全文获取类型
收费全文 | 25740篇 |
免费 | 2103篇 |
国内免费 | 994篇 |
专业分类
电工技术 | 1332篇 |
技术理论 | 5篇 |
综合类 | 1465篇 |
化学工业 | 4611篇 |
金属工艺 | 1692篇 |
机械仪表 | 1580篇 |
建筑科学 | 2029篇 |
矿业工程 | 705篇 |
能源动力 | 839篇 |
轻工业 | 1694篇 |
水利工程 | 412篇 |
石油天然气 | 1766篇 |
武器工业 | 154篇 |
无线电 | 2528篇 |
一般工业技术 | 3218篇 |
冶金工业 | 1456篇 |
原子能技术 | 270篇 |
自动化技术 | 3081篇 |
出版年
2024年 | 140篇 |
2023年 | 509篇 |
2022年 | 804篇 |
2021年 | 1121篇 |
2020年 | 904篇 |
2019年 | 760篇 |
2018年 | 869篇 |
2017年 | 888篇 |
2016年 | 776篇 |
2015年 | 1050篇 |
2014年 | 1240篇 |
2013年 | 1661篇 |
2012年 | 1621篇 |
2011年 | 1698篇 |
2010年 | 1499篇 |
2009年 | 1420篇 |
2008年 | 1349篇 |
2007年 | 1289篇 |
2006年 | 1377篇 |
2005年 | 1188篇 |
2004年 | 734篇 |
2003年 | 677篇 |
2002年 | 623篇 |
2001年 | 487篇 |
2000年 | 574篇 |
1999年 | 674篇 |
1998年 | 569篇 |
1997年 | 422篇 |
1996年 | 408篇 |
1995年 | 340篇 |
1994年 | 275篇 |
1993年 | 190篇 |
1992年 | 157篇 |
1991年 | 111篇 |
1990年 | 88篇 |
1989年 | 49篇 |
1988年 | 67篇 |
1987年 | 41篇 |
1986年 | 31篇 |
1985年 | 32篇 |
1984年 | 29篇 |
1983年 | 16篇 |
1982年 | 12篇 |
1981年 | 9篇 |
1980年 | 15篇 |
1979年 | 10篇 |
1978年 | 4篇 |
1974年 | 3篇 |
1959年 | 2篇 |
1958年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
倾角是许多控制系统中需要测量的一个重要参数。针对倾角测量,设计了一种基于ARM微控制器和加速度传感器的角度测量平台。该平台采用基于ARMCortex—M3内核的STM32F103VE为数据处理的核心,利用高精度加速度传感器MMA7361L为测角传感器,同时配置液晶屏和小型键盘实现了人机交互。该平台具有测量精度高、灵敏度高、价格低的特点,应用前景广阔。 相似文献
72.
针对远程信息监测系统中数据的实时采集更新问题,将AJAX和CGI应用到嵌入式Web服务器的设计中,实现了服务器与浏览器之间的动态信息交互。本文首先分析了uIP协议栈,并在协议栈之上设计了Web服务器,然后利用CGI服务程序处理来自客户端的XMLHttpRequest对象请求,实现动态Web功能。现场实验结果表明,嵌入式Web服务器降低了服务器端的资源开销,提高了响应速度。 相似文献
73.
74.
随着信息化和网络技术的不断发展,以计算机为工具来盗取用户信息的犯罪日益增加。尤其是通过网络窃取上网计算机涉密信息,已经成为国内外不法分子窃取我国秘密信息的重要手段。本文对国内外计算机窃密与反窃密技术的各种手段进行研究与分析,并通过理论与实际的相结合,提出安全与实用并重的防范措施。 相似文献
75.
This paper addresses the problem of semi‐global stabilization by output feedback for a class of nonlinear systems whose output gains are unknown. For each subsystem, we first design a state compensator and use the compensator states to construct a control law to stabilize the nominal linear system without the perturbing nonlinearities. Then, combining the output feedback domination approach with block‐backstepping scheme, a series of homogeneous output feedback controllers are constructed recursively for each subsystem and the closed‐loop system is rendered semi‐globally asymptotically stable. 相似文献
76.
