全文获取类型
收费全文 | 32263篇 |
免费 | 1643篇 |
国内免费 | 60篇 |
专业分类
电工技术 | 488篇 |
综合类 | 81篇 |
化学工业 | 6749篇 |
金属工艺 | 812篇 |
机械仪表 | 702篇 |
建筑科学 | 1748篇 |
矿业工程 | 174篇 |
能源动力 | 680篇 |
轻工业 | 3772篇 |
水利工程 | 307篇 |
石油天然气 | 79篇 |
武器工业 | 1篇 |
无线电 | 2165篇 |
一般工业技术 | 7535篇 |
冶金工业 | 3170篇 |
原子能技术 | 235篇 |
自动化技术 | 5268篇 |
出版年
2023年 | 318篇 |
2022年 | 302篇 |
2021年 | 651篇 |
2020年 | 525篇 |
2019年 | 518篇 |
2018年 | 938篇 |
2017年 | 910篇 |
2016年 | 1066篇 |
2015年 | 879篇 |
2014年 | 1181篇 |
2013年 | 2361篇 |
2012年 | 1612篇 |
2011年 | 2029篇 |
2010年 | 1656篇 |
2009年 | 1519篇 |
2008年 | 1727篇 |
2007年 | 1718篇 |
2006年 | 1301篇 |
2005年 | 1118篇 |
2004年 | 947篇 |
2003年 | 849篇 |
2002年 | 932篇 |
2001年 | 666篇 |
2000年 | 600篇 |
1999年 | 489篇 |
1998年 | 492篇 |
1997年 | 453篇 |
1996年 | 389篇 |
1995年 | 423篇 |
1994年 | 342篇 |
1993年 | 337篇 |
1992年 | 286篇 |
1991年 | 188篇 |
1990年 | 235篇 |
1989年 | 208篇 |
1988年 | 195篇 |
1987年 | 202篇 |
1986年 | 154篇 |
1985年 | 305篇 |
1984年 | 310篇 |
1983年 | 198篇 |
1982年 | 186篇 |
1981年 | 213篇 |
1980年 | 158篇 |
1979年 | 139篇 |
1978年 | 142篇 |
1977年 | 113篇 |
1976年 | 128篇 |
1975年 | 112篇 |
1974年 | 92篇 |
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
111.
We consider the classes of ⊕-codes and ⊗-codes, which are superclasses of outfix and hyper-codes, respectively. These restrictions are based on the synchronized insertion operation, which serves as a model for the gene rearrangement function in certain unicellular organisms. We investigate the classes of ⊕-codes and ⊗-codes from a theoretical perspective, examine their relationships with traditional code classes and consider related decidability problems. 相似文献
112.
On the removal of shadows from images 总被引:3,自引:0,他引:3
Finlayson GD Hordley SD Lu C Drew MS 《IEEE transactions on pattern analysis and machine intelligence》2006,28(1):59-68
This paper is concerned with the derivation of a progression of shadow-free image representations. First, we show that adopting certain assumptions about lights and cameras leads to a 1D, gray-scale image representation which is illuminant invariant at each image pixel. We show that as a consequence, images represented in this form are shadow-free. We then extend this 1D representation to an equivalent 2D, chromaticity representation. We show that in this 2D representation, it is possible to relight all the image pixels in the same way, effectively deriving a 2D image representation which is additionally shadow-free. Finally, we show how to recover a 3D, full color shadow-free image representation by first (with the help of the 2D representation) identifying shadow edges. We then remove shadow edges from the edge-map of the original image by edge in-painting and we propose a method to reintegrate this thresholded edge map, thus deriving the sought-after 3D shadow-free image. 相似文献
113.
U. Rösler 《Algorithmica》2001,29(1-2):238-261
This paper develops general tools for the analysis of stochastic divide and conquer algorithms. We concentrate on the average
performance and the distribution of the running time of the algorithm. As a special example we analyse the average performance
and the running time distribution of the (2k + 1)-median version of Quicksort.
