全文获取类型
收费全文 | 7651篇 |
免费 | 342篇 |
国内免费 | 48篇 |
专业分类
电工技术 | 213篇 |
综合类 | 20篇 |
化学工业 | 1646篇 |
金属工艺 | 159篇 |
机械仪表 | 184篇 |
建筑科学 | 237篇 |
矿业工程 | 8篇 |
能源动力 | 511篇 |
轻工业 | 760篇 |
水利工程 | 89篇 |
石油天然气 | 153篇 |
武器工业 | 4篇 |
无线电 | 940篇 |
一般工业技术 | 1347篇 |
冶金工业 | 451篇 |
原子能技术 | 77篇 |
自动化技术 | 1242篇 |
出版年
2024年 | 17篇 |
2023年 | 178篇 |
2022年 | 422篇 |
2021年 | 524篇 |
2020年 | 372篇 |
2019年 | 372篇 |
2018年 | 479篇 |
2017年 | 334篇 |
2016年 | 377篇 |
2015年 | 233篇 |
2014年 | 357篇 |
2013年 | 589篇 |
2012年 | 389篇 |
2011年 | 442篇 |
2010年 | 281篇 |
2009年 | 240篇 |
2008年 | 227篇 |
2007年 | 206篇 |
2006年 | 172篇 |
2005年 | 153篇 |
2004年 | 124篇 |
2003年 | 105篇 |
2002年 | 118篇 |
2001年 | 65篇 |
2000年 | 67篇 |
1999年 | 76篇 |
1998年 | 123篇 |
1997年 | 108篇 |
1996年 | 71篇 |
1995年 | 78篇 |
1994年 | 51篇 |
1993年 | 50篇 |
1992年 | 40篇 |
1991年 | 23篇 |
1990年 | 28篇 |
1989年 | 42篇 |
1988年 | 46篇 |
1987年 | 28篇 |
1986年 | 28篇 |
1985年 | 42篇 |
1984年 | 49篇 |
1983年 | 41篇 |
1982年 | 26篇 |
1981年 | 21篇 |
1980年 | 28篇 |
1979年 | 23篇 |
1978年 | 18篇 |
1977年 | 21篇 |
1976年 | 30篇 |
1974年 | 17篇 |
排序方式: 共有8041条查询结果,搜索用时 0 毫秒
61.
Muhammad Waseem Rizwan Ahmed Muhammad Irfan Shahid Qamar 《Quantum Information Processing》2013,12(12):3649-3664
We present a scheme for the implementation of three-qubit Grover’s algorithm using four-level superconducting quantum interference devices (SQUIDs) coupled to a superconducting resonator. The scheme is based on resonant, off-resonant interaction of the cavity field with SQUIDs and application of classical microwave pulses. We show that adjustment of SQUID level spacings during the gate operations, adiabatic passage, and second-order detuning are not required that leads to faster implementation. We also show that the marked state can be searched with high fidelity even in the presence of unwanted off-resonant interactions, level decay, and cavity dissipation. 相似文献
62.
We propose a new formulation of quantum algorithm which allows to distribute amplitudes over two copies of small quantum subsystems. The new method gives a fixed number of copies and applied to the control of multi-qubit system. The analysis for the amount of error due to the distribution process has been presented for a system of 10 qubits with a small quantum subsystems to be copied. The present scheme provides a new way to distribute amplitudes over small quantum subsystems. 相似文献
63.
Although CAD tools have significantly assisted electronic system simulation, the system-level optoelectronics modeling field has lagged behind due to a lack of simulation methodologies and tools. Optisim, a system-level modeling and simulation methodology of optical interconnects for HPC systems, can provide computer architects, designers, and researchers with a highly optimized, efficient, and accurate discrete-event environment to test various HPC systems. 相似文献
64.
A fundamental challenge in the design of Wireless Sensor Networks (WSNs) is to maximize their lifetimes especially when they have a limited and non-replenishable energy supply. To extend the network lifetime, power management and energy-efficient communication techniques at all layers become necessary. In this paper, we present solutions for the data gathering and routing problem with in-network aggregation in WSNs. Our objective is to maximize the network lifetime by utilizing data aggregation and in-network processing techniques. We particularly focus on the joint problem of optimal data routing with data aggregation en route such that the above mentioned objective is achieved. We present Grid-based Routing and Aggregator Selection Scheme (GRASS), a scheme for WSNs that can achieve low energy dissipation and low latency without sacrificing quality. GRASS embodies optimal (exact) as well as heuristic approaches to find the minimum number of aggregation points while routing data to the Base-Station (BS) such that the network lifetime is maximized. Our results show that, when compared to other schemes, GRASS improves system lifetime with acceptable levels of latency in data aggregation and without sacrificing data quality. 相似文献
65.
