全文获取类型
收费全文 | 13634篇 |
免费 | 1089篇 |
国内免费 | 505篇 |
专业分类
电工技术 | 2228篇 |
技术理论 | 1篇 |
综合类 | 861篇 |
化学工业 | 394篇 |
金属工艺 | 387篇 |
机械仪表 | 1114篇 |
建筑科学 | 778篇 |
矿业工程 | 282篇 |
能源动力 | 195篇 |
轻工业 | 125篇 |
水利工程 | 237篇 |
石油天然气 | 98篇 |
武器工业 | 122篇 |
无线电 | 2458篇 |
一般工业技术 | 1210篇 |
冶金工业 | 210篇 |
原子能技术 | 208篇 |
自动化技术 | 4320篇 |
出版年
2024年 | 51篇 |
2023年 | 218篇 |
2022年 | 250篇 |
2021年 | 364篇 |
2020年 | 328篇 |
2019年 | 209篇 |
2018年 | 184篇 |
2017年 | 302篇 |
2016年 | 358篇 |
2015年 | 358篇 |
2014年 | 681篇 |
2013年 | 610篇 |
2012年 | 814篇 |
2011年 | 1032篇 |
2010年 | 727篇 |
2009年 | 759篇 |
2008年 | 786篇 |
2007年 | 1058篇 |
2006年 | 871篇 |
2005年 | 880篇 |
2004年 | 785篇 |
2003年 | 633篇 |
2002年 | 552篇 |
2001年 | 394篇 |
2000年 | 329篇 |
1999年 | 303篇 |
1998年 | 232篇 |
1997年 | 210篇 |
1996年 | 163篇 |
1995年 | 141篇 |
1994年 | 123篇 |
1993年 | 87篇 |
1992年 | 104篇 |
1991年 | 76篇 |
1990年 | 58篇 |
1989年 | 44篇 |
1988年 | 42篇 |
1987年 | 25篇 |
1986年 | 7篇 |
1985年 | 25篇 |
1984年 | 10篇 |
1983年 | 13篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1979年 | 4篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1964年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
141.
生成式隐写通过生成足够自然或真实的含密样本来隐藏秘密消息,是信息隐藏方向的研究热点,但目前在视频隐写领域的研究还比较少。结合数字化卡登格的思想,提出一种基于深度卷积生成对抗网络(DCGAN)的半生成式视频隐写方案。该方案中,设计了基于DCGAN的双流视频生成网络,用来生成视频的动态前景、静态后景与时空掩模三个部分,并以随机噪声驱动生成不同的视频。方案中的发送方可设定隐写阈值,在掩模中自适应地生成数字化卡登格,并将其作为隐写与提取的密钥;同时以前景作为载体,实现信息的最优嵌入。实验结果表明,该方案生成的含密视频具有良好的视觉质量,Frechet Inception距离(FID)值为90,且嵌入容量优于现有的生成式隐写方案,最高可达0.11 bpp,能够更高效地传输秘密消息。 相似文献
142.
143.
The introduction of digital twins is expected to fundamentally change the technology in transportation systems, as they appear to be a compelling concept for monitoring the entire life cycle of the transport system. The advent of widespread information technology, particularly the availability of real-time traffic data, provides the foundation for supplementing predominated (offline) microscopic simulation approaches with actual data to create a detailed real-time digital representation of the physical traffic. However, the use of actual traffic data in real-time motorway analysis has not yet been explored. The reason is that there are no supporting models and the applicability of real-time data in the context of microscopic simulations has yet to be recognized. Thus, this article focuses on microscopic motorway simulation with real-time data integration during system run-time. As a result, we propose a novel paradigm in motorway traffic modeling and demonstrate it using the continuously synchronized digital twin model of the Geneva motorway (DT-GM). We analyze the application of the microscopic simulator SUMO in modeling and simulating on-the-fly synchronized digital replicas of real traffic by leveraging fine-grained actual traffic data streams from motorway traffic counters as input to DT-GM. Thus, the detailed methodological process of developing DT-GM is presented, highlighting the calibration features of SUMO that enable (dynamic) continuous calibration of running simulation scenarios. By doing so, the actual traffic data are directly fused into the running DT-GM every minute so that DT-GM is continuously calibrated as the physical equivalent changes. Accordingly, DT-GM raises a technology dimension in motorway traffic simulation to the next level by enabling simulation-based control optimization during system run-time that was previously unattainable. It, thus, forms the foundation for further evolution of real-time predictive analytics as support for safety–critical decisions in traffic management. Simulation results provide a solid basis for the future real-time analysis of an extended Swiss motorway network. 相似文献
144.
该文提出了一种增强型PTP光纤级联精细时频同步方法,该方法以PTP同步技术为基础,结合同步以太网时钟传递技术和基于数字双混频时差法的多级级联精细时钟同步技术,对PTP技术进行改进和增强,然后基于该方法,通过多级时频设备光纤级联的形式实现多节点、大跨度、网络化的时频信号传递与同步输出,并解决多级级联情况下同步精度会逐级恶化的问题,实现ns量级的系统时间同步精度,保证系统各环节在高度统一的时间尺度下进行高效同步与联动工作。通过设计、试验,验证了该方法的可行性和有效性。 相似文献
145.
