全文获取类型
收费全文 | 40302篇 |
免费 | 2219篇 |
国内免费 | 117篇 |
专业分类
电工技术 | 452篇 |
综合类 | 239篇 |
化学工业 | 9913篇 |
金属工艺 | 735篇 |
机械仪表 | 856篇 |
建筑科学 | 1402篇 |
矿业工程 | 110篇 |
能源动力 | 1231篇 |
轻工业 | 6713篇 |
水利工程 | 346篇 |
石油天然气 | 208篇 |
武器工业 | 6篇 |
无线电 | 2709篇 |
一般工业技术 | 5729篇 |
冶金工业 | 6798篇 |
原子能技术 | 265篇 |
自动化技术 | 4926篇 |
出版年
2024年 | 80篇 |
2023年 | 316篇 |
2022年 | 1367篇 |
2021年 | 1761篇 |
2020年 | 909篇 |
2019年 | 965篇 |
2018年 | 1105篇 |
2017年 | 1205篇 |
2016年 | 1216篇 |
2015年 | 967篇 |
2014年 | 1390篇 |
2013年 | 2224篇 |
2012年 | 2025篇 |
2011年 | 2475篇 |
2010年 | 1819篇 |
2009年 | 1834篇 |
2008年 | 1696篇 |
2007年 | 1525篇 |
2006年 | 1203篇 |
2005年 | 1156篇 |
2004年 | 1180篇 |
2003年 | 1066篇 |
2002年 | 1025篇 |
2001年 | 836篇 |
2000年 | 631篇 |
1999年 | 651篇 |
1998年 | 2131篇 |
1997年 | 1424篇 |
1996年 | 1016篇 |
1995年 | 668篇 |
1994年 | 530篇 |
1993年 | 591篇 |
1992年 | 279篇 |
1991年 | 321篇 |
1990年 | 267篇 |
1989年 | 227篇 |
1988年 | 245篇 |
1987年 | 190篇 |
1986年 | 203篇 |
1985年 | 212篇 |
1984年 | 158篇 |
1983年 | 112篇 |
1982年 | 135篇 |
1981年 | 139篇 |
1980年 | 137篇 |
1979年 | 110篇 |
1978年 | 95篇 |
1977年 | 153篇 |
1976年 | 233篇 |
1975年 | 97篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Sergio S��nchez Garc��a Ana G��mez Oliva Emilia P��rez Belleboni Iv��n Pau de la Cruz 《International Journal of Information Security》2011,10(6):351-372
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through
a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet,
only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that
do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two
generic entities that can solve the problem of delegated access to the telematic services provided by public authorities.
The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating
entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in
the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation.
Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token
has been revoked. Implications for theory and practice and suggestions for future research are discussed. 相似文献
992.
Murtas C Bruschi M Carnevali ML Petretto A Corradini E Prunotto M Candiano G degl'Innocenti ML Ghiggeri GM Allegri L 《Proteomics. Clinical applications》2011,5(1-2):90-97
Renal auto-immune diseases represent a major source of morbidity in humans. For many years the knowledge on mechanisms of auto-immunity involving the kidney has been uniquely based on animal models. However, these findings often could not be readily translated to humans owing to notably difference in antigen expression by human podocytes. One example is Heymann nephritis (HN), the experimental model of human membranous glomerulonephritis (MGN), which is obtained in rats by injecting antibodies against megalin, a protein that is not present in human glomeruli. Human studies could not be done in the past since sequencing required too much material exceeding what obtainable from tissue biopsies in vivo. Research is now on the way to identify auto-antigens and isolate specific auto-antibodies in humans. New technology developments based on tissue microdissection and proteomical analysis have facilitated the recent discoveries, allowing direct analysis of human tissue in vivo. Major advances on the pathogenesis of MGN, the prototype for the formation and glomerular deposition of auto-antibodies, are now in progress. Two independent groups have, in fact, demonstrated the existence of specific IgG(4) against phospholipase A2 receptor, aldose reductase and Mn-superoxide dismutase in glomerular eluates and in plasma of a prominent part of patients with MGN, suggesting a major role of these proteins as auto-antigens in human MGN. This review will focalize these aspects outlining the contribution of proteomics in most recent developments. 相似文献
993.
994.
