全文获取类型
收费全文 | 150846篇 |
免费 | 6682篇 |
国内免费 | 1943篇 |
专业分类
电工技术 | 4620篇 |
技术理论 | 3篇 |
综合类 | 6362篇 |
化学工业 | 22192篇 |
金属工艺 | 8715篇 |
机械仪表 | 7232篇 |
建筑科学 | 6859篇 |
矿业工程 | 2786篇 |
能源动力 | 2993篇 |
轻工业 | 7804篇 |
水利工程 | 2356篇 |
石油天然气 | 4372篇 |
武器工业 | 527篇 |
无线电 | 17395篇 |
一般工业技术 | 24471篇 |
冶金工业 | 5687篇 |
原子能技术 | 977篇 |
自动化技术 | 34120篇 |
出版年
2025年 | 207篇 |
2024年 | 1704篇 |
2023年 | 1466篇 |
2022年 | 1969篇 |
2021年 | 2772篇 |
2020年 | 2365篇 |
2019年 | 2139篇 |
2018年 | 16164篇 |
2017年 | 15342篇 |
2016年 | 11853篇 |
2015年 | 3140篇 |
2014年 | 3331篇 |
2013年 | 3845篇 |
2012年 | 7143篇 |
2011年 | 13716篇 |
2010年 | 11835篇 |
2009年 | 8987篇 |
2008年 | 10061篇 |
2007年 | 11009篇 |
2006年 | 3773篇 |
2005年 | 4238篇 |
2004年 | 3223篇 |
2003年 | 2954篇 |
2002年 | 2115篇 |
2001年 | 1535篇 |
2000年 | 1732篇 |
1999年 | 1768篇 |
1998年 | 1561篇 |
1997年 | 1298篇 |
1996年 | 1193篇 |
1995年 | 961篇 |
1994年 | 847篇 |
1993年 | 579篇 |
1992年 | 450篇 |
1991年 | 396篇 |
1990年 | 266篇 |
1989年 | 215篇 |
1988年 | 193篇 |
1987年 | 122篇 |
1986年 | 101篇 |
1985年 | 60篇 |
1968年 | 43篇 |
1966年 | 42篇 |
1965年 | 45篇 |
1959年 | 36篇 |
1958年 | 40篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
The objective of this work is to correctly detect and recognize faces in an image collection using a database of known faces. This has applications in photo-tagging, video indexing, surveillance and recognition in wearable computers. We propose a two-stage approach for both detection and recognition tasks. In the first stage, we generate a seed set from the given image collection using off-the-shelf face detection and recognition algorithms. In the second stage, the obtained seed set is used to improve the performance of these algorithms by adapting them to the domain at hand. We propose an exemplar-based semi-supervised framework for improving the detections. For recognition of images, we use sparse representation classifier and generate seed images based on a confidence measure. The labels of the seed set are then propagated to other faces using label propagation framework by imposing appropriate constraints. Unlike traditional approaches, our approach exploits the similarities among the faces in collection to obtain improved performance. We conduct extensive experiments on two real-world photo-album and video collections. Our approach consistently provides an improvement of \({\sim } 4\)% for detection and \(5{-}9\)% for recognition on all these datasets. 相似文献
992.
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a point-to-point network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization: It follows that, in case a third of the parties might be corrupted, broadcast is necessary for securely computing non-dominated functionalities (in which “small” subsets of the inputs cannot determine the output), including, as interesting special cases, the Boolean XOR and coin-flipping functionalities.
相似文献
- A symmetric n-party functionality can be securely computed facing \(n/3\le t<n/2\) corruptions (i.e., honest majority), if and only if it is \((n-2t)\) -dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output to some predetermined value.
- Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing \(t\ge n/2\) corruptions (i.e., no honest majority), if and only if it is 1-dominated and can be securely computed with broadcast.
993.
