全文获取类型
收费全文 | 49690篇 |
免费 | 5255篇 |
国内免费 | 3166篇 |
专业分类
电工技术 | 3145篇 |
技术理论 | 1篇 |
综合类 | 3929篇 |
化学工业 | 7805篇 |
金属工艺 | 2836篇 |
机械仪表 | 3189篇 |
建筑科学 | 3473篇 |
矿业工程 | 1312篇 |
能源动力 | 1163篇 |
轻工业 | 5517篇 |
水利工程 | 1129篇 |
石油天然气 | 2010篇 |
武器工业 | 464篇 |
无线电 | 5817篇 |
一般工业技术 | 5664篇 |
冶金工业 | 1968篇 |
原子能技术 | 586篇 |
自动化技术 | 8103篇 |
出版年
2024年 | 278篇 |
2023年 | 816篇 |
2022年 | 1587篇 |
2021年 | 2057篇 |
2020年 | 1569篇 |
2019年 | 1365篇 |
2018年 | 1551篇 |
2017年 | 1675篇 |
2016年 | 1603篇 |
2015年 | 2178篇 |
2014年 | 2728篇 |
2013年 | 3315篇 |
2012年 | 3788篇 |
2011年 | 4215篇 |
2010年 | 3819篇 |
2009年 | 3753篇 |
2008年 | 3593篇 |
2007年 | 3363篇 |
2006年 | 3081篇 |
2005年 | 2553篇 |
2004年 | 1830篇 |
2003年 | 1406篇 |
2002年 | 1326篇 |
2001年 | 1114篇 |
2000年 | 843篇 |
1999年 | 642篇 |
1998年 | 389篇 |
1997年 | 322篇 |
1996年 | 270篇 |
1995年 | 208篇 |
1994年 | 176篇 |
1993年 | 151篇 |
1992年 | 109篇 |
1991年 | 94篇 |
1990年 | 62篇 |
1989年 | 53篇 |
1988年 | 39篇 |
1987年 | 35篇 |
1986年 | 26篇 |
1985年 | 13篇 |
1984年 | 11篇 |
1983年 | 11篇 |
1982年 | 17篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 9篇 |
1977年 | 10篇 |
1976年 | 13篇 |
1975年 | 9篇 |
1970年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
The present study investigates the impact of the experience of role playing a violent character in a video game on attitudes towards violent crimes and criminals. People who played the violent game were found to be more acceptable of crimes and criminals compared to people who did not play the violent game. More importantly, interaction effects were found such that people were more acceptable of crimes and criminals outside the game if the criminals were matched with the role they played in the game and the criminal actions were similar to the activities they perpetrated during the game. The results indicate that people’s virtual experience through role-playing games can influence their attitudes and judgments of similar real-life crimes, especially if the crimes are similar to what they conducted while playing games. Theoretical and practical implications are discussed. 相似文献
72.
企业办公自动化系统的应用十分广泛,随着互联网的高速发展,WEB应用成为主流,OA系统在互联网上的延伸成为大趋势,本文阐述在WEB应用中如何保障数据和系统安全的手段和方法。 相似文献
73.
Segmenting center of interests (COIs) from pictures is an important but highly challenging problem for researchers in computer vision and image processing. The capability of understanding the meanings of pictures by computers can lead to breakthroughs in a wide range of applications including Web image search and online picture-sharing communities. In this paper, a two-level strategy is presented, which consists of a rough segmentation stage and a fine segmentation stage. In the first level, a picture is partitioned into four regions by using a block clustering method based on color and texture features, and the COI within the picture is distinguished from the background according to the principles of photographic composition. This stage aims to determine the approximate region of the target. In the second level, a novel active contour model is established based on shape information and vector method, where the image energy is defined by a hue gradient and the external energy is generated from either a triangular inner force or a supplementary force. This stage tries to extract the boundary of the target accurately. Experimental results on photos downloaded from the Internet show the feasibility and effectiveness of the proposed method. 相似文献
74.
