全文获取类型
收费全文 | 97374篇 |
免费 | 8567篇 |
国内免费 | 4583篇 |
专业分类
电工技术 | 6309篇 |
技术理论 | 2篇 |
综合类 | 6143篇 |
化学工业 | 15031篇 |
金属工艺 | 5549篇 |
机械仪表 | 5638篇 |
建筑科学 | 7323篇 |
矿业工程 | 2027篇 |
能源动力 | 2851篇 |
轻工业 | 7472篇 |
水利工程 | 1951篇 |
石油天然气 | 4288篇 |
武器工业 | 746篇 |
无线电 | 12969篇 |
一般工业技术 | 12333篇 |
冶金工业 | 4886篇 |
原子能技术 | 1157篇 |
自动化技术 | 13849篇 |
出版年
2024年 | 436篇 |
2023年 | 1524篇 |
2022年 | 2936篇 |
2021年 | 4046篇 |
2020年 | 2797篇 |
2019年 | 2354篇 |
2018年 | 2586篇 |
2017年 | 3069篇 |
2016年 | 2703篇 |
2015年 | 3766篇 |
2014年 | 4861篇 |
2013年 | 6094篇 |
2012年 | 6547篇 |
2011年 | 7292篇 |
2010年 | 6325篇 |
2009年 | 6071篇 |
2008年 | 5953篇 |
2007年 | 5671篇 |
2006年 | 5497篇 |
2005年 | 4469篇 |
2004年 | 3052篇 |
2003年 | 2519篇 |
2002年 | 2533篇 |
2001年 | 2141篇 |
2000年 | 2032篇 |
1999年 | 2062篇 |
1998年 | 1925篇 |
1997年 | 1646篇 |
1996年 | 1481篇 |
1995年 | 1223篇 |
1994年 | 949篇 |
1993年 | 787篇 |
1992年 | 621篇 |
1991年 | 474篇 |
1990年 | 396篇 |
1989年 | 310篇 |
1988年 | 254篇 |
1987年 | 189篇 |
1986年 | 158篇 |
1985年 | 143篇 |
1984年 | 101篇 |
1983年 | 75篇 |
1982年 | 68篇 |
1981年 | 60篇 |
1980年 | 54篇 |
1979年 | 35篇 |
1978年 | 32篇 |
1977年 | 32篇 |
1976年 | 54篇 |
1973年 | 21篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
A novel image authentication scheme which can protect the image integrity of the compressed images for block truncation coding (BTC) is proposed in this paper. In the proposed scheme, the authentication codes are embedded into the the quatization levels of each BTC-compressed image block by using reference matrix– RMB. The size of the authentication codes can be decided according to the user’s requirement by adjusting the value of B in Reference Matrix. The experimental results demonstrate that the proposed method outperforms previous approaches in image quality of the embedded image and high detecting accuracy. 相似文献
992.
993.
Online social platform, such as Wikipedia and Foursquare, has been increasingly exploded due to not only various useful services provided but also social gaming mechanisms that can keep users actively engaged. For example, users are awarded ”virtual goods” like badges and points when they contribute to the community in the network by voluntarily sharing ideas and other information. In this paper, we aim to examine the effectiveness of a social gamification mechanism, named user scores, designed in Foursquare which is one of most popular location-based social networks. A user’s score in Foursquare is an aggregate measure based on recent check-in activities of the user, which reflects a snapshot summary of the user’s temporal and spatial behaviors. Whenever a user checks in to a venue, a list of scores of the user’s friends are visible to the user via a ”leaderboard” which ranks these users’ scores in a descending order. Given a pair of friends who participate in a score competition in such a gimification mechanism, we identify if one user’s scores have significant influence on the other user’s scores by utilizing the Granger Causality Test. To understand what types of users and what types of friends tend to participate in the score competition (i.e., their check-ins are more likely driven by such a gamification mechanism), we extract users’ features (e.g. user’s degree) as well as the features of pairs of friends (e.g., number of common friends, score similarity and ranking difference) to examine whether these features have correlations with those pairs of users who are identified as being involved in the score game. The identified influence on user scores has the important implication on applications including friend and venue recommendations in location-based social networks. 相似文献
994.
