全文获取类型
收费全文 | 175544篇 |
免费 | 16965篇 |
国内免费 | 10140篇 |
专业分类
电工技术 | 13263篇 |
技术理论 | 11篇 |
综合类 | 15217篇 |
化学工业 | 25932篇 |
金属工艺 | 10706篇 |
机械仪表 | 11593篇 |
建筑科学 | 13421篇 |
矿业工程 | 4998篇 |
能源动力 | 5107篇 |
轻工业 | 15402篇 |
水利工程 | 3962篇 |
石油天然气 | 8596篇 |
武器工业 | 2023篇 |
无线电 | 19571篇 |
一般工业技术 | 18132篇 |
冶金工业 | 7178篇 |
原子能技术 | 2026篇 |
自动化技术 | 25511篇 |
出版年
2024年 | 754篇 |
2023年 | 2587篇 |
2022年 | 5291篇 |
2021年 | 7155篇 |
2020年 | 5407篇 |
2019年 | 4231篇 |
2018年 | 4615篇 |
2017年 | 5567篇 |
2016年 | 5038篇 |
2015年 | 7320篇 |
2014年 | 9405篇 |
2013年 | 10811篇 |
2012年 | 13131篇 |
2011年 | 14137篇 |
2010年 | 13019篇 |
2009年 | 12422篇 |
2008年 | 12252篇 |
2007年 | 11536篇 |
2006年 | 10812篇 |
2005年 | 8729篇 |
2004年 | 6446篇 |
2003年 | 5671篇 |
2002年 | 5830篇 |
2001年 | 5008篇 |
2000年 | 3633篇 |
1999年 | 2912篇 |
1998年 | 1899篇 |
1997年 | 1530篇 |
1996年 | 1332篇 |
1995年 | 1002篇 |
1994年 | 799篇 |
1993年 | 550篇 |
1992年 | 442篇 |
1991年 | 339篇 |
1990年 | 245篇 |
1989年 | 205篇 |
1988年 | 129篇 |
1987年 | 111篇 |
1986年 | 84篇 |
1985年 | 36篇 |
1984年 | 30篇 |
1983年 | 37篇 |
1982年 | 34篇 |
1981年 | 33篇 |
1980年 | 40篇 |
1979年 | 14篇 |
1978年 | 4篇 |
1975年 | 3篇 |
1959年 | 13篇 |
1951年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
Yan Wang Kwei-Jay Lin Duncan S. Wong Vijay Varadharajan 《Service Oriented Computing and Applications》2009,3(2):129-146
In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions.
From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly
when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality
provided by service clients. In this paper, we first present a trust management framework that is event-driven and rule-based.
In this framework, trust computation is based on formulae. But rules are defined to determine which formula to use and what
arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation
metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting
suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process.
Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new
service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality
services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed
approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed framework
is adaptable for different domains and complex trust evaluation systems.
相似文献
Vijay VaradharajanEmail: |
993.
Yan Meng 《Journal of Real-Time Image Processing》2009,4(4):339-351
Most conventional object tracking algorithms are implemented on general-purpose processors in software due to its great flexibility. However, the real-time performance is hard to achieve due to the inherent characteristics of the sequential processing of these processors. To tackle this issue, a reconfigurable system-on-chip (rSoC) platform with microprocessors and FPGAs is applied in this paper. To simplify the hardware/software interface, a Belief–Desire–Intention (BDI)-based multi-agent architecture is proposed as the unified framework. Then an agent-based task graph and two heuristic partitioning methods are proposed to partition the hardware and software on an rSoC platform. Compared to the module-based architecture, this BDI-based multi-agent architecture provides more efficiency, flexibility, autonomy, and scalability for the real-time tracking systems. A particle swarm optimization (PSO)-based object detection and tracking algorithm is applied to evaluate the proposed architecture. Extensive experimental results of object tracking demonstrate that the proposed architecture is efficient and highly robust with real-time performance. 相似文献
994.
