全文获取类型
收费全文 | 58156篇 |
免费 | 5790篇 |
国内免费 | 2927篇 |
专业分类
电工技术 | 4232篇 |
技术理论 | 2篇 |
综合类 | 4030篇 |
化学工业 | 9158篇 |
金属工艺 | 3235篇 |
机械仪表 | 3807篇 |
建筑科学 | 4477篇 |
矿业工程 | 1818篇 |
能源动力 | 1775篇 |
轻工业 | 4497篇 |
水利工程 | 1126篇 |
石油天然气 | 2623篇 |
武器工业 | 515篇 |
无线电 | 7260篇 |
一般工业技术 | 6543篇 |
冶金工业 | 2647篇 |
原子能技术 | 714篇 |
自动化技术 | 8414篇 |
出版年
2024年 | 277篇 |
2023年 | 1022篇 |
2022年 | 2042篇 |
2021年 | 2714篇 |
2020年 | 2058篇 |
2019年 | 1665篇 |
2018年 | 1865篇 |
2017年 | 2147篇 |
2016年 | 1982篇 |
2015年 | 2880篇 |
2014年 | 3523篇 |
2013年 | 4049篇 |
2012年 | 4364篇 |
2011年 | 4633篇 |
2010年 | 3941篇 |
2009年 | 3680篇 |
2008年 | 3490篇 |
2007年 | 3202篇 |
2006年 | 3136篇 |
2005年 | 2590篇 |
2004年 | 1871篇 |
2003年 | 1426篇 |
2002年 | 1341篇 |
2001年 | 1011篇 |
2000年 | 926篇 |
1999年 | 900篇 |
1998年 | 773篇 |
1997年 | 615篇 |
1996年 | 601篇 |
1995年 | 462篇 |
1994年 | 362篇 |
1993年 | 259篇 |
1992年 | 241篇 |
1991年 | 158篇 |
1990年 | 123篇 |
1989年 | 112篇 |
1988年 | 104篇 |
1987年 | 58篇 |
1986年 | 47篇 |
1985年 | 29篇 |
1984年 | 35篇 |
1983年 | 20篇 |
1982年 | 31篇 |
1981年 | 18篇 |
1980年 | 23篇 |
1979年 | 18篇 |
1977年 | 5篇 |
1976年 | 9篇 |
1965年 | 5篇 |
1959年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
201.
202.
为探究上覆水磷浓度对沉积物孔隙水中磷垂向分布的影响,通过室内实验,利用薄膜扩散平衡技术(DET)对孔隙水中磷浓度进行测量,分析孔隙水磷浓度的垂向变化规律,并揭示平衡时上覆水磷浓度与孔隙水磷浓度以及上覆水-沉积物界面孔隙水磷浓度的关系。结果表明:上覆水磷浓度越高,则沉积物孔隙水中磷垂向分布达到平衡所需的时间越长,相同垂向位置处孔隙水磷浓度及其浓度梯度越大;孔隙水磷浓度及其浓度梯度随深度增加而降低,表层沉积物孔隙水中磷的扩散作用最强,下层沉积物孔隙水磷浓度受上覆水磷浓度变化影响较小;吸附平衡后,沉积物孔隙水磷浓度和上覆水-沉积物界面孔隙水磷浓度均与上覆水磷浓度呈幂函数关系,而留存在沉积物孔隙水中的磷浓度仅占2.26%~3.80%,上覆水中减少的磷大部分被沉积物吸附。 相似文献
203.
To clarify some of the solid-state aspects of cold fusion in deuterated transition metal electrodes, we have carried out first-principles self-consistent total energy calculations for various configurations of atomic and diatomic deuterium inside fcc palladium. We find that the stability of the Pd+D system is controlled by the relative position of the deuterium-inducedantibonding level with respect to the Fermi energy. The equilibrium D-D distance in dense PdD
up to =3 is found to be much larger than the free space value. The calculated Born-Oppenheimer energy surface of diatomic D2 in crystalline palladiuim is shown to have but metastable local minima whose internuclear separation is at least 0.2 Ålarger than that of the isolated D2 molecule. We conclude that D2 incrystalline Pd will have a substantially lower tunneling probability than hitherto thought and that explanation for fusion mechanisms should be sought elsewhere. 相似文献
204.
