全文获取类型
收费全文 | 7133篇 |
免费 | 324篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 133篇 |
综合类 | 26篇 |
化学工业 | 1796篇 |
金属工艺 | 120篇 |
机械仪表 | 211篇 |
建筑科学 | 277篇 |
矿业工程 | 6篇 |
能源动力 | 469篇 |
轻工业 | 725篇 |
水利工程 | 76篇 |
石油天然气 | 115篇 |
无线电 | 656篇 |
一般工业技术 | 1159篇 |
冶金工业 | 337篇 |
原子能技术 | 83篇 |
自动化技术 | 1321篇 |
出版年
2024年 | 24篇 |
2023年 | 151篇 |
2022年 | 317篇 |
2021年 | 408篇 |
2020年 | 296篇 |
2019年 | 335篇 |
2018年 | 420篇 |
2017年 | 359篇 |
2016年 | 358篇 |
2015年 | 240篇 |
2014年 | 324篇 |
2013年 | 651篇 |
2012年 | 357篇 |
2011年 | 506篇 |
2010年 | 350篇 |
2009年 | 326篇 |
2008年 | 292篇 |
2007年 | 217篇 |
2006年 | 202篇 |
2005年 | 141篇 |
2004年 | 111篇 |
2003年 | 117篇 |
2002年 | 91篇 |
2001年 | 64篇 |
2000年 | 73篇 |
1999年 | 50篇 |
1998年 | 77篇 |
1997年 | 41篇 |
1996年 | 49篇 |
1995年 | 40篇 |
1994年 | 36篇 |
1993年 | 44篇 |
1992年 | 36篇 |
1991年 | 32篇 |
1990年 | 30篇 |
1989年 | 20篇 |
1988年 | 35篇 |
1987年 | 30篇 |
1986年 | 20篇 |
1985年 | 15篇 |
1984年 | 27篇 |
1983年 | 22篇 |
1982年 | 22篇 |
1981年 | 16篇 |
1980年 | 20篇 |
1979年 | 16篇 |
1978年 | 17篇 |
1976年 | 18篇 |
1975年 | 19篇 |
1974年 | 12篇 |
排序方式: 共有7510条查询结果,搜索用时 11 毫秒
91.
We show that for some special functions (called k-multigrid equidistributed functions), we can compute the limit of the frequency of patterns in the discretization of their graph, when the resolution tends to zero. This result is applied to parabolas. We deduce also that local length estimators almost never converge to the length for the parabolas. 相似文献
92.
This paper describes a new approach of heterogeneous data source fusion. Data sources are either static or active: static data sources can be structured or semi-structured, whereas active sources are services. In order to develop data sources fusion systems in dynamic contexts, we need to study all issues raised by the matching paradigms. This challenging problem becomes crucial with the dominating role of the internet. Classical approaches of data integration, based on schemas mediation, are not suitable to the World Wide Web (WWW) environment where data is frequently modified or deleted. Therefore, we develop a loosely integrated approach that takes into consideration both conflict management and semantic rules which must be enriched in order to integrate new data sources. Moreover, we introduce an XML-based Multi-data source Fusion Language (MFL) that aims to define and retrieve conflicting data from multiple data sources. The system, which is developed according to this approach, is called MDSManager (Multi-Data Source Manager). The benefit of the proposed framework is shown through a real world application based on web data sources fusion which is dedicated to online markets indices tracking. Finally, we give an evaluation of our MFL language. The results show that our language improves significantly the XQuery language especially considering its expressiveness power and its performances. 相似文献
93.
Andrew Walenstein Rachit Mathur Mohamed R. Chouchane Arun Lakhotia 《Journal in Computer Virology》2008,4(4):307-322
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation
engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs.
Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting
variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the
problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is
shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases,
automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory
to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors.
Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case
study using the virus suggests the approximations may be effective in practice for countering mutated malware.
R. Mathur is presently at McAfee AVERT Labs. 相似文献
94.
OBJECTIVE: To investigate the effect of optic flow on gait behavior during treadmill walking using an immersive virtual reality (VR) setup and compare it with conventional treadmill walking (TW) and overground walking (OW). BACKGROUND: Previous research comparing TW with OW speculated that a lack of optic flow (relative visual movement between a walker and the environment) during TW may have led to perceptual cue conflicts, resulting in differences in gait behavior, as compared with OW. METHOD: Participants walked under three locomotion conditions (OW, TW, and TW with VR [TWVR]) under three walking constraint conditions (no constraint, a temporal/pacing constraint, and a spatial/path-following constraint). Presence questionnaires (PQs) were administered at the close of the TWVR trials. Trials were subjected to video analysis to determine spatiotemporal and kinematics variables used for comparison of locomotion conditions. RESULTS: ANOVA revealed gait behavior during TWVR to be between that of OW and TW. Speed and cadence during TWVR were significantly different from those of TW, whereas knee angle was comparable to that of OW. Correlation analysis of PQ scores with gait measures revealed a positive linear association of the distraction subfactor of the PQ with walking speed during TWVR, suggesting an increase in the sense of presence in the virtual environment led to increases in walking speed. CONCLUSION: The results demonstrate that providing optic flow during TW through VR has an impact on gait behavior. APPLICATION: This study provides a basis for developing simple VR locomotion interface setups for gait research. 相似文献
95.
