全文获取类型
收费全文 | 105272篇 |
免费 | 9775篇 |
国内免费 | 5710篇 |
专业分类
电工技术 | 7217篇 |
技术理论 | 9篇 |
综合类 | 9345篇 |
化学工业 | 16354篇 |
金属工艺 | 6059篇 |
机械仪表 | 6673篇 |
建筑科学 | 8112篇 |
矿业工程 | 2820篇 |
能源动力 | 2895篇 |
轻工业 | 10723篇 |
水利工程 | 2115篇 |
石油天然气 | 5246篇 |
武器工业 | 1028篇 |
无线电 | 11214篇 |
一般工业技术 | 11065篇 |
冶金工业 | 3924篇 |
原子能技术 | 1133篇 |
自动化技术 | 14825篇 |
出版年
2024年 | 499篇 |
2023年 | 1773篇 |
2022年 | 3520篇 |
2021年 | 4540篇 |
2020年 | 3454篇 |
2019年 | 2707篇 |
2018年 | 2941篇 |
2017年 | 3463篇 |
2016年 | 3007篇 |
2015年 | 4453篇 |
2014年 | 5688篇 |
2013年 | 6525篇 |
2012年 | 7678篇 |
2011年 | 8387篇 |
2010年 | 7527篇 |
2009年 | 7114篇 |
2008年 | 7087篇 |
2007年 | 6618篇 |
2006年 | 6319篇 |
2005年 | 5014篇 |
2004年 | 3568篇 |
2003年 | 3017篇 |
2002年 | 3064篇 |
2001年 | 2579篇 |
2000年 | 2150篇 |
1999年 | 1857篇 |
1998年 | 1345篇 |
1997年 | 1027篇 |
1996年 | 917篇 |
1995年 | 684篇 |
1994年 | 557篇 |
1993年 | 386篇 |
1992年 | 329篇 |
1991年 | 245篇 |
1990年 | 164篇 |
1989年 | 144篇 |
1988年 | 90篇 |
1987年 | 76篇 |
1986年 | 59篇 |
1985年 | 30篇 |
1984年 | 18篇 |
1983年 | 24篇 |
1982年 | 24篇 |
1981年 | 24篇 |
1980年 | 32篇 |
1979年 | 9篇 |
1965年 | 2篇 |
1960年 | 2篇 |
1959年 | 8篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Visual Cryptography (VC) has been developed as a significant research arena in media security. Despite of its obvious strengths, recent investigations have debated this scheme from adverse aspects, its problem is lack of authentication of VC shares, VC authentication related to digital image processing and cryptography has not been fully integrated together in the past years. In this paper, we analyze both visual features and cryptographic features of VC shares and take use of them for VC authentication. Compared to those existing methods, our contribution is the first one to integrate visual features and cryptographic features of VC shares into Hash code for the purpose of VC authentication. 相似文献
992.
Deng Juan Zhao Shu Wang Yan Wang Lei Wang Hong Sha Hong 《Multimedia Tools and Applications》2017,76(7):10097-10117
Multimedia Tools and Applications - Most of the existing image encryption algorithms based on compressive sensing are too complex to operate. An image compression-encryption scheme with simple... 相似文献
993.
Shaio Yan Huang Chi-Chen Lin An-An Chiu David C. Yen 《Information Systems Frontiers》2017,19(6):1343-1356
The objective of this study is to identify the financial statement fraud factors and rank the relative importance. First, this study reviews the previous studies to identify the possible fraud indicators. Expert questionnaires are distributed next. After questionnaires are collected, Lawshe’s approach is employed to eliminate these factors whose CVR (content validity ratio) values do not meet the criteria. Further, the remaining 32 factors are reviewed by experts to be the measurements suitable for the assessment of fraud detection. The Analytic Hierarchy Process (AHP) is utilized to determine the relative weights of the individual items. The result of AHP shows that the most important dimension is Pressure/Incentive and the least one is Attitude/rationalization. In addition, the top five important measurements are “Poor performance”, “The need for external financing”, “Financial distress”, “Insufficient board oversight”, and “Competition or market saturation”. The result provides a significant advantage to auditors and managers in enhancing the efficiency of fraud detection and critical evaluation. 相似文献
994.
