全文获取类型
收费全文 | 103692篇 |
免费 | 9859篇 |
国内免费 | 5623篇 |
专业分类
电工技术 | 7181篇 |
技术理论 | 9篇 |
综合类 | 9287篇 |
化学工业 | 15995篇 |
金属工艺 | 6011篇 |
机械仪表 | 6666篇 |
建筑科学 | 8056篇 |
矿业工程 | 2765篇 |
能源动力 | 2883篇 |
轻工业 | 10381篇 |
水利工程 | 2094篇 |
石油天然气 | 5194篇 |
武器工业 | 1028篇 |
无线电 | 11075篇 |
一般工业技术 | 10912篇 |
冶金工业 | 3806篇 |
原子能技术 | 1128篇 |
自动化技术 | 14703篇 |
出版年
2024年 | 327篇 |
2023年 | 1670篇 |
2022年 | 3148篇 |
2021年 | 4413篇 |
2020年 | 3359篇 |
2019年 | 2648篇 |
2018年 | 2879篇 |
2017年 | 3338篇 |
2016年 | 2906篇 |
2015年 | 4352篇 |
2014年 | 5623篇 |
2013年 | 6471篇 |
2012年 | 7664篇 |
2011年 | 8380篇 |
2010年 | 7520篇 |
2009年 | 7104篇 |
2008年 | 7080篇 |
2007年 | 6613篇 |
2006年 | 6309篇 |
2005年 | 5013篇 |
2004年 | 3565篇 |
2003年 | 3015篇 |
2002年 | 3059篇 |
2001年 | 2575篇 |
2000年 | 2149篇 |
1999年 | 1846篇 |
1998年 | 1333篇 |
1997年 | 1022篇 |
1996年 | 914篇 |
1995年 | 683篇 |
1994年 | 553篇 |
1993年 | 386篇 |
1992年 | 326篇 |
1991年 | 243篇 |
1990年 | 164篇 |
1989年 | 142篇 |
1988年 | 88篇 |
1987年 | 70篇 |
1986年 | 54篇 |
1985年 | 25篇 |
1984年 | 15篇 |
1983年 | 21篇 |
1982年 | 22篇 |
1981年 | 22篇 |
1980年 | 32篇 |
1979年 | 9篇 |
1965年 | 2篇 |
1960年 | 2篇 |
1959年 | 8篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 812 毫秒
991.
992.
993.
Despite the successes in the last two decades, the state-of-the-art face detectors still have problems in dealing with images in the wild due to large appearance variations. Instead of leaving appearance variations directly to statistical learning algorithms, we propose a hierarchical part based structural model to explicitly capture them. The model enables part subtype option to handle local appearance variations such as closed and open month, and part deformation to capture the global appearance variations such as pose and expression. In detection, candidate window is fitted to the structural model to infer the part location and part subtype, and detection score is then computed based on the fitted configuration. In this way, the influence of appearance variation is reduced. Besides the face model, we exploit the co-occurrence between face and body, which helps to handle large variations, such as heavy occlusions, to further boost the face detection performance. We present a phrase based representation for body detection, and propose a structural context model to jointly encode the outputs of face detector and body detector. Benefit from the rich structural face and body information, as well as the discriminative structural learning algorithm, our method achieves state-of-the-art performance on FDDB, AFW and a self-annotated dataset, under wide comparisons with commercial and academic methods. 相似文献
994.
995.
搪瓷釉的烧成过程是一种“液相烧结”过程,其传质有赖于熔体的粘性流动。根据玻璃态物质化学组成—结构—粘度—温度的一般关系,推导出计算瓷釉烧成温度(T_烧)的经验公式。 相似文献
996.
In this paper, a lattice Boltzmann model for the three-dimensional complex Ginzburg–Landau equation is proposed. The multi-scale technique and the Chapman–Enskog expansion are used to describe higher-order moments of the complex equilibrium distribution function and a series of complex partial differential equations. The modified partial differential equation of the three-dimensional complex Ginzburg–Landau equation with the third order truncation error is obtained. Based on the complex lattice Boltzmann model, some motions of the stable scroll, such as the scroll wave with a straight filament, scroll ring, and helical scroll are simulated. The comparisons between results of the lattice Boltzmann model with those obtained by the alternative direction implicit scheme are given. The numerical results show that this model can be used to simulate the three-dimensional complex Ginzburg–Landau equation. 相似文献
997.
Rongliang Chen Yuqi Wu Zhengzheng Yan Yubo Zhao Xiao-Chuan Cai 《Journal of scientific computing》2014,58(2):275-289
Numerical simulation of three-dimensional incompressible flows at high Reynolds number using the unsteady Navier–Stokes equations is challenging. In order to obtain accurate simulations, very fine meshes are necessary, and such simulations are increasingly important for modern engineering practices, such as understanding the flow behavior around high speed trains, which is the target application of this research. To avoid the time step size constraint imposed by the CFL number and the fine spacial mesh size, we investigate some fully implicit methods, and focus on how to solve the large nonlinear system of equations at each time step on large scale parallel computers. In most of the existing implicit Navier–Stokes solvers, segregated velocity and pressure treatment is employed. In this paper, we focus on the Newton–Krylov–Schwarz method for solving the monolithic nonlinear system arising from the fully coupled finite element discretization of the Navier–Stokes equations on unstructured meshes. In the subdomain, LU or point-block ILU is used as the local solver. We test the algorithm for some three-dimensional complex unsteady flows, including flows passing a high speed train, on a supercomputer with thousands of processors. Numerical experiments show that the algorithm has superlinear scalability with over three thousand processors for problems with tens of millions of unknowns. 相似文献
998.
Social network has extended its popularity from the Internet to mobile domain. Personal mobile devices can be self-organized and communicate with each other for instant social activities at any time and in any places to achieve pervasive social networking (PSN). In such a network, various content information flows. To which extent should mobile users trust it, whilst user privacy can also be preserved? Existing work has not yet seriously considered trust and reputation management, although trust plays an important role in PSN. In this paper, we propose PerContRep, a practical reputation system for pervasive content services that can assist trustworthy content selection and consumption in a pervasive manner. We develop a hybrid trust and reputation management model to evaluate node recommendation trust and content reputation in the context of frequent change of node pseudonyms. Simulations show the advantages of PerContRep in assisting user decisions and its effectiveness with regard to unfair rating attack, collaborative unfair rating attack, on-off attack and conflict behavior attack. A prototype system achieves positive user feedback on its usability and social acceptance. 相似文献
999.
1000.