全文获取类型
收费全文 | 205748篇 |
免费 | 15372篇 |
国内免费 | 7808篇 |
专业分类
电工技术 | 11244篇 |
技术理论 | 14篇 |
综合类 | 11214篇 |
化学工业 | 35698篇 |
金属工艺 | 10538篇 |
机械仪表 | 11998篇 |
建筑科学 | 16408篇 |
矿业工程 | 4942篇 |
能源动力 | 5849篇 |
轻工业 | 12681篇 |
水利工程 | 3211篇 |
石油天然气 | 11072篇 |
武器工业 | 1345篇 |
无线电 | 25488篇 |
一般工业技术 | 26719篇 |
冶金工业 | 10934篇 |
原子能技术 | 2114篇 |
自动化技术 | 27459篇 |
出版年
2024年 | 881篇 |
2023年 | 3262篇 |
2022年 | 5828篇 |
2021年 | 7929篇 |
2020年 | 5796篇 |
2019年 | 5012篇 |
2018年 | 5415篇 |
2017年 | 6201篇 |
2016年 | 5693篇 |
2015年 | 7290篇 |
2014年 | 9523篇 |
2013年 | 12269篇 |
2012年 | 12225篇 |
2011年 | 13870篇 |
2010年 | 11610篇 |
2009年 | 11461篇 |
2008年 | 10875篇 |
2007年 | 10469篇 |
2006年 | 10857篇 |
2005年 | 9630篇 |
2004年 | 6563篇 |
2003年 | 5776篇 |
2002年 | 5251篇 |
2001年 | 4724篇 |
2000年 | 4869篇 |
1999年 | 5638篇 |
1998年 | 5283篇 |
1997年 | 4351篇 |
1996年 | 3956篇 |
1995年 | 3310篇 |
1994年 | 2768篇 |
1993年 | 2187篇 |
1992年 | 1700篇 |
1991年 | 1277篇 |
1990年 | 1018篇 |
1989年 | 877篇 |
1988年 | 681篇 |
1987年 | 496篇 |
1986年 | 394篇 |
1985年 | 334篇 |
1984年 | 212篇 |
1983年 | 198篇 |
1982年 | 163篇 |
1981年 | 145篇 |
1980年 | 131篇 |
1979年 | 97篇 |
1978年 | 63篇 |
1977年 | 63篇 |
1976年 | 77篇 |
1975年 | 38篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
831.
Reversible data hiding has received considerable interest recently in the field of information hiding. However, most of difference expansion (DE-based) schemes suffer from the problem that image cannot be restored into its original one free from location map. Reversible data hiding scheme with location map cannot effectively raise hiding capacity; in addition, it also incurs the computational cost during embedding and extracting. This study presents a reversible data hiding scheme that is free of location map and thus the computational cost, associated with embedding and extracting, is lower than that of most DE-based schemes. Furthermore, our scheme solves the problem of the low embedding rate of Tseng and Hsieh?s scheme because our scheme takes advantage of the bulk of relatively high small prediction-errors to raise embedding capacity. Experimental results demonstrate that the proposed scheme achieves the larger payload and the better image quality than some existing schemes by an adjustable control factor. The performance of the proposed scheme is more stable for the different images. 相似文献
832.
Chen G Deng Q Szymczak A Laramee RS Zhang E 《IEEE transactions on visualization and computer graphics》2012,18(5):767-782
Morse decomposition provides a numerically stable topological representation of vector fields that is crucial for their rigorous interpretation. However, Morse decomposition is not unique, and its granularity directly impacts its computational cost. In this paper, we propose an automatic refinement scheme to construct the Morse Connection Graph (MCG) of a given vector field in a hierarchical fashion. Our framework allows a Morse set to be refined through a local update of the flow combinatorialization graph, as well as the connection regions between Morse sets. The computation is fast because the most expensive computation is concentrated on a small portion of the domain. Furthermore, the present work allows the generation of a topologically consistent hierarchy of MCGs, which cannot be obtained using a global method. The classification of the extracted Morse sets is a crucial step for the construction of the MCG, for which the Poincare′ index is inadequate. We make use of an upper bound for the Conley index, provided by the Betti numbers of an index pair for a translation along the flow, to classify the Morse sets. This upper bound is sufficiently accurate for Morse set classification and provides supportive information for the automatic refinement process. An improved visualization technique for MCG is developed to incorporate the Conley indices. Finally, we apply the proposed techniques to a number of synthetic and realworld simulation data to demonstrate their utility. 相似文献
833.