Kiyohiko Hattori Eri Homma Toshinori Kagawa Masayuki Otani Naoki Tatebe Yasunori Owada Lin Shan Katsuhiro Temma Kiyoshi Hamaguchi 《Artificial Life and Robotics》2016,21(4):451-459
Recently, many extensive studies have been conducted on robot control via self-positioning estimation techniques. In the simultaneous localization and mapping (SLAM) method, which is one approach to self-positioning estimation, robots generally use both autonomous position information from internal sensors and observed information on external landmarks. SLAM can yield higher accuracy positioning estimations depending on the number of landmarks; however, this technique involves a degree of uncertainty and has a high computational cost, because it utilizes image processing to detect and recognize landmarks. To overcome this problem, we propose a state-of-the-art method called a generalized measuring-worm (GMW) algorithm for map creation and position estimation, which uses multiple cooperating robots that serve as moving landmarks for each other. This approach allows problems of uncertainty and computational cost to be overcome, because a robot must find only a simple two-dimensional marker rather than feature-point landmarks. In the GMW method, the robots are given a two-dimensional marker of known shape and size and use a front-positioned camera to determine the marker distance and direction. The robots use this information to estimate each other’s positions and to calibrate their movement. To evaluate the proposed method experimentally, we fabricated two real robots and observed their behavior in an indoor environment. The experimental results revealed that the distance measurement and control error could be reduced to less than 3 %. 相似文献
995.
Li-Xiang Ye Xiu Lin Xiang Chen Juan He Rong-Can Yang Hong-Yu Liu 《Quantum Information Processing》2016,15(7):2785-2796
A scheme is proposed to generate three-atom GHZ states by applying the inversely engineered control method on the basis of Lewis–Riesenfeld invariants. In the proposal, three atoms that have different configurations are trapped in a bimodal cavity. Numerical simulations indicate that our protocol has an obvious improvement of speed for the generation of GHZ states. Moreover, the present scheme is robust against both parameter fluctuations and dissipation. 相似文献
996.
Xin Lin Chris M. J. Tampère Francesco Viti Ben Immers 《Networks and Spatial Economics》2016,16(1):349-369
Increasing numbers of hard environmental constraints are being imposed in urban traffic networks by authorities in an attempt to mitigate pollution caused by traffic. However, it is not trivial for authorities to assess the cost of imposing such hard environmental constraints. This leads to difficulties when setting the constraining values as well as implementing effective control measures. For that reason, quantifying the cost of imposing hard environmental constraints for a certain network becomes crucial. This paper first indicates that for a given network, such cost is not only related to the attribution of environmental constraints but also related to the considered control measures. Next, we present an assessment criterion that quantifies the loss of optimality under the control measures considered by introducing the environmental constraints. The criterion can be acquired by solving a bi-level programming problem with/without environmental constraints. A simple case study shows its practicability as well as the differences between this framework and other frameworks integrating the environmental aspects. This proposed framework is widely applicable when assessing the interaction of traffic and its environmental aspects. 相似文献
997.
In this work, we have put forth two different protocols to address a concrete secure multi-party computational (MPC) problem related to a triangle, of which the coordinates of the three vertices are confidentially kept by the three participants, respectively. The three parties wish to collaboratively compute the area of this triangle while preserving their own coordinate privacy. As one of the merits, our protocols employ weaker assumptions of the existence of pseudorandom generators. In particular, unlike massive secure MPC protocols that rely a lot on oblivious transfer, ours utilize a new computing idea called “pseudorandom-then-rounding” method to avoid this burdensome obstacle. The two protocols are based on different theorems, while they both make use of the same underlying idea. At last, we provide a detailed proof for the first protocol by a series of security reductions of our newly defined games, which seems somewhat stronger than the previous simulation-based proofs and a proof sketch for the second one. Analysis and discussion about the reasons are provided as well to round off our work. 相似文献
998.
Nowadays, the road network has gained more and more attention in the research area of databases. Existing works mainly focus on standalone queries, such as k-nearest neighbor queries over a single type of objects (e.g., facility like restaurant or hotel). In this paper, we propose a k-multi-preference (kMP) query over road networks, involving complex query predicates and multiple facilities. In particular, given a query graph, a kMP query retrieves of the top-k groups of vertices (of k facility types) satisfying the label constraints and their aggregate distances are the smallest. A naïve solution to this problem is to enumerate all combinations of vertices with k possible facility types and then select the one with the minimum sum distance. This method, however, incurs rather high computation cost due to exponential possible combinations. In addition, the existing solutions to other standalone queries are for a single type of facilities and cannot be directly used to answer kMP queries. Therefore, in this paper, we propose an efficient approach to process a kMP query, which utilizes an index with bounded space and reduces the computation cost of the shortest path queries. We also design effective pruning techniques to filter out false alarms. Through our extensive experiments, we demonstrate the efficiency and effectiveness of our proposed solutions. 相似文献
999.
1000.