全文获取类型
收费全文 | 144943篇 |
免费 | 6560篇 |
国内免费 | 3224篇 |
专业分类
电工技术 | 4284篇 |
技术理论 | 2篇 |
综合类 | 6275篇 |
化学工业 | 21608篇 |
金属工艺 | 8362篇 |
机械仪表 | 7010篇 |
建筑科学 | 6757篇 |
矿业工程 | 2664篇 |
能源动力 | 2769篇 |
轻工业 | 7486篇 |
水利工程 | 2317篇 |
石油天然气 | 4194篇 |
武器工业 | 524篇 |
无线电 | 16732篇 |
一般工业技术 | 23647篇 |
冶金工业 | 5540篇 |
原子能技术 | 876篇 |
自动化技术 | 33680篇 |
出版年
2024年 | 225篇 |
2023年 | 1080篇 |
2022年 | 1563篇 |
2021年 | 2486篇 |
2020年 | 1924篇 |
2019年 | 1723篇 |
2018年 | 16025篇 |
2017年 | 15217篇 |
2016年 | 11650篇 |
2015年 | 3035篇 |
2014年 | 3221篇 |
2013年 | 3787篇 |
2012年 | 7142篇 |
2011年 | 13700篇 |
2010年 | 11824篇 |
2009年 | 8968篇 |
2008年 | 10050篇 |
2007年 | 10975篇 |
2006年 | 3766篇 |
2005年 | 4225篇 |
2004年 | 3223篇 |
2003年 | 2946篇 |
2002年 | 2114篇 |
2001年 | 1534篇 |
2000年 | 1729篇 |
1999年 | 1750篇 |
1998年 | 1549篇 |
1997年 | 1286篇 |
1996年 | 1182篇 |
1995年 | 956篇 |
1994年 | 836篇 |
1993年 | 569篇 |
1992年 | 434篇 |
1991年 | 384篇 |
1990年 | 252篇 |
1989年 | 210篇 |
1988年 | 187篇 |
1987年 | 108篇 |
1986年 | 91篇 |
1985年 | 56篇 |
1968年 | 43篇 |
1967年 | 33篇 |
1966年 | 42篇 |
1965年 | 45篇 |
1959年 | 35篇 |
1958年 | 38篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
针对视觉检测设备在复杂的生产环境下存在图像处理参数设置问题,设计了一套B/S架构的通用的专家在线平台,通过在原有的视觉检测平台上增加一个普通的USB摄像头及相应的应用软件,并通过网络将出现的新问题的图像实时传输给生产厂家或外部专家,由专家通过浏览器设置合理的图像处理参数,平台综合了数据协同、远程培训等功能,达到了远程解决问题的目的。 相似文献
992.
PKI技术及其在校园网中的应用研究 总被引:1,自引:0,他引:1
将PKI技术引入校园网络,构建基于PKI技术的数字认证中心,既保证了校园网络的安全性,实现安全文件传输,又解决了校园网络用户身份认证的问题,推进高校信息化的同时提高校园网的安全性。 相似文献
993.
In this paper, we present an efficient way of implementing OpenGL ES 1.1 3D graphics API library for the environments with
hardware-supported OpenGL facility, typically as desktop PCs. Although OpenGL ES was started from the existing OpenGL features,
it rapidly became the standard 3D graphics library customized for embedded systems through introducing fixed-point arithmetic
operations, buffer management with fixed-point data type supports, completely new texture mapping functions and others. Currently,
it is the official 3D graphics API for Google Android, Apple iPhone, Sony PlayStation3, etc. In this paper, we achieved improvements
on the arithmetic operations for the fixed-point number representation, which is the most characteristic data type for OpenGL
ES 1.1. For the conversion of fixed-point data types to the floating-point number representations for the underlying OpenGL,
we show the way of efficient conversion processes even with satisfying OpenGL ES standard requirements. We also introduced
a specialized memory management scheme to manage the converted data from the buffer containing fixed-point numbers. In the
case of texture processing, the requirements in both standards are quite different, and thus we used completely new software-implementations.
Our final implementation of OpenGL ES library provides all of more than 200 functions in the standard specification and passed
its conformance test, to show its compliance with the standard. From the efficiency point of view, we measured its execution
times for several OpenGL ES-specific application programs and achieved remarkable improvements. 相似文献
994.
In this paper, we present AutoMed, an automated mediator for multi-issue bilateral negotiation under time constraints. AutoMed
elicits the negotiators preferences and analyzes them. It monitors the negotiations and proposes possible solutions for resolving
the conflict. We conducted experiments in a simulated environment. The results show that negotiations mediated by AutoMed
are concluded significantly faster than non-mediated ones and without any of the negotiators opting out. Furthermore, the
subjects in the mediated negotiations are more satisfied with the resolutions than the subjects in the non-mediated negotiations. 相似文献
995.
