全文获取类型
收费全文 | 5270篇 |
免费 | 262篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 62篇 |
综合类 | 7篇 |
化学工业 | 1069篇 |
金属工艺 | 75篇 |
机械仪表 | 58篇 |
建筑科学 | 444篇 |
矿业工程 | 9篇 |
能源动力 | 237篇 |
轻工业 | 886篇 |
水利工程 | 40篇 |
石油天然气 | 9篇 |
无线电 | 253篇 |
一般工业技术 | 939篇 |
冶金工业 | 526篇 |
原子能技术 | 18篇 |
自动化技术 | 908篇 |
出版年
2023年 | 46篇 |
2022年 | 50篇 |
2021年 | 83篇 |
2020年 | 68篇 |
2019年 | 110篇 |
2018年 | 173篇 |
2017年 | 172篇 |
2016年 | 174篇 |
2015年 | 170篇 |
2014年 | 206篇 |
2013年 | 354篇 |
2012年 | 275篇 |
2011年 | 388篇 |
2010年 | 276篇 |
2009年 | 229篇 |
2008年 | 259篇 |
2007年 | 273篇 |
2006年 | 257篇 |
2005年 | 161篇 |
2004年 | 163篇 |
2003年 | 153篇 |
2002年 | 135篇 |
2001年 | 105篇 |
2000年 | 96篇 |
1999年 | 88篇 |
1998年 | 174篇 |
1997年 | 120篇 |
1996年 | 98篇 |
1995年 | 72篇 |
1994年 | 55篇 |
1993年 | 57篇 |
1992年 | 32篇 |
1991年 | 32篇 |
1990年 | 28篇 |
1989年 | 27篇 |
1988年 | 14篇 |
1987年 | 19篇 |
1986年 | 20篇 |
1985年 | 27篇 |
1984年 | 42篇 |
1983年 | 25篇 |
1982年 | 18篇 |
1981年 | 27篇 |
1980年 | 25篇 |
1979年 | 20篇 |
1977年 | 24篇 |
1976年 | 32篇 |
1975年 | 15篇 |
1974年 | 16篇 |
1973年 | 17篇 |
排序方式: 共有5540条查询结果,搜索用时 15 毫秒
71.
D. Bjørner 《Cybernetics and Systems Analysis》2010,46(4):609-623
In this paper, we wish to advocate that departments of computer science put emphasis on teaching programming and software
engineering based on formal methods; and more emphasis on research into formal methods for the trustworthy development of
software. We also wish to advocate that the concepts of domain science and domain engineering become an indispensable part
of the science of informatics and of software engineering. 相似文献
72.
Michael A. Bender Gerth Stølting Brodal Rolf Fagerberg Riko Jacob Elias Vicari 《Theory of Computing Systems》2010,47(4):934-962
We study the problem of sparse-matrix dense-vector multiplication (SpMV) in external memory. The task of SpMV is to compute
y:=Ax, where A is a sparse N×N matrix and x is a vector. We express sparsity by a parameter k, and for each choice of k consider the class of matrices where the number of nonzero entries is kN, i.e., where the average number of nonzero entries per column is k. 相似文献
73.
Incremental Linear Discriminant Analysis Using Sufficient Spanning Sets and Its Applications 总被引:1,自引:0,他引:1
Tae-Kyun Kim Björn Stenger Josef Kittler Roberto Cipolla 《International Journal of Computer Vision》2011,91(2):216-232
This paper presents an incremental learning solution for Linear Discriminant Analysis (LDA) and its applications to object
recognition problems. We apply the sufficient spanning set approximation in three steps i.e. update for the total scatter matrix, between-class scatter matrix and the projected data
matrix, which leads an online solution which closely agrees with the batch solution in accuracy while significantly reducing
the computational complexity. The algorithm yields an efficient solution to incremental LDA even when the number of classes
as well as the set size is large. The incremental LDA method has been also shown useful for semi-supervised online learning.
Label propagation is done by integrating the incremental LDA into an EM framework. The method has been demonstrated in the
task of merging large datasets which were collected during MPEG standardization for face image retrieval, face authentication
using the BANCA dataset, and object categorisation using the Caltech101 dataset. 相似文献
74.
We introduce a class of tree bimorphisms that define exactly the translations performed by syntax-directed translation schemata. We also show that these “quasi-alphabetic” tree bimorphisms preserve recognizability, and that their class is closed under composition and inverses. 相似文献
75.
76.
