全文获取类型
收费全文 | 269605篇 |
免费 | 38565篇 |
国内免费 | 20026篇 |
专业分类
电工技术 | 74175篇 |
技术理论 | 7篇 |
综合类 | 25582篇 |
化学工业 | 19859篇 |
金属工艺 | 6683篇 |
机械仪表 | 17856篇 |
建筑科学 | 10720篇 |
矿业工程 | 7426篇 |
能源动力 | 11871篇 |
轻工业 | 10027篇 |
水利工程 | 6222篇 |
石油天然气 | 6311篇 |
武器工业 | 3048篇 |
无线电 | 32371篇 |
一般工业技术 | 16036篇 |
冶金工业 | 6473篇 |
原子能技术 | 3063篇 |
自动化技术 | 70466篇 |
出版年
2024年 | 1149篇 |
2023年 | 4023篇 |
2022年 | 8731篇 |
2021年 | 10642篇 |
2020年 | 9301篇 |
2019年 | 7899篇 |
2018年 | 7599篇 |
2017年 | 10063篇 |
2016年 | 12151篇 |
2015年 | 13832篇 |
2014年 | 19344篇 |
2013年 | 17453篇 |
2012年 | 20818篇 |
2011年 | 21365篇 |
2010年 | 16500篇 |
2009年 | 17043篇 |
2008年 | 16984篇 |
2007年 | 20467篇 |
2006年 | 18222篇 |
2005年 | 14975篇 |
2004年 | 11804篇 |
2003年 | 10054篇 |
2002年 | 7627篇 |
2001年 | 6292篇 |
2000年 | 5293篇 |
1999年 | 3947篇 |
1998年 | 2807篇 |
1997年 | 2231篇 |
1996年 | 1923篇 |
1995年 | 1517篇 |
1994年 | 1258篇 |
1993年 | 868篇 |
1992年 | 758篇 |
1991年 | 514篇 |
1990年 | 486篇 |
1989年 | 400篇 |
1988年 | 274篇 |
1987年 | 179篇 |
1986年 | 142篇 |
1985年 | 138篇 |
1984年 | 156篇 |
1983年 | 121篇 |
1982年 | 120篇 |
1981年 | 79篇 |
1980年 | 90篇 |
1979年 | 44篇 |
1977年 | 36篇 |
1964年 | 39篇 |
1962年 | 68篇 |
1959年 | 45篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
Masahiro Sato Miyu Koriyama Satoshi Watanabe Masato Ohtsuka Takayuki Sakurai Emi Inada Issei Saitoh Shingo Nakamura Kazuchika Miyoshi 《International journal of molecular sciences》2015,16(8):17838-17856
Some reports demonstrated successful genome editing in pigs by one-step zygote microinjection of mRNA of CRISPR/Cas9-related components. Given the relatively long gestation periods and the high cost of housing, the establishment of a single blastocyst-based assay for rapid optimization of the above system is required. As a proof-of-concept, we attempted to disrupt a gene (GGTA1) encoding the α-1,3-galactosyltransferase that synthesizes the α-Gal epitope using parthenogenetically activated porcine oocytes. The lack of α-Gal epitope expression can be monitored by staining with fluorescently labeled isolectin BS-I-B4 (IB4), which binds specifically to the α-Gal epitope. When oocytes were injected with guide RNA specific to GGTA1 together with enhanced green fluorescent protein (EGFP) and human Cas9 mRNAs, 65% (24/37) of the developing blastocysts exhibited green fluorescence, although almost all (96%, 23/24) showed a mosaic fluorescent pattern. Staining with IB4 revealed that the green fluorescent area often had a reduced binding activity to IB4. Of the 16 samples tested, six (five fluorescent and one non-fluorescent blastocysts) had indel mutations, suggesting a correlation between EGFP expression and mutation induction. Furthermore, it is suggested that zygote microinjection of mRNAs might lead to the production of piglets with cells harboring various mutation types. 相似文献
72.
Nicholas Caffes David B. Kurland Volodymyr Gerzanich J. Marc Simard 《International journal of molecular sciences》2015,16(3):4973-4984
Ischemic and hemorrhagic strokes are associated with severe functional disability and high mortality. Except for recombinant tissue plasminogen activator, therapies targeting the underlying pathophysiology of central nervous system (CNS) ischemia and hemorrhage are strikingly lacking. Sur1-regulated channels play essential roles in necrotic cell death and cerebral edema following ischemic insults, and in neuroinflammation after hemorrhagic injuries. Inhibiting endothelial, neuronal, astrocytic and oligodendroglial sulfonylurea receptor 1–transient receptor potential melastatin 4 (Sur1–Trpm4) channels and, in some cases, microglial KATP (Sur1–Kir6.2) channels, with glibenclamide is protective in a variety of contexts. Robust preclinical studies have shown that glibenclamide and other sulfonylurea agents reduce infarct volumes, edema and hemorrhagic conversion, and improve outcomes in rodent models of ischemic stroke. Retrospective studies suggest that diabetic patients on sulfonylurea drugs at stroke presentation fare better if they continue on drug. Additional laboratory investigations have implicated Sur1 in the pathophysiology of hemorrhagic CNS insults. In clinically relevant models of subarachnoid hemorrhage, glibenclamide reduces adverse neuroinflammatory and behavioral outcomes. Here, we provide an overview of the preclinical studies of glibenclamide therapy for CNS ischemia and hemorrhage, discuss the available data from clinical investigations, and conclude with promising preclinical results that suggest glibenclamide may be an effective therapeutic option for ischemic and hemorrhagic stroke. 相似文献
73.