In this paper, we present a formulation of the quaternion constraint for rigid body rotations in the form of a standard perfect
bilateral mechanical constraint, for which the associated Lagrangian multiplier has the meaning of a constraint force. First,
the equations of motion of a scalable body are derived. A scalable body has three translational, three rotational, and one
uniform scaling degree of freedom. As generalized coordinates, an unconstrained quaternion and a displacement vector are used.
To the scalable body, a perfect bilateral constraint is added, restricting the quaternion to unit length and making the body
rigid. This way a quaternion based differential algebraic equation (DAE) formulation for the dynamics of a rigid body is obtained,
where the 7×7 mass matrix is regular and the unit length restriction of the quaternion is enforced by a mechanical constraint.
Finally, the equations of motion in the form of a DAE are linked to the Newton–Euler equations of motion of a rigid body.
The rigid body DAE formulation is useful for the construction of (energy) consistent integrators. 相似文献
996.
Bettina Berendt 《Data mining and knowledge discovery》2012,24(3):697-737
Over the last decade, privacy has been widely recognised as one of the major problems of data collections in general and the
Web in particular. This concerns specifically data arising from Web usage (such as querying or transacting) and social networking
(characterised by rich self-profiling including relational information) and the inferences drawn from them. The data mining
community has been very conscious of these issues and has addressed in particular the inference problems through various methods
for “privacy-preserving data mining” and “privacy-preserving data publishing”. However, it appears that these approaches by
themselves cannot effectively solve the privacy problems posed by mining. We argue that this is due to the underlying notions
of privacy and of data mining, both of which are too narrow. Drawing on notions of privacy not only as hiding, but as control
and negotiation, as well as on data mining not only as modelling, but as the whole cycle of knowledge discovery, we offer
an alternative view. This is intended to be a comprehensive view of the privacy challenges as well as solution approaches
along all phases of the knowledge discovery cycle. The paper thus combines a survey with an outline of an agenda for a comprehensive,
interdisciplinary view of Web mining and privacy. 相似文献
997.
Efficient compression and network adaptive video coding for distributed video surveillance 总被引:1,自引:1,他引:0
The availability of cheap network based video cameras and the prevalence of wireless networks has lead to a major thrust towards
deployment of large scale Distributed Video Surveillance (DVS) systems. This has opened up an important area of research to
deal with the issues involved in DVS system for efficient collection and transmission of large scale video streams from the
cameras at the guarded sites, to the end users in possibly constrained network conditions. In this paper, we propose a framework
based on content-based video classification and scalable compression scheme to provide a robust bandwidth efficient video
transmission for DVS. The scheme builds on a Discrete Wavelet Transform (DWT) based Color-Set Partitioning for Hierarchical
Trees (CSPIHT) coding to obtain a scalable bitstream. Wavelet domain segmentation and compression assists in development of
a DVS architecture. The architecture includes a novel module for dynamic allocation of Network bandwidth based on the current
available resources and constraints. Different frame constituents are optimally coded based on their relative significance,
perceptual quality, and available estimate of network bandwidth. Experimental result over different video sequences and simulations
for Network conditions demonstrate the efficient performance of the approach. 相似文献
998.
Guang-Ho Cha 《Multimedia Tools and Applications》2012,56(2):351-364
One of the central problems regarding media search is the semantic gap between the low-level features computed automatically
from media data and the human interpretation of them. This is because the notion of similarity is usually based on high-level
abstraction but the low-level features do not sometimes reflect the human perception. In this paper, we assume the semantics
of media is determined by the contextual relationship in a dataset, and introduce the method to capture the contextual information from a large media (especially
image) dataset for effective search. Similarity search in an image database based on this contextual information shows encouraging
experimental results. 相似文献
999.
The paper proposes a new approach to find semantic meanings in visual object class structure, in line with the Gestalt laws
of proximity. Micro level semantic structures are formed by line segments (arcs also approximated into line segments based
on pixel deviation threshold) which are in close proximity. These structures are hierarchically combined till a semantic label
can be assigned. The algorithm extracts semantic groups, their inter-relations and represents these using a graph. Invariant
geometrical properties of the groups and relations are used as vertex and edge labels. A graph model captures the inter class
variability by analyzing the repetitiveness of structures and relations and uses it as a weighting factor for classification.
The algorithm has been tested on a standard benchmark database and compared with existing approaches. 相似文献
1000.
Hugo Feitosa de Figueirêdo Yuri Almeida Lacerda Anselmo Cardoso de Paiva Marco Antonio Casanova Cláudio de Souza Baptista 《Multimedia Tools and Applications》2012,59(1):279-305
The recent popularity of digital cameras has posed a new problem: how to efficiently store and retrieve the very large number
of digital photos captured and chaotically stored in multiple locations without any annotation. This paper proposes an infrastructure,
called PhotoGeo, which aims at helping users with the people photo annotation, event photo annotation, storage and retrieval
of personal digital photos. To achieve the desired objective, PhotoGeo uses new algorithms that make it possible to annotate
photos with the key metadata to facilitate their retrieval, such as: the people who were shown in the photo (who); where it was captured (where); the date and time of capture (when); and the event that was captured. The paper concludes with a detailed evaluation of these algorithms. 相似文献