Christos Doulkeridis Akrivi Vlachou Kjetil Nørvåg Yannis Kotidis Michalis Vazirgiannis 《Peer-to-Peer Networking and Applications》2010,3(1):67-79
The advent of the World Wide Web has made an enormous amount of information available to everyone and the widespread use of
digital equipment enables end-users (peers) to produce their own digital content. This vast amount of information requires scalable data management systems. Peer-to-peer
(P2P) systems have so far been well established in several application areas, with file-sharing being the most prominent.
The next challenge that needs to be addressed is (more complex) data sharing, management and query processing, thus facilitating
the delivery of a wide spectrum of novel data-centric applications to the end-user, while providing high Quality-of-Service.
In this paper, we propose a self-organizing P2P system that is capable to identify peers with similar content and intentionally
assign them to the same super-peer. During content retrieval, fewer super-peers need to be contacted and therefore efficient
similarity search is supported, in terms of reduced network traffic and contacted peers. Our approach increases the responsiveness
and reliability of a P2P system and we demonstrate the advantages of our approach using large-scale simulations. 相似文献
77.
The aims were to evaluate the inter-method reliability of a registration sheet for patient handling tasks, to study the day-to-day variation of musculoskeletal complaints (MSC) and to examine whether patient handling tasks and psychosocial factors were associated with MSC.Nurses (n = 148) fulfilled logbooks for three consecutive working days followed by a day off. Low back pain (LBP), neck/shoulder pain (NSP), knee pain (KP), psychosocial factors (time pressure, stress, conscience of the quality of work) and patient transfers and care tasks were reported.The logbook was reliable for both transfer and care tasks. The numbers of nurses reporting MSC and the level of pain increased significantly during the three working days (15%-30% and 17%-37%, respectively) and decreased on the day off. Stress and transfer task were associated with LPB and transfer tasks were associated with KP.Our results confirm a relationship between work factors and MSC and indicate that logs could be one way to obtain a better understanding of the complex interaction of various nursing working conditions in relation to MSC. 相似文献
78.
Sebastian Dörn 《Information Processing Letters》2009,109(6):325-328
In this paper we give tight quantum query complexity bounds of some important linear algebra problems. We prove Θ(n2) quantum query bounds for verify the determinant, rank, matrix inverse and the matrix power problem. 相似文献
79.
Design and validation of structures against blast loads are important for modern society in order to protect and secure its citizen. Since it is a challenge to validate and optimise protective structures against blast loads using full-scale experimental tests, we have to turn our attention towards advanced numerical tools like the finite element method. Several different finite element techniques can be used to describe the response of structures due to blast loads. Some of these are: (1) a pure Lagrangian formulation, (2) an initial Eulerian simulation (to determine the load) followed by a Lagrangian simulation (for the structural response) and (3) a hybrid technique that combines the advantages of Eulerian and Lagrangian methods to have a full coupling between the blast waves and the deformation of the structure. Ideally, all blast simulations should be carried out using the fully coupled Eulerian–Lagrangian approach, but this may not be practical as the computational time increases considerably when going from a pure Lagrangian to a fully coupled Eulerian–Lagrangian simulation. A major goal in this study is to investigate if a pure Lagrangian formulation can be applied to determine the structural response in a specified blast load problem or if more advanced approaches such as the fully coupled Eulerian–Lagrangian approach is required for reliable results. This is done by conducting numerical simulations of an unprotected 20 ft ISO container exposed to a blast load of 4000 kg TNT at 120 m standoff distance using the three different approaches presented above. To validate and discuss the results, the simulated response of the container is compared to available data from a full-scale blast test under such conditions. 相似文献
80.
Jakob Kjøbsted Huusom Niels Kjølstad Poulsen Sten Bay Jørgensen 《Journal of Process Control》2009,19(4):570-578
Iterative Feedback Tuning constitutes an attractive control loop tuning method for processes in the absence of an accurate process model. It is a purely data driven approach aiming at optimizing the closed loop performance. The standard formulation ensures an unbiased estimate of the loop performance cost function gradient with respect to the control parameters. This gradient is important in a search algorithm. The extension presented in this paper further ensures informative data to improve the convergence properties of the method and hence reduce the total number of required plant experiments especially when tuning for disturbance rejection. Informative data is achieved through application of an external probing signal in the tuning algorithm. The probing signal is designed based on a constrained optimization which utilizes an approximate black box model of the process. This model estimate is further used to guarantee nominal stability and to improve the parameter update using a line search algorithm for determining the iteration step size. The proposed algorithm is compared to the classical formulation in a simulation study of a disturbance rejection problem. This type of problem is notoriously difficult for Iterative Feedback Tuning due to the lack of excitation from the reference. 相似文献