Online publication October 13, 2000. 相似文献
114.
For educators, the World Wide Web offers a valuable technology for knowledge sharing. It can complement more traditional approaches
to knowledge sharing such as books and lectures. Here, we identify and differentiate three major approaches for Web-based
knowledge sharing: course-centered sites, subject-centered sites, and book-centered sites. A rationale for book-centered sites,
those developed to facilitate students’ and instructors’ efforts in courses that use the book, is advanced. We introduce an
architecture of features that can guide developers of such sites. This is illustrated by a book-centered site implemented
according to the architecture. Several sites for introductory business computing books are compared and contrasted in terms
of the architecture, suggesting ways in which each can be extended.
This revised version was published online in July 2006 with corrections to the Cover Date. 相似文献
115.
116.
117.
Fujio Takahashi Ernst -H. Reimerdes Henning Klostermeyer 《Zeitschrift für Lebensmitteluntersuchung und -Forschung A》1977,164(3):163-166
Summary In casein-containing agarose gels, pepsin and chymosin form radial diffusion zones; the diameters of these zones show rectilinear correlations with the logarithm of the enzyme concentration at constant time. The sensitivity for both enzymes is below 1 g. Addition of the inhibitor pepstatin A to these enzymes causes a reduction of the diameters of the diffusion zones, with large differences for both the enzymes. With this procedure, the pepsin/chymosin ratio in rennet preparations was assayed with an accuracy of ±5%. Identification of the inhibitors allows the determination of amounts in the namomole range. This method is a simple technique for the evaluation of proteinases and their inhibitors in screening systems.
Geldiffusion — eine einfache und empfindliche Technik für den Nachweis von Proteinaseinhibitoren und die Anwendung für die Bestimmung von Proteinasen in Gemischen
Zusammenfassung In caseinhaltigen Agarosegelen erzeugen sowohl Pepsin wie Chymosin radiale Diffusionszonen, deren Durchmesser bei gegebener Zeit dem Logarithmus der Enzymmenge proportional ist. Die Bestimmungsgrenze liegt für beide Enzyme unter 1 g. Bei Zugabe des Inhibitors Pepstatin A zu den Proteinasepräparaten werden die Diffusionszonen beider Proteinasen verkleinert, aber in unterschiedlichem Ausmaße. Auf dieser Basis kann in technischen Labpräparaten das Mengenverhältnis Pepsin/Chymosin mit einer Genauigkeit von ±5% bestimmt werden. Bei Umkehr der Reaktion zum Nachweis des Inhibitors sind Mengen im Bereich von 10–9 Mol sicher erfaßbar. Die Methodik ist verallgemeinerungsfähig als Screening-Test für Proteinaseinhibitoren.相似文献
118.
In this paper we investigate the relation between architectural support for Prolog and performance. We will show that partial support for tags does perform as well as full support, but it only reduces the execution time by approximately 10%. With respect to special addressing modes, auto address modification (post/pre increment, decrement on loads and stores) only yields a cycle reduction of approximately 6% and the introduction of a single shadow register set yields around 8%. Combining these optimizations, a performance gain of 20 to 25% can be achieved, depending on the memory system. Usingvliw techniques, which exploit instruction-level parallelism, the performance can be doubled, using three processing elements. Two processing elements already provide a significant speedup, but the use of four processing elements is not justified if we compare the gain in performance with the cost of the extra hardware. In general we observe only a small performance improvement (around 20%) when moving fromrisc to special-purposerisc architectures, an improvement which can also be achieved by applying advanced compiler technology, such as compiler optimization, optimizations forwam, and optimal scheduling techniques forvliw architectures. Unfortunately these hardware and software effects do not add up, as a better compiler reduces the effect of hardware support. Finally, the cycle time is essential for comparing the performance of different (micro)-architectures, but it is not always clear what the effects of the different tradeoffs are on the maximum achievable cycle time. 相似文献
119.
120.