In this paper, a single-iteration strategy is proposed for the design of a multi-loop PI controller to achieve the desired gain and phase margins for two-input and two-output (TITO) processes. To handle loop interactions, a TITO system is converted into two equivalent single loops with uncertainties drawn from interactions. The maximum uncertainty is estimated for the initial controller design in one loop and single-input and single-output (SISO) controller design is applied. This controller is substituted to other equivalent loop for design, and finally, the first loop controller is refined on knowledge of other loop controller. For SISO controller tuning, a new method is presented to determine the achievable gain and phase margins as well as the relevant controller parameters. Examples are given for illustration and comparison. 相似文献
75.
混沌权值变异的Huffman树图像加密算法 总被引:1,自引:0,他引:1
提出一种采用混沌权值变异的Huff man树的图像加密算法.此算法在熵编码过程中,以基本的Huffman树为标准,利用双耦合混沌序列1对DC系数进行树的结构未变异、路径值变异的加密;再利用双耦合混沌序列2对AC系数进行码字序号的加密.论文对算法进行了仿真,并对安全性、计算复杂度、压缩比性能进行了分析.实验结果表明,该算法基本上不影响压缩效率,且计算复杂度低、安全性高和实时性好,可用于网络上的图像服务. 相似文献
76.
Sang Min LeeAuthor VitaeJae Hwa SongAuthor Vitae Phill Gu JungAuthor VitaeDong Hyo JangAuthor Vitae Min Seong KimAuthor VitaeWeui Bong JeongAuthor Vitae Byung Min KimAuthor VitaeJong Soo KoAuthor Vitae 《Sensors and actuators. A, Physical》2011,171(2):233-240
A superhydrophobic micromesh covered with nanoprotrusions has been introduced and its applicability to a waterproof mobile phone speaker has been evaluated. The nanotextured superhydrophobic micromesh showed excellent water repellency, self-cleaning and waterproofing performances. In a waterproof speaker test using the fabricated nanotextured micromesh, the micromesh did not lose its waterproof function at 2 m water depth and did not form a remnant water film after being removed from the water. The packaged speaker showed almost the same sound quality before and after dipping at a 2 m water depth. These results demonstrate that the superhydrophobic nanotextured micromesh could be directly applicable for various products that need to resist water penetration, yet allow the transmission of gases and sound/light waves. 相似文献
77.
78.
Bin Li Hong-Wei Wang Jian-Bo Yang Min Guo Chao Qi 《Expert systems with applications》2011,38(12):14997-15008
This paper is devoted to investigating inventory control problems under nonstationary and uncertain demand. A belief-rule-based inventory control (BRB-IC) method is developed, which can be applied in situations where demand and demand-forecast-error (DFE) do not follow certain stochastic distribution and forecasting demand is given in single-point or interval styles. The method can assist decision-making through a belief-rule structure that can be constructed, initialized and adjusted using both manager’s knowledge and operational data. An extended optimal base stock (EOBS) policy is proved for initializing the belief-rule-base (BRB), and a BRB-IC inference approach with interval inputs is proposed. A numerical example and a case study are examined to demonstrate potential applications of the BRB-IC method. These studies show that the belief-rule-based expert system is flexible and valid for inventory control. The case study also shows that the BRB-IC method can compensate DFE by training BRB using historical demand data for generating reliable ordering policy. 相似文献
79.
基于SIMD指令的柔性物体并行碰撞检测 总被引:2,自引:0,他引:2
复杂场景中柔性物体间的碰撞检测依然难以满足交互设计的要求.为了提高处理速度,文中给出了一种充分利用现代CPU的并行处理能力的碰撞检测算法.算法基于两方面的并行处理:即基于SIMD指令的指令级并行处理和基于多线程的任务级并行处理.算法给出了一种针对SIMD指令特别优化的k-DOP模型--SIMD-DOP,从理论上分析了该包围盒的高效性,并与常规的16-DOP和24-DOP进行了运行效率对比.通过使用SIMD-DOP同时在多核间进行负载均衡,算法获得了优化的并行加速.文中算法已经在一台16核工作站上针对一组复杂测试场景进行了验证. 相似文献
80.