César García-Osorio Aida de Haro-García Nicolás García-Pedrajas 《Artificial Intelligence》2010,174(5-6):410-441
Instance selection is becoming increasingly relevant due to the huge amount of data that is constantly being produced in many fields of research. Although current algorithms are useful for fairly large datasets, scaling problems are found when the number of instances is in the hundreds of thousands or millions. When we face huge problems, scalability becomes an issue, and most algorithms are not applicable.Thus, paradoxically, instance selection algorithms are for the most part impracticable for the same problems that would benefit most from their use. This paper presents a way of avoiding this difficulty using several rounds of instance selection on subsets of the original dataset. These rounds are combined using a voting scheme to allow good performance in terms of testing error and storage reduction, while the execution time of the process is significantly reduced. The method is particularly efficient when we use instance selection algorithms that are high in computational cost. The proposed approach shares the philosophy underlying the construction of ensembles of classifiers. In an ensemble, several weak learners are combined to form a strong classifier; in our method several weak (in the sense that they are applied to subsets of the data) instance selection algorithms are combined to produce a strong and fast instance selection method.An extensive comparison of 30 medium and large datasets from the UCI Machine Learning Repository using 3 different classifiers shows the usefulness of our method. Additionally, the method is applied to 5 huge datasets (from three hundred thousand to more than a million instances) with good results and fast execution time. 相似文献
995.
Fault detection for discrete event systems using Petri nets with unobservable transitions 总被引:1,自引:0,他引:1
Maria Paola Cabasino Author Vitae Alessandro Giua Author Vitae Author Vitae 《Automatica》2010,46(9):1531-1539
In this paper we present a fault detection approach for discrete event systems using Petri nets. We assume that some of the transitions of the net are unobservable, including all those transitions that model faulty behaviors. Our diagnosis approach is based on the notions of basis marking and justification, that allow us to characterize the set of markings that are consistent with the actual observation, and the set of unobservable transitions whose firing enable it. This approach applies to all net systems whose unobservable subnet is acyclic. If the net system is also bounded the proposed approach may be significantly simplified by moving the most burdensome part of the procedure off-line, thanks to the construction of a graph, called the basis reachability graph. 相似文献
996.
997.
José A. de França Author Vitae Marcelo R. Stemmer Author Vitae 《Pattern recognition》2010,43(3):1180-1187
In recent years, the camera calibration using 1D patterns has been studied and improved by researchers all over the world. However, the progress in that area has been mainly in the sense of reducing the restrictions to the 1D pattern movement. On the other hand, the method's accuracy still demands improvements. In the present paper, the original technique proposed by Zhang is revisited and we demonstrate that the method's accuracy can be significantly improved, simply by analyzing and reformulating the problem. The numerical conditioning can be improved if a simple data normalization is performed. Furthermore, a non-linear solution based on the Partitioned Levenberg-Marquardt algorithm is proposed. That solution takes advantage of the problem's particular structure to reduce the computational complexity of the original method and to improve the accuracy. Tests using both synthetic and real images demonstrate that the calibration method using 1D patterns can be applied in practice, with accuracy comparable to other already traditional methods. 相似文献
998.
In this paper a new nonlinear feedback control law for continuous stirred tank reactors, obtained by exact Input/Output (I/O) linearization and Sontag's input‐to‐state stability feedback control redesign methods, is studied. By the new feedback control law, a significant attenuation of the disturbance effect is guaranteed, with evident improvement with respect to control laws obtained by the exact I/O linearization method. The performed simulations validate the theoretical results. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
999.
1000.
In this paper, we propose novel elastic graph matching (EGM) algorithms for face recognition assisted by the availability of 3D facial geometry. More specifically, we conceptually extend the EGM algorithm in order to exploit the 3D nature of human facial geometry for face recognition/verification. In order to achieve that, first we extend the matching module of the EGM algorithm in order to capitalize on the 2.5D facial data. Furthermore, we incorporate the 3D geometry into the multiscale analysis used and build a novel geodesic multiscale morphological pyramid of dilations/erosions in order to fill the graph jets. We show that the proposed advances significantly enhance the performance of EGM algorithms. We demonstrate the efficiency of the proposed advances in the face recognition/verification problem using photometric stereo. 相似文献