全文获取类型
收费全文 | 115243篇 |
免费 | 3951篇 |
国内免费 | 2031篇 |
专业分类
电工技术 | 2954篇 |
技术理论 | 2篇 |
综合类 | 4466篇 |
化学工业 | 16488篇 |
金属工艺 | 6467篇 |
机械仪表 | 5134篇 |
建筑科学 | 5308篇 |
矿业工程 | 1480篇 |
能源动力 | 1983篇 |
轻工业 | 6165篇 |
水利工程 | 1832篇 |
石油天然气 | 1767篇 |
武器工业 | 281篇 |
无线电 | 13060篇 |
一般工业技术 | 19859篇 |
冶金工业 | 3880篇 |
原子能技术 | 657篇 |
自动化技术 | 29442篇 |
出版年
2024年 | 178篇 |
2023年 | 641篇 |
2022年 | 1187篇 |
2021年 | 1626篇 |
2020年 | 1152篇 |
2019年 | 959篇 |
2018年 | 15311篇 |
2017年 | 14392篇 |
2016年 | 10926篇 |
2015年 | 1912篇 |
2014年 | 1917篇 |
2013年 | 2096篇 |
2012年 | 5275篇 |
2011年 | 11635篇 |
2010年 | 10285篇 |
2009年 | 7459篇 |
2008年 | 8559篇 |
2007年 | 9451篇 |
2006年 | 1753篇 |
2005年 | 2617篇 |
2004年 | 2054篇 |
2003年 | 2024篇 |
2002年 | 1384篇 |
2001年 | 857篇 |
2000年 | 872篇 |
1999年 | 774篇 |
1998年 | 549篇 |
1997年 | 512篇 |
1996年 | 513篇 |
1995年 | 387篇 |
1994年 | 325篇 |
1993年 | 218篇 |
1992年 | 173篇 |
1991年 | 135篇 |
1990年 | 83篇 |
1989年 | 83篇 |
1988年 | 72篇 |
1987年 | 45篇 |
1986年 | 36篇 |
1968年 | 43篇 |
1966年 | 42篇 |
1965年 | 45篇 |
1962年 | 64篇 |
1961年 | 57篇 |
1960年 | 46篇 |
1959年 | 37篇 |
1958年 | 37篇 |
1957年 | 36篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
991.
M. Kamruzzaman Chaoping Liu A. K. M. Farid Ul Islam J. A. Zapien 《Semiconductors》2017,51(12):1615-1624
The thin film of Sb2Se3 was deposited by thermal evaporation method and the film was annealed in N2 flow in a three zone furnace at a temperature of 290°С for 30 min. The structural properties were characterized by scanning electron microscopy (SEM), transmission electron microscopy (ТЕМ), X-ray diffraction (XRD) and Raman spectroscopy, respectively. It is seen that the as-deposited film is amorphous and the annealed film is polycrystalline in nature. The surface of Sb2Se3 film is oxidized with a thickness of 1.15 nm investigated by X-ray photolecetron spectroscopy (XPS) measurement. Spectroscopic ellipsometry (SE) and UV–vis spectroscopy measurements were carried out to study the optical properties of Sb2Se3 film. In addition, the first principles calculations were applied to study the electronic and optical properties of Sb2Se3. From the theoretical calculation it is seen that Sb2Se3 is intrinsically an indirect band gap semiconductor. Importantly, the experimental band gap is in good agreement with the theoretical band gap. Furthermore, the experimental values of n, k, ε1, and ε2 are much closer to the theoretical results. However, the obtained large dielectric constants and refractive index values suggest that exciton binding energy in Sb2Se3 should be relatively small and an antireflective coating is recommended to enhance the light absorption of Sb2Se3 for thin film solar cells application. 相似文献
992.
