全文获取类型
收费全文 | 49670篇 |
免费 | 2697篇 |
国内免费 | 155篇 |
专业分类
电工技术 | 711篇 |
综合类 | 65篇 |
化学工业 | 10633篇 |
金属工艺 | 2137篇 |
机械仪表 | 3243篇 |
建筑科学 | 1121篇 |
矿业工程 | 25篇 |
能源动力 | 2119篇 |
轻工业 | 3922篇 |
水利工程 | 273篇 |
石油天然气 | 88篇 |
武器工业 | 2篇 |
无线电 | 7853篇 |
一般工业技术 | 10694篇 |
冶金工业 | 3933篇 |
原子能技术 | 661篇 |
自动化技术 | 5042篇 |
出版年
2024年 | 50篇 |
2023年 | 572篇 |
2022年 | 871篇 |
2021年 | 1486篇 |
2020年 | 1075篇 |
2019年 | 1179篇 |
2018年 | 1434篇 |
2017年 | 1416篇 |
2016年 | 1758篇 |
2015年 | 1299篇 |
2014年 | 2093篇 |
2013年 | 3016篇 |
2012年 | 3270篇 |
2011年 | 3901篇 |
2010年 | 2822篇 |
2009年 | 2930篇 |
2008年 | 2824篇 |
2007年 | 2196篇 |
2006年 | 2039篇 |
2005年 | 1726篇 |
2004年 | 1578篇 |
2003年 | 1518篇 |
2002年 | 1336篇 |
2001年 | 1138篇 |
2000年 | 999篇 |
1999年 | 932篇 |
1998年 | 1575篇 |
1997年 | 1005篇 |
1996年 | 809篇 |
1995年 | 561篇 |
1994年 | 468篇 |
1993年 | 406篇 |
1992年 | 292篇 |
1991年 | 277篇 |
1990年 | 260篇 |
1989年 | 244篇 |
1988年 | 207篇 |
1987年 | 170篇 |
1986年 | 119篇 |
1985年 | 116篇 |
1984年 | 93篇 |
1983年 | 65篇 |
1982年 | 39篇 |
1981年 | 39篇 |
1980年 | 30篇 |
1979年 | 32篇 |
1978年 | 30篇 |
1977年 | 39篇 |
1976年 | 62篇 |
1973年 | 23篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Eunsang Kim 《Information Processing Letters》2009,109(9):454-459
Bentley and Sedgewick proposed multikey Quicksort with ‘split-end’ partitioning for sorting strings. But it can be slow in case of many equal elements because it adopted ‘split-end’ partitioning that moves equal elements to the ends and swaps back to the middle. We present ‘collect-center’ partitioning to improve multikey Quicksort in that case. It moves equal elements to the middle directly like the ‘Dutch National Flag Problem’ partitioning approach and it uses two inner loops like Bentley and McIlroy's. In case of many equal elements such as DNA sequences, HTML files, and English texts, multikey Quicksort with ‘collect-center’ partitioning is faster than multikey Quicksort with ‘split-end’ partitioning. 相似文献
992.
We develop a scheme for constructing G 1 triangular spline surfaces of arbitrary topological type. To assure that the scheme is local and singularity-free, we analyze the selection of scalar weight functions and the construction of the boundary curve network in detail. With the further requirements of interpolating positions, normals, and surface curvatures, we show that the minimum degree of such a triangular spline surface is 6. And we present a method for constructing boundary curves network, which consists of cubic Bézier curves. To deal with certain singular cases, the base mesh must be locally subdivided and we proposed an adaptive subdivision strategy for it. An application of our G 1 triangular spline surfaces to the approximation of implicit surfaces is described. The visual quality of this scheme is demonstrated by some examples. 相似文献
993.
Fully discrete potential-based finite element methods called methods are used to solve a transient eddy current problem in a three-dimensional convex bounded polyhedron. Using methods, fully discrete coupled and decoupled numerical schemes are developed. The existence and uniqueness of solutions
for these schemes together with the energy-norm error estimates are provided. To verify the validity of both schemes, some
computer simulations are performed for the model from TEAM Workshop Problem 7.
This work was supported by Postech BSRI Research Fund-2009, National Basic Research Program of China (2008CB425701), NSFC
under the grant 10671025 and the Key Project of Chinese Ministry of Education (No. 107018). 相似文献
994.
Though cryptography is being used more and more widely in reality, it seems that there exists no scheme or a concatenation of some existing schemes that could deal soundly with such practical situations as providing a clue, where the provider of the clue may want to reserve his beneficial rights while keeping his identity secret. To address this problem, inspired by the two notions of the ring signature and the authenticated encryption signature, we propose a new type of authenticated encryption scheme, which we call the ring authenticated encryption scheme, which can enable any member of a group of persons to provide a clue to some designated recipient wisely. 相似文献
995.