Disciplined autonomy: How business analytics complements customer involvement for digital innovation
《The Journal of Strategic Information Systems》2022,31(1):101706
The rise of big data and the fluid boundaries of digital products are driving companies to use business analytics (BA) to power their customer involvement. The complementarity view offers unique competence to generate value from BA because capability complementarity is less likely to be replicated or imitated. Unlike prior studies on BA-enabled value realization, our research investigates the interactions of BA and customer involvement capabilities using the complementarity view. We tested our model using data collected from 317 IT companies in China. Our results suggest that BA value realization requires both a top-down mechanism in which BA skills provide global guidance for alignment with a company’s goals and a bottom-up mechanism in which BA culture empowers local autonomy for adaptation to ever-changing needs. Our BA-complemented mechanisms provide research and practice with a way to concurrently use BA and customer involvement capabilities to address the duality of digital innovation. We further suggest that BA skills are necessary but insufficient for digital innovation because BA culture demonstrates a stronger effect in complementing organizations’ existing capabilities than BA skills do. 相似文献
146.
《The Journal of Strategic Information Systems》2022,31(1):101708
With business ecosystems digitalizing by the force of digital innovation, the deployment of boundary resources (such as application programming interfaces: APIs) becomes a strategic option across contexts. We distinguish between boundary resources that provide access openness and those that provide resource openness, and theorize the antecedents and consequences of their deployment. Employing panel data regressions to a longitudinal cross-industry dataset, we find that the digital knowledge base of the focal firm and the existence of potential digital complementors drive boundary resource deployment. Such deployment benefits firm performance depending on the firm’s market power. From our empirical analysis, we reveal a differentiated perspective on the quality of the confined openness provided by boundary resources as well as the embeddedness of their deployment in the rationales and motivations of the associated actors in digital business ecosystems. We complement the existent theoretical framework on boundary resources and provide valuable insights to managers reflecting about deploying boundary resources in a beneficial way. 相似文献
147.
Modern information technologies and in particular the internet have revolutionized the patent information professionals' work in terms of speed of access and information comprehensiveness from both company internal and external digital sources. Here, I describe how the digital mindmapping technique can be used to complement existing intellectual property management software solutions to meet the challenge of optimizing and managing patent search workflows as well as to rapidly organise and access highly dynamic, heterogeneous and scattered patent information sources. Both eye catching and highly memorable and at the same time self-explanatory mindmapping examples are presented. These were designed to include basic and advanced level digital mindmapping features tailored to significantly speed up and maintain a high work quality level of patent search professionals. A special emphasis is put on the great benefit of organising and accessing the plethora of internet-based worldwide online patent registers through mindmapping, both in terms of managing the constantly changing deep links to the actual search options for e.g., legal status information, and keeping track of the offered level of content. 相似文献
148.
《工程(英文)》2018,4(1):29-39
With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas. 相似文献
149.
Analyzable data capturing physical entity activities is a prerequisite for complex hospital operational decision-makings. However, there is a lack of effective strategies to integrate real-time data from multiple sources for efficient clinical and non-clinical operations in healthcare settings. Drawing on previous explorations of digital twins that facilitate real-time feedback of physical entities, we propose a conceptual framework of digital twinning for smart hospitals, with identified information needs and enabling technologies. A pilot platform is developed and tested in a Shanghai municipal hospital. The results indicate that the digital twinning method enables continuous real-time control of related operational tasks, and further promotes the development of digitization, automation, and intelligence in hospital operations. 相似文献
150.
Considering that random fluctuations can affect the rolling process of cold rolling mills, leading to abnormal cold mill performance and defects in the rolled product. Therefore, it is crucial to study the influence of random fluctuations on the system of cold rolling mills. In this paper, taking a model of the vertical vibration of a four-roller cold rolling mill under harmonic excitation as a prototype class for a real system, the effects of random fluctuations on the system response are analyzed. Firstly, based on the deterministic vertical vibration model of a four-roller cold rolling mill under harmonic excitation, a stochastic vertical vibration model of a four-roller cold rolling mill with random fluctuation as Gaussian white noise is introduced. Subsequently, the vertical vibration model of a four-roller rolling mill is theoretically analyzed by the averaging method and the stochastic averaging method, respectively. The effectiveness of the proposed theoretical method is verified by numerical simulation results, and the influences of harmonic excitation and random excitation on the system response are also investigated in detail. Finally, the results show that the noise induces the occurrence of stochastic transitions and bifurcations, and the steady-state probability density function and time history diagrams are given to further explain the existence of these dynamic phenomena. The related research can provide theoretical guidance for the realization of vibration control and reliability design in the four-roller cold rolling mill system. 相似文献