全文获取类型
收费全文 | 1700篇 |
免费 | 362篇 |
国内免费 | 106篇 |
专业分类
电工技术 | 192篇 |
综合类 | 86篇 |
化学工业 | 367篇 |
金属工艺 | 93篇 |
机械仪表 | 89篇 |
建筑科学 | 145篇 |
矿业工程 | 76篇 |
能源动力 | 45篇 |
轻工业 | 216篇 |
水利工程 | 43篇 |
石油天然气 | 100篇 |
武器工业 | 13篇 |
无线电 | 164篇 |
一般工业技术 | 217篇 |
冶金工业 | 66篇 |
原子能技术 | 33篇 |
自动化技术 | 223篇 |
出版年
2024年 | 31篇 |
2023年 | 83篇 |
2022年 | 175篇 |
2021年 | 185篇 |
2020年 | 128篇 |
2019年 | 124篇 |
2018年 | 114篇 |
2017年 | 136篇 |
2016年 | 90篇 |
2015年 | 111篇 |
2014年 | 129篇 |
2013年 | 130篇 |
2012年 | 143篇 |
2011年 | 125篇 |
2010年 | 70篇 |
2009年 | 65篇 |
2008年 | 57篇 |
2007年 | 43篇 |
2006年 | 36篇 |
2005年 | 31篇 |
2004年 | 31篇 |
2003年 | 18篇 |
2002年 | 13篇 |
2001年 | 8篇 |
2000年 | 19篇 |
1999年 | 17篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 7篇 |
1994年 | 8篇 |
1993年 | 6篇 |
1992年 | 5篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1982年 | 1篇 |
1980年 | 3篇 |
1959年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有2168条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
In this work the synergistic effects of microwave (MW) irradiation induced oxidation processes and CoFe2O4 were studied for the degradation of brilliant green (BG) from aqueous solutions. Under the optimum condition, the ratio of solid to liquid was 1:167 (0.3 g CoFe2O4 mixed with 50 mL of 20 mg L−1 BG solution), MW power 600 W, and the time of the irradiation 2 min. And the decolorization rate could reach up to 100%. Further investigation showed that BG was degraded by MW-induced oxidation combined with CoFe2O4 surface adsorption. The CoFe2O4 could increase the efficiencies of MW degradation and be used repeatedly. The experimental results indicated that the method of MW degradation BG in the presence of CoFe2O4 could reduce reaction time and increase product yield. 相似文献
5.
Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao 《计算机系统科学与工程》2021,39(3):373-390
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier. 相似文献
6.
7.
四氯化硅的应用现状研究 总被引:1,自引:0,他引:1
综述了四氯化硅的主要处理方法和应用研究进展。详细介绍了四氯化硅在制备二氧化硅、多晶硅、三氯硅烷及其他硅烷产品方面的应用及其制备原理,并对各制备工艺技术进行了分析。 相似文献
8.
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
Qiqi LAI Yuan CHEN Yupu HU Baocang WANG Mingming JIANG 《Frontiers of Computer Science in China》2014,(3):469-477
Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions. Our main idea is to introduce a universal hash function (UHF) h as a random value for each encrypfion, and then use s = h(sk) as the key of the ideal cipher F, where sk is the private key of our symmetric encryption scheme. Although many other schemes that are secure against KDM attacks have already been proposed, in both the ideal standard models, the much more significance of our paper is the simplicity in which we implement KDM security against active attacks. 相似文献
9.
针对稀土萃取过程中组分含量难以实时监测以及现有组分含量检测方法耗时、耗内存的现状,设计了一种基于溶液图像时序特征的元素组分含量动态监测系统。首先使用图像采集装置获取萃取槽体溶液的时序图像,考虑萃取液颜色特性和单一颜色空间的不全面性,采用主成分分析(PCA)方法在HSI和YUV融合的颜色空间提取图像的时序特征,并结合生产指标构造基于鲸鱼优化算法(WOA)的最小二乘支持向量机(LSSVM)分类器来对工况状态进行判断。然后当工况处于非最佳状态时,在HSV颜色空间对图像提取颜色直方图和颜色矩特征,并开发以溶液图像间的混合特征差值的线性加权值为相似度度量的图像检索系统,从而获取组分含量值。最后进行镨/钕萃取槽体混合溶液测试,结果表明该系统能够实现元素组分含量的动态监测。 相似文献
10.
由于整点报时与不报时是区分正常广播与“黑广播”的重要指标之一,因此文章提出一种基于隐马尔可夫模型的调频广播信号整点报时特性识别方法。利用静音识别算法将调频广播整点时刻频谱数据表示为0-1序列并在0-1序列中分析调频广播信号的静音序列变化规律,得到调频广播频谱数据的隐藏状态和观察状态的随机序列;通过子区间划分,分别获得初始隐藏状态转移矩阵和初始观察状态概率矩阵;采用Baum-Welch迭代学习算法,在调频广播整点时刻频谱数据训练样本集上对隐藏状态转移矩阵和观察状态概率矩阵进行训练学习,分别得到调频广播整点报时和不报时的隐马尔可夫模型,并给出调频广播信号整点报时特性识别算法。采用实测调频广播整点报时频谱数据进行整点报时特性识别实验,其结果表明,该方法可有效地识别调频广播信号整点报时特性,其整点报时特性的平均识别率为87.5%。该方法在快速发现“黑广播”方面具有一定的实用价值。 相似文献