全文获取类型
收费全文 | 108869篇 |
免费 | 18011篇 |
国内免费 | 9852篇 |
专业分类
电工技术 | 16604篇 |
技术理论 | 10篇 |
综合类 | 12671篇 |
化学工业 | 3536篇 |
金属工艺 | 2013篇 |
机械仪表 | 5668篇 |
建筑科学 | 4187篇 |
矿业工程 | 2669篇 |
能源动力 | 2272篇 |
轻工业 | 1470篇 |
水利工程 | 2051篇 |
石油天然气 | 1825篇 |
武器工业 | 1074篇 |
无线电 | 24963篇 |
一般工业技术 | 4468篇 |
冶金工业 | 1642篇 |
原子能技术 | 292篇 |
自动化技术 | 49317篇 |
出版年
2025年 | 4篇 |
2024年 | 2608篇 |
2023年 | 2828篇 |
2022年 | 4661篇 |
2021年 | 4997篇 |
2020年 | 4985篇 |
2019年 | 3590篇 |
2018年 | 3014篇 |
2017年 | 3550篇 |
2016年 | 3745篇 |
2015年 | 4266篇 |
2014年 | 7348篇 |
2013年 | 6505篇 |
2012年 | 8205篇 |
2011年 | 8407篇 |
2010年 | 6661篇 |
2009年 | 6979篇 |
2008年 | 7375篇 |
2007年 | 8269篇 |
2006年 | 6870篇 |
2005年 | 6151篇 |
2004年 | 5087篇 |
2003年 | 4467篇 |
2002年 | 3479篇 |
2001年 | 2975篇 |
2000年 | 2274篇 |
1999年 | 1843篇 |
1998年 | 1323篇 |
1997年 | 1080篇 |
1996年 | 883篇 |
1995年 | 686篇 |
1994年 | 498篇 |
1993年 | 315篇 |
1992年 | 206篇 |
1991年 | 137篇 |
1990年 | 107篇 |
1989年 | 95篇 |
1988年 | 60篇 |
1987年 | 31篇 |
1986年 | 29篇 |
1985年 | 35篇 |
1984年 | 19篇 |
1983年 | 20篇 |
1982年 | 27篇 |
1981年 | 7篇 |
1980年 | 4篇 |
1979年 | 8篇 |
1965年 | 2篇 |
1959年 | 4篇 |
1951年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
无线传感器网络在军事和民用领域得到广泛的应用。由于传感器节点的资源有限以及通信的开放性使得其安全性显得尤为重要。出于对能量消耗的考虑,目前的路由协议设计得比较简单,作者对路由的安全性能以及可能受到的攻击进行分析,并给出相应的防范对策。 相似文献
92.
For a non-idealized machine tool, each point in the workspace is associated with a tool point positioning error vector. If this error map can be determined, then it is possible to substantially improve the positioning performance of the machine by introducing suitable compensation into the control loop. This paper explores the possibility of using an artifical neural network (ANN) to compute this mapping. The training set for the ANN is obtained by mounting a physical artifact whose dimensions are precisely known in the machine's workspace. The machine, equipped with a touch trigger probe, measures the positions of features on the artifact. The difference between the machine reading and the known dimension is the machine error at that point in the workspace. Using standard modeling techniques, the kinematic error model for a CNC turning center was developed. This model was parameterized by measurement of the parametric error functions using a laser interferometer, electronic levels and a precision square. The kinematic model was then used to simulate the artifact-measuring process and develop the ANN training set. The effect of changing artifact geometry was explored and a machining operation was simulated using the ANN output to provide compensation. The results show that the ANN is capable of learning the error map of a real machine, and that ANN-based compensation can significantly reduce part-dimensional errors. 相似文献
93.
《Displays》2023
Ship surveillance plays an important role in ensuring the safety of maritime transportation and navigation. Due to the influence of factors such as waves and special weather, the existing detection methods still cannot balance the accuracy, speed and the parameters of the model in the changeable and complex marine environment. To solve this problem, this paper proposes an improved real-time method based on YOLOv5, which has few parameters and achieves high detection accuracy with little memory and computation cost. Collaborative Attention (CA) mechanism is added to the network structure, which enables the model to more accurately locate and identify target regions. We also design a Spatial Pyramid Pooling module (SPP) and a weighted pyramid network called Bidirectional Feature Pyramid Network (BiFPN) based on the characteristics of the ships to better fuse feature information. Transformer encoder is introduced to capture long-distance dependencies and preserve global and local features to the greatest extent. Furthermore, the ability of our proposed structure to localize objects at each stage is improved through integrating the output of multiple modules. The experimental results show that, the comprehensive performance of this method is better than the existing technology in ship detection on different evaluation criteria. 相似文献
94.
In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating the pathways using multiple criteria and analytics. We present a Group Adaptive Hybrid Routing Algorithm (GAHRA) for gathering portability, which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile situations. Based on this aspect, the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach, with the objectives of enhancing the output of MANET routing computation in each hub. Simulation analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications. 相似文献
95.
