全文获取类型
收费全文 | 9471篇 |
免费 | 731篇 |
国内免费 | 89篇 |
专业分类
电工技术 | 180篇 |
综合类 | 41篇 |
化学工业 | 2615篇 |
金属工艺 | 213篇 |
机械仪表 | 394篇 |
建筑科学 | 354篇 |
矿业工程 | 20篇 |
能源动力 | 615篇 |
轻工业 | 910篇 |
水利工程 | 190篇 |
石油天然气 | 140篇 |
武器工业 | 5篇 |
无线电 | 976篇 |
一般工业技术 | 1613篇 |
冶金工业 | 210篇 |
原子能技术 | 67篇 |
自动化技术 | 1748篇 |
出版年
2024年 | 40篇 |
2023年 | 191篇 |
2022年 | 346篇 |
2021年 | 612篇 |
2020年 | 550篇 |
2019年 | 680篇 |
2018年 | 775篇 |
2017年 | 732篇 |
2016年 | 723篇 |
2015年 | 429篇 |
2014年 | 711篇 |
2013年 | 1037篇 |
2012年 | 651篇 |
2011年 | 731篇 |
2010年 | 471篇 |
2009年 | 404篇 |
2008年 | 244篇 |
2007年 | 181篇 |
2006年 | 148篇 |
2005年 | 101篇 |
2004年 | 101篇 |
2003年 | 58篇 |
2002年 | 57篇 |
2001年 | 28篇 |
2000年 | 23篇 |
1999年 | 25篇 |
1998年 | 22篇 |
1997年 | 18篇 |
1996年 | 23篇 |
1995年 | 19篇 |
1994年 | 10篇 |
1993年 | 15篇 |
1992年 | 10篇 |
1991年 | 17篇 |
1990年 | 16篇 |
1989年 | 12篇 |
1988年 | 7篇 |
1987年 | 7篇 |
1986年 | 8篇 |
1985年 | 8篇 |
1984年 | 14篇 |
1983年 | 12篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1979年 | 6篇 |
1978年 | 3篇 |
1977年 | 2篇 |
1973年 | 2篇 |
1967年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Alenazy Wael Mohammad Alqahtani Abdullah Saleh 《Multimedia Tools and Applications》2021,80(5):7411-7431
Multimedia Tools and Applications - Face detection by low-resolution image (LR) is one of the key aspects of Human-Computer Interaction(HCI). Due to the LR image, which has changes in pose,... 相似文献
992.
Keyvanpour Mohammad Reza Khanbani Neda Aliniya Zahra 《Multimedia Tools and Applications》2021,80(9):13879-13910
Multimedia Tools and Applications - Auto understanding of human activities in video is an increasing necessity in some application realms. The existing methods for human’s activity... 相似文献
993.
Younesi Reza Rastegar Fatemi Mohammad Jalal Rastgarpour Maryam 《Multimedia Tools and Applications》2021,80(30):36249-36274
Multimedia Tools and Applications - This paper presents an area-efficient and multi-sized DCT architecture for HEVC application. We exploit the commonality in the arithmetic units to increase the... 相似文献
994.
Elkenawy Ahmed El-Nagar Ahmad M. El-Bardini Mohammad El-Rabaie Nabila M. 《Neural computing & applications》2021,33(15):9221-9240
Neural Computing and Applications - This study introduces a neural network (NN) adaptive tracking controller-based reinforcement learning (RL) scheme for unknown nonlinear systems. First, an... 相似文献
995.
Zaki Ahmad M. El-Nagar Ahmad M. El-Bardini Mohammad Soliman F. A. S. 《Neural computing & applications》2021,33(5):1515-1531
Neural Computing and Applications - For the current paper, the technique of feed-forward neural network deep learning controller (FFNNDLC) for the nonlinear systems is proposed. The FFNNDLC... 相似文献
996.
Mahmoodi Kumars Ketabdari Mohammad Javad Vaghefi Mohammad 《Pattern Analysis & Applications》2021,24(4):1859-1872
Pattern Analysis and Applications - Outlier or anomaly detection is an important branch of data analysis that becomes a crucial task in many application domains. Data objects which significantly... 相似文献
997.
This paper offers a recurrent neural network to support vector machine (SVM) learning in stochastic support vector regression with probabilistic constraints. The SVM is first converted into an equivalent quadratic programming (QP) formulation in linear and nonlinear cases. An artificial neural network for SVM learning is then proposed. The presented neural network framework guarantees obtaining the optimal solution of the SVM problem. The existence and convergence of the trajectories of the network are studied. The Lyapunov stability for the considered neural network is also shown. The efficiency of the proposed method is shown by three illustrative examples.
相似文献998.
Javidan Kazemi Kordestani Ali Ahmadi Mohammad Reza Meybodi 《Applied Intelligence》2014,41(4):1150-1169
A new variant of Differential Evolution (DE), called ADE-Grid, is presented in this paper which adapts the mutation strategy, crossover rate (CR) and scale factor (F) during the run. In ADE-Grid, learning automata (LA), which are powerful decision making machines, are used to determine the proper value of the parameters CR and F, and the suitable strategy for the construction of a mutant vector for each individual, adaptively. The proposed automata based DE is able to maintain the diversity among the individuals and encourage them to move toward several promising areas of the search space as well as the best found position. Numerical experiments are conducted on a set of twenty four well-known benchmark functions and one real-world engineering problem. The performance comparison between ADE-Grid and other state-of-the-art DE variants indicates that ADE-Grid is a viable approach for optimization. The results also show that the proposed ADE-Grid improves the performance of DE in terms of both convergence speed and quality of final solution. 相似文献
999.
Benyamin Norouzi Seyed Mohammad Seyedzadeh Sattar Mirzakuchaki Mohammad Reza Mosavi 《Multimedia Systems》2014,20(1):45-64
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms. 相似文献
1000.
In this work, we investigate the structural behavior of a micro-electromechanical system arch microbeam actuated by electric fringing-fields where the electrodes are located at both side of the microbeam. In this particular configuration, the electrostatic actuating force is caused by the asymmetry of the fringing electric fields acting in a direction opposite to the relative deflection of the microbeam. A reduced-order model is derived for the considered system using the so-called Galerkin decomposition and assuming linear undamped mode shapes of a straight beam as basis functions in the decomposition process. A static analysis is performed to investigate the occurrence of any structural instability. The eigenvalue problem is then investigated to calculate the fundamental as well as higher natural frequencies variation of the microbeam with the applied DC load. A bifurcation analysis is then implemented to derive a criterion for whether symmetric or asymmetric bifurcation is occurring during the static structural instability. The results show elimination of the so-called pull-in instability in this kind of systems as compared to the regular case of parallel-plates electrostatic actuation. The bifurcation analysis shows that the arch goes for asymmetric bifurcation (symmetry breaking) with increase in initial elevation without the occurrence of symmetric bifurcation (snap-through) for any initial elevation. 相似文献