全文获取类型
收费全文 | 252094篇 |
免费 | 3775篇 |
国内免费 | 1045篇 |
专业分类
电工技术 | 4329篇 |
综合类 | 202篇 |
化学工业 | 37132篇 |
金属工艺 | 8219篇 |
机械仪表 | 7263篇 |
建筑科学 | 6785篇 |
矿业工程 | 541篇 |
能源动力 | 7237篇 |
轻工业 | 28640篇 |
水利工程 | 2120篇 |
石油天然气 | 1852篇 |
武器工业 | 5篇 |
无线电 | 33393篇 |
一般工业技术 | 46181篇 |
冶金工业 | 46476篇 |
原子能技术 | 3366篇 |
自动化技术 | 23173篇 |
出版年
2021年 | 1801篇 |
2020年 | 1346篇 |
2019年 | 1667篇 |
2018年 | 2573篇 |
2017年 | 2593篇 |
2016年 | 2877篇 |
2015年 | 2164篇 |
2014年 | 3655篇 |
2013年 | 11956篇 |
2012年 | 6754篇 |
2011年 | 9669篇 |
2010年 | 7444篇 |
2009年 | 8397篇 |
2008年 | 8917篇 |
2007年 | 8931篇 |
2006年 | 8282篇 |
2005年 | 7485篇 |
2004年 | 7208篇 |
2003年 | 7093篇 |
2002年 | 6597篇 |
2001年 | 7021篇 |
2000年 | 6325篇 |
1999年 | 6823篇 |
1998年 | 16381篇 |
1997年 | 11368篇 |
1996年 | 8582篇 |
1995年 | 6546篇 |
1994年 | 5712篇 |
1993年 | 5569篇 |
1992年 | 3997篇 |
1991年 | 3776篇 |
1990年 | 3548篇 |
1989年 | 3370篇 |
1988年 | 3276篇 |
1987年 | 2590篇 |
1986年 | 2487篇 |
1985年 | 3158篇 |
1984年 | 2798篇 |
1983年 | 2559篇 |
1982年 | 2344篇 |
1981年 | 2390篇 |
1980年 | 2202篇 |
1979年 | 2048篇 |
1978年 | 1879篇 |
1977年 | 2176篇 |
1976年 | 2725篇 |
1975年 | 1584篇 |
1974年 | 1491篇 |
1973年 | 1558篇 |
1972年 | 1144篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Permanent distortion is one of the main drawbacks of all the irreversible watermarking schemes. Attempts to recover the original signal after the signal passes the authentication process are being made, starting just a few years ago. Some common problems, such as salt-and-pepper artefacts owing to intensity wraparound and low embedding capacity, can now be resolved. However, some significant problems remain unsolved. First, the embedding capacity is signal-dependent, i.e., capacity varies significantly depending on the nature of the host signal. The direct impact of this is compromised security for signals with low capacity. Some signals may be even non-embeddable. Secondly, while seriously tackled in irreversible watermarking schemes, the well-known problem of block-wise dependence, which opens a security gap for the vector quantisation attack and transplantation attack, are not addressed by researchers of the reversible schemes. This work proposes a reversible watermarking scheme with near-constant signal-independent embedding capacity and immunity to the vector quantisation attack and transplantation attack. 相似文献
992.
Summary The thermal properties of an epoxy resin (diglycidyl ether Bisphenol A, DGEBA) cured with a primary amine (ethylenediamine, ETDA) and filled with 10, 20 and 30 wt. % of ultra fine copper particles were analyzed. The thermal results were evaluated by means of the Romero-Garcia method, which allowed to obtain the resin degradation kinetic parameters, as well as the possible decomposition mechanism. From the obtained results is possible to infer that higger copper content strongly affects the degradation process of the epoxy resin, which causes a drop off on the composites thermal stability. This behavior could be attributed to water presence, being this effect less pronounced for the resin with 10 wt. % copper and unfilled resin. Regarding to decomposition mechanism, three way transport showed the best correlation for all samples. 相似文献
993.
The study and creation of the infrastructure required to enable system-level science--the integration of diverse sources of knowledge about the constituent parts of a complex system with the goal of obtaining an understanding of the system's properties as a whole--is becoming increasingly important, spawning new knowledge in variety of fields at a rapid pace. 相似文献
994.
995.
996.
D. Twigger M. Byard S. Draper R. Driver R. Hartley S. Hennessy C. Mallen R. Mohamed‡ C. O'Malley§ T. O'Shea‡ E. Scanlon‡ 《Journal of Computer Assisted Learning》1991,7(2):144-155
Abstract This paper outlines the work of the Conceptual Change in Science project, funded as part of the ESRC InTER programme. The aims of this research project are to clarify and describe the process of change in learners' conceptual understandings of natural phenomena. The domain of reasoning selected for study is that of mechanics. Computer software which may be useful in exploring and developing pupils' reasoning and promoting conceptual change in this domain is being developed and evaluated. The group that is carrying out the research is based at the Universities of Leeds, Glasgow and the Open University. 相似文献
997.
998.
S.T.V. Parthasaradhi R. Derakhshani L.A. Hornak S.A.C. Schuckers 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》2005,35(3):335-343
Fingerprint scanners may be susceptible to spoofing using artificial materials, or in the worst case, dismembered fingers. An anti-spoofing method based on liveness detection has been developed for use in fingerprint scanners. This method quantifies a specific temporal perspiration pattern present in fingerprints acquired from live claimants. The enhanced perspiration detection algorithm presented here improves our previous work by including other fingerprint scanner technologies; using a larger, more diverse data set; and a shorter time window. Several classification methods were tested in order to separate live and spoof fingerprint images. The dataset included fingerprint images from 33 live subjects, 33 spoofs created with dental material and Play-Doh, and fourteen cadaver fingers. Each method had a different performance with respect to each scanner and time window. However, all the classifiers achieved approximately 90% classification rate for all scanners, using the reduced time window and the more comprehensive training and test sets. 相似文献
999.
Rui A. S. Lapa José L. F. C. Lima 《Journal of Automated Methods and Management in Chemistry》1991,13(3):119-122
The construction of a microcomputer-controlled electrode switch for
use in potentiometric determinations is described. This can be coupled to most of the analytical equipment usually found in laboratories, to enable a setting up of automatic systems capable of performing sequential determinations with several ion-selective
electrodes. The assessment of its analytical usage and behaviour are discussed. 相似文献
1000.
Access path deployment is a critical issue in physical database design. Access paths typically include a clustered index as the primary access path and a set of secondary indexes as auxiliary access paths. To deploy the right access paths requires an effective algorithm and accurate estimation of the parameters used by the algorithm. One parameter central to any index-selection algorithm is the block selectivity of a query. Existing methods for estimating block selectivities are limited by restrictive assumptions. Furthermore, most existing methods produce estimates useful for aiding the selection of secondary indexes only. Little research has been done in the area of estimating block selectivities for supporting the selection of the clustered index. The paper presents a set of methods that do not depend on any specific assumption, produce accurate estimates, and can be used to aid in selecting the clustered index as well as secondary indexes 相似文献