Andreas Winter 《Journal of Cryptology》2017,30(1):1-21
We show that it is possible for the so-called weak locking capacity of a quantum channel (Guha et al. in Phys Rev X 4:011016, 2014) to be much larger than its private capacity. Both reflect different ways of capturing the notion of reliable communication via a quantum system while leaking almost no information to an eavesdropper; the difference is that the latter imposes an intrinsically quantum security criterion whereas the former requires only a weaker, classical condition. The channels for which this separation is most straightforward to establish are the complementary channels of classical-quantum (cq-)channels and, hence, a subclass of Hadamard channels. We also prove that certain symmetric channels (related to photon number splitting) have positive weak locking capacity in the presence of a vanishingly small pre-shared secret, whereas their private capacity is zero. These findings are powerful illustrations of the difference between two apparently natural notions of privacy in quantum systems, relevant also to quantum key distribution: the older, naïve one based on accessible information, contrasting with the new, composable one embracing the quantum nature of the eavesdropper’s information. Assuming an additivity conjecture for constrained minimum output Rényi entropies, the techniques of the first part demonstrate a single-letter formula for the weak locking capacity of complements to cq-channels, coinciding with a general upper bound of Guha et al. for these channels. Furthermore, still assuming this additivity conjecture, this upper bound is given an operational interpretation for general channels as the maximum weak locking capacity of the channel activated by a suitable noiseless channel. 相似文献
993.
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a “qualified” subset of parties can efficiently reconstruct the secret while any “unqualified” subset of parties cannot efficiently learn anything about the secret. The collection of “qualified” subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in \({\mathsf {P}}\)). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in \({\mathsf {NP}}\): in order to reconstruct the secret a set of parties must be “qualified” and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467–476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement \(x\in L\) for a language \(L\in {\mathsf {NP}}\) such that anyone holding a witness to the statement can decrypt the message; however, if \(x\notin L\), then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in \({\mathsf {NP}}\) assuming witness encryption for \({\mathsf {NP}}\) and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone \({\mathsf {NP}}\)-complete function implies a computational secret-sharing scheme for every monotone function in \({\mathsf {NP}}\). 相似文献
994.
995.
Marija Denkovska Pero Latkoski Liljana Gavrilovska 《Wireless Personal Communications》2016,87(3):713-730
This paper investigates the possible coexistence issues between the digital video broadcasting-terrestrial (DVB-T) system and the long term evolution (LTE) that operate in adjacent frequency bands. The proposed methodology for interference assessment evaluates the DVB-T performance degradation in presence of aggregate LTE-800 interference targeting the territory of Macedonia as evaluation area. The simulation analysis quantifies the percentage of interference degraded pixels and obtains the probability of pixel DVB-T service degradation. Furthermore, a measurement trial complements the simulation analysis through the evaluation of the influence of active antenna usage by the DVB-T receivers. The simulation and measurement results in this particular case confirm that the alignment of the active DVB-T receiving antenna towards the LTE-800 base station can substantially increase the degradation whereas aligning of the active DVB-T receiving antenna towards the DVB-T transmitter maintains the efficient TV reception. Finally, this paper proposes a simple algorithm for optimal LTE frequency arrangement, resulting in significant reduction of the LTE interference towards the DVB-T system. 相似文献
996.
Eui-Hak Lee Hwan-Jun Choi Jong-Ho Paik Dong-Sun Kim Hyoung-Kyu Song 《Wireless Personal Communications》2016,88(4):1015-1025
In this paper, the hierarchical space time cyclic delay diversity (H-STCDD) scheme is proposed. Proposed scheme uses hierarchical modulation and achieves approximately full rate. It also uses a cyclic delay diversity scheme, which improves the benefit of channel coding particularly in high SNR environment between source to relay and source to destination. According to simulation result, proposed scheme has up to 2.2 dB better BER performance than conventional cooperative scheme at BER of 10?3 and has similar BER performance with the STCDD scheme particularly in high SNR environment between source to relay and source to destination. Throughput of the proposed scheme is better than those of other cooperative schemes. Therefore proposed scheme is more efficient than other cooperative scheme and can be efficiently used in high SNR environment between source to relay and source to destination. 相似文献
997.
