全文获取类型
收费全文 | 44093篇 |
免费 | 4064篇 |
国内免费 | 2018篇 |
专业分类
电工技术 | 2510篇 |
技术理论 | 2篇 |
综合类 | 2554篇 |
化学工业 | 7613篇 |
金属工艺 | 2633篇 |
机械仪表 | 2994篇 |
建筑科学 | 3016篇 |
矿业工程 | 1301篇 |
能源动力 | 1288篇 |
轻工业 | 2869篇 |
水利工程 | 654篇 |
石油天然气 | 2470篇 |
武器工业 | 355篇 |
无线电 | 5395篇 |
一般工业技术 | 5938篇 |
冶金工业 | 2432篇 |
原子能技术 | 496篇 |
自动化技术 | 5655篇 |
出版年
2024年 | 188篇 |
2023年 | 830篇 |
2022年 | 1388篇 |
2021年 | 2146篇 |
2020年 | 1534篇 |
2019年 | 1428篇 |
2018年 | 1490篇 |
2017年 | 1529篇 |
2016年 | 1439篇 |
2015年 | 1885篇 |
2014年 | 2266篇 |
2013年 | 2720篇 |
2012年 | 2811篇 |
2011年 | 3185篇 |
2010年 | 2520篇 |
2009年 | 2494篇 |
2008年 | 2500篇 |
2007年 | 2240篇 |
2006年 | 2356篇 |
2005年 | 1905篇 |
2004年 | 1382篇 |
2003年 | 1213篇 |
2002年 | 1134篇 |
2001年 | 993篇 |
2000年 | 959篇 |
1999年 | 989篇 |
1998年 | 827篇 |
1997年 | 710篇 |
1996年 | 625篇 |
1995年 | 520篇 |
1994年 | 405篇 |
1993年 | 271篇 |
1992年 | 226篇 |
1991年 | 200篇 |
1990年 | 168篇 |
1989年 | 152篇 |
1988年 | 99篇 |
1987年 | 85篇 |
1986年 | 55篇 |
1985年 | 49篇 |
1984年 | 34篇 |
1983年 | 37篇 |
1982年 | 29篇 |
1981年 | 23篇 |
1980年 | 26篇 |
1979年 | 17篇 |
1978年 | 15篇 |
1976年 | 18篇 |
1975年 | 10篇 |
1973年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
961.
962.
According to actual needs, a generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than the existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Compared with existing identity based generalized signcryption, the new scheme has less implementation complexity. Moreover, the new scheme has comparable computation complexity with the existing normal signcryption schemes. 相似文献
963.
Recent advances in algorithms for the multidimensional multiple choice knapsack problems have enabled us to solve rather large problem instances. However, these algorithms are evaluated with very limited benchmark instances. In this study, we propose new methods to systematically generate comprehensive benchmark instances. Some instances with special correlation properties between parameters are found to be several orders of magnitude harder than those currently used for benchmarking the algorithms. Experiments on an existing exact algorithm and two generic solvers show that instances whose weights are uncorrelated with the profits are easier compared with weakly or strongly correlated cases. Instances with classes containing similar set of profits for items and with weights strongly correlated to the profits are the hardest among all instance groups investigated. These hard instances deserve further study and understanding their properties may shed light to better algorithms. 相似文献
964.
In product design process, when dealing with technical problems or initiating a new design, R&D personnel would often turn to technical database to seek inspiration. The building of a database with such documents has not been systematically dealt with. In this paper, several issues on how to build up a product design database are investigated: input source, sampling scheme and quality control. A case study of building a database for robotic design is used to demonstrate the concept. It is an archive of more than 1500 relevant technical papers. A total of 16 graduates are employed as operators in the labeling process and subsequently the hypothesis tests are utilized to process the labeling results. To ensure this database quality, the labeling consistency of each operator and the understanding of each category are tested. With the use of statistical methods, this work proposes a feasible and practical way to create such a database for product design. 相似文献
965.
This paper considers the existence of the equilibrium point and its global exponential robust stability for reaction-diffusion
interval neural networks with variable coefficients and distributed delays by means of the topological degree theory and Lyapunov-functional
method. The sufficient conditions on global exponential robust stability established in this paper are easily verifiable.
An example is presented to demonstrate the effectiveness and efficiency of our results. 相似文献
966.
There are a number of dirty data in observation data set derived from ocean observing network. These data should be carefully and reasonably processed before they are used for forecasting or analysis in oceanic warning system (OWS). Due to high-dimensional and dynamic oceanic data, we propose an intelligent integrated data processing model for the OWS. Firstly, we design an integrated framework of the oceanic data processing and present its processing model. The function of each module of this model is analyzed in details. Then, we propose several intelligent data processing methods, such as an intelligent data cleaning method based on the fuzzy c-means algorithm, a data filtering and clustering method based on the greedy clustering algorithm, and a data processing method based on the maximum entropy for the OWS. The efficiency and accuracy of the proposed model is proved by experimental results of observation data of the Red Tide. The proposed model can automatically find the new clustering center with the updated sample data, and outperforms several algorithms in data processing for the OWS. 相似文献
967.
利用三维可视化软件包,采用Shear—Warp算法实现地震数据的模型可视化,并给出了具体算法流程。实验结果表明此算法可提高地震数据的体绘制速度,实现地震数据解释的实时交互式绘制,为地质勘探提供可视化依据。 相似文献
968.
基于GPRS的远程监控系统中,监控中心实现与前端采集系统的网络数据传输是整个系统的重要的组成部分。本文提出了采用套接字(socket),基于TCP/IP协议实现远程数据收发的办法。简要介绍了基于GPRS的远程监控系统的组成功能,详细论述了基于套接字的编程技术,给出了基于Win32控制台的部分源码。 相似文献
969.
VPN技术种类繁多,但是不同的用户有不同的需求,本文依据当前文献中出现的不同VPN技术,在分析了它们各自的技术特点后,提出了一种远程用户接入本地网络时的VPN方案的选择方法。 相似文献
970.
本文通过对量子密码BB84协议及IEEE802.11i认证协议的分析与讨论,深入研究了802.11i密钥管理机制中的4次握手,利用量子密码安全的优势与IEEE802.11i无线网络相结合,提出量子握手,为无线网络中数据的通信安全提供保障。 相似文献