全文获取类型
收费全文 | 4648篇 |
免费 | 571篇 |
国内免费 | 427篇 |
专业分类
电工技术 | 318篇 |
综合类 | 297篇 |
化学工业 | 493篇 |
金属工艺 | 278篇 |
机械仪表 | 394篇 |
建筑科学 | 819篇 |
矿业工程 | 44篇 |
能源动力 | 260篇 |
轻工业 | 25篇 |
水利工程 | 70篇 |
石油天然气 | 39篇 |
武器工业 | 11篇 |
无线电 | 410篇 |
一般工业技术 | 971篇 |
冶金工业 | 77篇 |
原子能技术 | 35篇 |
自动化技术 | 1105篇 |
出版年
2024年 | 17篇 |
2023年 | 187篇 |
2022年 | 242篇 |
2021年 | 174篇 |
2020年 | 303篇 |
2019年 | 225篇 |
2018年 | 212篇 |
2017年 | 268篇 |
2016年 | 323篇 |
2015年 | 254篇 |
2014年 | 376篇 |
2013年 | 388篇 |
2012年 | 455篇 |
2011年 | 367篇 |
2010年 | 277篇 |
2009年 | 330篇 |
2008年 | 138篇 |
2007年 | 248篇 |
2006年 | 247篇 |
2005年 | 105篇 |
2004年 | 52篇 |
2003年 | 44篇 |
2002年 | 42篇 |
2001年 | 46篇 |
2000年 | 34篇 |
1999年 | 45篇 |
1998年 | 18篇 |
1997年 | 9篇 |
1996年 | 11篇 |
1995年 | 10篇 |
1994年 | 15篇 |
1993年 | 9篇 |
1992年 | 14篇 |
1991年 | 11篇 |
1990年 | 10篇 |
1989年 | 10篇 |
1988年 | 18篇 |
1987年 | 41篇 |
1986年 | 56篇 |
1985年 | 9篇 |
1980年 | 1篇 |
1979年 | 5篇 |
排序方式: 共有5646条查询结果,搜索用时 15 毫秒
31.
《Diamond and Related Materials》2005,14(1):74-77
Diamond-like carbon (DLC) layers deposited at room temperature in 13.56 MHz radio-frequency methane (CH4) plasma have been studied. The results of transient currents for DLC thin films are reported. The carrier's lifetime was determined based on the transient current analysis for the surface and bulk recombinations: trs=0.3 ms, trv=0.11 ms. These values seem to be relatively high for structures of this type. The diffusion length for DLC films L*=0.67×10−4 cm. Other parameters such as the diffusion coefficient D*=4×10−5 cm2/s and surface recombination rate S=0.37 cm/s are exceptionally small here. 相似文献
32.
This paper proposes a self-embedding watermarking scheme that reduces the watermark payload significantly while maintaining good recovery quality and security. The embedded watermark contributes to the tamper detection and content recovery and is composed of only the compression codes of the image content. The compression codes with variable length are generated according to the roughness of the image. To improve the security, a chaos-based pseudorandom sequence generator is adopted to generate block-mapping sequence and encrypt compression codes. The proposed method takes into account the invisibility, recovery quality, and security using the flexible watermark payload, which preserves sufficient information of the image block with as few bits as possible. Experimental results demonstrate that the proposed scheme not only outperforms conventional self-embedding fragile watermarking algorithms in tamper detection and recovery, but also improve the security against the various counterfeiting attacks. 相似文献
33.
Shi-Jinn Horng Didi Rosiyadi Pingzhi Fan Xian Wang Muhammad Khurram Khan 《Multimedia Tools and Applications》2014,72(3):3085-3103
This paper proposes an adaptive watermarking scheme for e-government document images. The adaptive scheme combines the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Genetic algorithm (GA), subsequently, is employed for the optimization of the scaling factor of the masking. Involving a number of steps, the scheme proposed through this study begins by calculating the mask of the host image using luminance masking. It is then continued by transforming the mask on each area into all frequencies domain. The watermark image, following this, is embedded by modifying the singular values of DCT-transformed host image with singular values of mask coefficient of host image and the control parameter of DCT-transformed watermark image using Genetic Algorithm (GA). The use of both the singular values and the control parameter respectively, in this case, is not only to improve the sensitivity of the watermark performance but also to avoid the false positive problem. The watermark image, afterwards, is extracted from the distorted images. The experiment results show the improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks. 相似文献
34.
Song-Ya Ma Ming-Xing Luo Xiu-Bo Chen Yi-Xian Yang 《Quantum Information Processing》2014,13(9):1951-1965
Two schemes via different entangled resources as the quantum channel are proposed to realize remote preparation of an arbitrary four-particle \(\chi \) -state with high success probabilities. To design these protocols, some useful and general measurement bases are constructed, which have no restrictions on the coefficients of the prepared states. It is shown that through a four-particle projective measurement and two-step three-particle projective measurement under the novel sets of mutually orthogonal basis vectors, the original state can be prepared with the probability 50 and 100 %, respectively. And for the first scheme, the special cases of the prepared state that the success probability reaches up to 100 % are discussed by the permutation group. Furthermore, the present schemes are extended to the non-maximally entangled quantum channel, and the classical communication costs are calculated. 相似文献
35.
36.
In this paper, the control synthesis problem for a class of large‐scale systems with multi‐modes that are called large‐scale switched systems is addressed. By introducing the concept of decentralized switching signal and the relevant decentralized average dwell time, the asymptotic stability and weighted ?2 gain performance are investigated. It should be noted that the decentralized switching covers general switching cases for large‐scale switched systems, namely, it admits both time‐dependent switching signal and arbitrary switching signal blended in the decentralized switching. Then, on the basis of the analysis results, the decentralized weighted control scheme including state feedback controller gains and switching signals is studied. Several design algorithms are proposed to meet different controller design problems. Finally, numerical examples are provided to illustrate theoretical findings within this paper. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
37.
38.
韧性断裂准则在板料成形中应用研究进展 总被引:1,自引:0,他引:1
对板料成形中的成形极限应力图、最大变薄率、成形极限图以及韧性断裂准则等预测成形极限的方法进行了综述和分析,提出了利用韧性断裂准则能够较好地预测塑性差的板料成形极限,而且还能考虑应变路径的变化.利用有限元方法模拟时,韧性断裂准则既可以运用到完全耦合的弹塑性损伤模型的增量方法中,也可以运用到一步有限元逆算法中.指出了为准确地预测成形极限,除了提高有限元模拟精度外,应找到一种本质地反映材料性能的准则. 相似文献
39.
应用copula函数来表示由两类失效部件组成的相依串联系统和相依并联系统的可靠性,并对这两种系统的可靠性进行比较,得到了使这两种相依系统的可靠性之间的大小关系成立的一些条件. 相似文献
40.
基于FCM的驾驶行为险态辨识模型 总被引:1,自引:0,他引:1
为实现险性驾驶行为的有效辨识,以事故发生概率为依据,在对驾驶行为状态予以险态分级的前提下,采用单因子方差分析进行险态辨识主因子析取,并基于模糊C均值聚类法构建了险态行为辨识模型。最后,结合实例对模型予以试算,并采用样本回代对模型进行了验证。结果表明,模型误差率为2.5%。 相似文献