全文获取类型
收费全文 | 17683篇 |
免费 | 1004篇 |
国内免费 | 127篇 |
专业分类
电工技术 | 276篇 |
综合类 | 80篇 |
化学工业 | 4423篇 |
金属工艺 | 415篇 |
机械仪表 | 575篇 |
建筑科学 | 582篇 |
矿业工程 | 24篇 |
能源动力 | 1163篇 |
轻工业 | 1662篇 |
水利工程 | 217篇 |
石油天然气 | 243篇 |
武器工业 | 4篇 |
无线电 | 1820篇 |
一般工业技术 | 3323篇 |
冶金工业 | 1025篇 |
原子能技术 | 122篇 |
自动化技术 | 2860篇 |
出版年
2024年 | 79篇 |
2023年 | 314篇 |
2022年 | 688篇 |
2021年 | 1059篇 |
2020年 | 873篇 |
2019年 | 920篇 |
2018年 | 1074篇 |
2017年 | 963篇 |
2016年 | 952篇 |
2015年 | 568篇 |
2014年 | 890篇 |
2013年 | 1634篇 |
2012年 | 1087篇 |
2011年 | 1154篇 |
2010年 | 829篇 |
2009年 | 735篇 |
2008年 | 571篇 |
2007年 | 499篇 |
2006年 | 423篇 |
2005年 | 303篇 |
2004年 | 244篇 |
2003年 | 226篇 |
2002年 | 174篇 |
2001年 | 131篇 |
2000年 | 141篇 |
1999年 | 125篇 |
1998年 | 323篇 |
1997年 | 231篇 |
1996年 | 193篇 |
1995年 | 135篇 |
1994年 | 121篇 |
1993年 | 118篇 |
1992年 | 86篇 |
1991年 | 73篇 |
1990年 | 68篇 |
1989年 | 65篇 |
1988年 | 52篇 |
1987年 | 45篇 |
1986年 | 58篇 |
1985年 | 59篇 |
1984年 | 65篇 |
1983年 | 42篇 |
1982年 | 45篇 |
1981年 | 43篇 |
1980年 | 40篇 |
1979年 | 31篇 |
1978年 | 38篇 |
1977年 | 36篇 |
1976年 | 55篇 |
1974年 | 32篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
171.
Ayesha Kulsoom Di Xiao Aqeel-ur-Rehman Syed Ali Abbas 《Multimedia Tools and Applications》2016,75(1):1-23
A novel image encryption algorithm in streaming mode is proposed which exhaustively employs an entire set of DNA complementary rules alongwith one dimensional chaotic maps. The proposed algorithm is highly efficient due to encrypting the subset of digital image which contains 92.125 % of information. DNA addition operation is carried out on this MSB part. The core idea of the proposed scheme is to scramble the whole image by means of piecewise linear chaotic map (PWLCM) followed by decomposition of image into most significant bits (MSB) and least significant bits (LSB). The logistic sequence is XORed with the decoded MSB and LSB parts separately and finally these two parts are combined to get the ciphered image. The parameters for PWLCM, logistic map and selection of different DNA rules for encoding and decoding of both parts of an image are derived from 128-bit MD5 hash of the plain image. Simulated experimental results in terms of quantitative and qualitative ways prove the encryption quality. Efficiency and robustness against different noises make the proposed cipher a good candidate for real time applications. 相似文献
172.
In this paper, metamodeling and five well-known metaheuristic optimization algorithms were used to reduce the weight and improve crash and NVH attributes of a vehicle simultaneously. A high-fidelity full vehicle model is used to analyze peak acceleration, intrusion and component’s internal-energy under Full-Frontal, Offset-Frontal, and Side crash scenarios as well as vehicle natural frequencies. The radial basis functions method is used to approximate the structural responses. A nonlinear surrogate-based mass minimization was formulated and solved by five different optimization algorithms under crash-vibration constraints. The performance of these algorithms is investigated and discussed. 相似文献
173.
