全文获取类型
收费全文 | 395311篇 |
免费 | 23236篇 |
国内免费 | 7245篇 |
专业分类
电工技术 | 17924篇 |
技术理论 | 41篇 |
综合类 | 19866篇 |
化学工业 | 63467篇 |
金属工艺 | 23050篇 |
机械仪表 | 22867篇 |
建筑科学 | 25810篇 |
矿业工程 | 10402篇 |
能源动力 | 9910篇 |
轻工业 | 21489篇 |
水利工程 | 6272篇 |
石油天然气 | 21694篇 |
武器工业 | 2313篇 |
无线电 | 43717篇 |
一般工业技术 | 53238篇 |
冶金工业 | 18226篇 |
原子能技术 | 3798篇 |
自动化技术 | 61708篇 |
出版年
2025年 | 648篇 |
2024年 | 6892篇 |
2023年 | 6308篇 |
2022年 | 8839篇 |
2021年 | 12732篇 |
2020年 | 10650篇 |
2019年 | 9070篇 |
2018年 | 22086篇 |
2017年 | 22152篇 |
2016年 | 18226篇 |
2015年 | 12577篇 |
2014年 | 14862篇 |
2013年 | 17314篇 |
2012年 | 21223篇 |
2011年 | 28758篇 |
2010年 | 24949篇 |
2009年 | 21422篇 |
2008年 | 22190篇 |
2007年 | 22931篇 |
2006年 | 16532篇 |
2005年 | 15693篇 |
2004年 | 10360篇 |
2003年 | 9256篇 |
2002年 | 7998篇 |
2001年 | 6729篇 |
2000年 | 7441篇 |
1999年 | 8796篇 |
1998年 | 7073篇 |
1997年 | 5975篇 |
1996年 | 5609篇 |
1995年 | 4587篇 |
1994年 | 3819篇 |
1993年 | 2681篇 |
1992年 | 2198篇 |
1991年 | 1663篇 |
1990年 | 1196篇 |
1989年 | 957篇 |
1988年 | 791篇 |
1987年 | 541篇 |
1986年 | 400篇 |
1985年 | 286篇 |
1984年 | 210篇 |
1983年 | 135篇 |
1982年 | 145篇 |
1981年 | 103篇 |
1980年 | 82篇 |
1968年 | 43篇 |
1965年 | 46篇 |
1955年 | 66篇 |
1954年 | 70篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
在分析CVMS操作系统软硬件支持的基础上,提出了国产中西文终端GW220,CJ4010,HZ200A等作为VAX计算机终端时进入和使用CVMS操作系统的一种方法;比较了EDIT和HEDT两个编辑命令使用的异同;最后,通过建立LOGIN,COM命令过程,提出了进入CVMS系统更为方便的方法。 相似文献
992.
根据实验所测有关电解质溶液的活度系数,确定其数学模型为γ=e~(a bm cm~2 d/m)。利用最小二乘法建立了1∶1型电解质活度系数与浓度之间的函数关系式,从而通过此关系式可对任意浓度下1∶1型电解质的活度系数进行预测,其相对误差不超过2.6%。 相似文献
993.
设备诊断系统的建立及应用 总被引:1,自引:0,他引:1
张东初 《郑州轻工业学院学报(自然科学版)》1994,9(4):45-49
介绍了一套设备诊断系统的基本构成,通过实例证明了系统的可行性;展示了实施设备状态监测和故障诊断这种先进设备管理维修方式良好的发展前景. 相似文献
994.
995.
Quantized Feedback Adaptive Reliable $$H_{\infty }$$ Control for Linear Time-Varying Delayed Systems
Based on an improved \(H_\infty \) performance index, the method of designing a reliable adaptive \(H_\infty \) controller with quantized state is addressed for the time-varying delayed system in this paper. On the basis of online estimates of actuator faults, the controller parameters are updated automatically to compensate the influence of actuator faults on the system while the desired improved \(H_\infty \) performance is preserved. A Lyapunov function candidate is constructed to prove that the closed-loop system is asymptotically stable. And the existing sufficient conditions of the controller are proved to be less conservative. The gains of the controller and the parameters of the adaptive law are co-designed and obtained in terms of solutions to a set of linear matrix inequalities. Finally, two numerical examples are given to illustrate that the proposed method is more effective than the previous methods for time-varying delayed systems. 相似文献
996.