Rotation-invariant target detection using a trained filter-feature-based joint Fourier transform (JFT) correlator is investigated. First, a composite reference image is obtained from a training set of targets. An optimum filter formulation is then applied on this composite image to come up with a new feature that we refer to as a filter feature. This feature is then used in a JFT correlator, which results in a simple and robust rotation-invariant target recognition system. 相似文献
66.
For studying flow problems involved with complex physics it is now common to use numerical field methods for solving Navier-Stokes or Euler equations. However, for a large class of fluid mechanics problems, which can be dealt with linearized potential equations, the boundary element method proves to be quite useful, especially for its easy application and relatively less computational effort compared to the field methods. The boundary element method has undergone some significant advancements in the last decade with respect to the study of steady and unsteady flow problems concerning wing aerodynamics in compressible medium, flow fields of propellers and rotors and acoustical disturbance propagation from moving bodies. In this paper a few recent contributions which evolved in the DLR as research projects and as doctoral and diploma thesis of the Technical University Braunschweig are concisely described.List of symbols
a
Sound velocity
-
b
Span of a wing
-
c
p
Coefficient of static pressure
-
c
dp
Coefficient of profile drag
-
c
1, c
d, cm
Coefficient of lift, drag and moment per unit span width
-
c
L, cD, cM
Total lift, drag and moment-coefficients
-
c
T, cP
Thrust and power-coefficient of a propeller
-
d
Distance
- D
Doublet strength
-
e
Specific heat energy
-
E
Total energy in a moving medium element
-
f
Frequency
-
F
Field point
-
g
Gravitational acceleration
-
h
Radial distance in cylinder coordinates
-
I
1, I
2
Inducing functions
-
i, j, k
Unit vectors in cartesian coordinates
-
k
Wave number [/a
]
-
l
Local wing-chord
-
l
0, l
v
Length of singularity element at t
oand t
v
-
m
Notation for Fourier-component
-
M, M
*
Mach number based on local and critical sound speed
-
n
Number of rotation per second
- n
Unit normal vector to a surface 相似文献
67.
Omar Ahmed Emam Serag Ahmed Farag Nagy Haliem Aziz 《Zeitschrift für Lebensmitteluntersuchung und -Forschung A》1995,201(6):557-561
Powdered black pepper from Egyptian markets, was irradiated with different recommended doses of gamma rays (5.0 and 10.0 kGy) and with microwaves for different periods (20, 40 and 75 s) to improve its hygienic quality. The most common bacterial isolates were of three generaBacillus, Clostridium andMicrococcus (7.5 × 106), whereas the predominant fungi (7.8 × 104) wereAspergillus species,A. glaucus, A. flavus, A. niger andA. ochraceus. Doses of gamma irradiation used (5.0 and 10 kGy) were sufficient to decrease spore-forming bacteria (SFB) and to inhibit the fungal flora and coliforms which contaminated the black pepper powder. Microwave treatments for 40 s and 75 s were of the same effectiveness whereas treatment for 20 s was less so. GLC analysis proved the presence of 31 peaks, only 19 compounds were identified as monoterpene hydrocarbons (56.21%), the major one being -phellandrene and limonene. Sesquiterpenes were also present, mainly -caryollphyllene (3.69%) as well as oxygenated compounds such as terpenol, geraniol, Me-chavicol, eugenol and anisol. Gamma irradiation at 5 kGy and 10 kGy respectively decreased the numbers of identified compounds from 21 (86.58% concentration) in untreated pepper to 16 (59.22% concentration), 15 (54.06% concentration). In comparison, microwave treatments, particularly for 40 s and 75 s, increased the concentration of the same compounds. The results obtained indicate that microwave treatment, under these conditions, is a safe and suitable technique for decontamination of black pepper which does not result in a great loss of flavour compounds, as compared with recommended doses of gamma irradiation. 相似文献
68.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT. 相似文献
69.
Khaled M. Alalayah Fatma S. Alrayes Jaber S. Alzahrani Khadija M. Alaidarous Ibrahim M. Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim 《计算机系统科学与工程》2023,46(3):3121-3139
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches. 相似文献
70.
El-Moursy Ali A. Sibai Fadi N. Rehman Jahanzeb Gouda Omar M. Gaber Abdelrahman T. Khedr Ahmed M. 《Wireless Personal Communications》2022,124(2):1525-1555
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT).... 相似文献