77.
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy data-intensive applications without the infrastructure investment, where large application datasets can be stored in the cloud. Based on the pay-as-you-go model, data placement strategies have been developed to cost-effectively store large volumes of generated datasets in the scientific cloud workflows. As promising as it is, this paradigm also introduces many new challenges for data security when the users outsource sensitive data for sharing on the cloud servers, which are not within the same trusted domain as the data owners. This challenge is further complicated by the security constraints on the potential sensitive data for the scientific workflows in the cloud. To effectively address this problem, we propose a security-aware intermediate data placement strategy. First, we build a security overhead model to reasonably measure the security overheads incurred by the sensitive data. Second, we develop a data placement strategy to dynamically place the intermediate data for the scientific workflows. Finally, our experimental results show that our strategy can effectively improve the intermediate data security while ensuring the data transfer time during the execution of scientific workflows. 相似文献
78.
The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. In this paper, we first present a general framework for searching on error-tolerant keywords. Then we propose a concrete scheme, based on a fuzzy extractor, which is proved secure against an adaptive adversary under well-defined security definition. The scheme is suitable for all similarity metrics including Hamming distance, edit distance, and set difference. It does not require the user to construct or store anything in advance, other than the key used to calculate the trapdoor of keywords and the key to encrypt data documents. Thus, our scheme tremendously eases the users' burden. What is more, our scheme is able to transform the servers' searching for error-tolerant keywords on ciphertexts to the searching for exact keywords on plaintexts. The server can use any existing approaches of exact keywords search to search plaintexts on an index table. 相似文献
79.
In this paper, we propose a discriminative multi-task objects tracking method with active feature selection and drift correction. The developed method formulates object tracking in a particle filter framework as multi-Task discriminative tracking. As opposed to generative methods that handle particles separately, the proposed method learns the representation of all the particles jointly and the corresponding coefficients are similar. The tracking algorithm starts from the active feature selection scheme, which adaptively chooses suitable number of discriminative features from the tracked target and background in the dynamic environment. Based on the selected feature space, the discriminative dictionary is constructed and updated dynamically. Only a few of them are used to represent all the particles at each frame. In other words, all the particles share the same dictionary templates and their representations are obtained jointly by discriminative multi-task learning. The particle that has the highest similarity with the dictionary templates is selected as the next tracked target state. This jointly sparsity and discriminative learning can exploit the relationship between particles and improve tracking performance. To alleviate the visual drift problem encountered in object tracking, a two-stage particle filtering algorithm is proposed to complete drift correction and exploit both the ground truth information of the first frame and observations obtained online from the current frame. Experimental evaluations on challenging sequences demonstrate the effectiveness, accuracy and robustness of the proposed tracker in comparison with state-of-the-art algorithms. 相似文献
80.
For hyperspectral target detection, it is usually the case that only part of the targets pixels can be used as target signatures, so can we use them to construct the most proper background subspace for detecting all the probable targets? In this paper, a dynamic subspace detection (DSD) method which establishes a multiple detection framework is proposed. In each detection procedure, blocks of pixels are calculated by the random selection and the succeeding detection performance distribution analysis. Manifold analysis is further used to eliminate the probable anomalous pixels and purify the subspace datasets, and the remaining pixels construct the subspace for each detection procedure. The final detection results are then enhanced by the fusion of target occurrence frequencies in all the detection procedures. Experiments with both synthetic and real hyperspectral images (HSI) evaluate the validation of our proposed DSD method by using several different state-of-the-art methods as the basic detectors. With several other single detectors and multiple detection methods as comparable methods, improved receiver operating characteristic curves and better separability between targets and backgrounds by the DSD methods are illustrated. The DSD methods also perform well with the covariance-based detectors, showing their efficiency in selecting covariance information for detection. 相似文献