全文获取类型
收费全文 | 5598篇 |
免费 | 814篇 |
国内免费 | 538篇 |
专业分类
电工技术 | 526篇 |
综合类 | 761篇 |
化学工业 | 45篇 |
金属工艺 | 72篇 |
机械仪表 | 356篇 |
建筑科学 | 42篇 |
矿业工程 | 102篇 |
能源动力 | 47篇 |
轻工业 | 21篇 |
水利工程 | 29篇 |
石油天然气 | 45篇 |
武器工业 | 49篇 |
无线电 | 2251篇 |
一般工业技术 | 237篇 |
冶金工业 | 50篇 |
原子能技术 | 10篇 |
自动化技术 | 2307篇 |
出版年
2024年 | 27篇 |
2023年 | 63篇 |
2022年 | 111篇 |
2021年 | 111篇 |
2020年 | 128篇 |
2019年 | 105篇 |
2018年 | 110篇 |
2017年 | 171篇 |
2016年 | 173篇 |
2015年 | 264篇 |
2014年 | 365篇 |
2013年 | 387篇 |
2012年 | 487篇 |
2011年 | 504篇 |
2010年 | 456篇 |
2009年 | 399篇 |
2008年 | 456篇 |
2007年 | 481篇 |
2006年 | 423篇 |
2005年 | 394篇 |
2004年 | 308篇 |
2003年 | 239篇 |
2002年 | 200篇 |
2001年 | 175篇 |
2000年 | 94篇 |
1999年 | 65篇 |
1998年 | 39篇 |
1997年 | 42篇 |
1996年 | 48篇 |
1995年 | 40篇 |
1994年 | 24篇 |
1993年 | 12篇 |
1992年 | 7篇 |
1991年 | 7篇 |
1990年 | 7篇 |
1989年 | 9篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 4篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有6950条查询结果,搜索用时 15 毫秒
81.
The seismic stability of the underground cavern complex, which houses the Baihetan hydropower plant in Yunnan Province, China, currently the world’s 2nd largest underground rock cavern group, is studied in this article. A preliminary performance-based seismic assessment approach specified for underground rock caverns is firstly proposed. The seismic performance objectives are classified. Reference earthquake motions are specified with the determination of the seismic variables. Detailed dynamic response analyses (Method 2B) are conducted based on the parameters given by the cyclic dynamic loading tests with medium strain rate. The seismic response of acceleration, stress, displacement and failure zones are studied. In addition, the seismic spectrum characteristics are analysed with a newly introduced wavelet packet technique. The mechanism of the support measures for seismic stability is also discussed. The assessment for seismic performance of the underground cavern complex is obtained by integrating these results. Serviceability objective of the underground cavern complex under operating basis earthquake may be satisfied, and the safety objective be feasible but with the presence of the proposed reinforcement system. The seismic isolation design is preferred, yet not necessary. And if any seismic isolation design is to be adopted, the frequency absorption range of the isolation material is expected to be 1–4 Hz. 相似文献
82.
以沪昆客专贵州段小高山隧道泄水洞下穿既有高铁隧道正洞爆破施工为工程实例,在泄水洞开挖下穿既有铁路隧道时,为确保既有隧道结构安全和爆破振动影响问题,采用稳健回归和小波包等分析技术,研究了在既有隧道正洞内设置沙质缓冲层,其在下穿隧道施工中爆破地震波特征和传播机制。结果表明:主频率分布范围较广;缓冲层有效地吸收了大部分高频带能量,到达既有隧道结构的能量主要集中在第2~第4频带部分,振动速度峰值降低了34%左右,各方向的主振频率主要位于5~70 Hz的中低频范围;切向的能量占主要优势,须重点关注。研究为下穿既有隧道正洞施工,保证其结构安全和沉降满足要求奠定了理论基础,该成果可为类似下穿隧道工程和小距离隧道工程爆破振动控制提供参考。 相似文献
83.
针对网络化控制系统中存在的数据包丢失,考虑了基于状态空间模型的网络化广义预测控制问题;在假设反馈通道和控制通道的数据包丢失过程确定可知的情况下,提出了一种采用预测器和预测控制器分别补偿反馈通道和控制通道的数据包丢失对系统性能影响的方法,通过把广义预测控制问题转化为滚动线性二次型最优跟踪问题,基于动态规划给出了网络化广义预测控制器的设计方法,并基于Ricoati差分方程非负定解的单调性,给出了末端加权矩阵保证系统稳定性的充分条件,最后通过仿真验证了所提出方法的有效性. 相似文献
84.
