全文获取类型
收费全文 | 54846篇 |
免费 | 9396篇 |
国内免费 | 5897篇 |
专业分类
电工技术 | 4907篇 |
技术理论 | 2篇 |
综合类 | 5008篇 |
化学工业 | 1993篇 |
金属工艺 | 1411篇 |
机械仪表 | 4132篇 |
建筑科学 | 2191篇 |
矿业工程 | 1064篇 |
能源动力 | 542篇 |
轻工业 | 4463篇 |
水利工程 | 467篇 |
石油天然气 | 1306篇 |
武器工业 | 822篇 |
无线电 | 12491篇 |
一般工业技术 | 3896篇 |
冶金工业 | 977篇 |
原子能技术 | 557篇 |
自动化技术 | 23910篇 |
出版年
2024年 | 611篇 |
2023年 | 1680篇 |
2022年 | 2689篇 |
2021年 | 2938篇 |
2020年 | 2899篇 |
2019年 | 2204篇 |
2018年 | 1874篇 |
2017年 | 2410篇 |
2016年 | 2516篇 |
2015年 | 2875篇 |
2014年 | 4353篇 |
2013年 | 3743篇 |
2012年 | 4605篇 |
2011年 | 4804篇 |
2010年 | 3629篇 |
2009年 | 3586篇 |
2008年 | 3628篇 |
2007年 | 3868篇 |
2006年 | 3126篇 |
2005年 | 2640篇 |
2004年 | 1995篇 |
2003年 | 1663篇 |
2002年 | 1260篇 |
2001年 | 902篇 |
2000年 | 716篇 |
1999年 | 564篇 |
1998年 | 483篇 |
1997年 | 345篇 |
1996年 | 335篇 |
1995年 | 227篇 |
1994年 | 163篇 |
1993年 | 137篇 |
1992年 | 122篇 |
1991年 | 100篇 |
1990年 | 91篇 |
1989年 | 52篇 |
1988年 | 56篇 |
1987年 | 27篇 |
1986年 | 34篇 |
1985年 | 31篇 |
1984年 | 27篇 |
1983年 | 27篇 |
1982年 | 19篇 |
1981年 | 20篇 |
1980年 | 18篇 |
1979年 | 8篇 |
1978年 | 6篇 |
1976年 | 4篇 |
1975年 | 4篇 |
1951年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
11.
T. MATTILA-SANDHOLM T. ALI-VEHMAS G. WIRTANEN U. RÖNNER M. SANDHOLM 《International Journal of Food Science & Technology》1991,26(3):325-336
Automated monitoring of the microbiological quality of heat-processed foods by the resazurin reduction test was applied to microtitration plate incubator-fluorimeter technology. The appearance and disappearance of the fluorescing peak of resorufin was monitored on microtitration trays. Pasteurized or ultra-high temperature-treated starch-based soup was used as the model food system. Bacillus subtilis spores (ultra-high temperature treatment) and vegetative cells of Enterococcus faecalis (pasteurization) were inoculated into the soup before the heat treatment at levels which resulted in some survival. The timing of appearance of maximum fluorescence correlated with the number of bacteria in pre-incubated samples. Automated resazurin-reduction fluorimetry was compared with conventional plating, turbidometry and microcolony count by the direct epifluorescent filter technique. The results of the resazurin test correlated well with those of all the other methods tested. Fluorimetry had the advantage that the results could be read within 1–5h and the reproducibility was superior to the other methods. 相似文献
12.
Akira Ishizaki Kazuhiko Takasaki Shoji Shimomura Kouichi Masaki Kanji Kitazawa 《Electrical Engineering in Japan》1996,116(5):128-137
Although brushless resolvers have been used widely as angular position transducers, they are expensive due to their intricate construction, involving a rotary transformer to supply the exciting coils wound on the rotor poles with the current. It is shown theoretically in this paper that the resolver without rotary transformer or brushes can be realized by simple construction, which consists of the stator core with both 4-poles exciting windings and 2-poles output ones and the rotor core carrying no windings. In this resolver the rotor core has minimum gap at one side and a maximum gap at another side of the diameter. It is characterized by an outer surface form that makes the fluctuation part of gap permeance very in proportion to cos θ, where θ represents the angular position of a point in the air gap with respect to the origin on the rotor, the point of minimum air gap. The method determining the rotor form to embody the aforementioned gap permeance variation is also shown. It has been confirmed not only by simulation but also experiment that the 2-phase output voltages of a model designed based on the theory have sinusoidal waveforms with very small harmonic contents. Moreover, the rotor position detected by processing the output voltages through the conventional resolver/digital converter was within acceptable engineering accuracy. 相似文献
13.
从SAN(存储区域网)的安全隐患出发,分析了SAN在应用环境中受到的三种典型威胁。结合现行的入侵检测技术给出一个可行的解决方案。 相似文献
14.
《Expert systems with applications》2014,41(11):5416-5430
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQLIA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQLIA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods. 相似文献
15.
Behavioral cues to deception are instrumental in detecting deception. As one of the primary sources of deception behavior, text has been analyzed at the level of sub-sentence or message but not the discourse of interaction. Additionally, empirical studies on cues to deception in the case of multiple receivers remain nonexistent. To fill these voids, we propose a discourse framework and six hypotheses about deception behaviors in a multi-receiver environment. The deception behaviors are operationalized by discourse features based on an analysis of real-world data. The results of statistical analysis validate the efficacy of discourse features in discriminating deceivers from truth-tellers. 相似文献
16.
We propose a face detection method based on skin color likelihood via a boosting algorithm which emphasizes skin color information while deemphasizing non-skin color information. A stochastic model is adapted to compute the similarity between a color region and the skin color. Both Haar-like features and Local Binary Pattern (LBP) features are utilized to build a cascaded classifier. The boosted classifier is implemented based on skin color emphasis to localize the face region from a color image. Based on our experiments, the proposed method shows good tolerance to face pose variation and complex background with significant improvements over classical boosting-based classifiers in terms of total error rate performance. 相似文献
17.
18.
19.
详细描述了用分光光度计测定饱和盐水中的微量铝、硅、铁、碘等杂质的分析方法,利用该方法对饱和盐水进行测定,证明该检测方法简便、快速、实用,能够满足生产需要。 相似文献
20.
线性动态系统模型结合稀疏编码实现异常事件检测。线性动态系统可有效地捕捉动态纹理在时间和空间的转移信息,描述视频的时空小块。然而,线性动态系统属于非欧氏空间,无法直接用传统的稀疏编码进行异常检测。基于约束凸优化公式,将相似性变换与稀疏编码结合,可实现线性动态系统稀疏编码的优化求解。实验表明,所提出的方法具有更好的性能。 相似文献