分析了全球微波接入互存(WiMAX)的技术特点和算法复杂度,探讨了其在电源监控系统中的应用,提出了基于Inter WiMAX Connection 2250技术的远程电源监控系统。在讨论WiMAX物理层算法的基础上,确定了以正交频分多址(OFDMA)模式为主体的物理层通信协议,提高了信道的利用率,抑制了码间干扰,为构建电源监控系统打下了良好的基础。 相似文献
74.
Reliability based criteria are quite popular for optimal sensor network design. We present a modified definition of system reliability for sensor network design for two applications: reliable estimation of variables in a steady state linear flow process, and reliable fault detection and diagnosis for any process. Unlike the weakest-link based definition of system reliability in the literature, the proposed definition considers the entire system and is consistent with the reliability concept used in classical reliability literature. For each application, dual approaches for defining system reliability are proposed, and their analogy with the reliability problem in the classical reliability literature is established. Using examples and stochastic simulations, the advantage of using the proposed system reliability in contrast to the existing definition is illustrated. Part II of this series of articles presents methods for efficient generation of the system reliability function and its use in optimization-based approaches for designing optimal sensor networks. 相似文献
75.
针对互联网中恶意域名攻击事件频发,现有域名检测方法实时性不强的问题,提出一种基于词法特征的恶意域名快速检测算法。该算法根据恶意域名的特点,首先将所有待测域名按照长度进行正则化处理后赋予权值;然后利用聚类算法将待测域名划分成多个小组,并利用改进的堆排序算法按照组内权值总和计算各域名小组优先级,根据优先级降序依次计算各域名小组中每一域名与黑名单上域名之间的编辑距离;最后依据编辑距离值快速判定恶意域名。算法运行结果表明,基于词法特征的恶意域名快速检测算法与单一使用域名语义和单一使用域名词法的恶意域名检测算法相比,准确率分别提高1.7%与2.5%,检测速率分别提高13.9%与6.8%,具有更高的准确率和实时性。 相似文献
76.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
77.
Data fitting with B-splines is a challenging problem in reverse engineering for CAD/CAM, virtual reality, data visualization, and many other fields. It is well-known that the fitting improves greatly if knots are considered as free variables. This leads, however, to a very difficult multimodal and multivariate continuous nonlinear optimization problem, the so-called knot adjustment problem. In this context, the present paper introduces an adapted elitist clonal selection algorithm for automatic knot adjustment of B-spline curves. Given a set of noisy data points, our method determines the number and location of knots automatically in order to obtain an extremely accurate fitting of data. In addition, our method minimizes the number of parameters required for this task. Our approach performs very well and in a fully automatic way even for the cases of underlying functions requiring identical multiple knots, such as functions with discontinuities and cusps. To evaluate its performance, it has been applied to three challenging test functions, and results have been compared with those from other alternative methods based on AIS and genetic algorithms. Our experimental results show that our proposal outperforms previous approaches in terms of accuracy and flexibility. Some other issues such as the parameter tuning, the complexity of the algorithm, and the CPU runtime are also discussed. 相似文献
78.
We investigate the problem of efficient wireless power transfer in wireless sensor networks. In our approach, special mobile entities (called the Mobile Chargers) traverse the network and wirelessly replenish the energy of sensor nodes. In contrast to most current approaches, we envision methods that are distributed and use limited network information. We propose four new protocols for efficient charging, addressing key issues which we identify, most notably (i) what are good coordination procedures for the Mobile Chargers and (ii) what are good trajectories for the Mobile Chargers. Two of our protocols (DC, DCLK) perform distributed, limited network knowledge coordination and charging, while two others (CC, CCGK) perform centralized, global network knowledge coordination and charging. As detailed simulations demonstrate, one of our distributed protocols outperforms a known state of the art method, while its performance gets quite close to the performance of the powerful centralized global knowledge method. 相似文献
79.
80.
泛在电力物联网是物联网在电力领域的具体体现,建设泛在电力物联网是推进"三型两网"建设的关键环节,也是实现能源转型的必要手段。阐述了泛在电力物联网的定义,从供电公司角度出发,根据北京经济技术开发区实际情况,讨论了依托地区特点的泛在电力物联网实施策略和实际应用场景,分析了可能遇到的问题。得出结论:随着泛在电力物联网的深入建设,供电公司能够为电力客户提供多元化服务,提高客户满意度;地市供电公司能够依托泛在电力物联网开展更多电力相关业务;泛在电力物联网的安全性、实用性、有效性是发展面临的首要问题。 相似文献