We use Schnyder woods of 3-connected planar graphs to produce convex straight-line drawings
on a grid of size
The parameter
depends on the Schnyder wood used for the drawing. This parameter is in the range
The algorithm is a refinement of the face-counting algorithm; thus, in particular, the size of the grid is at most
The above bound on the grid size simultaneously matches or improves all previously known bounds for convex drawings, in particular
Schnyder's and the recent Zhang and He bound for triangulations and the Chrobak and Kant bound for 3-connected planar graphs.
The algorithm takes linear time. The drawing algorithm has been implemented and tested. The expected grid size for the drawing
of a random triangulation is close to
For a random 3-connected plane graph, tests show that the expected size of the drawing is
相似文献
96.
Mohamed Ahmed Hamid Harroud Roger Impey Ahmed Karmouch 《Multimedia Tools and Applications》2007,34(3):299-315
In this paper, we aim to provide adaptive multimedia services especially video ones to end-users in an efficient and secure
manner. Users moving outside the office should be able to maintain an office-like environment at their current locations.
First, the agents within our proposed architecture negotiate the different communication and interaction factors autonomously
and dynamically. Moreover, we needed to develop a user agent in addition to service and system agents that could negotiate
the requirements and capabilities at run time to furnish best possible service results. Thus we designed and integrated a
video indexing and key framing service within our overall agent-based architecture. We integrated this video indexing and
content-based analysis service to adapt the video content according to run time conditions. We designed a video XML schema
to validate the media content out of this multimedia service according to specific requirements and features, as we will describe
later.
相似文献
Ahmed KarmouchEmail: |
97.
El Rube I Ahmed M Kamel M 《IEEE transactions on pattern analysis and machine intelligence》2006,28(2):323-327
In this paper, new wavelet-based affine invariant functions for shape representation are presented. Unlike the previous representation functions, only the approximation coefficients are used to obtain the proposed functions. One of the derived functions is computed by applying a single wavelet transform; the other function is calculated by applying two different wavelet transforms with two different wavelet families. One drawback of the previously derived detail-based invariant representation functions is that they are sensitive to noise at the finer scale levels, which limits the number of scale levels that can be used. The experimental results in this paper demonstrate that the proposed functions are more stable and less sensitive to noise than the detail-based functions. 相似文献
98.
Disruption damage conditions for future large tokamaks like ITER are nearly impossible to simulate on current tokamaks. The electrothermal plasma source SIRENS has been designed, constructed, and operated to produce high density (> 1025/m3), low temperature (1–3 eV) plasma formed by the ablation of the insulator with currents of up to 100 kA (100 s pulse length) and energies up to 15 kJ. The source heat fluence (variable from 0.2 to 7 MJ/m2) is adequate for simulation of the thermal quench phase of plasma disruption in future fusion tokamaks. Different materials have been exposed to the high heat flux in SIRENS, where comparative erosion behavior was obtained. Vapor shield phenomena has been characterized for different materials, and the energy transmission factor through the shielding layer is obtained. The device is also equipped with a magnet capable of producing a parallel magnetic field (up to 16 T) over a 8 msec pulse length. The magnetic field is produced to decrease the turbulent energy transport through the vapor shield, which provides further reduction of surface erosion (magnetic vapor shield effect). 相似文献
99.
For part I see ibid. vol.8, no. 1 (2000). This paper presents an application of the generalized hidden Markov models to handwritten word recognition. The system represents a word image as an ordered list of observation vectors by encoding features computed from each column in the given word image. Word models are formed by concatenating the state chains of the constituent character hidden Markov models. The novel work presented includes the preprocessing, feature extraction, and the application of the generalized hidden Markov models to handwritten word recognition. Methods for training the classical and generalized (fuzzy) models are described. Experiments were performed on a standard data set of handwritten word images obtained from the US Post Office mail stream, which contains real-word samples of different styles and qualities 相似文献
100.
We present new and effective lower bounds for the resource constrained project scheduling problem. This problem is widely known to be notoriously difficult to solve due to the lack of lower bounds that are both tight and fast. In this paper, we propose several new lower bounds that are based on the concept of energetic reasoning. A major contribution of this work is to investigate several enhanced new feasibility tests that prove useful for deriving new lower bounds that consistently outperform the classical energetic reasoning-based lower bound. In particular, we present the results of a comprehensive computational study, carried out on 1560 benchmark instances, that provides strong evidence that a deceptively simple dual feasible function-based lower bound is highly competitive with a state-of-the-art lower bound while being extremely fast. Furthermore, we found that an effective shaving procedure enables to derive an excellent lower bound that often outperforms the best bound from the literature while being significantly simpler. 相似文献