Entity linking is a fundamental task in natural language processing. The task of entity linking with knowledge graphs aims at linking mentions in text to their correct entities in a knowledge graph like DBpedia or YAGO2. Most of existing methods rely on hand‐designed features to model the contexts of mentions and entities, which are sparse and hard to calibrate. In this paper, we present a neural model that first combines co‐attention mechanism with graph convolutional network for entity linking with knowledge graphs, which extracts features of mentions and entities from their contexts automatically. Specifically, given the context of a mention and one of its candidate entities' context, we introduce the co‐attention mechanism to learn the relatedness between the mention context and the candidate entity context, and build the mention representation in consideration of such relatedness. Moreover, we propose a context‐aware graph convolutional network for entity representation, which takes both the graph structure of the candidate entity and its relatedness with the mention context into consideration. Experimental results show that our model consistently outperforms the baseline methods on five widely used datasets. 相似文献
205.
Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao 《计算机系统科学与工程》2021,39(3):373-390
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier. 相似文献
206.
Liu Jiahuan Guo Fei Gao Huang Huang Zhigao Zhang Yun Zhou Huamin 《Neural computing & applications》2021,33(21):14179-14197
Neural Computing and Applications - Image classification tasks widely exist in many actual scenarios, including medicine, security, manufacture and finance. A major problem that hurts algorithm... 相似文献
207.
Yang Chao Ding Yijie Meng Qiaozhen Tang Jijun Guo Fei 《Neural computing & applications》2021,33(17):11387-11399
Neural Computing and Applications - RNA-binding proteins play an important role in the biological process. However, the traditional experiment technology to predict RNA-binding residues is... 相似文献
208.
Wang Fei Zhang Weiwei Xu Zongfeng Ping Jingyu Chu Hao 《Neural computing & applications》2021,33(15):9061-9073
Neural Computing and Applications - In real-world application of affective brain–computer interface (aBCI), individual differences across subjects and non-stationary characteristics of... 相似文献
209.
云存储安全增强系统的设计与实现 总被引:1,自引:0,他引:1
云存储是一种新型的网络存储形式,并逐步为大家所接受,企业和个人用户都开始使用云存储作为其网络存储媒介。目前很多著名的IT企业都推出了云存储服务,其中Amazon公司推出的SimpleStorageService(S3)就是商用云存储服务的典型代表。随着云存储的广泛使用,云存储中数据的安全问题,如数据泄漏和数据篡改,也成了用户广泛关注的问题。文章基于Amazons3的云存储服务,设计并实现了一款云存储安全增强系统,对用户上传至Amazons3的数据进行加密保护,使得文件以密文形式存储于Amazons3,可以有效防止数据在传输和存储过程中的泄漏;同时系统还对从s3下栽的文件进行完整性校验,检测其内容与上传时是否一致,以防止文件被篡改;最后,系统还提供了多用户访问控制支持,多个用户可以共享同一个S3账号,同时保证各自存储的内容互相隔离,禁止一个用户非授权访问其他用户存储的文件。 相似文献
210.
针对实时监控系统中的运行设备或装置的异常报警信息,设计了基于GSM无线通讯的微机监测系统,实现了多故障远程短信息报警功能,介绍了系统的软硬件设计及主要功能;经应用测试,系统具有宴时性强、稳定性高、投入成本低等特点,能将信息同时发送至多个移动通信终端,已成功应用于农业温室大棚监控系统的实时故障报警,系统也可方便地应用于工厂生产线、金融、交通及家庭安全等方面的远程监测. 相似文献