Luo SJ Liu CL Chen BY Ma KL 《IEEE transactions on visualization and computer graphics》2012,18(5):810-821
Graph visualization has been widely used to understand and present both global structural and local adjacency information in relational data sets (e.g., transportation networks, citation networks, or social networks). Graphs with dense edges, however, are difficult to visualize because fast layout and good clarity are not always easily achieved. When the number of edges is large, edge bundling can be used to improve the clarity, but in many cases, the edges could be still too cluttered to permit correct interpretation of the relations between nodes. In this paper, we present an ambiguity-free edge-bundling method especially for improving local detailed view of a complex graph. Our method makes more efficient use of display space and supports detail-on-demand viewing through an interactive interface. We demonstrate the effectiveness of our method with public coauthorship network data. 相似文献
834.
Scalable influence maximization for independent cascade model in large-scale social networks 总被引:2,自引:0,他引:2
Influence maximization, defined by Kempe et al. (SIGKDD 2003), is the problem of finding a small set of seed nodes in a social network that maximizes the spread of influence under certain influence cascade models. The scalability of influence maximization is a key factor for enabling prevalent viral marketing in large-scale online social networks. Prior solutions, such as the greedy algorithm of Kempe et al. (SIGKDD 2003) and its improvements are slow and not scalable, while other heuristic algorithms do not provide consistently good performance on influence spreads. In this article, we design a new heuristic algorithm that is easily scalable to millions of nodes and edges in our experiments. Our algorithm has a simple tunable parameter for users to control the balance between the running time and the influence spread of the algorithm. Our results from extensive simulations on several real-world and synthetic networks demonstrate that our algorithm is currently the best scalable solution to the influence maximization problem: (a) our algorithm scales beyond million-sized graphs where the greedy algorithm becomes infeasible, and (b) in all size ranges, our algorithm performs consistently well in influence spread—it is always among the best algorithms, and in most cases it significantly outperforms all other scalable heuristics to as much as 100–260% increase in influence spread. 相似文献
835.
M. Alghane Y. Q. Fu B. X. Chen Y. Li M. P. Y. Desmulliez A. J. Walton 《Microfluidics and nanofluidics》2012,13(6):919-927
This paper reports an experimental and numerical investigation on the scaling effects in the flow hydrodynamics for confined microdroplets induced by a surface acoustic wave (SAW). The characteristic parameters of the flow hydrodynamics were studied as a function of the separation height, H, between the LiNbO3 substrate and a top glass plate, for various droplets volumes and radio-frequency powers. The ratio of the gap height to attenuation length of the SAW, H/l SAW, is shown to be an important parameter affecting the streaming flow induced in this confined regime. The reported numerical and experimental results are in good agreement over the range examined in this study and demonstrate that, at a lower gap heights of H?≤?100?μm, a significant decrease in streaming velocity or Reynolds number is induced, with the velocity approaching zero when the gap height is decreased to ~50?μm. An increase in the gap height results in an increased streaming velocity; however, if the gap height exceeds 70?% of the SAW attenuation length, any further increase in the gap height induces a drop in the streaming velocity. 相似文献
836.
Wen-Hui?ChenEmail author Jun-Horng?Chen Shih-Chun?Shao 《International Journal of Control, Automation and Systems》2012,10(2):407-414
Data corruption in SCADA systems refers to errors that occur during acquisition, processing, or transmission, introducing
unintended changes to the original data. In SCADA-based power systems, the data gathered by remote terminal units (RTUs) is
subject to data corruption due to noise interference or lack of calibration. In this study, an effective approach based on
the fusion of the general regression neural network (GRNN) and the particle swarm optimization (PSO) technique is employed
to deal with errors in RTU data. The proposed hybrid model, denoted as GRNN-PSO, is able to handle noisy data in a fast speed,
which makes it feasible for practical applications. Experimental results show the GRNN-PSO model has better performance in
removing the unintended changes to the original data compared with existing methods. 相似文献
837.
H. C. Yang C. H. Nien H. H. Sung C. H. Chen 《Journal of Low Temperature Physics》1989,75(3-4):243-252
The electrical resistivity, ac susceptibility, critical current density, and Josephson tunneling of Pb/Ag multilayers have been measured in wide temperature ranges in order to study the proximity effect. A resistivity drop was found to occur atT
c
of Pb in versusT measurement and, at low temperature, the multilayers show proximity effect. The I-V characteristic of the multilayer shows voltage steps, indicating a resistive state has occurred in the sample. The superconducting properties of the multilayer were analyzed with the bilayer theory of the proximity effect. 相似文献
838.
