全文获取类型
收费全文 | 19422篇 |
免费 | 749篇 |
国内免费 | 378篇 |
专业分类
电工技术 | 659篇 |
技术理论 | 1篇 |
综合类 | 449篇 |
化学工业 | 1691篇 |
金属工艺 | 963篇 |
机械仪表 | 474篇 |
建筑科学 | 624篇 |
矿业工程 | 289篇 |
能源动力 | 329篇 |
轻工业 | 817篇 |
水利工程 | 206篇 |
石油天然气 | 306篇 |
武器工业 | 65篇 |
无线电 | 1724篇 |
一般工业技术 | 1434篇 |
冶金工业 | 472篇 |
原子能技术 | 176篇 |
自动化技术 | 9870篇 |
出版年
2025年 | 49篇 |
2024年 | 241篇 |
2023年 | 198篇 |
2022年 | 280篇 |
2021年 | 405篇 |
2020年 | 349篇 |
2019年 | 338篇 |
2018年 | 311篇 |
2017年 | 325篇 |
2016年 | 360篇 |
2015年 | 384篇 |
2014年 | 667篇 |
2013年 | 827篇 |
2012年 | 1321篇 |
2011年 | 3646篇 |
2010年 | 1640篇 |
2009年 | 1507篇 |
2008年 | 1133篇 |
2007年 | 1002篇 |
2006年 | 878篇 |
2005年 | 964篇 |
2004年 | 780篇 |
2003年 | 820篇 |
2002年 | 488篇 |
2001年 | 182篇 |
2000年 | 179篇 |
1999年 | 180篇 |
1998年 | 225篇 |
1997年 | 143篇 |
1996年 | 107篇 |
1995年 | 84篇 |
1994年 | 72篇 |
1993年 | 70篇 |
1992年 | 38篇 |
1991年 | 51篇 |
1990年 | 37篇 |
1989年 | 30篇 |
1988年 | 33篇 |
1987年 | 16篇 |
1986年 | 20篇 |
1985年 | 16篇 |
1984年 | 39篇 |
1983年 | 17篇 |
1982年 | 18篇 |
1981年 | 18篇 |
1980年 | 10篇 |
1979年 | 6篇 |
1978年 | 6篇 |
1977年 | 7篇 |
1973年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
Madhu S. NairAuthor Vitae G. RajuAuthor Vitae 《Computers & Electrical Engineering》2011,37(5):644-655
The paper proposes a new fuzzy-based two-step filter for restoring images corrupted with additive noise. The goal of the first step is to compute the difference between the central pixel and its neighborhood in a selected window and to compute a fuzzy membership degree for each difference value using a Gaussian membership function. Computed fuzzy membership values are appropriately utilized as weights for each pixel and then computes the weighted average representing the modified value for the current central pixel. The second step is used as an augmented step to the first one and its goal is to improve the result obtained in the first step by reducing the noise in the color component differences without destroying the fine details of the image. The experimental analysis shows that the proposed method gives better results compared to existing advanced filters for additive noise reduction. Both visual, quantitative and qualitative analysis have been done to prove the efficiency and effectiveness of the proposed method. 相似文献
62.
Dingde Jiang Zhengzheng Xu Hongwei Xu Yang Han Zhenhua Chen Zhen YuanAuthor vitae 《Computers & Electrical Engineering》2011,37(6):1106-1121
Traffic matrix (TM) is a key input of traffic engineering and network management. However, it is significantly difficult to attain TM directly, and so TM estimation is so far an interesting topic. Though many methods of TM estimation are proposed, TM is generally unavailable in the large-scale IP backbone networks and is difficult to be estimated accurately. This paper proposes a novel method of TM estimation in large-scale IP backbone networks, which is based on the generalized regression neural network (GRNN), called GRNN TM estimation (GRNNTME) method. Firstly, building on top of GRNN, we present a multi-input and multi-output model of large-scale TM estimation. Because of the powerful capability of learning and generalizing of GRNN, the output of our model can sufficiently capture the spatio-temporal correlations of TM. This ensures that the estimation of TM can accurately be attained. And then GRNNTME uses the procedure of data posttreating further to make the output of our model closer to real value. Finally, we use the real data from the Abilene Network to validate GRNNTME. Simulation results show that GRNNTME can perform well the accurate and fast estimation of TM, track its dynamics, and holds the stronger robustness and lower estimation errors. 相似文献
63.
Keystream reuse, also known as the two time pad problem, is a well known weakness in stream ciphers. The implementers of the cryptographic algorithms are still underestimating this threat. The keystream reuse exploitation techniques presented so far assume the underlying plaintext to be textual data and all the heuristics presented previously are based on the language characteristics of the underlying text based data, which fail when compression is applied on the plaintext before encryption. This paper presents exploitation techniques for two time pads in case of stream ciphered digitized and compressed speech signals. In this paper we show that how an adversary can automatically recover the digitized speech signals encrypted under the same keystream provided the language (e.g. English) and digital encoding/compression scheme details of the underlying speech signals are known. Our technique of cryptanalysis is based on the modeling of the speech parameters by exploiting the inter frame correlations between each components of the speech vectors in different frames and then using these models to decode the two speech signals in the keystream reuse scenario. The technique is flexible enough to incorporate all modern speech coding schemes based on parameter or hybrid encoding and compression techniques. The simulation experiments have showed promising results for most of the present day speech digitization and compression techniques. 相似文献
64.
In this paper, we investigate the prediction of the cell composition of bacteria with respect to their medium. By modeling the bacterium as an interconnection of subsystems, the problem is written as a non-smooth convex optimization problem equivalent to a Linear Programming feasibility problem. We then obtain a new method, called Resource Balance Analysis (RBA), predicting the distribution of the available resources in the medium among the various cellular subsystems. Beyond its predictive capability, the proposed approach grasps some fundamental aspects of the bacterium physiology by including a refined model. This method reveals the existence of an intrinsic bottleneck in the system resource distribution of the bacterium, leading to the existence of a structural limitation of its growth rate which can be predicted. RBA is also able to predict the configuration of the metabolic network for a given medium at steady-state regimen which nicely fits the available experimental results for the gram-positive model bacterium Bacillus subtilis. 相似文献
65.
Wei-Song Lin Author vitae 《Automatica》2011,(5):1047-1052
Adaptive Optimal Control (AOC) by reinforcement synthesis is proposed to facilitate the application of optimal control theory in feedback controls. Reinforcement synthesis uses the critic–actor architecture of reinforcement learning to carry out sequential optimization. Optimality conditions for AOC are formulated using the discrete minimum principle. A proof of the convergence conditions for the reinforcement synthesis algorithm is presented. As the final time extends to infinity, the reinforcement synthesis algorithm is equivalent to the Dual Heuristic dynamic Programming (DHP) algorithm, a version of approximate dynamic programming. Thus, formulating DHP with the AOC approach has rigorous proofs of optimality and convergence. The efficacy of AOC by reinforcement synthesis is demonstrated by solving a linear quadratic regulator problem. 相似文献
66.
67.
68.
69.