The trend of digital convergence makes multitasking common in many digital electronic products. Some applications in those systems have inherent real‐time properties, while many others have few or no timeliness requirements. Therefore the embedded Linux kernels, which are widely used in those devices, provide real‐time features in many forms. However, providing real‐time scheduling usually induces throughput degradation in heavy multitasking due to the increased context switches. Usually the throughput degradation becomes a critical problem, since the performance of the embedded processors is generally limited for cost, design and energy efficiency reasons. This paper proposes schemes to lessen the throughput degradation, which is from real‐time scheduling, by suppressing unnecessary context switches and applying real‐time scheduling mechanisms only when it is necessary. Also the suggested schemes enable the complete priority inheritance protocol to prevent the well‐known priority inversion problem. We evaluated the effectiveness of our approach with open‐source benchmarks. By using the suggested schemes, the throughput is improved while the scheduling latency is kept same or better in comparison with the existing approaches. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
996.
A method of generating modified advancing layers mesh is proposed. In this paper the mesh generation process of semi-unstructured prismatic/tetrahedral mesh is presented for relatively thin three-dimensional geometries with variable thickness, as in the case of injection molding analysis. Prismatic meshes are generated by offsetting initial surface triangular meshes. During the mesh generation process, mesh quality is efficiently improved with the use of a new node relocation method. Finally, tetrahedral meshes are automatically generated in the rest of the domain. The mesh generating capability of the proposed algorithm is demonstrated with the several practical test cases. 相似文献
997.
In IEEE 802.16 networks, bandwidth request–grant schemes are employed for reducing data collision and supporting various QoS requirements. In this paper, we investigate the impact of such schemes on Best-Effort (BE) traffic. We examine three candidate schemes. In the first scheme, each Subscribe Station (SS) attempts to request bandwidth in every frame to reduce delay. In the second scheme, the number of bandwidth request is limited to avoid collisions in bandwidth request. In the third scheme, a base station allocates bandwidth to each SS based on the measured sending rate without explicit bandwidth request. We quantitatively analyze the performance of these schemes in terms of the collision rate and buffer length. We also present a simulation study to validate our analysis and to observe the impact of these schemes on BE traffic. This paper shows that IEEE 802.16 networks can be effectively managed through appropriate bandwidth request schemes. It is also shown that bandwidth allocation without request can be an alternative for increasing utilization. 相似文献
998.
Hyung-Soo Lee Daijin Kim 《IEEE transactions on pattern analysis and machine intelligence》2009,31(6):1102-1116
The active appearance model (AAM) is a well-known model that can represent a non-rigid object effectively. However, the fitting result is often unsatisfactory when an input image deviates from the training images due to its fixed shape and appearance model. To obtain more robust AAM fitting, we propose a tensor-based AAM that can handle a variety of subjects, poses, expressions, and illuminations in the tensor algebra framework, which consists of an image tensor and a model tensor. The image tensor estimates image variations such as pose, expression, and illumination of the input image using two different variation estimation techniques: discrete and continuous variation estimation. The model tensor generates variation-specific AAM basis vectors from the estimated image variations, which leads to more accurate fitting results. To validate the usefulness of the tensor-based AAM, we performed variation-robust face recognition using the tensor-based AAM fitting results. To do, we propose indirect AAM feature transformation. Experimental results show that tensor-based AAM with continuous variation estimation outperforms that with discrete variation estimation and conventional AAM in terms of the average fitting error and the face recognition rate. 相似文献
999.
In this paper, we propose a simple algorithm for detecting scanning worms with high detection rate and low false positive rate. The novelty of our algorithm is inspecting the frequency characteristic of scanning worms instead of counting the number of suspicious connections or packets from a monitored network. Its low complexity allows it to be used on any network-based intrusion detection system as a real-time detection module for high-speed networks.Our algorithm need not be adjusted to network status because its parameters depend on application types, which are generally and widely used in any networks such as web and P2P services. By using real traces, we evaluate the performance of our algorithm and compare it with that of SNORT. The results confirm that our algorithm outperforms SNORT with respect to detection rate and false positive rate. 相似文献
1000.
Refinement algebras are abstract algebras for reasoning about programs in a total correctness framework. We extend a reduct of von Wright’s demonic refinement algebra with two operators for modelling enabledness and termination of programs. We show how the operators can be used for expressing relations between programs and apply the algebra to reasoning about action systems. 相似文献