全文获取类型
收费全文 | 44630篇 |
免费 | 5199篇 |
国内免费 | 3008篇 |
专业分类
电工技术 | 5306篇 |
综合类 | 5321篇 |
化学工业 | 1209篇 |
金属工艺 | 1037篇 |
机械仪表 | 3143篇 |
建筑科学 | 3932篇 |
矿业工程 | 1587篇 |
能源动力 | 725篇 |
轻工业 | 1192篇 |
水利工程 | 921篇 |
石油天然气 | 788篇 |
武器工业 | 474篇 |
无线电 | 8514篇 |
一般工业技术 | 2947篇 |
冶金工业 | 1156篇 |
原子能技术 | 278篇 |
自动化技术 | 14307篇 |
出版年
2024年 | 169篇 |
2023年 | 495篇 |
2022年 | 822篇 |
2021年 | 1039篇 |
2020年 | 1095篇 |
2019年 | 811篇 |
2018年 | 796篇 |
2017年 | 1072篇 |
2016年 | 1283篇 |
2015年 | 1624篇 |
2014年 | 2880篇 |
2013年 | 2510篇 |
2012年 | 3505篇 |
2011年 | 3892篇 |
2010年 | 3090篇 |
2009年 | 3221篇 |
2008年 | 3290篇 |
2007年 | 3774篇 |
2006年 | 3380篇 |
2005年 | 2896篇 |
2004年 | 2218篇 |
2003年 | 1887篇 |
2002年 | 1432篇 |
2001年 | 1204篇 |
2000年 | 936篇 |
1999年 | 660篇 |
1998年 | 460篇 |
1997年 | 410篇 |
1996年 | 360篇 |
1995年 | 364篇 |
1994年 | 265篇 |
1993年 | 176篇 |
1992年 | 135篇 |
1991年 | 124篇 |
1990年 | 117篇 |
1989年 | 92篇 |
1988年 | 72篇 |
1987年 | 38篇 |
1986年 | 26篇 |
1985年 | 32篇 |
1984年 | 31篇 |
1983年 | 27篇 |
1982年 | 21篇 |
1981年 | 11篇 |
1980年 | 14篇 |
1979年 | 18篇 |
1963年 | 7篇 |
1961年 | 9篇 |
1959年 | 7篇 |
1957年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
21.
Maria Grazia Basanisi Gianfranco La Bella Gaia Nobili Rosa Coppola Annita Maria Damato Maria Assunta Cafiero Giovanna La Salandra 《International Journal of Food Science & Technology》2020,55(3):1145-1150
The authenticity and traceability of meat products are issues of primary importance to ensure food safety. Unfortunately, food adulteration (e.g. the addition of inexpensive cuts to minced meat products) and mislabelling (e.g. the inclusion of meat from species other than those declared) happens frequently worldwide. The aim of this study was to apply a droplet digital PCR assay for the detection and quantification (copies μL−1) of the beef, pork, horse, sheep, chicken and turkey in meat products. The analysis conducted on commercial meat showed the presence of traces of DNA from other animal species than those declared. We show that the method is highly sensitive, specific and accurate (accuracy = 100%). This method could be adopted by competent food safety authorities to verify compliance with the labelling of meat products and to ensure quality and safety throughout the meat supply chain, from primary production to consumption. 相似文献
22.
The veracity present in molecular data available in biological databases possesses new challenges for data analytics. The analysis of molecular data of various diseases can provide vital information for developing better understanding of the molecular mechanism of a disease. In this paper, an attempt has been made to propose a model that addresses the issue of veracity in data analytics for amino acid association patterns in protein sequences of Swine Influenza Virus. The veracity is caused by intra-sequential and inter-sequential biases present in the sequences due to varying degrees of relationships among amino acids. A complete dataset of 63,682 protein sequences is downloaded from NCBI and is refined. The refined dataset consists of 26,594 sequences which are employed in the present study. The type I fuzzy set is employed to explore amino acid association patterns in the dataset. The type I fuzzy support is refined to partially remove the inter-sequential biases causing veracity in data. The remaining inter-sequential biases present in refined fuzzy support are evaluated and eliminated using type II fuzzy set. Hence, it is concluded that a combination of type II fuzzy & refined fuzzy approach is the optimal approach for extracting a better picture of amino acid association patterns in the molecular dataset. 相似文献
23.
采用物质的相变吸热原理,可以将高温环境传人保温箱的热量重新排回至高温环境,有效地提高了保温箱的抗高温能力,并对保温箱的隔热性能做了简单的理论推算和测温反向试验。温度测试仪选用超低功耗CPU,具有体积小、耗电少的优点,使黑匣子高温测试仪在运行过程中具有很好的安全可靠性。 相似文献
24.
文章介绍了3种宽带数字储频的基本结构,分析了宽带数字储频的一个重要指标——量化噪声,根据输出信号频谱的杂散电平比较了三种结构的优劣。 相似文献
25.
26.
A Lattice Approach to Image Segmentation 总被引:1,自引:0,他引:1
Jean Serra 《Journal of Mathematical Imaging and Vision》2006,24(1):83-130
After a formal definition of segmentation as the largest partition of the space according to a criterion σ and a function
f, the notion of a morphological connection is reminded. It is used as an input to a central theorem of the paper (Theorem
8), that identifies segmentation with the connections that are based on connective criteria. Just as connections, the segmentations can then
be regrouped by suprema and infima. The generality of the theorem makes it valid for functions from any space to any other
one. Two propositions make precise the AND and OR combinations of connective criteria.
The soundness of the approach is demonstrated by listing a series of segmentation techniques. One considers first the cases
when the segmentation under study does not involve initial seeds. Various modes of regularity are discussed, which all derive
from Lipschitz functions. A second category of examples involves the presence of seeds around which the partition of the space
is organized. An overall proposition shows that these examples are a matter for the central theorem. Watershed and jump connection
based segmentations illustrate this type of situation. The third and last category of examples deals with cases when the segmentation
occurs in an indirect space, such as an histogram, and is then projected back on the actual space under study.
The relationships between filtering and segmentation are then investigated. A theoretical chapter introduces and studies the
two notions of a pulse opening and of a connected operator. The conditions under which a family of pulse openings can yield a connected filter are clarified. The ability of segmentations
to generate pyramids, or hierarchies, is analyzed. A distinction is made between weak hierarchies where the partitions increase
when going up in the pyramid, and the strong hierarchies where the various levels are structured as semi-groups, and particularly
as granulometric semi-groups.
The last section is based on one example, and goes back over the controversy about “lattice” versus “functional” optimization.
The problem is now tackled via a case of colour segmentation, where the saturation serves as a cursor between luminance and
hue. The emphasis is put on the difficulty of grouping the various necessary optimizations into a single one. 相似文献
27.
论文提出利用用户提供的个性化信息来随机产生关联大素数,保证了素数选取的随机化、个性化,提高了RSA算法的安全性。 相似文献
28.
为了提高现代网络信息传输的安全性,利用无理数小数点后数字的无穷性、无规律性、分布均匀性,提出一种全新的加密算法,并用它所产生的密钥流进行数字签名,实现身份验证不可抵赖、信息传输无篡改,确保信息传输的完整性、真实性,达到提高加密效率、相互认证的效果。 相似文献
29.
30.