全文获取类型
收费全文 | 4192篇 |
免费 | 154篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 35篇 |
综合类 | 11篇 |
化学工业 | 620篇 |
金属工艺 | 27篇 |
机械仪表 | 91篇 |
建筑科学 | 222篇 |
矿业工程 | 3篇 |
能源动力 | 110篇 |
轻工业 | 361篇 |
水利工程 | 22篇 |
石油天然气 | 10篇 |
无线电 | 479篇 |
一般工业技术 | 787篇 |
冶金工业 | 885篇 |
原子能技术 | 21篇 |
自动化技术 | 667篇 |
出版年
2024年 | 4篇 |
2023年 | 46篇 |
2022年 | 74篇 |
2021年 | 90篇 |
2020年 | 72篇 |
2019年 | 69篇 |
2018年 | 90篇 |
2017年 | 77篇 |
2016年 | 115篇 |
2015年 | 85篇 |
2014年 | 112篇 |
2013年 | 230篇 |
2012年 | 186篇 |
2011年 | 239篇 |
2010年 | 184篇 |
2009年 | 204篇 |
2008年 | 237篇 |
2007年 | 209篇 |
2006年 | 207篇 |
2005年 | 165篇 |
2004年 | 155篇 |
2003年 | 154篇 |
2002年 | 125篇 |
2001年 | 107篇 |
2000年 | 112篇 |
1999年 | 81篇 |
1998年 | 169篇 |
1997年 | 120篇 |
1996年 | 104篇 |
1995年 | 72篇 |
1994年 | 59篇 |
1993年 | 45篇 |
1992年 | 34篇 |
1991年 | 26篇 |
1990年 | 40篇 |
1989年 | 28篇 |
1988年 | 30篇 |
1987年 | 23篇 |
1986年 | 23篇 |
1985年 | 24篇 |
1984年 | 15篇 |
1983年 | 9篇 |
1982年 | 8篇 |
1981年 | 15篇 |
1980年 | 9篇 |
1979年 | 4篇 |
1978年 | 13篇 |
1977年 | 6篇 |
1976年 | 15篇 |
1975年 | 8篇 |
排序方式: 共有4351条查询结果,搜索用时 15 毫秒
11.
12.
Attempts have been made to extend SQL to work with multimedia databases. We are reserved on the representation ability of extended SQL to cope with the richness in content of multimedia data. In this paper we present an example of a multimedia database system, Computer Aided Facial Image Inference and Retrieval system (CAFIIR). The system stores and manages facial images and criminal records, providing necessary functions for crime identification. We would like to demonstrate some core techniques for multimedia database with CAFIIR system. Firstly, CAFIIR is a integrated system. Besides database management, there are image analysis, image composition, image aging, and report generation subsystems, providing means for problem solving. Secondly, the richness of multimedia data urges feature-based database for their management. CAFIIR is feature-based. A indexing mechanism,iconic index, has been proposed for indexing facial images using hierarchical self-organization neural network. The indexing method operates on complex feature measures and provides means for visual navigation. Thirdly, special retrieval methods for facial images have been developed, including visual browsing, similarity retrieval, free text retrieval and fuzzy retrieval. 相似文献
13.
The texture effect on visual colour difference evaluation was investigated in this study. Five colour centers were selected and textured colour pairs were generated using scanned textile woven fabrics and colour‐mapping technique. The textured and solid colour pairs were then displayed on a characterized cathode ray tube (CRT) monitor for colour difference evaluation. The colour difference values for the pairs with texture patterns are equal to 5.0 CIELAB units in lightness direction. The texture level was represented by the half‐width of histogram, which is called texture strength in this study. High correlation was found between texture strength and visual colour difference for textured colour pairs, which indicates that an increasing of 10 units of texture strength in luminance would cause a decreasing of 0.25 units visual difference for the five colour centers. The ratio of visual difference between textured and solid colour pairs also indicates a high parametric effect of texture. © 2005 Wiley Periodicals, Inc. Col Res Appl, 30, 341–347, 2005; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/col. 相似文献
14.
The application of reflex optoelectronic switching matrices (ROSM) to signal processing in the gigahertz region is analyzed. Various signal processing functions such as delay generation, loop filtering, word generation/detection, integration, and digital to analog conversion are identified and their respective realizations in a ROSM are presented. It is found that for dedicated signal processing functions, simpler submatrices instead of full matrices can be employed with significant reduction in complexity and cost. The performance of ROSM's using currently commercially available components confirms the feasibility of gigahertz signal processing with ROSM's. 相似文献
15.
