全文获取类型
收费全文 | 9001篇 |
免费 | 318篇 |
国内免费 | 39篇 |
专业分类
电工技术 | 121篇 |
综合类 | 22篇 |
化学工业 | 2104篇 |
金属工艺 | 168篇 |
机械仪表 | 230篇 |
建筑科学 | 573篇 |
矿业工程 | 31篇 |
能源动力 | 171篇 |
轻工业 | 772篇 |
水利工程 | 54篇 |
石油天然气 | 11篇 |
武器工业 | 1篇 |
无线电 | 591篇 |
一般工业技术 | 1444篇 |
冶金工业 | 1520篇 |
原子能技术 | 70篇 |
自动化技术 | 1475篇 |
出版年
2023年 | 58篇 |
2022年 | 122篇 |
2021年 | 144篇 |
2020年 | 106篇 |
2019年 | 119篇 |
2018年 | 168篇 |
2017年 | 110篇 |
2016年 | 191篇 |
2015年 | 191篇 |
2014年 | 250篇 |
2013年 | 564篇 |
2012年 | 397篇 |
2011年 | 545篇 |
2010年 | 410篇 |
2009年 | 389篇 |
2008年 | 432篇 |
2007年 | 420篇 |
2006年 | 363篇 |
2005年 | 312篇 |
2004年 | 291篇 |
2003年 | 221篇 |
2002年 | 227篇 |
2001年 | 173篇 |
2000年 | 165篇 |
1999年 | 157篇 |
1998年 | 258篇 |
1997年 | 194篇 |
1996年 | 159篇 |
1995年 | 140篇 |
1994年 | 122篇 |
1993年 | 136篇 |
1992年 | 130篇 |
1991年 | 75篇 |
1990年 | 92篇 |
1989年 | 79篇 |
1988年 | 94篇 |
1987年 | 66篇 |
1986年 | 54篇 |
1985年 | 79篇 |
1984年 | 94篇 |
1983年 | 60篇 |
1982年 | 66篇 |
1981年 | 83篇 |
1980年 | 68篇 |
1979年 | 85篇 |
1978年 | 68篇 |
1977年 | 67篇 |
1976年 | 56篇 |
1975年 | 58篇 |
1973年 | 47篇 |
排序方式: 共有9358条查询结果,搜索用时 15 毫秒
91.
We introduce a simple, linear time algorithm for recognizing trivially perfect (TP) graphs. It improves upon the algorithm of Yan et al. [J.-H. Yan, J.-J. Chen, G.J. Chang, Quasi-threshold graphs, Discrete Appl. Math. 69 (3) (1996) 247–255] in that it is certifying, producing a P4 or a C4 when the graph is not TP. In addition, our algorithm can be easily modified to recognize the complement of TP graphs (co-TP) in linear time as well. It is based on lexicographic BFS, and in particular the technique of partition refinement, which has been used in the recognition of many other graph classes [D.G. Corneil, Lexicographic breadth first search—a survey, in: WG 2004, in: Lecture Notes in Comput. Sci., vol. 3353, Springer, 2004, pp. 1–19]. 相似文献
92.
Evolutionary algorithms are randomized search heuristics, which are applied to problems whose structure is not well understood, as well as to problems in combinatorial optimization. They have successfully been applied to different kinds of arc routing problems. To start the analysis of evolutionary algorithms with respect to the expected optimization time on these problems, we consider the Eulerian cycle problem. We show that a variant of the well-known (1+1) EA working on the important encoding of permutations is able to find an Eulerian tour of an Eulerian graph in expected polynomial time. Altering the operator used for mutation in the considered algorithm, the expected optimization time changes from polynomial to exponential. 相似文献
94.
“好小啊!”几乎所有人第一次看到NVIDIA离子平台的时候,都会发出这样的惊呼,然后人们会有三种反应,要反围观之后走开,要么打听哪里可以买到,而我们发烧级DLYer则会想:它为什么这么小,我们能自己搭建一台出来吗?为了实现打造超迷你平台客厅电脑的愿望, 相似文献
95.