174.
In this paper, the robust input covariance constraint (ICC) control problem with polytopic uncertainty is solved using convex optimization with linear matrix inequality (LMI) approach. The ICC control problem is an optimal control problem that optimizes the output performance subjected to multiple constraints on the input covariance matrices. This control problem has significant practical implications when hard constraints need to be satisfied on control actuators. The contribution of this paper is the characterization of the control synthesis LMIs used to solve the robust ICC control problem for polytopic uncertain systems. Both continuous‐ and discrete‐time systems are considered. Parameter‐dependent and independent Lyapunov functions have been used for robust ICC controller synthesis. Numerical design examples are presented to illustrate the effectiveness of the proposed approach. 相似文献
175.
Jens Petter Johansen Petter Grytten Almklov Abdul Basit Mohammad 《Cognition, Technology & Work》2016,18(2):333-350
This paper explores how different forms of anticipatory work contribute to reliability in high-risk space operations. It is based on ethnographic field work, participant observation and interviews supplemented with video recordings from a control room responsible for operating a microgravity greenhouse at the International Space Station (ISS). Drawing on examples from different stages of a biological experiment on the ISS, we demonstrate how engineers, researchers and technicians work to anticipate and proactively mitigate possible problems. Space research is expensive and risky. The experiments are planned over the course of many years by a globally distributed network of organizations. Owing to the inaccessibility of the ISS, every trivial detail that could possibly cause a problem is subject to scrutiny. We discuss what we label anticipatory work: practices constituted of an entanglement of cognitive, social and technical elements involved in anticipating and proactively mitigating everything that might go wrong. We show how the nature of anticipatory work changes between planning and the operational phases of an experiment. In the planning phase, operators inscribe their anticipation into technology and procedures. In the operational phase, we show how troubleshooting involves the ability to look ahead in the evolving temporal trajectory of the ISS operations and to juggle pre-planned fixes along these trajectories. A key objective of this paper is to illustrate how anticipation is shared between humans and different forms of technology. Moreover, it illustrates the importance of including considerations of temporality in safety and reliability research. 相似文献
176.
Force-driven liquid argon flows both in nanoscale periodic domains and in gold nano-channels are simulated using non-equilibrium molecular dynamics to investigate the scale and wall force field effects. We examined variations in liquid density, viscosity, velocity profile, slip length, shear stress and mass flow rate in different sized periodic domains and nano-channels at a fixed thermodynamic state. In the absence of walls, liquid argon obeys Newton’s law of viscosity with the desired absolute viscosity in domains as small as 4 molecular diameters in height. Results prove that deviations from continuum solution are solely due to wall effects. Simulations in nano-channels with heights varying from 3.26 to 36 nm exhibit parabolic velocity profiles with constant slip length modeled by Navier-type slip boundary condition. Both channel averaged density and “apparent viscosity” decrease with reduced channel height, which has competing effects in determination of the mass flow rate. Density layering and wall force field induce deviations from Newton’s law of viscosity in the near-wall region, while constant “apparent viscosity” with the deformation rate from a parabolic velocity profile successfully predicts shear stress in the bulk flow region. 相似文献
177.
Nadir Shah Ayaz Ahmad Babar Nazir Depei Qian 《Peer-to-Peer Networking and Applications》2016,9(2):356-371
Due to limited radio range and mobility of nodes in mobile ad hoc networks (MANETs), the network partitioning and merging could occur frequently. When structured peer-to-peer (P2P) overlays are running over MANETs, then network partition in the physical network can also cause network partition at the overlay layer. Existing approaches for structured P2P overlay over MANETs do not detect network partition at the overlay layer. This paper proposes a cross-layer approach to detect network partition at the overlay layer for structured P2P overlay over MANETs. Simulation results show that the proposed approach is highly effective and efficient in terms of routing overhead, success ratio and false-negative ratio. 相似文献
178.
179.
180.