In this paper, a finite-time optimal tracking control scheme based on integral reinforcement learning is developed for partially unknown nonlinear systems. In order to realize the prescribed performance, the original system is transformed into an equivalent unconstrained system so as to a composite system is constructed. Subsequently, a modified nonlinear quadratic performance function containing the auxiliary tracking error is designed. Furthermore, the technique of experience replay is used to update the critic neural network, which eliminates the persistent of excitation condition in traditional optimal methods. By combining the prescribed performance control with the finite-time optimization control technique, the tracking error is driven to a desired performance in finite time. Consequently, it has been shown that all signals in the partially unknown nonlinear system are semiglobally practical finite-time stable by stability analysis. Finally, the provided comparative simulation results verify the effectiveness of the developed control scheme. 相似文献
96.
Design of a 2-DOF-PID controller using an improved sine–cosine algorithm for load frequency control of a three-area system with nonlinearities 下载免费PDF全文
This paper proposes an improved sine–cosine algorithm (ISCA) based 2-DOF-PID controller for load frequency control. A three-area test system is built for study, while some physical constraints (nonlinearities) are considered for the investigation of a realistic power system. The proposed method is used as the parameter optimizer of the LFC controller in different scenarios. The 2-DOF-PID controllers are used because of their capability of fast disturbance rejection without significant increase of overshoot in set-point tracking. The 2-DOF-PID controllers’ efficacy is observed by examining the responses with the outcomes obtained with PID and FOPID controllers. The simulation results with the suggested scheme are correlated with some of the existing algorithms, such as SCA, SSA, ALO, and PSO in three different scenarios, i.e., a disturbance in two areas, in three areas, and in the presence of physical constraints. In addition, the study is extended to a four-area power system. Statistical analysis is performed using the Wilcoxon Sign Rank Test (WSRT) on 20 independent runs. This confirms the supremacy of the proposed method. 相似文献
97.
Saleh Albahli 《计算机系统科学与工程》2022,43(2):701-717
While the internet has a lot of positive impact on society, there are negative components. Accessible to everyone through online platforms, pornography is, inducing psychological and health related issues among people of all ages. While a difficult task, detecting pornography can be the important step in determining the porn and adult content in a video. In this paper, an architecture is proposed which yielded high scores for both training and testing. This dataset was produced from 190 videos, yielding more than 19 h of videos. The main sources for the content were from YouTube, movies, torrent, and websites that hosts both pornographic and non-pornographic contents. The videos were from different ethnicities and skin color which ensures the models can detect any kind of video. A VGG16, Inception V3 and Resnet 50 models were initially trained to detect these pornographic images but failed to achieve a high testing accuracy with accuracies of 0.49, 0.49 and 0.78 respectively. Finally, utilizing transfer learning, a convolutional neural network was designed and yielded an accuracy of 0.98. 相似文献
98.
Kun Yang Lei Zhao Xianghui Wang Mingyang Zhang Linyan Xue Shuang Liu Kun Liu 《计算机、材料和连续体(英文)》2023,75(3):5159-5176
The diagnosis of COVID-19 requires chest computed tomography (CT). High-resolution CT images can provide more diagnostic information to help doctors better diagnose the disease, so it is of clinical importance to study super-resolution (SR) algorithms applied to CT images to improve the resolution of CT images. However, most of the existing SR algorithms are studied based on natural images, which are not suitable for medical images; and most of these algorithms improve the reconstruction quality by increasing the network depth, which is not suitable for machines with limited resources. To alleviate these issues, we propose a residual feature attentional fusion network for lightweight chest CT image super-resolution (RFAFN). Specifically, we design a contextual feature extraction block (CFEB) that can extract CT image features more efficiently and accurately than ordinary residual blocks. In addition, we propose a feature-weighted cascading strategy (FWCS) based on attentional feature fusion blocks (AFFB) to utilize the high-frequency detail information extracted by CFEB as much as possible via selectively fusing adjacent level feature information. Finally, we suggest a global hierarchical feature fusion strategy (GHFFS), which can utilize the hierarchical features more effectively than dense concatenation by progressively aggregating the feature information at various levels. Numerous experiments show that our method performs better than most of the state-of-the-art (SOTA) methods on the COVID-19 chest CT dataset. In detail, the peak signal-to-noise ratio (PSNR) is 0.11 dB and 0.47 dB higher on CTtest1 and CTtest2 at SR compared to the suboptimal method, but the number of parameters and multi-adds are reduced by 22K and 0.43G, respectively. Our method can better recover chest CT image quality with fewer computational resources and effectively assist in COVID-19. 相似文献
99.
100.
随着互联网用户的剧增,网络安全成为困扰中国互联网健康发展的重要问题之一。与此同时,日趋严重的网络泄密问题已逐渐成为与黑客入侵、病毒袭击、垃圾邮件、流氓插件并行的第五大网络安全隐患.从法律角度来看,网路泄密实质上是对网络隐私权的侵犯,笔者通过对网路隐私权的分析,从现行法律制度与未来法律制度来解读网络泄密。 相似文献