全文获取类型
收费全文 | 659356篇 |
免费 | 11734篇 |
国内免费 | 4361篇 |
专业分类
电工技术 | 13642篇 |
技术理论 | 3篇 |
综合类 | 3521篇 |
化学工业 | 98869篇 |
金属工艺 | 24945篇 |
机械仪表 | 20457篇 |
建筑科学 | 19079篇 |
矿业工程 | 3451篇 |
能源动力 | 17150篇 |
轻工业 | 60521篇 |
水利工程 | 6516篇 |
石油天然气 | 9863篇 |
武器工业 | 434篇 |
无线电 | 82230篇 |
一般工业技术 | 123063篇 |
冶金工业 | 117404篇 |
原子能技术 | 12254篇 |
自动化技术 | 62049篇 |
出版年
2022年 | 4107篇 |
2021年 | 6420篇 |
2020年 | 4668篇 |
2019年 | 5215篇 |
2018年 | 8059篇 |
2017年 | 8261篇 |
2016年 | 8465篇 |
2015年 | 7028篇 |
2014年 | 11133篇 |
2013年 | 30518篇 |
2012年 | 17981篇 |
2011年 | 24638篇 |
2010年 | 19351篇 |
2009年 | 21342篇 |
2008年 | 22586篇 |
2007年 | 22703篇 |
2006年 | 20207篇 |
2005年 | 18638篇 |
2004年 | 17761篇 |
2003年 | 17173篇 |
2002年 | 16573篇 |
2001年 | 16470篇 |
2000年 | 15545篇 |
1999年 | 16407篇 |
1998年 | 36895篇 |
1997年 | 26810篇 |
1996年 | 20911篇 |
1995年 | 16346篇 |
1994年 | 14475篇 |
1993年 | 14075篇 |
1992年 | 10450篇 |
1991年 | 9985篇 |
1990年 | 9491篇 |
1989年 | 9166篇 |
1988年 | 8678篇 |
1987年 | 7552篇 |
1986年 | 7540篇 |
1985年 | 8832篇 |
1984年 | 8221篇 |
1983年 | 7298篇 |
1982年 | 6851篇 |
1981年 | 6848篇 |
1980年 | 6581篇 |
1979年 | 6331篇 |
1978年 | 6061篇 |
1977年 | 7086篇 |
1976年 | 9521篇 |
1975年 | 5151篇 |
1974年 | 4972篇 |
1973年 | 4901篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
A common computing-core representation of the discrete cosine transform and discrete sine transform is derived and a reduced-complexity algorithm is developed for computation of the proposed computing-core. A parallel architecture based on the principle of distributed arithmetic is designed further for the computation of these transforms using the common-core algorithm. The proposed scheme not only leads to a systolic-like regular and modular hardware for computing these transforms, but also offers significant improvement in area-time efficiency over the existing structures. The structure proposed here is devoid of complicated input/output mapping and does not involve any complex control. Unlike the convolution-based structures, it does not restrict the transform length to be a prime or multiple of prime and can be utilized as a reusable core for cost-effective, memory-efficient, high-throughput implementation of either of these transforms 相似文献
32.
Piedade M. Sousa L. A. de Almeida T. M. Germano J. da Costa B. A. Lemos J. M. Freitas P. P. Ferreira H. A. Cardoso F. A. 《IEEE transactions on circuits and systems. I, Regular papers》2006,53(11):2384-2395
This paper presents a hand-held microsystem based on new fully integrated magnetoresistive biochips for biomolecular recognition (DNA hybridization, antibody antigen interaction, etc.). Magnetoresistive chip surfaces are chemically treated, enabling the immobilization of probe biomolecules such as DNA or antibodies. Fluid handling is also integrated in the biochip. The proposed microsystem not only integrates the biochip, which is an array of 16times16 magnetoresistive sensors, but it also provides all the electronic circuitry for addressing and reading out each transducer. The proposed architecture and circuits were specifically designed for achieving a compact, programmable and portable microsystem. The microsystem also integrates a hand-held analyzer connected through a wireless channel. A prototype of the system was already developed and detection of magnetic nanoparticles was obtained. This indicates that the system may be used for magnetic label based bioassays 相似文献
33.
WiFi access point pricing as a dynamic game 总被引:1,自引:0,他引:1
We study the economic interests of a wireless access point owner and his paying client, and model their interaction as a dynamic game. The key feature of this game is that the players have asymmetric information - the client knows more than the access provider. We find that if a client has a "web browser" utility function (a temporal utility function that grows linearly), it is a Nash equilibrium for the provider to charge the client a constant price per unit time. On the other hand, if the client has a "file transferor" utility function (a utility function that is a step function), the client would be unwilling to pay until the final time slot of the file transfer. We also study an expanded game where an access point sells to a reseller,which in turn sells to a mobile client and show that if the client has a web browser utility function, that constant price is a Nash equilibrium of the three player game. Finally, we study a two player game in which the access point does not know whether he faces a web browser or file transferor type client, and show conditions for which it is not a Nash equilibrium for the access point to maintain a constant price. 相似文献
34.