Hsin-Hung Cho Chin-Feng Lai Timothy K. Shih Han-Chieh Chao 《Mobile Networks and Applications》2016,21(5):846-855
A mature cloud system needs a complete resource allocation policy which includes internal and external allocation. They not only enable users to have better experiences, but also allows the cloud provider to cut costs. In the other words, internal and external allocation are indispensable since a combination of them is only a total solution for whole cloud system. In this paper, we clearly explain the difference between internal allocation (IA) and external allocation (EA) as well as defining the explicit IA and EA problem for the follow up research. Although many researchers have proposed resource allocation methods, they are just based on subjective observations which lead to an imbalance of the overall cloud architecture, and cloud computing resources to operate se-quentially. In order to avoid an imbalanced situation, in previous work, we proposed Data Envelopment Analysis (DEA) to solve this problem; it considers all of a user’s demands to evaluate the overall cloud parameters. However, although DEA can provide a higher quality solution, it requires more time. So we use the Q-learning and Data Envelopment Analysis (DEA) to solve the imbalance problem and reduce computing time. As our simulation results show, the proposed DEA+Qlearning will provide almost best quality but too much calculating time. 相似文献
998.
Peicheng Zhou Gong Cheng Zhenbao Liu Shuhui Bu Xintao Hu 《Multidimensional Systems and Signal Processing》2016,27(4):925-944
Target detection in remote sensing images (RSIs) is a fundamental yet challenging problem faced for remote sensing images analysis. More recently, weakly supervised learning, in which training sets require only binary labels indicating whether an image contains the object or not, has attracted considerable attention owing to its obvious advantages such as alleviating the tedious and time consuming work of human annotation. Inspired by its impressive success in computer vision field, in this paper, we propose a novel and effective framework for weakly supervised target detection in RSIs based on transferred deep features and negative bootstrapping. On one hand, to effectively mine information from RSIs and improve the performance of target detection, we develop a transferred deep model to extract high-level features from RSIs, which can be achieved by pre-training a convolutional neural network model on a large-scale annotated dataset (e.g. ImageNet) and then transferring it to our task by domain-specifically fine-tuning it on RSI datasets. On the other hand, we integrate negative bootstrapping scheme into detector training process to make the detector converge more stably and faster by exploiting the most discriminative training samples. Comprehensive evaluations on three RSI datasets and comparisons with state-of-the-art weakly supervised target detection approaches demonstrate the effectiveness and superiority of the proposed method. 相似文献
999.
Jie Ren Ming Xu Jeremy S. Smith Shi Cheng 《Multidimensional Systems and Signal Processing》2016,27(4):1007-1029
For the robust detection of pedestrians in intelligent video surveillance, an approach to multi-view and multi-plane data fusion is proposed. Through the estimated homography, foreground regions are projected from multiple camera views to a reference view. To identify false-positive detections caused by foreground intersections of non-corresponding objects, the homographic transformations for a set of parallel planes, which are from the head plane to the ground, are applied. Multiple features including occupancy information and colour cues are extracted from such planes for joint decision-making. Experimental results on real world sequences have demonstrated the good performance of the proposed approach in pedestrian detection for intelligent visual surveillance. 相似文献
1000.
Cloud-integrated fiber-wireless (FiWi) networks inheriting advantages of optical and wireless access networks have a broad prospect in the future. As various component failures may occur in cloud-integrated FiWi networks, survivability is becoming one of the key important issues. It is necessary to provide survivability strategies for cloud-integrated FiWi networks. Hence, this paper mainly focuses on the survivability of cloud-integrated FiWi networks against multiple fibers failure. Firstly, in this paper, a novel integer linear programming (ILP) solution is proposed to tolerate the failure of multiple distribution fibers with capacity and coverage constraints in the context of urban area. Then, considering the complexity of ILP models, an efficient heuristic scheme is proposed, in order to get the approximate solutions of ILP. Simulation results and analysis give the configurations of optical network units (ONUs) and wireless routers with different constraints and show the network coverage of clients for different number of ONUs and wireless routers with ILP solution and heuristic approach, respectively. 相似文献