全文获取类型
收费全文 | 11539篇 |
免费 | 1641篇 |
国内免费 | 1149篇 |
专业分类
电工技术 | 438篇 |
综合类 | 1258篇 |
化学工业 | 417篇 |
金属工艺 | 656篇 |
机械仪表 | 709篇 |
建筑科学 | 1304篇 |
矿业工程 | 754篇 |
能源动力 | 261篇 |
轻工业 | 229篇 |
水利工程 | 767篇 |
石油天然气 | 863篇 |
武器工业 | 168篇 |
无线电 | 1428篇 |
一般工业技术 | 955篇 |
冶金工业 | 353篇 |
原子能技术 | 118篇 |
自动化技术 | 3651篇 |
出版年
2024年 | 67篇 |
2023年 | 237篇 |
2022年 | 464篇 |
2021年 | 500篇 |
2020年 | 493篇 |
2019年 | 477篇 |
2018年 | 389篇 |
2017年 | 481篇 |
2016年 | 499篇 |
2015年 | 589篇 |
2014年 | 784篇 |
2013年 | 741篇 |
2012年 | 867篇 |
2011年 | 929篇 |
2010年 | 706篇 |
2009年 | 694篇 |
2008年 | 702篇 |
2007年 | 756篇 |
2006年 | 671篇 |
2005年 | 538篇 |
2004年 | 471篇 |
2003年 | 412篇 |
2002年 | 303篇 |
2001年 | 286篇 |
2000年 | 253篇 |
1999年 | 190篇 |
1998年 | 165篇 |
1997年 | 117篇 |
1996年 | 95篇 |
1995年 | 113篇 |
1994年 | 72篇 |
1993年 | 48篇 |
1992年 | 42篇 |
1991年 | 39篇 |
1990年 | 35篇 |
1989年 | 23篇 |
1988年 | 18篇 |
1987年 | 10篇 |
1986年 | 10篇 |
1985年 | 4篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1964年 | 3篇 |
1963年 | 2篇 |
1962年 | 2篇 |
1959年 | 2篇 |
1957年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
Chiuhsiang Joe Lin Lai‐Yu Cheng Ming‐Ching Wang 《Journal of the Society for Information Display》2015,23(2):76-83
Accurate distance estimation is essential for effective user interaction with objects appearing in the virtual space. Research has shown that the distance estimation in the virtual space is not as accurate as that in the real world. The inaccuracy phenomenon is almost exclusively documented for estimating objects appearing straight ahead of the eye. A collection of the accuracy data for targets located in different angles of view in the visual field may be useful in aiding the design of user‐virtual object interaction. This study collected the object to object distance estimation accuracy for targets displayed stereoscopically. There are five horizontal and two vertical viewing angles and three depths, resulting in a total of 30 locations in the virtual space. The distance estimation for any of the 30 object pairs were performed with or without the aid of spatial cues. Significant factors influencing the accuracy and time of distance estimation were identified. Implications of the finding were discussed with respect to the stereoscopic display environment. 相似文献
42.
A pair of gyradius ratios, defined from the principal radii of gyration, are used to generate a dimension map that describes the geometry of molecular aggregates in water and in organic solvents. Molecular dynamics simulations were performed on the aggregation of representative biomolecules and polyaromatic compounds to demonstrate application of the dimension map. It was shown that molecular aggregate data on the dimension map were bounded by two boundary curves, and that the map could be separated into three regions representing three groups of structures: one-dimensional rod-like structures; two-dimensional planar structures or short-cylinder-like structures; and three-dimensional sphere-like structures. Examining the location of the aggregates on the dimension map and how the location changes with solvent type and solute material parameter provides a simple yet effective way to infer the aggregation manner and to study solubility and mechanism of aggregation. 相似文献
43.
基于线性地基反力法和土体的弹塑性本构关系,对桩顶水平反力系数不为零时的水平受荷桩进行了研究,给出了桩顶土屈服临界荷载(水平力、弯矩)的耦合关系式。研究结果表明,当荷载大于临界荷载时,桩顶土发生塑性屈服,其塑性屈服深度随荷载的增加而增加,但其塑性区扩展速率随桩顶荷载的增加而逐渐减小。给出了弹性区与塑性区桩内力耦合的矩阵方程及其迭代求解格式;利用曲面拟合软件给出了塑性区换算深的计算公式。通过工程算例验证,证明该方法可靠快捷,便于手算,值得推广。
相似文献
44.
The success of an artificial neural network (ANN) strongly depends on the variety of the connection weights and the network structure. Among many methods used in the literature to accurately select the network weights or structure in isolate; a few researchers have attempted to select both the weights and structure of ANN automatically by using metaheuristic algorithms. This paper proposes modified bat algorithm with a new solution representation for both optimizing the weights and structure of ANNs. The algorithm, which is based on the echolocation behaviour of bats, combines the advantages of population-based and local search algorithms. In this work, ability of the basic bat algorithm and some modified versions which are based on the consideration of the personal best solution in the velocity adjustment, the mean of personal best and global best solutions through velocity adjustment and the employment of three chaotic maps are investigated. These modifications are aimed to improve the exploration and exploitation capability of bat algorithm. Different versions of the proposed bat algorithm are incorporated to handle the selection of the structure as well as weights and biases of the ANN during the training process. We then use the Taguchi method to tune the parameters of the algorithm that demonstrates the best ability compared to the other versions. Six classifications and two time series benchmark datasets are used to test the performance of the proposed approach in terms of classification and prediction accuracy. Statistical tests demonstrate that the proposed method generates some of the best results in comparison with the latest methods in the literature. Finally, our best method is applied to a real-world problem, namely to predict the future values of rainfall data and the results show satisfactory of the method. 相似文献
45.
《Information Security Journal: A Global Perspective》2013,22(4-6):235-246
ABSTRACTThe recent trends in technology have made it possible to reproduce and share digital media more easily and more rapidly. This leads to the problem of exploiting the media illegitimately. To alleviate this problem, many cryptographic techniques are used to secure the data by encrypting them. However, the cloaked form of encrypted data attracts the intruder and shows the way to malicious attacks. Due to this, in recent times steganography has drawn more attention to secure the data. This article presents a new technique that embeds data in intermediate significant bit (ISB) and least significant bit (LSB) planes of the cover image. The method employs chaotic maps to generate random locations to hide the data bits as well as permutation order to encrypt the cover image. The cover image is first encrypted by applying permutation order, then embedding is carried out on the random locations generated. After embedding, the decrypted cover image is transmitted. This method provides two-level security in extracting the hidden data. Experimental outcomes (PSNR, MSE, NAE, and NCC) confirm that the method is proficient. The randomness of the values generated by chaotic maps is assessed by the NIST standard test suite. 相似文献
46.
47.
本文首先对自行研制的海上地震拖缆自动定深器建立了较为详细的数学模型,给出了其传递函数模型,然后在Matlab环境下,利用仿真工具Simulink和控制系统工具箱(ControlSystemToolbox)中的SISO工具设计了经典控制器,并且对该系统进行了仿真分析,仿真结果表明:利用本文所设计的控制器,该系统具有较好的动态特性。 相似文献
48.
49.
闫达 《电脑编程技巧与维护》2011,(18):82-84
总结了进行网络可靠性分析的一般步骤,比较了传统的网络分析方法的优缺点,重点论述了一种基于有序二叉决策图的方法,在考虑失效节点的网络可靠性分析中的应用。 相似文献
50.