看着扫描仪的规格说明书,2400dpi×4800dpi的光学分辩率、19200dpi×19200dpi的插值分辩率并列写在上面;准备扫描资料,结果发现可以选择的分辨率从75dpi到2400dpi,项目似乎更多了。这些分辨率究竟是怎么回事呢? 相似文献
96.
Jedy Frank.C.Kgight 《微型计算机》2009,(1):44-59
根据本刊2007年的年度调查结果显示,有高达70%的读者是有固定收入的上班族,其中信息传播、计算机服务和软件行业的读者比例达到18.47%、教育行业的读者有14.63%、制造业的读者达10.96%,国家机构和金融业的读者也有10%左右。他们一直希望在本刊看到更多关于商务产品、技术和解决方案的内容报道。而对于大多数企业来说,如何能用经济的成本买到最适合需要的办公设备也一直是个难题。 相似文献
97.
This paper considers the problem of scheduling quay cranes which are used at sea port container terminals to load and unload
containers. This problem is studied intensively in a recent stream of research but still lacks a correct treatment of crane
interference constraints. We present a revised optimization model for the scheduling of quay cranes and propose a heuristic
solution procedure. At its core a Branch-and-Bound algorithm is applied for searching a subset of above average quality schedules.
The heuristic takes advantage from efficient criteria for branching and bounding the search with respect to the impact of
crane interference. Although the used techniques are quite standard, the new heuristic produces much better solutions in considerably
shorter run times than all algorithms known from the literature. 相似文献
98.
Among the many 3D face matching techniques that have been developed, are variants of 3D facial curve matching, which reduce the amount of face data to one or a few 3D curves. The face’s central profile, for instance, proved to work well. However, the selection of the optimal set of 3D curves and the best way to match them has not been researched systematically. We propose a 3D face matching framework that allows profile and contour based face matching. Using this framework we evaluate profile and contour types including those described in the literature, and select subsets of facial curves for effective and efficient face matching. With a set of eight geodesic contours we achieve a mean average precision (MAP) of 0.70 and 92.5% recognition rate (RR) on the 3D face retrieval track of the Shape Retrieval Contest (SHREC’08), and a MAP of 0.96 and 97.6% RR on the University of Notre Dame (UND) test set. Face matching with these curves is time-efficient and performs better than other sets of facial curves and depth map comparison. 相似文献
99.
Ivan Martinovic Paul Pichota Matthias Wilhelm Frank A. Zdarsky Jens B. Schmitt 《Pervasive and Mobile Computing》2009,5(5):510-525
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library. 相似文献
100.
Jastorff AM Haegler K Maccarrone G Holsboer F Weber F Ziemssen T Turck CW 《Proteomics. Clinical applications》2009,3(11):1273-1287
Multiple sclerosis is characterized by inflammatory demyelination and axonal loss as pathophysiological correlates of relapsing activity and progressive development of clinical disability. The molecular processes involved in this pathogenesis are still unclear as they are quite complex and heterogeneous. In this article we present protein expression analysis of brain and spinal cord tissues from different models of murine experimental autoimmune encephalomyelitis (EAE), the most commonly used animal model for multiple sclerosis. We observed a number of EAE-specific protein expression and PTM differences. Proteome analysis was extended to multiple sclerosis specimens in order to validate the EAE findings. Our findings suggest the regulation of a number of proteins that shed light on the molecular mechanisms of the disease processes taking place in EAE and multiple sclerosis. We found consistent modulation of proteins including serum amyloid P component, sirtuin 2, dihydropyrimidinase-related protein family proteins, stathmin 1, creatine kinase B and chloride intracellular channel protein 1. Functional classification of the proteins by database and the literature mining reveals their association with neuronal development and myelinogenesis, suggesting possible disease processes that mediate neurodegeneration. 相似文献