全文获取类型
收费全文 | 302098篇 |
免费 | 23382篇 |
国内免费 | 15131篇 |
专业分类
电工技术 | 18604篇 |
技术理论 | 52篇 |
综合类 | 38922篇 |
化学工业 | 30845篇 |
金属工艺 | 11330篇 |
机械仪表 | 17283篇 |
建筑科学 | 39505篇 |
矿业工程 | 15726篇 |
能源动力 | 8595篇 |
轻工业 | 16744篇 |
水利工程 | 14447篇 |
石油天然气 | 12115篇 |
武器工业 | 2787篇 |
无线电 | 22133篇 |
一般工业技术 | 20842篇 |
冶金工业 | 16619篇 |
原子能技术 | 3068篇 |
自动化技术 | 50994篇 |
出版年
2024年 | 866篇 |
2023年 | 2808篇 |
2022年 | 5238篇 |
2021年 | 6440篇 |
2020年 | 6819篇 |
2019年 | 5634篇 |
2018年 | 5433篇 |
2017年 | 6674篇 |
2016年 | 8034篇 |
2015年 | 8957篇 |
2014年 | 16655篇 |
2013年 | 14972篇 |
2012年 | 19521篇 |
2011年 | 21338篇 |
2010年 | 16846篇 |
2009年 | 17372篇 |
2008年 | 16553篇 |
2007年 | 21491篇 |
2006年 | 20376篇 |
2005年 | 17709篇 |
2004年 | 15391篇 |
2003年 | 14084篇 |
2002年 | 11636篇 |
2001年 | 9846篇 |
2000年 | 8280篇 |
1999年 | 6965篇 |
1998年 | 5514篇 |
1997年 | 4721篇 |
1996年 | 4271篇 |
1995年 | 3552篇 |
1994年 | 3083篇 |
1993年 | 2384篇 |
1992年 | 2064篇 |
1991年 | 1544篇 |
1990年 | 1338篇 |
1989年 | 1168篇 |
1988年 | 969篇 |
1987年 | 644篇 |
1986年 | 525篇 |
1985年 | 471篇 |
1984年 | 425篇 |
1983年 | 320篇 |
1982年 | 278篇 |
1981年 | 237篇 |
1980年 | 183篇 |
1979年 | 141篇 |
1978年 | 84篇 |
1977年 | 93篇 |
1976年 | 68篇 |
1975年 | 63篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
11.
12.
13.
A small handful of recent studies have addressed a phenomenon known as “phantom vibration syndrome”. This refers to when phone users perceive their device to vibrate, indicating that a call or text is incoming, when in fact the phone did not vibrate at all. Though these studies show that most users do not find phantom vibration hallucinations to be very bothersome, they also find that a large majority of users experience this phenomenon. This paper explores what the striking prevalence of phantom vibration syndrome means for our contemporary relationships with technology. I begin with a review of the theories purporting to explain these data, which largely rely on particular understandings of the brain. Next I develop an alternative theory of phantom vibration syndrome based on insights from the philosophical tradition of phenomenology. This account considers the ways users develop bodily and perceptual habits regarding how the phone is understood and used. By critically contrasting these different theories, we can refine our questions about what the high prevalence of phantom vibration syndrome implies about our contemporary technological situation. 相似文献
14.
This paper presents an innovative solution to model distributed adaptive systems in biomedical environments. We present an original TCBR-HMM (Text Case Based Reasoning-Hidden Markov Model) for biomedical text classification based on document content. The main goal is to propose a more effective classifier than current methods in this environment where the model needs to be adapted to new documents in an iterative learning frame. To demonstrate its achievement, we include a set of experiments, which have been performed on OSHUMED corpus. Our classifier is compared with Naive Bayes and SVM techniques, commonly used in text classification tasks. The results suggest that the TCBR-HMM Model is indeed more suitable for document classification. The model is empirically and statistically comparable to the SVM classifier and outperforms it in terms of time efficiency. 相似文献
15.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
16.
ABSTRACTIn this paper, we review some algebraic control system. Precisely, linear and bilinear systems on Euclidean spaces and invariant and linear systems on Lie groups. The fourth classes of systems have a common issue: to any class, there exists an associated subgroup. From this object, we survey the controllability property. Especially, from those coming from our contribution to the theory. 相似文献
18.
19.
Salman M.A. Salman 《国际水资源开发杂志》2015,31(1):4-16
The United Nations Watercourses Convention entered into force on 17 August 2014, following a long and complex journey that dates back to 1970 when the UN referred the matter to its legal arm, the International Law Commission. This article follows the Convention through that long and turbulent road, examines its main provisions and analyses the reasons for the delay of its entry into force. It concludes by answering the question of why entry into force of the Convention should indeed matter. 相似文献
20.