全文获取类型
收费全文 | 80980篇 |
免费 | 7286篇 |
国内免费 | 3809篇 |
专业分类
电工技术 | 4880篇 |
技术理论 | 6篇 |
综合类 | 5493篇 |
化学工业 | 13400篇 |
金属工艺 | 4650篇 |
机械仪表 | 4742篇 |
建筑科学 | 6221篇 |
矿业工程 | 2566篇 |
能源动力 | 2423篇 |
轻工业 | 6619篇 |
水利工程 | 1542篇 |
石油天然气 | 4964篇 |
武器工业 | 674篇 |
无线电 | 9023篇 |
一般工业技术 | 9433篇 |
冶金工业 | 4064篇 |
原子能技术 | 955篇 |
自动化技术 | 10420篇 |
出版年
2024年 | 496篇 |
2023年 | 1671篇 |
2022年 | 3035篇 |
2021年 | 4117篇 |
2020年 | 2936篇 |
2019年 | 2450篇 |
2018年 | 2719篇 |
2017年 | 2944篇 |
2016年 | 2561篇 |
2015年 | 3391篇 |
2014年 | 4304篇 |
2013年 | 4900篇 |
2012年 | 5189篇 |
2011年 | 5515篇 |
2010年 | 4778篇 |
2009年 | 4416篇 |
2008年 | 4312篇 |
2007年 | 4157篇 |
2006年 | 4199篇 |
2005年 | 3546篇 |
2004年 | 2357篇 |
2003年 | 2140篇 |
2002年 | 2119篇 |
2001年 | 1751篇 |
2000年 | 1704篇 |
1999年 | 1902篇 |
1998年 | 1480篇 |
1997年 | 1238篇 |
1996年 | 1199篇 |
1995年 | 1036篇 |
1994年 | 838篇 |
1993年 | 548篇 |
1992年 | 440篇 |
1991年 | 357篇 |
1990年 | 285篇 |
1989年 | 234篇 |
1988年 | 199篇 |
1987年 | 127篇 |
1986年 | 115篇 |
1985年 | 72篇 |
1984年 | 62篇 |
1983年 | 47篇 |
1982年 | 41篇 |
1981年 | 37篇 |
1980年 | 27篇 |
1979年 | 13篇 |
1978年 | 8篇 |
1977年 | 10篇 |
1976年 | 17篇 |
1975年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
This paper proposes a novel method, called model transduction, to directly transfer pose between different meshes, without the need of building the skeleton configurations for meshes. Different from previous retargetting methods, such as deformation transfer, model transduction does not require a reference source mesh to obtain the source deformation, thus effectively avoids unsatisfying results when the source and target have different reference poses. Moreover, we show other two applications of the model ... 相似文献
992.
针对Snake模型不能收敛到深凹陷区域的缺点,提出一种Snake模型的改进算法.首先把模型不能收敛到深凹陷区域归结为内部能量产生的收缩不足,在此基础上改变新的力,以调整内部能量;然后在不增加参数个数的前提下给出新的能量表达式.算法的实现采用贪婪算法.结果表明,改进的Snake模型能迅速地收敛到凹陷区域,并减少了结果对初值的依赖,明显优于传统Snake模型. 相似文献
993.
介绍了基于嵌入式PIC16F876A-I/SP芯片的质子交换膜燃料电池控制器的软硬件的设计,该控制器很好地改善了燃料电池的输出性能.实验结果表明,设计的质子交换膜燃料电池控制器不仅具有保护反应堆和蓄电池等功能,并可以在多变的环境下保持燃料电池的高度可靠性和稳定性.其性能基本达到预期指标. 相似文献
994.
