全文获取类型
收费全文 | 50301篇 |
免费 | 6580篇 |
国内免费 | 2506篇 |
专业分类
电工技术 | 3261篇 |
技术理论 | 1篇 |
综合类 | 5585篇 |
化学工业 | 8455篇 |
金属工艺 | 2862篇 |
机械仪表 | 2757篇 |
建筑科学 | 2297篇 |
矿业工程 | 4690篇 |
能源动力 | 1853篇 |
轻工业 | 7159篇 |
水利工程 | 983篇 |
石油天然气 | 2640篇 |
武器工业 | 377篇 |
无线电 | 3826篇 |
一般工业技术 | 3385篇 |
冶金工业 | 1902篇 |
原子能技术 | 132篇 |
自动化技术 | 7222篇 |
出版年
2024年 | 285篇 |
2023年 | 1357篇 |
2022年 | 2199篇 |
2021年 | 2347篇 |
2020年 | 2663篇 |
2019年 | 1810篇 |
2018年 | 1586篇 |
2017年 | 1508篇 |
2016年 | 1868篇 |
2015年 | 2147篇 |
2014年 | 3767篇 |
2013年 | 4279篇 |
2012年 | 6622篇 |
2011年 | 6211篇 |
2010年 | 4018篇 |
2009年 | 4384篇 |
2008年 | 2490篇 |
2007年 | 3267篇 |
2006年 | 2622篇 |
2005年 | 1033篇 |
2004年 | 366篇 |
2003年 | 290篇 |
2002年 | 287篇 |
2001年 | 225篇 |
2000年 | 288篇 |
1999年 | 247篇 |
1998年 | 171篇 |
1997年 | 102篇 |
1996年 | 106篇 |
1995年 | 81篇 |
1994年 | 87篇 |
1993年 | 63篇 |
1992年 | 67篇 |
1991年 | 52篇 |
1990年 | 35篇 |
1989年 | 25篇 |
1988年 | 60篇 |
1987年 | 109篇 |
1986年 | 119篇 |
1985年 | 30篇 |
1984年 | 22篇 |
1983年 | 12篇 |
1982年 | 13篇 |
1981年 | 20篇 |
1980年 | 9篇 |
1979年 | 13篇 |
1978年 | 7篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1951年 | 12篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
5G时代的到来加快了以车路协同为核心的车联网技术的发展脚步。高效,可靠,安全的通信质量将是实现智能交通管理系统,完善智慧出行的基本要求。因此,针对存在信息窃取者的车联网中继协作传输场景,利用机会式中继选择策略与最大比合并技术设计了直接传输链路与多跳中继转发链路共存的安全传输方案,旨在提高信息传输的可靠性及安全性。同时,在获得信道概率密度函数及累积分布函数的基础上,利用全概率公式等方法推导出基于DF(Decode-Forward)中继协作传输的车联网系统安全中断概率的闭合表达式,其中涉及的信息传输信道均服从Nakagami-m分布,提高了理论推导的难度。最终的仿真实验证实了理论推导的准确性及本方案的可行性。 相似文献
2.
3.
对工业化进程中,即1949-2012年我国煤矿事故进行统计分析。建立煤矿安全以自然条件、安全管理和通风系统的3个层次及21个指标的综合评价体系,给出煤矿安全5个等级标准及相应的评价指标量值。应用可拓理论,以平顶山某煤矿为实例,进行计算分析,得出该煤矿等级为Ⅲ级,处于一般安全的状况,需要采取防范措施预防潜在危险因素。评价结果合理。 相似文献
4.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
5.
6.
This paper addresses the nonlinear stress-strain response in glass fibre non-crimp fabric reinforced vinylester composite laminates subjected to in-plane tensile loading. The nonlinearity is shown to be a combination of brittle and plastic failure. It is argued that the shift from plastic to brittle behaviour in the vinylester is caused by the state of stress triaxiality caused by the interaction between fibre and vinylester. A model combining damage and plasticity is calibrated and evaluated using data from extensive experimental testing. The onset of damage is predicted using the Puck failure criterion, and the evolution of damage is calibrated from the observed softening in plies loaded in transverse tension. Shear loading beyond linear elastic response is observed to result in irreversible strains. A yield criterion is implemented for shear deformation. A strain hardening law is fitted to the stress-strain response observed in shear loaded plies. Experimental results from a selection of laminates with different layups are used to verify the numerical models. A complete set of model parameters for predicting elastic behaviour, strength and post failure softening is presented for glass fibre non-crimped fabric reinforced vinylester. The predicted behaviour from using these model parameters are shown to be in good agreement with experimental results. 相似文献
7.
为了研究荷电细水雾对瓦斯爆炸超压的影响规律和机理,采用小尺寸管道模拟瓦斯爆炸,研究不同荷电电压作用下的瓦斯爆炸超压和平均压升速率,以及不同雾通量作用下的瓦斯爆炸超压.结果表明:随着荷电电压的升高,瓦斯爆炸超压和平均压升速率受到明显的抑制;随着雾通量的增加,瓦斯爆炸超压明显降低.在实验条件下,和普通细水雾相比,当雾通量为4L、荷电电压为8kV时,瓦斯爆炸超压峰值降低10.798kPa,降幅达49.78%;平均压升速率峰值降低180.468kPa/s,降幅达49.90%. 相似文献
8.
This paper investigates the differential geometry of 3D MAT (medial axis transform) using the moving frame and differential form. After constructing the mapping relation and moving frames around both the MA (medial axis) point and the associated boundary points, various curves are defined to serve as carriers for the study. Based on analysis of the infinitesimal translation and rotation of the moving frames, the relations of distance differentials, rotation vectors and differential invariants are derived. Furthermore, a special case in the 3D MAT, the normal form, is defined for the moulding surfaces, where the 3D problem can be converted into a 2D one. 相似文献
9.
10.