全文获取类型
收费全文 | 19812篇 |
免费 | 1128篇 |
国内免费 | 1097篇 |
专业分类
电工技术 | 351篇 |
技术理论 | 1篇 |
综合类 | 872篇 |
化学工业 | 1057篇 |
金属工艺 | 355篇 |
机械仪表 | 1257篇 |
建筑科学 | 1570篇 |
矿业工程 | 502篇 |
能源动力 | 200篇 |
轻工业 | 873篇 |
水利工程 | 176篇 |
石油天然气 | 244篇 |
武器工业 | 111篇 |
无线电 | 1995篇 |
一般工业技术 | 589篇 |
冶金工业 | 497篇 |
原子能技术 | 203篇 |
自动化技术 | 11184篇 |
出版年
2024年 | 34篇 |
2023年 | 211篇 |
2022年 | 318篇 |
2021年 | 427篇 |
2020年 | 433篇 |
2019年 | 334篇 |
2018年 | 346篇 |
2017年 | 448篇 |
2016年 | 610篇 |
2015年 | 581篇 |
2014年 | 1139篇 |
2013年 | 1014篇 |
2012年 | 1116篇 |
2011年 | 1598篇 |
2010年 | 1089篇 |
2009年 | 1094篇 |
2008年 | 1180篇 |
2007年 | 1342篇 |
2006年 | 1374篇 |
2005年 | 1102篇 |
2004年 | 1002篇 |
2003年 | 1011篇 |
2002年 | 810篇 |
2001年 | 610篇 |
2000年 | 482篇 |
1999年 | 454篇 |
1998年 | 382篇 |
1997年 | 263篇 |
1996年 | 230篇 |
1995年 | 195篇 |
1994年 | 108篇 |
1993年 | 112篇 |
1992年 | 86篇 |
1991年 | 69篇 |
1990年 | 45篇 |
1989年 | 52篇 |
1988年 | 32篇 |
1987年 | 32篇 |
1986年 | 52篇 |
1985年 | 45篇 |
1984年 | 30篇 |
1983年 | 27篇 |
1982年 | 21篇 |
1981年 | 28篇 |
1980年 | 17篇 |
1979年 | 13篇 |
1978年 | 7篇 |
1977年 | 7篇 |
1976年 | 10篇 |
1973年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
72.
苏同建 《计算机光盘软件与应用》2012,(3):26+25
企业信息化作为国民经济信息化的基础,是当前推进国民经济信息化的重中之重。伴随全球信息化浪潮,我国煤矿企业信息化进程不断向深度和广度双向推进,但依然存在一些不尽人意的地方。本文首先分析了煤矿企业信息化的现状和制约信息化的原因,在此基础生展望了煤矿企业信息化的发展方向。 相似文献
73.
王琳 《计算机光盘软件与应用》2012,(4):136+88
本文针对国土资源管理的业务需求,设计出结构合理、功能全面的国土资源业务办公系统,并利用ArcEngine和C#加以实现,系统的建成使用极大地提高了国土资源管理工作效率。 相似文献
74.
《Displays》2021
As the demand for high-quality stereo images has grown in recent years, stereoscopic image quality assessment (SIQA) has become an important research area in modern image processing technology.In this paper, we propose a no-reference stereoscopic image quality assessment (NR-SIQA) model using heterogeneous ensemble learning ‘quality-aware’ features from luminance image, chrominance image, disparity and cyclopean images via quaternion wavelet transform (QWT). Firstly, luminance image and chrominance image are generated by CIELAB color space as monocular perception, and the novel disparity and cyclopean images are utilized to complement with monocular information. Then, a number of ‘quality-aware’ features in the quaternion wavelet domain are discovered, including entropy, texture features, energy features, energy differences features and MSCN coefficients of high frequency sub-band. Finally, a heterogeneous ensemble model via support vector regression (SVR) & extreme learning machine (ELM) & random forest (RF) is proposed to predict quality score, and bootstrap sampling and rotated feature space are used to increase the diversity of data distribution. Comparing with the state-of-the-art NR-SIQA models, experimental results on four public databases prove the accuracy and robustness of the proposed model. 相似文献
75.
High-performance aerospace component manufacturing requires stringent in-process geometrical and performance-based quality control. Real-time observation, understanding and control of machining processes are integral to optimizing the machining strategies of aerospace component manufacturing. Digital Twin can be used to model, monitor and control the machining process by fusing multi-dimensional in-context machining process data, such as changes in geometry, material properties and machining parameters. However, there is a lack of systematic and efficient Digital Twin modeling method that can adaptively develop high-fidelity multi-scale and multi-dimensional Digital Twins of machining processes. Aiming at addressing this challenge, we proposed a Digital Twin modeling method based on biomimicry principles that can adaptively construct a multi-physics digital twin of the machining process. With this approach, we developed multiple Digital Twin sub-models, e.g., geometry model, behavior model and process model. These Digital Twin sub-models can interact with each other and compose an integrated true representation of the physical machining process. To demonstrate the effectiveness of the proposed biomimicry-based Digital Twin modeling method, we tested the method in monitoring and controlling the machining process of an air rudder. 相似文献
76.
Defect inspection of glass bottles in the beverage industrial is of significance to prevent unexpected losses caused by the damage of bottles during manufacturing and transporting. The commonly used manual methods suffer from inefficiency, excessive space consumption, and beverage wastes after filling. To replace the manual operations in the pre-filling detection with improved efficiency and reduced costs, this paper proposes a machine learning based Acoustic Defect Detection (LearningADD) system. Moreover, to realize scalable deployment on edge and cloud computing platforms, deployment strategies especially partitioning and allocation of functionalities need to be compared and optimized under realistic constraints such as latency, complexity, and capacity of the platforms. In particular, to distinguish the defects in glass bottles efficiently, the improved Hilbert-Huang transform (HHT) is employed to extend the extracted feature sets, and then Shuffled Frog Leaping Algorithm (SFLA) based feature selection is applied to optimize the feature sets. Five deployment strategies are quantitatively compared to optimize real-time performances based on the constraints measured from a real edge and cloud environment. The LearningADD algorithms are validated by the datasets from a real-life beverage factory, and the F-measure of the system reaches 98.48 %. The proposed deployment strategies are verified by experiments on private cloud platforms, which shows that the Distributed Heavy Edge deployment outperforms other strategies, benefited from the parallel computing and edge computing, where the Defect Detection Time for one bottle is less than 2.061 s in 99 % probability. 相似文献
77.
基于不对称加密的网络信息安全对策研究 总被引:2,自引:0,他引:2
本文对SSL VPN的原理与连接过程及优势作了详细的分析,通过SSL VPN客户端经过安全的身份验证和加密,从而有效保障了网络资源的安全性,并使用了一个实例H3C SSL VPN。 相似文献
78.
杨燕 《网络安全技术与应用》2012,(1):10-11,16
信息网络技术在我军各个领域得到广泛应用。本文分析了军队信息安全面临的严峻形势,提出了军队信息安全的应对策略。 相似文献
79.
?erif Bahtiyar Mehmet Ufuk Ça?layan 《Journal of Network and Computer Applications》2012,35(1):480-490
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments. 相似文献
80.