全文获取类型
收费全文 | 362663篇 |
免费 | 22440篇 |
国内免费 | 11204篇 |
专业分类
电工技术 | 15931篇 |
技术理论 | 31篇 |
综合类 | 19136篇 |
化学工业 | 59460篇 |
金属工艺 | 21079篇 |
机械仪表 | 21151篇 |
建筑科学 | 24681篇 |
矿业工程 | 9879篇 |
能源动力 | 8954篇 |
轻工业 | 19994篇 |
水利工程 | 5929篇 |
石油天然气 | 20213篇 |
武器工业 | 2235篇 |
无线电 | 39660篇 |
一般工业技术 | 48981篇 |
冶金工业 | 17216篇 |
原子能技术 | 3068篇 |
自动化技术 | 58709篇 |
出版年
2024年 | 821篇 |
2023年 | 4411篇 |
2022年 | 6609篇 |
2021年 | 10899篇 |
2020年 | 8289篇 |
2019年 | 7029篇 |
2018年 | 21028篇 |
2017年 | 21189篇 |
2016年 | 16983篇 |
2015年 | 11636篇 |
2014年 | 13908篇 |
2013年 | 16553篇 |
2012年 | 20673篇 |
2011年 | 28198篇 |
2010年 | 24463篇 |
2009年 | 20972篇 |
2008年 | 21786篇 |
2007年 | 22459篇 |
2006年 | 16090篇 |
2005年 | 15301篇 |
2004年 | 10102篇 |
2003年 | 9019篇 |
2002年 | 7830篇 |
2001年 | 6578篇 |
2000年 | 7268篇 |
1999年 | 8524篇 |
1998年 | 6857篇 |
1997年 | 5804篇 |
1996年 | 5463篇 |
1995年 | 4479篇 |
1994年 | 3735篇 |
1993年 | 2611篇 |
1992年 | 2123篇 |
1991年 | 1596篇 |
1990年 | 1145篇 |
1989年 | 910篇 |
1988年 | 747篇 |
1987年 | 488篇 |
1986年 | 359篇 |
1985年 | 235篇 |
1984年 | 161篇 |
1983年 | 104篇 |
1982年 | 125篇 |
1981年 | 83篇 |
1980年 | 67篇 |
1968年 | 43篇 |
1966年 | 42篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Zhishou Zhang Qibin Sun Wai-Choong Wong John Apostolopoulos Susie Wee 《Multimedia, IEEE Transactions on》2007,9(2):320-331
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required 相似文献
992.
Domain-Driven, Actionable Knowledge Discovery 总被引:1,自引:0,他引:1
Data mining increasingly faces complex challenges in the real-life world of business problems and needs. The gap between business expectations and R&D results in this area involves key aspects of the field, such as methodologies, targeted problems, pattern interestingness, and infrastructure support. Both researchers and practitioners are realizing the importance of domain knowledge to close this gap and develop actionable knowledge for real user needs. 相似文献
993.
994.
995.
Compared to other fields of engineering, in mechanical engineering, the Discrete Element Method (DEM) is not yet a well known
method. Nevertheless, there is a variety of simulation problems where the method has obvious advantages due to its meshless
nature. For problems where several free bodies can collide and break after having been largely deformed, the DEM is the method
of choice. Neighborhood search and collision detection between bodies as well as the separation of large solids into smaller
particles are naturally incorporated in the method. The main DEM algorithm consists of a relatively simple loop that basically
contains the three substeps contact detection, force computation and integration. However, there exists a large variety of
different algorithms to choose the substeps to compose the optimal method for a given problem. In this contribution, we describe
the dynamics of particle systems together with appropriate numerical integration schemes and give an overview over different
types of particle interactions that can be composed to adapt the method to fit to a given simulation problem. Surface triangulations
are used to model complicated, non-convex bodies in contact with particle systems. The capabilities of the method are finally
demonstrated by means of application examples.
Commemorative Contribution. 相似文献
996.
Miomir Vukobratović Veljko Potkonjak Kalman Babković Branislav Borovac 《Multibody System Dynamics》2007,17(1):71-96
In the last decade we have witnessed a rapid growth of Humanoid Robotics, which has already constituted an autonomous research field. Humanoid robots (or simply humanoids) are expected in all situations of humans’ everyday life, “living” and cooperating with us. They will work in services, in
homes, and hospitals, and they are even expected to get involved in sports. Hence, they will have to be capable of doing diverse
kinds of tasks. This forces the researchers to develop an appropriate mathematical model to support simulation, design, and
control of these systems. Another important fact is that today’s, and especially tomorrow’s, humanoid robots will be more
and more humanlike in their shape and behavior. A dynamic model developed for an advanced humanoid robot may become a very
useful tool for the dynamic analysis of human motion in different tasks (walking, running and jumping, manipulation, various
sports, etc.). So, we derive a general model and talk about a human-and-humanoid simulation system. The basic idea is to start
from a human/humanoid considered as a free spatial system (“flier”). Particular problems (walking, jumping, etc.) are then
considered as different contact tasks – interaction between the flier and various objects (being either single bodies or separate
dynamic systems). 相似文献
997.
Mining process models with non-free-choice constructs 总被引:6,自引:0,他引:6
Lijie Wen Wil M. P. van der Aalst Jianmin Wang Jiaguang Sun 《Data mining and knowledge discovery》2007,15(2):145-180
Process mining aims at extracting information from event logs to capture the business process as it is being executed. Process
mining is particularly useful in situations where events are recorded but there is no system enforcing people to work in a
particular way. Consider for example a hospital where the diagnosis and treatment activities are recorded in the hospital
information system, but where health-care professionals determine the “careflow.” Many process mining approaches have been
proposed in recent years. However, in spite of many researchers’ persistent efforts, there are still several challenging problems
to be solved. In this paper, we focus on mining non-free-choice constructs, i.e., situations where there is a mixture of choice
and synchronization. Although most real-life processes exhibit non-free-choice behavior, existing algorithms are unable to
adequately deal with such constructs. Using a Petri-net-based representation, we will show that there are two kinds of causal
dependencies between tasks, i.e., explicit and implicit ones. We propose an algorithm that is able to deal with both kinds
of dependencies. The algorithm has been implemented in the ProM framework and experimental results shows that the algorithm
indeed significantly improves existing process mining techniques. 相似文献
998.
999.
A recently proposed argument to explain the improved performance of the eight-point algorithm that results from using normalized
data (Chojnacki, W., et al. in IEEE Trans. Pattern Anal. Mach. Intell. 25(9):1172–1177, 2003) relies upon adoption of a certain model for statistical data distribution. Under this model, the cost function that underlies
the algorithm operating on the normalized data is statistically more advantageous than the cost function that underpins the
algorithm using unnormalized data. Here we extend this explanation by introducing a more refined, structured model for data
distribution. Under the extended model, the normalized eight-point algorithm turns out to be approximately consistent in a
statistical sense. The proposed extension provides a link between the existing statistical rationalization of the normalized
eight-point algorithm and the approach of Mühlich and Mester for enhancing total least squares estimation methods via equilibration.
The paper forms part of a wider effort to rationalize and interrelate foundational methods in vision parameter estimation. 相似文献
1000.