全文获取类型
收费全文 | 11769篇 |
免费 | 1980篇 |
国内免费 | 1523篇 |
专业分类
电工技术 | 793篇 |
综合类 | 1406篇 |
化学工业 | 649篇 |
金属工艺 | 309篇 |
机械仪表 | 613篇 |
建筑科学 | 349篇 |
矿业工程 | 226篇 |
能源动力 | 214篇 |
轻工业 | 322篇 |
水利工程 | 154篇 |
石油天然气 | 296篇 |
武器工业 | 177篇 |
无线电 | 1692篇 |
一般工业技术 | 811篇 |
冶金工业 | 134篇 |
原子能技术 | 94篇 |
自动化技术 | 7033篇 |
出版年
2024年 | 21篇 |
2023年 | 150篇 |
2022年 | 284篇 |
2021年 | 326篇 |
2020年 | 418篇 |
2019年 | 353篇 |
2018年 | 350篇 |
2017年 | 418篇 |
2016年 | 493篇 |
2015年 | 538篇 |
2014年 | 792篇 |
2013年 | 780篇 |
2012年 | 1022篇 |
2011年 | 995篇 |
2010年 | 802篇 |
2009年 | 909篇 |
2008年 | 914篇 |
2007年 | 1005篇 |
2006年 | 774篇 |
2005年 | 739篇 |
2004年 | 545篇 |
2003年 | 448篇 |
2002年 | 363篇 |
2001年 | 310篇 |
2000年 | 253篇 |
1999年 | 199篇 |
1998年 | 141篇 |
1997年 | 145篇 |
1996年 | 127篇 |
1995年 | 102篇 |
1994年 | 87篇 |
1993年 | 73篇 |
1992年 | 74篇 |
1991年 | 38篇 |
1990年 | 43篇 |
1989年 | 32篇 |
1988年 | 20篇 |
1987年 | 18篇 |
1986年 | 14篇 |
1985年 | 16篇 |
1984年 | 23篇 |
1983年 | 19篇 |
1982年 | 17篇 |
1981年 | 11篇 |
1980年 | 15篇 |
1979年 | 12篇 |
1978年 | 5篇 |
1977年 | 10篇 |
1976年 | 7篇 |
1975年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 38 毫秒
71.
An algorithm for reconstructing a binary array of size N sx N from its forest of quadtree representation is presented. The algorithm traverses each tree of the forest in preorder and maps each ‘black’ node into the spatial domain. The time complexity in mapping is O(log N × Bn + Bp), where Bn is the number of black nodes in the forest and Bp is the number of black pixels in the N × N array. The algorithm has been implemented on an Apple II. 相似文献
72.
基于语法的元程序设计系统的自动生成技术 总被引:4,自引:0,他引:4
本文提出一种基于语法的元程序设计系统的自动生成技术,并开发了一个元程序设计系统的自动生成系统A-MPS。元程序设计系统是一种以程序作为操作对象的有效的程序设计工具,并具有广泛的应用。 相似文献
73.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
74.
本文应用故障树分析方法,对快中子零功率堆(DF-Ⅵ)在启动过程中发生临界事故的可能性做了初步的定量估计。结果表明,该堆每次启动发生临界事故的概率约为10~(-6)量级,得出确保装置启动安全的首要因素是选配合格的操作人员的结论,并对设备的改进提出了一些建议. 相似文献
75.
76.
Tree-based partitioning of date for association rule mining 总被引:1,自引:1,他引:0
The most computationally demanding aspect of Association Rule Mining is the identification and counting of support of the frequent sets of items that occur together sufficiently often to be the basis of potentially interesting rules. The task increases in difficulty with the scale of the data and also with its density. The greatest challenge is posed by data that is too large to be contained in primary memory, especially when high data density and/or low support thresholds give rise to very large numbers of candidates that must be counted. In this paper, we consider strategies for partitioning the data to deal effectively with such cases. We describe a partitioning approach which organises the data into tree structures that can be processed independently. We present experimental results that show the method scales well for increasing dimensions of data and performs significantly better than alternatives, especially when dealing with dense data and low support thresholds.
Shakil Ahmed received a first class BSc (Hons) degree from Dhaka University, Bangladesh, in 1990; and an MSc (first class), also Dhaka University, in 1992. He received his PhD from The University of Liverpool, UK, in 2005. From 2000 onwards he is a member of the Data Mining Group at the Department of Computer Science of the University of Liverpool, UK. His research interests include data mining, Association Rule Mining and pattern recognition.
Frans Coenen has been working in the field of Data Mining for many years and has written widely on the subject. He received his PhD from Liverpool Polytechnic in 1989, after which he took up a post as a RA within the Department of Computer Science at the University of Liverpool. In 1997, he took up a lecturing post within the same department. His current Data Mining research interests include Association rule Mining, Classification algorithms and text mining. He is on the programme committee for ICDM'05 and was the chair for the UK KDD symposium (UKKDD'05).
Paul Leng is professor of e-Learning at the University of Liverpool and director of the e-Learning Unit, which is responsible for overseeing the University's online degree programmes, leading to degrees of MSc in IT and MBA. Along with e-Learning, his main research interests are in Data Mining, especially in methods of discovering Association Rules. In collaboration with Frans Coenen, he has developed efficient new algorithms for finding frequent sets and is exploring applications in text mining and classification. 相似文献
77.
本文介绍以数字搜索树表示的二值图象的一种几何变换算法,文中讨论了四分区与正四边区的基本关系,输出DST结点成立的充分条件,给出了完整的几何变换算法并对算法的复杂性作了分析。 相似文献
78.
79.
郭来德 《计算机与数字工程》2012,40(3):104-105,114
图片是传递与表达信息的重要形式,由于图片数据特殊编码方式,它的存储和显示显得比较复杂。C#功能强大,使用方便,已经成为一种主流的计算机软件编程语言。文章介绍了使用C#向数据库中插入图片的方法,并加以比较。 相似文献
80.
文章首先对Sql Server 2008商业智能平台及决策树技术相关理论作了介绍,然后对挖掘数据源数据进行了一系列预处理。利用Sql Server 2008商业智能平台下的决策树技术并采用数据挖掘扩展语言即DMX语言创建了CET-4成绩分析决策树模型。分类矩阵和挖掘提升图分别对该模型的评估结果表明了模型具有较高的可靠性和分类准确度,同时模型对应的一些规则可作为英语教学管理和改革的重要参考依据。 相似文献