Qiyong Han Xiaodong Zhang Dong Chen Pengfei Wang 《Metallurgical and Materials Transactions B》1988,19(4):617-622
The equilibrium Ca3P2(s) = 3[Ca] + 2[P] was studied at 1600 ° by equilibrating liquid iron, saturated with Ca3P2, and contained in a TiN crucible, with Ca vapor. The source of Ca was liquid Ca contained in an Mo crucible, and the vapor
pressure of Ca was varied by varying the position of the Mo crucible in the temperature gradient of a vertical tube furnace.
A least-squares analysis of the data gave and. The simultaneous equilibria CaO(s) = [Ca] + [O] and CaS(s) = [Ca] + [S] were studied at 1600 ° by equilibrating liquid iron, contained in a pressed and sintered CaO-CaS crucible with
Ca vapor. The advantage of this technique is that two equilibrium constants,K
cas andK
cao, and two interaction coefficients, and can be determined from one set of experiments. It was determined that, at 1600 °,K
cas = 5.9 × 10−8
K
cao = 5.5 × 10−9,, and.
Formerly Graduate Students 相似文献
839.
用于VLSI的SiO_xN_y薄膜的界面陷阱 总被引:3,自引:1,他引:2
陈蒲生 《固体电子学研究与进展》1992,12(4):336-341
采用雪崩热电子注入技术研究了用于VLSI的快速热氮化的SiO_xN_y薄膜界面陷阱。给出这种薄介质膜禁带中央界面陷阱密度随氮化时间的变化关系,观察到这种薄膜存在着不同类型的密度悬殊很大的电子陷阱。指出雪崩热电子注入过程中在Si/SiO_xN_y界面上产生两类性质不同的快界面态陷阱,并给出这两种陷阱在禁带中能级位置及密度大小关系;同时还给出禁带中央界面陷阱密度随雪崩注入剂量呈现弱“N”形变化关系,并对实验结果进行了讨论。 相似文献
840.
The shear stress distribution for the notch problem of plane elasticity in the sliding mode case is investigated in this paper. Particular features of the shear stress distribution beneath the crown point of notch are analyzed by means of the Muskhelishvili method [1]. It is found that the maximum shear stress xy, max is always reached at some point below the surface of the notch. The smaller the radius of the notch, the larger is the maximum shear stress xy, max. A relation between xy, max and stress intensity factor K
II of the corresponding crack problem is found to be Several specific examples are given to prove the validity of the obtained relation.% MathType!MTEF!2!1!+-% feaafiart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXafv3ySLgzGmvETj2BSbqefm0B1jxALjhiov2D% aebbfv3ySLgzGueE0jxyaibaiGc9yrFr0xXdbba91rFfpec8Eeeu0x% Xdbba9frFj0-OqFfea0dXdd9vqaq-JfrVkFHe9pgea0dXdar-Jb9hs% 0dXdbPYxe9vr0-vr0-vqpWqaaeaabiGaciaacaqabeaadaqaaqGaaO% qaaiaadUeadaWgaaWcbaGaaeysaiaabMeaaeqaaOGaeyypa0ZaaSaa% aeaacaaIZaWaaOaaaeaacaaIZaGaeqiWdahaleqaaaGcbaGaaGOmaa% aadaWfqaqaaiGacYgacaGGPbGaaiyBaaWcbaGaeqyWdiNaeyOKH4Qa% aGimaaqabaGcdaGcaaqaaiabeg8aYjabeo8aZbWcbeaakmaaBaaale% aacaWG4bGaamyEaiaacYcaciGGTbGaaiyyaiaacIhadaahaaadbeqa% amXvP5wqonvsaeHbuLwBLnhiov2DGi1BTfMBG0evGueE0jxyGi0BSr% gaiuaacqWFUaGlaaaaleqaaaaa!6261!\[K_{{\text{II}}} = \frac{{3\sqrt {3\pi } }}{2}\mathop {\lim }\limits_{\rho \to 0} \sqrt {\rho \sigma } _{xy,\max ^. } \]This research project is supported by the National Science Foundation of China. 相似文献