全文获取类型
收费全文 | 6224篇 |
免费 | 365篇 |
国内免费 | 55篇 |
专业分类
电工技术 | 89篇 |
综合类 | 17篇 |
化学工业 | 1294篇 |
金属工艺 | 147篇 |
机械仪表 | 197篇 |
建筑科学 | 134篇 |
矿业工程 | 29篇 |
能源动力 | 352篇 |
轻工业 | 555篇 |
水利工程 | 61篇 |
石油天然气 | 42篇 |
无线电 | 695篇 |
一般工业技术 | 1407篇 |
冶金工业 | 589篇 |
原子能技术 | 70篇 |
自动化技术 | 966篇 |
出版年
2024年 | 24篇 |
2023年 | 124篇 |
2022年 | 317篇 |
2021年 | 501篇 |
2020年 | 297篇 |
2019年 | 340篇 |
2018年 | 361篇 |
2017年 | 311篇 |
2016年 | 299篇 |
2015年 | 202篇 |
2014年 | 264篇 |
2013年 | 484篇 |
2012年 | 294篇 |
2011年 | 331篇 |
2010年 | 215篇 |
2009年 | 185篇 |
2008年 | 166篇 |
2007年 | 156篇 |
2006年 | 136篇 |
2005年 | 102篇 |
2004年 | 80篇 |
2003年 | 94篇 |
2002年 | 77篇 |
2001年 | 58篇 |
2000年 | 58篇 |
1999年 | 75篇 |
1998年 | 173篇 |
1997年 | 134篇 |
1996年 | 101篇 |
1995年 | 74篇 |
1994年 | 69篇 |
1993年 | 57篇 |
1992年 | 38篇 |
1991年 | 44篇 |
1990年 | 35篇 |
1989年 | 32篇 |
1988年 | 25篇 |
1987年 | 29篇 |
1986年 | 34篇 |
1985年 | 34篇 |
1984年 | 26篇 |
1983年 | 29篇 |
1982年 | 13篇 |
1981年 | 13篇 |
1980年 | 11篇 |
1978年 | 16篇 |
1977年 | 18篇 |
1976年 | 23篇 |
1973年 | 9篇 |
1972年 | 8篇 |
排序方式: 共有6644条查询结果,搜索用时 15 毫秒
141.
M. Sahli C. Roques-Carmes C. Khan Malek J. C. Gelin 《Microsystem Technologies》2008,14(9-11):1545-1551
The possibility to fill cavities of finite geometry could be described using an analytical model of the hot-embossing process of viscoelastic polymers. This model is based on the volume conservation during the forming process which allows to predict data concerning the geometrical evolution of the material on one hand, and on the other hand the filling time of cavities in the mould. A particular attention was drawn on the necessary time to fill the cavities depending on their shape or a scale factor for a given cavity shape. 相似文献
142.
A Cooperative Game Theoretical Technique for Joint Optimization of Energy Consumption and Response Time in Computational Grids 总被引:2,自引:0,他引:2
Khan Samee U. Ahmad Ishfaq 《Parallel and Distributed Systems, IEEE Transactions on》2009,20(3):346-360
With the explosive growth in computers and the growing scarcity in electric supply, reduction of energy consumption in large-scale computing systems has become a research issue of paramount importance. In this paper, we study the problem of allocation of tasks onto a computational grid, with the aim to simultaneously minimize the energy consumption and the makespan subject to the constraints of deadlines and tasks' architectural requirements. We propose a solution from cooperative game theory based on the concept of Nash Bargaining Solution. In this cooperative game, machines collectively arrive at a decision that describes the task allocation that is collectively best for the system, ensuring that the allocations are both energy and makespan optimized. Through rigorous mathematical proofs we show that the proposed cooperative game in mere O(n mlog(m)) time (where n is the number of tasks and m is the number of machines in the system) produces a Nash Bargaining Solution that guarantees Pareto-optimally. The simulation results show that the proposed technique achieves superior performance compared to the Greedy and Linear Relaxation (LR) heuristics, and with competitive performance relative to the optimal solution implemented in LINDO for small-scale problems. 相似文献
143.
Automatic onset detection and picking algorithm has been proposed by applying the spectro-ratio on time–frequency sub-band. The proposed algorithm does not need any parameter settings as it will work on data generated by either short or very broad band seismometers. Our algorithm is applied on local events from Cairo region recorded by three stations of the Egyptian National Seismic Network (ENSN). Maximum standard deviation is observed to be 0.113 s of the corresponding manual picks made by analysts. 相似文献
144.