车辆图像的预处理效果的好坏直接影响着车牌定位的准确率和运算速度;为了去除复杂背景区域的影响,消除图像的噪声,提出了一种针对视频序列改进的预处理流程;基于混合高斯背景建模结合小波包多尺度去噪的思想,去除大量的背景信息,缩小了车牌定位的范围再继续后面的预处理工作;上述方法得到的图片,噪声干扰降低且含有较少的不规则连通区域,分别以文献[6]和文献[7]提供的车牌定位方法为例进行测试,效果良好。 相似文献
85.
HUANG Kun & ZHANG DaFang School of Computer Communication Hunan University Changsha China School of Software 《中国科学:信息科学(英文版)》2011,(1):23-37
Deep packet inspection(DPI)scans both packet headers and payloads to search for predefined signatures.As link rates and traffc volumes of Internet are constantly growing,DPI is facing the high performance challenge of how to achieve line-speed packet processing with limited embedded memory.The recent trie bitmap content analyzer(TriBiCa)suffers from high update overhead and many false positive memory accesses,while the shared-node fast hash table(SFHT)suffers from high update overhead and large memory requi... 相似文献
86.
GUO YuQian GUI WeiHua & YANG ChunHua School of Information Science Engineering Central South University Changsha China 《中国科学:信息科学(英文版)》2011,(4):824-835
This paper considers the design of compensators for systems with quantized inputs in order to reduce the influence of quantization.For systems with (vector) relative degrees,we propose a kind of compensators which can compensate for the accumulated output deviation completely caused by quantization.The proposed compensators are capable of keeping the differences of the input-output responses between the systems with quantized inputs and the original systems without considering quantization within certain sm... 相似文献
87.
基于智能防火墙的网络安全设计 总被引:1,自引:0,他引:1
本文分析了传统防火墙所存在的缺点,讨论了网络层与应用层信息在防火墙安全策略制定过程中综合应用的方法。研究了防火墙过滤规则自动产生与配置的途径,提出了一种基于智能防火墙网络安全的模型和实现方法。 相似文献
88.
We tighten a key estimate, which dictates the computational complexity of Guruswami-Sudan algorithm, on the lower bound of the degrees of freedom, and then propose a modified decoding algorithm for Reed-Solomon codes beyond half the minimum distance. The computational complexity of the modified algorithm is lower than the Guruswami-Sudan algorithm for the medium to high rate Reed-Solomon codes, and has the same asymptotic complexity as the algorithm proposed by Wu. Besides we also claim that our modified algorithm outperforms Wu's algorithm to some extent. 相似文献
89.
Djamel Bouchaffra Author Vitae 《Pattern recognition》2010,43(7):2590-2607
Current extensions of hidden Markov models such as structural, hierarchical, coupled, and others have the power to classify complex and highly organized patterns. However, one of their major limitations is the inability to cope with topology: When applied to a visible observation (VO) sequence, the traditional HMM-based techniques have difficulty predicting the n-dimensional shape formed by the symbols of the VO sequence. To fulfill this need, we propose a novel paradigm named “topological hidden Markov models” (THMMs) that classifies VO sequences by embedding the nodes of an HMM state transition graph in a Euclidean space. This is achieved by modeling the noise embedded in the shape generated by the VO sequence. We cover the first and second level topological HMMs. We describe five basic problems that are assigned to a second level topological hidden Markov model: (1) sequence probability evaluation, (2) statistical decoding, (3) structural decoding, (4) topological decoding, and (5) learning. To show the significance of this research, we have applied the concept of THMMs to: (i) predict the ASCII class assigned to a handwritten numeral, and (ii) map protein primary structures to their 3D folds. The results show that the second level THMMs outperform the SHMMs and the multi-class SVM classifiers significantly. 相似文献
90.
无论是蠕虫病毒、木马或是其他的网络攻击行为,无不向目标网络发送恶意数据包,以达到恶意攻击的目的.网络监控成为检测来自外部网络的数据包安全性的重要手段,Snort作为防火墙的补充广泛应用于网络内部,监控网络流量、数据包安全等.将Snort IDS部署在网络边界,基于CVE漏洞库建立本地Snort特征库,以检测所有通过边界的数据包,保护内网安全. 相似文献