In the field of computational fluid dynamics (CFD), the upwind finite volume method (FVM) is widely applied to solve 3D flows with discontinuity phenomena (e.g., shock waves). It produces unstructured data at the center of each cell (cell-centered data) with the flow discontinuity constraint on the inner-face between face-neighboring cells. For visualization, existing approaches with interpolation usually pre-extrapolate cell-centered data into cell-vertexed data (data values given at cell vertices) and only handle cell-vertexed data during actual rendering, which unconsciously depress the rendering accuracy and violate the discontinuity constraint. In this paper, we propose a novel method to visualize cell-centered data directly avoiding extrapolation and keep the discontinuity in the rendering data on the framework of multi-pass raycasting. During resampling, the field is reconstructed using the original cell-centered data value and the cell-gradient estimated by Green–Gauss theorem. To keep the discontinuity, we reconstruct the field at an inner-face resampled point using both the face-adjacencies and get two discontinuous field values. Then the field is obtained by computing Roe-average of the two. The analysis and experiments demonstrate that our approach gains a high-accuracy reconstruction and leads to a high-quality image. 相似文献
995.
We present an image deformation method driven by skeleton; it is based on MLS deformation algorithm (Schaefer et al. in SIGGRAPH,
vol. 25, pp. 533–540, 2006). We improve the MLS deformation by defining a new weight function based on skeleton. Being different from the weight function
based on control points, our weight function has benefited from the shape information of undeformed object and keeps deformation
local, therefore our method can achieve a realistic effect. In cartoon video, we propose a new method to track the skeleton
in the video, to build new origin skeleton and new target skeleton on each frame, and to apply our image deformation method
to each frame and maintain spatiotemporal consistency. Results demonstrate that our method is able to decrease the effect
of squeeze and use less control points. 相似文献
996.
Yusuke Tsuda Yonghao Yue Yoshinori Dobashi Tomoyuki Nishita 《The Visual computer》2010,26(6-8):883-891
In the field of computer graphics, simulation of fluids, including avalanches, is an important research topic. In this paper, we propose a method to simulate a kind of avalanche, mixed-motion avalanche, which is usually large and travels down the slope fast, often resulting in impressive visual effects. The mixed-motion avalanche consists of snow smokes and liquefied snow which form an upper suspension layer and a lower dense-flow layer, respectively. The mixed-motion avalanche travels down the surface of the snow-covered mountain, which is called accumulated snow layer. We simulate a mixed-motion avalanche taking into account these three snow layers. We simulate the suspension layer using a grid-based approach, the dense-flow and accumulated snow layer using a particle-based approach. An important contribution of our method is an interaction model between these snow layers that enables us to obtain the characteristic motions of avalanches, such as the generation of the snow smoke from the head of the avalanche. 相似文献
997.
The authors present an application-driven approach to compressing large-scale time-varying volume data. Their approach identifies a reference feature to partition the data into space-time blocks, which are compressed with various precisions depending on their association to the feature. Runtime decompression is performed with bit-wise texture packing and deferred filtering. This method achieves high compression rates and interactive rendering while preserving fine details surrounding regions of interest. Such an application-driven approach could help computational scientists cope with the large-data problem. 相似文献
998.
According to actual needs, a generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than the existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Compared with existing identity based generalized signcryption, the new scheme has less implementation complexity. Moreover, the new scheme has comparable computation complexity with the existing normal signcryption schemes. 相似文献
999.
XML has been the de‐facto standard of information representation and exchange over the web. As the next generation of the Web language, XML is straightforwardly usable over the Internet. At the same time, the real world is filled with imprecision and uncertainty. However, the existed works fall short in their ability to model imprecise and uncertain data using XML. In this paper, we propose a new fuzzy XML data model based on XML Schema. With the model used, the fuzzy information in XML documents can be represented naturally. Along with the model, an associated algebra is presented formally. We also introduce how to use our algebra to capture queries expressed in XQuery. It shows that this model and algebra can establish a firm foundation for publishing and managing the histories of fuzzy data on the Web. © 2010 Wiley Periodicals, Inc. 相似文献
1000.
In this paper, we prove that the Legendre tau method has the optimal rate of convergence in L
2-norm, H
1-norm and H
2-norm for one-dimensional second-order steady differential equations with three kinds of boundary conditions and in C([0,T];L
2(I))-norm for the corresponding evolution equation with the Dirichlet boundary condition. For the generalized Burgers equation,
we develop a Legendre tau-Chebyshev collocation method, which can also be optimally convergent in C([0,T];L
2(I))-norm. Finally, we give some numerical examples. 相似文献