):37–49, 2000). The resulting novel formulation requires substantial enhancement to account for path-based flows and scenario-based stochastic demands. Further, a numerical demonstration is presented on a network with different demand loading profiles. Finally, model complexity, implications on scalability and future research directions are discussed. 相似文献
118.
Sharp GC Lee SW Wehe DK 《IEEE transactions on pattern analysis and machine intelligence》2008,30(1):120-130
Missing data are common in range images, due to geometric occlusions, limitations in the sensor field of view, poor reflectivity, depth discontinuities, and cast shadows. Using registration to align these data often fails, because points without valid correspondences can be incorrectly matched. This paper presents a maximum likelihood method for registration of scenes with unmatched or missing data. Using ray casting, correspondences are formed between valid and missing points in each view. These correspondences are used to classify points by their visibility properties, including occlusions, field of view, and shadow regions. The likelihood of each point match is then determined using statistical properties of the sensor, such as noise and outlier distributions. Experiments demonstrate a high rates of convergence on complex scenes with varying degrees of overlap. 相似文献
119.
This paper proposes and implements a novel hybrid level set method which combines the numerical efficiency of the local level set approach with the temporal stability afforded by a semi-implicit technique. By introducing an extraction/insertion algorithm into the local level set approach, we can accurately capture complicated behaviors such as interface separation and coalescence. This technique solves a well known problem when treating a semi-implicit system with spectral methods, where spurious interface movements emerge when two interfaces are close to each other. Numerical experiments show that the proposed method is stable, efficient and scales up well into three dimensional problems. 相似文献
120.
David G.W. Birch 《Information Security Technical Report》2009,14(3):143-145
It is impossible to make any progress on the security vs. privacy debate, or move towards a political settlement around identity for the coming years, unless we develop a more modern notion of what identity is and how it should be addressed online. So long as we maintain an essentially “Victorian” view of the balance between security and privacy, founded on the central concept of identity as a card in a filing cabinet, then society cannot properly take advantage of technological developments. If it does, then security and privacy are no longer competing concerns that need to be balanced but simultaneous deliverables of an infrastructure founded in utility. 相似文献