N. P. Yeliseyeva 《Journal of Communications Technology and Electronics》2006,51(4):380-384
Rigorous analytic expressions for radiation resistance R Σ of an electric dipole are obtained for three mutually orthogonal orientations of the dipole’s axis with respect to a plane metal screen or right-angle corner of infinite dimensions. Radiation resistance R Σ of the dipole oriented arbitrarily in space is calculated and analyzed as a function of the distance from the screen. 相似文献
35.
We report for the first time optical signal-to-noise penalties which lead to performance degradations in single-fiber long-reach optical access networks when compared to identical dual-fiber systems. A simplified architecture, with reduced optical amplifier count compared to previous work, for single-fiber operation of a symmetrical 10-Gb/s, 1024-way split, 110-km long-reach optical access network is presented and demonstrated. In addition, a possible solution to remove the optical signal-to-noise penalty is suggested 相似文献
36.
A multi-level attention framework for tracking and segmentation of humans and objects under complex occlusions is investigated,
featuring an effective probabilistic appearance-based technique for pixel reclassification during object grouping and splitting.
A novel ’spatial-depth affinity metric’ is introduced in the conventional likelihood function, utilising information of both
spatial locations of pixels and dynamic depth ordering of the component objects in grouping. Depth ordering estimation is
achieved through a combination of top-down and bottom-up approach. Experiments on some realworld difficult scenarios of low
quality and highly compressed videos demonstrate the very promising results achieved. 相似文献
37.
The objective of this study was to compare methane production and characteristics of digested material in anaerobic digestion concepts according to the Animal By-Products Regulation (ABP-Regulation) of the EC (hygienisation of biowaste for 1 hour at 70 degrees C, particle size < 12 mm) and Finnish national regulations (treatment temperature 55 degrees C, feeding interval 24 h, hydraulic retention time (HRT) 20 d, particle size < 40 mm) and with small variations in treatment methods for treating manure and biowaste. Moreover, the survival of three different salmonella bacteria in these processes was studied. Hygienisation of biowaste prior to digestion at 35 degrees C enhanced methane production by 14-18% compared to similar treatment without hygienisation. The differences in treatment temperature, HRT and hygienisation of biowaste prior to digestion did not significantly affect the characteristics of digested material. The concepts according to the ABP-Regulation and Finnish national regulations were effective in destroying salmonella bacteria to an undetectable level. 相似文献
38.
网络安全事件的关联分析方法的比较研究 总被引:2,自引:0,他引:2
随着当前攻击手段和技术的日益复杂化,一次入侵事件往往需要多个步骤才能完成,这些步骤都是彼此相关的。但是传统的入侵检测集中于检测底层的入侵或异常,所检测到的结果也仅仅是一次完整入侵的一部分,所以不能将不同的报警结合起来以发现入侵的逻辑步骤或者入侵背后的攻击策略。关联分析技术将不同分析器上产生的报警进行融合与关联分析,极大地减少了报警的数量,降低了入侵检测的误报率,并且适当的减少了入侵检测的漏报率。文中在对网络安全事件关联分析方法的系统结构进行分析后,着重介绍了当前比较流行的几种网络安全事件关联分析方法,最后对各种方法进行了比较研究。 相似文献
39.
Gundolf Kiefer Helko Lehmann Jürgen Weese 《IEEE transactions on information technology in biomedicine》2006,10(2):385-394
Maximum intensity projections (MIPs) are an important visualization technique for angiographic data sets. Efficient data inspection requires frame rates of at least five frames per second at preserved image quality. Despite the advances in computer technology, this task remains a challenge. On the one hand, the sizes of computed tomography and magnetic resonance images are increasing rapidly. On the other hand, rendering algorithms do not automatically benefit from the advances in processor technology, especially for large data sets. This is due to the faster evolving processing power and the slower evolving memory access speed, which is bridged by hierarchical cache memory architectures. In this paper, we investigate memory access optimization methods and use them for generating MIPs on general-purpose central processing units (CPUs) and graphics processing units (GPUs), respectively. These methods can work on any level of the memory hierarchy, and we show that properly combined methods can optimize memory access on multiple levels of the hierarchy at the same time. We present performance measurements to compare different algorithm variants and illustrate the influence of the respective techniques. On current hardware, the efficient handling of the memory hierarchy for CPUs improves the rendering performance by a factor of 3 to 4. On GPUs, we observed that the effect is even larger, especially for large data sets. The methods can easily be adjusted to different hardware specifics, although their impact can vary considerably. They can also be used for other rendering techniques than MIPs, and their use for more general image processing task could be investigated in the future. 相似文献
40.
Kruk Menno R.; Halász József; Meelis Wout; Haller József 《Canadian Metallurgical Quarterly》2004,118(5):1062
Aggressive behavior induces an adrenocortical stress response, and sudden stressors often precipitate violent behavior. Experiments in rats revealed a fast, mutual, positive feedback between the adrenocortical stress response and a brain mechanism controlling aggression. Stimulation of the aggressive area in the hypothalamus rapidly activated the adrenocortical response, even in the absence of an opponent and fighting. Hypothalamic aggression, in turn, was rapidly facilitated by a corticosterone injection in rats in which the natural adrenocortical stress response was prevented by adrenalectomy. The rapidity of both effects points to a fast, mutual, positive feedback of the controlling mechanisms within the time frame of a single conflict. Such a mutual facilitation may contribute to the precipitation and escalation of violent behavior under stressful conditions. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献