全文获取类型
收费全文 | 73128篇 |
免费 | 8974篇 |
国内免费 | 5677篇 |
专业分类
电工技术 | 7067篇 |
技术理论 | 2篇 |
综合类 | 6650篇 |
化学工业 | 9442篇 |
金属工艺 | 4500篇 |
机械仪表 | 5007篇 |
建筑科学 | 5785篇 |
矿业工程 | 2657篇 |
能源动力 | 2107篇 |
轻工业 | 6560篇 |
水利工程 | 2129篇 |
石油天然气 | 3273篇 |
武器工业 | 1000篇 |
无线电 | 9174篇 |
一般工业技术 | 6698篇 |
冶金工业 | 2942篇 |
原子能技术 | 1182篇 |
自动化技术 | 11604篇 |
出版年
2024年 | 468篇 |
2023年 | 1291篇 |
2022年 | 2815篇 |
2021年 | 3832篇 |
2020年 | 2727篇 |
2019年 | 2145篇 |
2018年 | 2269篇 |
2017年 | 2622篇 |
2016年 | 2346篇 |
2015年 | 3532篇 |
2014年 | 4375篇 |
2013年 | 5134篇 |
2012年 | 6172篇 |
2011年 | 6325篇 |
2010年 | 5773篇 |
2009年 | 5633篇 |
2008年 | 5316篇 |
2007年 | 5225篇 |
2006年 | 4738篇 |
2005年 | 3713篇 |
2004年 | 2735篇 |
2003年 | 1834篇 |
2002年 | 1780篇 |
2001年 | 1415篇 |
2000年 | 1076篇 |
1999年 | 645篇 |
1998年 | 342篇 |
1997年 | 277篇 |
1996年 | 252篇 |
1995年 | 227篇 |
1994年 | 149篇 |
1993年 | 97篇 |
1992年 | 96篇 |
1991年 | 68篇 |
1990年 | 59篇 |
1989年 | 40篇 |
1988年 | 24篇 |
1987年 | 14篇 |
1986年 | 19篇 |
1985年 | 12篇 |
1984年 | 14篇 |
1983年 | 10篇 |
1982年 | 11篇 |
1981年 | 13篇 |
1980年 | 23篇 |
1979年 | 13篇 |
1977年 | 9篇 |
1976年 | 18篇 |
1959年 | 12篇 |
1951年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
环境一号B星热红外波段单通道算法温度反演 总被引:1,自引:0,他引:1
文中在考虑环境一号B星(HJ-1B)热红外波段(infrared scanner,IRS4)光谱响应函数和有效波长的基础上,通过MODTRAN4模型模拟,对Jimenez-Munoz和Sobrino(JM&S)单通道算法中的大气函数进行改进,重新计算得到了适合HJ-1B星IRS4地表温度(land surface temperature,LST)反演的3个大气函数公式,并反演了福州地区的地表温度.采用基于星上辐亮度法对反演的地表温度进行精度评价,并将反演的地表温度与JM&S算法、段四波等修正的JM&S算法反演的地表温度进行对比分析.结果表明:使用文中改进后的大气参数对HJ-1B星IRS4进行地表温度反演,可取得较好结果. 相似文献
992.
993.
994.
HUANG ZhiYong HE FaZhi CAI XianTao ZOU ZhengQin LIU Jing LIANG MingMing & CHEN XiaoComputer School Wuhan University Wuhan China 《中国科学:信息科学(英文版)》2011,(6):1207-1217
Most image retargeting algorithms rely heavily on valid saliency map detection to proceed. However, the inefficiency of high quality saliency map detection severely restricts the application of these image retargeting methods. In this paper, we propose a random algorithm for efficient context-aware saliency map detection. Our method is a multiple level saliency map detection algorithm that integrates multiple level coarse saliency maps into the resulting saliency map and selectively updates unreliable regio... 相似文献
995.
The fast Fourier transform (FFT) is a fundamental kernel of many computation-intensive scientific applications.This paper deals with an implementation of the FFT on the accelerator system,a heterogeneous multi-core architecture to accelerate computation-intensive parallel computing in scientific and engineering applications.The Engineering and Scientific Computation Accelerator (ESCA) consists of a control unit and a single instruction multiple data (SIMD) processing element (PE) array,in which PEs communicate with each other via a hierarchical two-level network-on-chip (NoC) with high bandwidth and low latency.We exploit the architecture features of ESCA to implement a parallel FFT algorithm efficiently.Experimental results show that both the proposed parallel FFT algorithm and the ESCA architecture are scalable.The 16-bit fixed-point parallel FFT performance of ESCA is compared with a published work to prove the superiority of the mapping algorithm and the hardware architecture.The floating-point parallel FFT performances of ESCA are evaluated and compared with those of the IBM Cell processor and GPU to demonstrate the computing power of the ESCA system for high performance applications. 相似文献
996.
This communique presents forced second-order consensus protocols with communication time-delays for the network of agents with double integrator dynamics and gives a measure of the robustness of the protocols to the communication time-delays. By employing a frequency domain method, it is proven that the forced consensus is achieved asymptotically for appropriate time-delay if the network is connected. Particularly, the maximum fixed time-delay that can be tolerated by the network is found. The forced consensus protocols are distributed in the sense that each agent only needs information from its neighboring agents, which reduces the complexity of connections between agents significantly. Numerical simulation results are provided to demonstrate the effectiveness and the sharpness of the theoretical results. 相似文献
997.
Modeling MODIS LAI time series using three statistical methods 总被引:2,自引:0,他引:2
Leaf Area Index (LAI) is one of the most important variables characterizing land surface vegetation and dynamics. Many satellite data, such as the Moderate Resolution Imaging Spectroradiometer (MODIS), have been used to generate LAI products. It is important to characterize their spatial and temporal variations by developing mathematical models from these products. In this study, we aim to model MODIS LAI time series and further predict its future values by decomposing the LAI time series of each pixel into several components: trend, intra-annual variations, seasonal cycle, and stochastic stationary or irregular parts. Three such models that can characterize the non-stationary time series data and predict the future values are explored, including Dynamic Harmonics Regression (DHR), STL (Seasonal-Trend Decomposition Procedure based on Loess), and Seasonal ARIMA (AutoRegressive Intergrated Moving Average) (SARIMA). The preliminary results using six years (2001-2006) of the MODIS LAI product indicate that all these methods are effective to model LAI time series and predict 2007 LAI values reasonably well. The SARIMA model gives the best prediction, DHR produces the smoothest curve, and STL is more sensitive to noise in the data. These methods work best for land cover types with pronounced seasonal variations. 相似文献
998.
999.
邱波 《网络安全技术与应用》2011,(12):29-31
本文通过对黑客起源及其文化的认识来分析黑客技术的发展,同时也针对当前一些主要的黑客攻击手段提出了防御的对策。 相似文献
1000.
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University. 相似文献