Wen-Ke Wang Hui Zhang Hyungjun Park Jun-Hai Yong Jean-Claude Paul Jia-Guang Sun 《Computer aided design》2008,40(10-11):999-1008
A new algorithm for reducing control points in lofted surface interpolation to rows of data points is presented in this paper. The key step of surface lofting is to obtain a set of compatible B-spline curves interpolating each row. Given a set of points and their parameterization, a necessary and sufficient condition is proposed to determine the existence of interpolating B-spline curves defined on a given knot vector. Based on this condition, we first properly construct a common knot vector that guarantees the existence of interpolating B-spline curves to each row of points. Then we calculate a set of interpolating B-spline curves defined on the common knot vector by energy minimization. Using this method, fewer control points are employed while maintaining a visually pleasing shape of the lofted surface. Several experimental results demonstrate the usability and quality of the proposed method. 相似文献
995.
This paper analyzes the numerically instable problem in the current 3D fragile watermarking schemes. Some existing fragile watermarking schemes apply the floating-point arithmetic to embed the watermarks. However, these schemes fail to work properly due to the numerically instable problem, which is common in the floating-point arithmetic. This paper proposes a numerically stable fragile watermarking scheme. The scheme views the mantissa part of the floating-point number as an unsigned integer and operates on it by the bit XOR operator. Since there is no numerical problem in the bit operation, this scheme is numerically stable. The scheme can control the watermark strength through changing the embedding parameters. This paper further discusses selecting appropriate embedding parameters to achieve good performance in terms of the perceptual invisibility and the ability to detect unauthorized attacks on the 3D models. The experimental results show that the proposed public scheme could detect attacks such as adding noise, adding/deleting faces, inserting/removing vertices, etc. The comparisons with the existing fragile schemes show that this scheme is easier to implement and use. 相似文献
996.
The interpolated fast Fourier transform (IFFT) has been proposed as a way to eliminate the picket fence effect (PFE) of the fast Fourier transform. The modulus based IFFT, cited in most relevant references, makes use of only the 1st and 2nd highest spectral lines. An approach using three principal spectral lines is proposed. This new approach combines both directions of the complex spectrum based IFFT with the Hanning window. The optimal weight to minimize the estimation variance is established on the first order Taylor series expansion of noise interference. A numerical simulation is carried out, and the results are compared with the Cramer-Rao bound. It is demonstrated that the proposed approach has a lower estimation variance than the two-spectral-line approach. The improvement depends on the extent of sampling deviating from the coherent condition, and the best is decreasing variance by 2/7. However, it is also shown that the estimation variance of the windowed IFFT with the Hanning is significantly higher than that of without windowing. 相似文献
997.
王琰 《自动化与仪器仪表》2008,(4)
根据洗衣机的控制要求,从功能要求、硬件设计、软件设计三个方面描述了一个以MCS-51单片机为控制核心的洗衣机控制系统。给出了硬件线路框图和相关的控制程序流程图。 相似文献
998.
针对传统均质机的缺点,设计了一套基于 HMI、PLC、变频器的控制系统.实现了对均质机的自动控制.针对均质机加热工作采用夹层注油间接加热方式具有滞后大的特点,提出一种基于三菱FX2N系列PLC的专家PID的控制算法.有效解决传统均质机控制系统加热控制时温度超调量大、加热控制时间过长的问题.本设计已经应用到了实际生产中,取得良好效果. 相似文献
999.
1000.
本文对CNGI研究课题"组播与P2P相结合的文件分发系统"进行了简要介绍.通过对该系统文件管理模块的总体设计和详细设计,实现了基于IPv6组播与P2P技术的结合.该系统借助JxTA平台实现P2P的基本功能:节点搜索、节点资源搜索、节点间的通讯和文件的统一管理等,实现了尽量利用可靠的组播并利用P2P实现跨组播域的信息传输.最后通过对管理模块在不同环境下的测试数据进行分析,表明该设计思想的有效性. 相似文献