Event‐Triggered Control for Couple‐Group Multi‐Agent Systems with Logarithmic Quantizers and Communication Delays 下载免费PDF全文
This paper mainly investigates the event‐triggered control for couple‐group multi‐agent systems with communication delay. Logarithmic quantization is considered in the communication channels. Event‐triggered control laws are adopted to reduce the frequency of individual actuation updating for discrete‐time agent dynamics. The proposed protocol is efficient as long as the quantization levels are dense enough, i.e. the density of quantization levels goes to infinity is a sufficient condition for the asymptotic consensus of the multi‐agent systems. It turns out that the bounded consensus depends on not only the density of quantization levels, but also the updating strategy of events. Finally, a simulation example is given to demonstrate the effectiveness of the proposed methods. 相似文献
995.
This study considers a multi-trip split-delivery vehicle routing problem with soft time windows for daily inventory replenishment under stochastic travel times. Considering uncertainty in travel times for vehicle routing problems is beneficial because more robust schedules can be generated and unanticipated consequences can be reduced when schedules are implemented in reality. However, uncertainties in model parameters have rarely been addressed for the problems in this category mainly due to the high problem complexity. In this study, an innovative and practical approach is proposed to consider stochastic travel times in the planning process. In the planning model, the possible outcomes of vehicle arrivals and product delivery at retailers are systematically categorized and their associated penalty and reward are estimated. Thus, unanticipated costs for every scheduling decision can be incorporated into the planning model to generate vehicle routing schedules that are more robust facing uncertain traffic conditions. To solve the model that is characterized as an NP-hard problem in a reasonable amount of time, a two-stage heuristic solution algorithm is proposed. Finally, the stochastic model is compared with the deterministic model in both planning and simulated operation stages using the data of a supply chain in Taiwan. The result confirms that the schedule generated by the stochastic model is more robust than the one created with the deterministic model because undesired outcomes such as unfulfilled demands are greatly reduced. 相似文献
996.
The growing demand for microfluidic analytical devices calls for fast, cost-effective and high-throughput fabrication methods. Here we report a low-cost rapid prototyping method for single-layer microfluidic PDMS devices with abrupt depth variations under non-clean-room conditions. Channel patterns with different user-designed depths ranging from micrometres to millimetres are engraved on a polymethylmethacrylate (PMMA) plate in one step based on a laser ablation approach. A UV-curable polymer, Norland Optical Adhesive (NOA) 81, is then used to replicate the channel patterns from the PMMA female mould and is finally used as the master for single-layer polydimethylsiloxane (PDMS) microfluidic devices. This rapid prototyping method can significantly facilitate the fast evaluation of proof of concept in microfluidic researches and small-scale mass production for commercialization applications. 相似文献
997.
This paper presents a gradient based concurrent multi-scale design optimization method for composite frames considering specific manufacturing constraints raised from the aerospace industrial requirements. Geometrical parameters of the frame components at the macro-structural scale and the discrete fiber winding angles at the micro-material scale are introduced as the independent design variables at the two geometrical scales. The DMO (Discrete Material Optimization) approach is utilized to couple the two geometrical scales and realize the simultaneous optimization of macroscopic topology and microscopic material selection. Six kinds of manufacturing constraints are explicitly included in the optimization model as series of linear inequalities or equalities. The capabilities of the proposed optimization model are demonstrated with the example of compliance minimization, subject to constraint on the composite volume. The linear constraints and optimization problems are solved by Sequential Linear Programming (SLP) optimization algorithm with move limit strategy. Numerical results show the potential of weight saving and structural robustness design with the proposed concurrent optimization model. The multi-scale optimization model, considering specific manufacturing constraints, provides new choices for the design of the composite frame structure in aerospace and other industries. 相似文献
998.
999.
1000.
公共自行车租赁系统已逐步纳入城市公共交通体系,以解决公交出行“最后一公里”问题。本文针对自行车租赁系统中的安全认证问题,提出用软件模块实现DES算法代替传统所使用的PSAM(Purchase Secure Access Module)硬件卡方案,分别在自行车租赁系统内的售卡系统、消费终端和车辆信息几个模块中,实现DES加密。不仅提高现有系统智能卡的扩展性和安全性,而且减少硬件成本,提高了系统的效率。 相似文献