Williams Paula G.; Wasserman Michelle S.; Lotto Andrew J. 《Canadian Metallurgical Quarterly》2003,22(1):3
In 2 studies, the relation between measures of self-assessed health (SAH) and automatic processing of health-relevant information was investigated. In Study 1, 84 male and 86 female undergraduate students completed a modified Stroop task. Results indicated that participants with poorer SAH showed enhanced interference effects for illness versus non-illness words. In Study 2, 27 male and 30 female undergraduate students completed a self-referent encoding task. Results offered a conceptual replication and extension of Study 1 by confirming the specificity of the relation between SAH measures and automatic processing of health (vs negative or positive general trait) information. These studies provide evidence that individual differences in SAH are reflected in schematic processing of health-relevant information. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
16.
17.
Our previous receiver operating characteristic (ROC) study indicated that the detection accuracy of microcalcifications by radiologists is significantly reduced if mammograms are digitized at 0.1 mm x 0.1 mm. Our recent study also showed that detection accuracy by computer decreases as the pixel size increases from 0.035 mm x 0.035 mm. It is evident that very large matrix sizes have to be used for digitizing mammograms in order to preserve the information in the image. Efficient compression techniques will be needed to facilitate communication and archiving of digital mammograms. In this study, we evaluated two compression techniques: full frame discrete cosine transform (DCT) with entropy coding and Laplacian pyramid hierarchical coding (LPHC). The dependence of their efficiency on the compression parameters was investigated. The techniques were compared in terms of the trade-off between the bit rate and the detection accuracy of subtle microcalcifications by an automated detection algorithm. The mean-square errors in the reconstructed images were determined and the visual quality of the error images was examined. It was found that with the LPHC method, the highest compression ratio achieved without a significant degradation in the detectability was 3.6:1. The full frame DCT method with entropy coding provided a higher compression efficiency of 9.6:1 at comparable detection accuracy. The mean-square errors did not correlate with the detection accuracy of the microcalcifications. This study demonstrated the importance of determining the quality of the decompressed images by the specific requirements of the task for which the decompressed images are to be used. Further investigation is needed for selection of optimal compression technique for digital mammograms. 相似文献
18.
The development of verbal and spatial working memory was investigated with an interference paradigm. Memory spans were obtained from 3 groups (8-, 10-, and 19-yr olds) under 6 different conditions: Two primary memory tasks (1 verbal, 1 spatial) were administered in isolation and in conjunction with 2 versions of a secondary task. The primary tasks required recalling a series of visually presented digits and recalling the locations of Xs in a series of visually presented grids. The secondary tasks required reporting the color of the stimuli as they were presented using either a verbal or a spatial response. Analyses revealed that all age groups showed domain-specific interference (i.e., interference by a secondary task from the same domain as the primary task), but only the 8-yr-olds also showed nonspecific interference (i.e., interference by a secondary task from a domain different than the primary memory task), suggesting that at least some executive functions do not reach adult levels of efficiency until approximately age 10. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
19.
This paper presents a new model to study the reliability of communication networks in which link failures are statistically dependent. The approach tries to identify and model explicitly the events that cause communication link failures. No conditional probabilities are needed, and so two major difficulties inherent to them, namely, an exponential number of conditional probabilities to deal with and a consistency requirement to satisfy, are avoided. For reliability computations, some existing algorithms for finding network reliability can be used with minor modifications and no significant increase in computational complexity. 相似文献
20.
Zhang X.B. Lam S.S. Dong-Young Lee Yang Y.R. 《Networking, IEEE/ACM Transactions on》2003,11(6):908-922
We present the design and specification of a protocol for scalable and reliable group rekeying together with performance evaluation results. The protocol is based upon the use of key trees for secure groups and periodic batch rekeying. At the beginning of each rekey interval, the key server sends a rekey message to all users consisting of encrypted new keys (encryptions, in short) carried in a sequence of packets. We present a scheme for identifying keys, encryptions, and users, and a key assignment algorithm that ensures that the encryptions needed by a user are in the same packet. Our protocol provides reliable delivery of new keys to all users eventually. It also attempts to deliver new keys to all users with a high probability by the end of the rekey interval. For each rekey message, the protocol runs in two steps: a multicast step followed by a unicast step. Proactive forward error correction (FEC) multicast is used to reduce delivery latency. Our experiments show that a small FEC block size can be used to reduce encoding time at the server without increasing server bandwidth overhead. Early transition to unicast, after at most two multicast rounds, further reduces the worst-case delivery latency as well as user bandwidth requirement. The key server adaptively adjusts the proactivity factor based upon past feedback information; our experiments show that the number of NACKs after a multicast round can be effectively controlled around a target number. Throughout the protocol design, we strive to minimize processing and bandwidth requirements for both the key server and users. 相似文献