Multiple access control (MAC) protocols play a significant role in wireless LANs. The IEEE 802.11 MAC protocol specifies two
coordination functions that are Distributed Coordination Function (DCF) and Point Coordination Function (PCF). While both
DCF and PCF are available in a wireless cell, we propose a novel access mechanism called Adaptive Coordination Function (ACF)
to support various classes of traffic. The ACF superframe comprises two periods, one TDMA period designed for real-time traffic
and followed by an adaptive period which adaptively employs DCF or PCF to support non-real-time traffic. In this paper, we
apply the theory of M/G/1 queues to analyze the performance of adaptive period in terms of queuing delay, end-to-end delay,
and saturation throughput. With our analytic model, DCF or PCF can be invoked appropriately according to the number of stations,
packet arrival rate, packet payload size, and effective channel bit rate. Analytical results are derived for an extensive
throughput and delay performance evaluation of both DCF and PCF. 相似文献
994.
The commonly used models for shadowed fading channels arise by compounding the Nakagami distribution with others such as the
log-normal and gamma distributions. A distribution that is more flexible than the Nakagami distribution is the well known
Weibull distribution. In this paper, we derive a collection of generalized models for shadowed fading channels by compounding
the Weibull distribution with other distributions belong to some fifteen flexible families. We also illustrate the superior
performance of these models over the standard Nakagami models. 相似文献
995.
Maciej Jan Zawodniok Sarangapani Jagannathan 《International Journal of Wireless Information Networks》2007,14(4):251-263
In this paper, two novel energy-efficient rate adaptation schemes are presented. The proposed protocols use the Distributed
Power Control (DPC) algorithm to predict the channel state and determine the necessary transmission power which optimizes
the energy consumption. The first proposed rate adaptation scheme heuristically alters the modulation rate to balance the
energy-efficiency and the required throughput which is estimated with queue fill ratio. Moreover, the back-off scheme is incorporated
to mitigate congestion and reduce packet losses due to buffer overflows thus minimizing energy consumption. Consequently,
the nodes will conserve energy when the traffic is low, offer higher throughput when needed and save energy during congestion
by limiting transmission rates. The second rate adaptation scheme employs dynamic programming (DP) principle to analytically
select modulation rate and a burst size to be used during transmission. The proposed quadratic cost-function minimizes the
energy consumption while alleviating network congestions and buffer overflows. The proposed DP solution renders a Riccati
equation ultimately providing an optimal rate selection. The simulation results indicate that an increase in throughput by
96% and energy-efficiency by 131% is observed when compared to other available protocols, for example Receiver Based AutoRate
(RBAR).
相似文献
Sarangapani JagannathanEmail: |
996.
The computation of outage probability in cellular radio system has been extensively studied. The Signal-to-Interference-plus-Noise
Ratio (SINR) distribution involves the sum of lognormal distributions due to dominant effect of shadowing in both the signal
and interference components. Since no closed-form expression can be found for the sum of lognormal distributions, many approximation
methods and bounds were proposed in the past. In this paper, Log Shifted Gamma (LSG) approximation is proposed to calculate
the sum of correlated lognormal random variables (RVs), hence the outage probability, accurately with a wide range of dB spreads,
number of interferers M, correlation coefficients r among interference components, and noise power N. Overall, LSG approximation
shows consistent accuracy due to its flexibility over the classical lognormal approximation, especially with small correlation
coefficients r and/or large dB spreads. 相似文献
997.
Grzegorz Mrugalski Janusz Rajski Chen Wang Artur Pogiel Jerzy Tyszer 《Journal of Electronic Testing》2007,23(1):35-45
This paper describes a non-recursive fault diagnosis technique for scan-based designs with convolutional test response compaction.
The proposed approach allows a time-efficient and accurate identification of failing scan cells using Gauss–Jordan elimination
method.
相似文献
Jerzy Tyszer (Corresponding author)Email: |
998.
传统的安全管理框架缺少对底层数据的整合分析,不能形成有效的网络安全态势信息和风险评估,也不能满足用户对其扩展性和健壮性的要求。文中利用TMN(电信管理网)管理与受管资源分开的思路启发,提出了一种新的综合安全管理框架。新的框架在J2EE分布式架构平台加以实现,能够满足用户对综合安管系统扩展性、易用性和健壮性的需求。 相似文献
999.
1000.