全文获取类型
收费全文 | 84019篇 |
免费 | 7036篇 |
国内免费 | 4559篇 |
专业分类
电工技术 | 4895篇 |
技术理论 | 2篇 |
综合类 | 7771篇 |
化学工业 | 13480篇 |
金属工艺 | 4520篇 |
机械仪表 | 5289篇 |
建筑科学 | 5801篇 |
矿业工程 | 1985篇 |
能源动力 | 2271篇 |
轻工业 | 7256篇 |
水利工程 | 1688篇 |
石油天然气 | 3441篇 |
武器工业 | 631篇 |
无线电 | 9958篇 |
一般工业技术 | 9302篇 |
冶金工业 | 3633篇 |
原子能技术 | 1126篇 |
自动化技术 | 12565篇 |
出版年
2024年 | 275篇 |
2023年 | 993篇 |
2022年 | 1777篇 |
2021年 | 2556篇 |
2020年 | 2040篇 |
2019年 | 1789篇 |
2018年 | 1949篇 |
2017年 | 2225篇 |
2016年 | 2134篇 |
2015年 | 2977篇 |
2014年 | 3974篇 |
2013年 | 4851篇 |
2012年 | 5559篇 |
2011年 | 5929篇 |
2010年 | 5647篇 |
2009年 | 5499篇 |
2008年 | 5464篇 |
2007年 | 5331篇 |
2006年 | 5220篇 |
2005年 | 4370篇 |
2004年 | 3541篇 |
2003年 | 3270篇 |
2002年 | 3898篇 |
2001年 | 3359篇 |
2000年 | 2352篇 |
1999年 | 1805篇 |
1998年 | 1257篇 |
1997年 | 1061篇 |
1996年 | 938篇 |
1995年 | 803篇 |
1994年 | 613篇 |
1993年 | 445篇 |
1992年 | 364篇 |
1991年 | 286篇 |
1990年 | 233篇 |
1989年 | 155篇 |
1988年 | 147篇 |
1987年 | 101篇 |
1986年 | 63篇 |
1985年 | 61篇 |
1984年 | 57篇 |
1983年 | 40篇 |
1982年 | 28篇 |
1981年 | 30篇 |
1980年 | 31篇 |
1979年 | 20篇 |
1978年 | 11篇 |
1977年 | 15篇 |
1976年 | 23篇 |
1959年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
在分析了数字版权研究现状和功能框架的基础上,设计了基于多重数字水印和密码的版权管理模型;该模型采用数字内容和许可证各自单独封装、独立分发的方式,使得只有购买了许可证的特定用户才能使用数字内容,实现了水印作品的许可交易;另外,内容服务器采用的对数字作品加载两次水印,对数字内容部分签名加密,未加密部分签名的方案,在有效保证数字内容安全传输的基础上又减少了计算量和存储量;分析表明该模型有显著的优点和很好的安全性。 相似文献
92.
Sangmun Shin Nguyen Khoa Viet Truong Byung Rae Cho Sung Hoon Hong 《Computers & Industrial Engineering》2011
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed. 相似文献
93.
Autonomous topological modeling of a home environment and topological localization using a sonar grid map 总被引:1,自引:0,他引:1
This paper presents a method of autonomous topological modeling and localization in a home environment using only low-cost
sonar sensors. The topological model is extracted from a grid map using cell decomposition and normalized graph cut. The autonomous
topological modeling involves the incremental extraction of a subregion without predefining the number of subregions. A method
of topological localization based on this topological model is proposed wherein a current local grid map is compared with
the original grid map. The localization is accomplished by obtaining a node probability from a relative motion model and rotational
invariant grid-map matching. The proposed method extracts a well-structured topological model of the environment, and the
localization provides reliable node probability even when presented with sparse and uncertain sonar data. Experimental results
demonstrate the performance of the proposed topological modeling and localization in a real home environment. 相似文献
94.
95.
96.
Voting systems are common tools in a variety of areas. This paper studies parameterized computational complexity of control of Plurality, Condorcet and Approval voting systems, respectively. The types of controls considered include adding or deleting candidates or voters, under constructive or destructive setting. We obtain the following results: (1) constructive control by adding candidates in Plurality voting is W[2]-hard with respect to the parameter “number of added candidates”, (2) destructive control by adding candidates in Plurality voting is W[2]-hard with respect to the parameter “number of added candidates”, (3) constructive control by adding voters in Condorcet voting is W[1]-hard with respect to the parameter “number of added voters”, (4) constructive control by deleting voters in Condorcet voting is W[1]-hard with respect to the parameter “number of deleted voters”, (5) constructive control by adding voters in Approval voting is W[1]-hard with respect to the parameter “number of added voters”, and (6) constructive control by deleting voters in Approval voting is W[2]-hard with respect to the parameter “number of deleted voters”. 相似文献
97.
98.
99.
Deng Juan Zhao Shu Wang Yan Wang Lei Wang Hong Sha Hong 《Multimedia Tools and Applications》2017,76(7):10097-10117
Multimedia Tools and Applications - Most of the existing image encryption algorithms based on compressive sensing are too complex to operate. An image compression-encryption scheme with simple... 相似文献
100.
Mei Kum Khaw Chin Hong Ooi Faisal Mohd-Yasin Anh V. Nguyen Geoffrey M. Evans Nam-Trung Nguyen 《Microfluidics and nanofluidics》2017,21(6):110
This paper reports the dynamic behaviour of a magnetically actuated floating liquid marble by analysing the oscillation of the marble. A liquid marble is a liquid droplet coated with hydrophobic powder. Magnetite particles inside the marble make it magnetic. The marble floats on a carrier liquid that contains aqueous glycerol of various concentrations. A permanent magnet located under the carrier liquid drives the floating marble with the initial velocity. Stopping the magnet abruptly causes the marble to oscillate around its final position for a few seconds. The oscillation was recorded and analysed using customised image processing and evaluation software. The damped harmonic motion model was then applied to the data and tested. Subsequently, critical parameters of the system such as the initial displacement, friction correction factor, the apparent frequency and the spring constant were determined and discussed. The simple experimental set-up and convenient theoretical approach allow us to characterise the marble motion under the influence of a magnet with good accuracy. 相似文献