Leonardo Bruno de Sá Maurício Henrique Costa Dias Antonio Carneiro de Mesquita Filho 《Circuits, Systems, and Signal Processing》2016,35(11):3811-3829
Whereas the present practice of designing matching networks for antennas is limited to conventional topologies, requiring a significant amount of domain knowledge, evolutionary algorithms can be used for automatically identifying unconventional designs that are more effective than would otherwise be developed. In this work, an automatic method to design lossless matching networks driven by an evolutionary algorithm (EA) that considers the sensitivities of the network parameters during the synthesis process is presented. To this end, a closed-form expression for the transducer power gain (TPG) sensitivity with respect to the component values is employed in such a way that the effects of the components tolerance on the matching network performance can easily be quantified. A 3D data structure based on the adjacency matrix is conveniently used to represent any type of network topologies. The proposed EA employs a novel set of topology variation operators, tailored for changing the circuit topology, and an association step, with the aim of reducing the number of nodes of the matching circuit. The efficiency of the proposed EA is tested in the synthesis of an impedance matching network for a VHF monopole whip antenna. This study’s results indicate a matching bandwidth improvement, a more uniformly distributed TPG along the operation frequency band and a more stable TPG regarding the components tolerance compared to the results obtained by previous approaches. 相似文献
997.
Kaifang Yang Shuai Wan Yanchao Gong Hong Ren Wu Yan Feng 《Circuits, Systems, and Signal Processing》2016,35(11):4099-4128
This paper presents a novel filtering technique based on sample adaptive offset (SAO) in H.265/high-efficiency video coding (HEVC) for reduction in the temporal flickering artifacts and improving the coding performance. SAO is a newly introduced technique for in-loop filtering in H.265/HEVC, which derives the offsets independently for each frame in the spatial domain without considering temporal frame correlation. As a result, the temporal distortion artifacts which will have a negative effect on the subjective quality, such as flickering artifacts, cannot be effectively addressed. In this paper, the rate-distortion optimization of the newly developed SAO method, referred to as Inter-SAO, is performed on the residual samples between adjacent frames. Inter-SAO and SAO in the reference software of H.265/HEVC (i.e., the test model HM) are then combined to form the novel in-loop filter-based method, denoted as 3D-SAO filtering method, where both spatial information and temporal information are effectively utilized to reduce the overall distortion in reconstructed videos. Compared with the SAO in HM, 3D-SAO has demonstrated its advanced performance for flickering artifacts suppression. Furthermore, 3D-SAO improves the coding efficiency compared with the SAO in HM with a performance gain of up to 0.91 dB in \(\Delta PSNR\), 1.74 dB in \(\Delta PSPNR\) and 7.33 % in BD-rate reduction. 相似文献
998.
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal state of a party in a protocol without probing its internal secret state. However, when transactions are concurrent, say over the Internet, with players possessing public keys (as is common in cryptography), assuring that entities “know” what they claim to know, where adversaries may be well coordinated across different transactions, turns out to be much more subtle and in need of re-examination. In such settings, mixing the public-key structure as part of the language and statements is a natural adversarial strategy. Here, we investigate how to formally treat knowledge possession by parties interacting concurrently in the public-key model. More technically, we look into the relative power of the notion of “concurrent knowledge extraction” (CKE) for concurrent zero knowledge (CZK) in the bare public-key (BPK) model, where the language and statements being proved can be dynamically and adaptively chosen by the prover and may be possibly based on verifiers’ public keys. By concrete attacks against some existing natural protocols, we first show that concurrent soundness and normal arguments of knowledge do not guarantee concurrent verifier security in the public-key setting. Here, roughly speaking, concurrent verifier security says that the malicious concurrent prover should “know" all the witnesses to all the possibly public-key-related statements adaptively chosen and successfully proved in the concurrent sessions. These concrete attacks serve as a good motivation for understanding “possession of knowledge” for concurrent transactions with registered public keys, i.e., the subtleties of concurrent knowledge extraction in the public-key model. This motivates us to introduce and formalize the notion of CKE, along with clarifications of various subtleties. Two implementations are then presented for constant-round concurrently knowledge extractable concurrent zero-knowledge (CZK–CKE) argument for \(\mathcal {NP}\) in the BPK model: One protocol is generic and based on standard polynomial-time assumptions, whereas the other protocol is computationally efficient and employs complexity leveraging in a novel way. Both protocols can be practically instantiated for some specific number-theoretic languages without going through general \(\mathcal {NP}\)-reductions. Of independent interest are the discussions about the subtleties surrounding the fundamental structure of Feige–Shamir zero knowledge in the BPK model. 相似文献
999.
1000.
As numerous faults exist in practical analog circuits, new challenges arise in the field of diagnosis with large-scale target faults as well as fault features. To address this issue, firstly, an ambiguity model is built to measure the distinguishability between two faults. Then, the optimal fault features are obtained by analyzing the response curves of the circuit under test (CUT) to minimize the ambiguities among the faults. Finally, comparisons are made among three classification methods, including the maximum likelihood classifier (MLC), artificial neural networks (ANNs) and support vector machine (SVM), to demonstrate their own diagnostic abilities for practical use. Two examples are illustrated, and taking advantage of an automated implementation framework, 92 faults in total are examined in the second example. The experimental results show that good diagnostic performances can be obtained with the proposed method. However, when a practical case is encountered, the ANNs method may fail due to its high time and space complexity, while the MLC and SVM methods are still applicable. 相似文献