Extended Kalman filter based speeds estimation of series-connected five-phase two-motor drive system
The multi-phase machines enables independent control of a few number of machines that are connected in series in a particular manner, and the supply is fed from a single voltage source inverter (VSI). The idea was first implemented for a five-phase series-connected two-motor drive system, but is now applicable to any number of phases. The number of series-connected machines is a function of the phase number of VSI. Variable speed induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, information of the rotor speed is extracted from measured stator currents and voltages at motor terminals. Open-loop estimators or closed-loop observers are used for this purpose. They differ with respect to accuracy, robustness, and sensitivity against model parameter variations. This paper analyses operation of an EKF-based sensorless control of vector controlled series-connected two-motor five-phase drive system with current control in the stationary reference frame. Results, obtained with fixed voltage and fixed frequency supply fed and hysteresis current control, is presented for various operating conditions on the basis of simulation. The purpose of this paper is to report first time, the simulation results on a sensorless control of a five-phase two-motor series-connected drive system using EKF estimator. 相似文献
145.
An integrated fiber-optic probe comprising a short length of multimode fiber that is fusion spliced to a monomode optical fiber has been fabricated for imaging and nonimaging applications. The fiber probe, typically 250 μm in diameter, can deliver a focused Gaussian spot approximately 25 μm in diameter at a distance of approximately 500 μm from the tip. Two off-the-shelf graded-index multimode fibers have been used in the fabrication of imaging and nonimaging probes. These integrated probes have considerably improved the spatial resolution of backscatter lensless fiber probes being utilized in the dynamic light-scattering characterization of colloidal suspension. 相似文献
146.
KS Khan 《Canadian Metallurgical Quarterly》1994,15(2):218-225
The relation of epidemiology and ethics is discussed from a Third World perspective, including the following issues: the structure and dynamics of a Third World Society; the nature of the relationship between the First World "islanders" in the Third World and their counterparts in the First World, and between the "islanders" and their fellow citizens; the inner dynamics of Third World researchers; the different knowledge systems; and the role of institutions in the Third World and the First World. 相似文献
147.
Yawar Abbas Bangash Waseem Iqbal Saddaf Rubab Abdul Waheed Khan Waqas Aman 《International Journal of Communication Systems》2023,36(17):e5601
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy. 相似文献
148.
Mohibullah Khan Ata Ullah Isra Naz Sajjad Haider Nz Jhanji Mohammad Shorfuzzaman Mehedi Masud 《计算机系统科学与工程》2023,46(1):461-473
The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for classifying COVID-CT images. Secondly, an alpha fusion attack is generated to fool the classification model. The alpha fusion attack is tested in the last phase on a modified LSTM-based CNN (CNN-MLSTM) model and other pre-trained models. The results of CNN models show that the accuracy of these models dropped greatly after the alpha-fusion attack. The highest F1 score before the attack was achieved is 97.45 And after the attack lowest F1 score recorded is 22%. Results elucidate the performance in terms of accuracy, precision, F1 score and Recall. 相似文献
149.
(Aim) The COVID-19 has caused 6.26 million deaths and 522.06 million confirmed cases till 17/May/2022. Chest computed tomography is a precise way to help clinicians diagnose COVID-19 patients. (Method) Two datasets are chosen for this study. The multiple-way data augmentation, including speckle noise, random translation, scaling, salt-and-pepper noise, vertical shear, Gamma correction, rotation, Gaussian noise, and horizontal shear, is harnessed to increase the size of the training set. Then, the SqueezeNet (SN) with complex bypass is used to generate SN features. Finally, the extreme learning machine (ELM) is used to serve as the classifier due to its simplicity of usage, quick learning speed, and great generalization performances. The number of hidden neurons in ELM is set to 2000. Ten runs of 10-fold cross-validation are implemented to generate impartial results. (Result) For the 296-image dataset, our SNELM model attains a sensitivity of 96.35 ± 1.50%, a specificity of 96.08 ± 1.05%, a precision of 96.10 ± 1.00%, and an accuracy of 96.22 ± 0.94%. For the 640-image dataset, the SNELM attains a sensitivity of 96.00 ± 1.25%, a specificity of 96.28 ± 1.16%, a precision of 96.28 ± 1.13%, and an accuracy of 96.14 ± 0.96%. (Conclusion) The proposed SNELM model is successful in diagnosing COVID-19. The performances of our model are higher than seven state-of-the-art COVID-19 recognition models. 相似文献
150.
El-Moursy Ali A. Sibai Fadi N. Rehman Jahanzeb Gouda Omar M. Gaber Abdelrahman T. Khedr Ahmed M. 《Wireless Personal Communications》2022,124(2):1525-1555
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT).... 相似文献