全文获取类型
收费全文 | 73351篇 |
免费 | 7129篇 |
国内免费 | 4027篇 |
专业分类
电工技术 | 4282篇 |
技术理论 | 6篇 |
综合类 | 5245篇 |
化学工业 | 12049篇 |
金属工艺 | 4422篇 |
机械仪表 | 4618篇 |
建筑科学 | 5254篇 |
矿业工程 | 1977篇 |
能源动力 | 1926篇 |
轻工业 | 7046篇 |
水利工程 | 1495篇 |
石油天然气 | 3621篇 |
武器工业 | 613篇 |
无线电 | 8211篇 |
一般工业技术 | 8623篇 |
冶金工业 | 3332篇 |
原子能技术 | 831篇 |
自动化技术 | 10956篇 |
出版年
2024年 | 397篇 |
2023年 | 1286篇 |
2022年 | 2293篇 |
2021年 | 3041篇 |
2020年 | 2376篇 |
2019年 | 2038篇 |
2018年 | 2333篇 |
2017年 | 2479篇 |
2016年 | 2298篇 |
2015年 | 3120篇 |
2014年 | 3848篇 |
2013年 | 4834篇 |
2012年 | 5254篇 |
2011年 | 5756篇 |
2010年 | 5160篇 |
2009年 | 5046篇 |
2008年 | 4841篇 |
2007年 | 4562篇 |
2006年 | 4352篇 |
2005年 | 3645篇 |
2004年 | 2501篇 |
2003年 | 2034篇 |
2002年 | 1900篇 |
2001年 | 1570篇 |
2000年 | 1379篇 |
1999年 | 1289篇 |
1998年 | 933篇 |
1997年 | 728篇 |
1996年 | 663篇 |
1995年 | 534篇 |
1994年 | 449篇 |
1993年 | 339篇 |
1992年 | 264篇 |
1991年 | 198篇 |
1990年 | 149篇 |
1989年 | 102篇 |
1988年 | 104篇 |
1987年 | 76篇 |
1986年 | 55篇 |
1985年 | 45篇 |
1984年 | 39篇 |
1983年 | 27篇 |
1982年 | 28篇 |
1981年 | 11篇 |
1980年 | 20篇 |
1979年 | 20篇 |
1978年 | 13篇 |
1977年 | 11篇 |
1976年 | 15篇 |
1975年 | 11篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
In order to solve the transformation problem of Bill of Materials (BOM) from engineering BOM to maintenance BOM for Maintenance, Repair and Overhaul (MRO) systems, a formal transformation model of BOM view is proposed. In this model, the intermediate component, inherited component, virtual component are defined in the specific maintenance management domain, and the transformation process from engineering BOM to maintenance BOM is discussed through feature recognition methods and rules. The proposed transformation model has been developed and deployed in an MRO system for a steel manufacturing enterprise. 相似文献
112.
In a large-scale locality-driven network such as in modular robotics and wireless sensor networks, knowing the state of a local area is sometimes necessary due to either interactions being local and driven by neighborhood proximity or the users being interested in the state of a certain region. We define locality-aware predicates (LAP) that aim at detecting a predicate within a specified area. We model the area of interest as the set of processes that are within a breadth-first search tree (BFST) of height k rooted at the initiator process. Although a locality-aware predicate specifies a predicate only within a local area, observing the area consistently requires considering the entire system in a consistent manner. This raises the challenge of making the complexities of the corresponding predicate detection algorithms scale-free, i.e., independent of the size of the system. Since all existing algorithms for getting a consistent view of the system require either a global snapshot of the entire system or vector clocks of the size of the system, a new solution is needed. We focus on stable LAP, which are those LAP that remain true once they become true. We propose a scale-free algorithm to detect stable LAP within a k-height BFST. Our algorithm can detect both stable conjunctive LAP and stable relational LAP. In the process of designing our algorithm, we also propose the first distributed algorithm for building a BFST within an area of interest in a graph, and the first distributed algorithm for recording a consistent sub-cut within the area of interest. This paper demonstrates that LAPs are a natural fit for detecting distributed properties in large-scale distributed systems, and stable LAPs can be practically detected at low cost. 相似文献
113.
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy data-intensive applications without the infrastructure investment, where large application datasets can be stored in the cloud. Based on the pay-as-you-go model, data placement strategies have been developed to cost-effectively store large volumes of generated datasets in the scientific cloud workflows. As promising as it is, this paradigm also introduces many new challenges for data security when the users outsource sensitive data for sharing on the cloud servers, which are not within the same trusted domain as the data owners. This challenge is further complicated by the security constraints on the potential sensitive data for the scientific workflows in the cloud. To effectively address this problem, we propose a security-aware intermediate data placement strategy. First, we build a security overhead model to reasonably measure the security overheads incurred by the sensitive data. Second, we develop a data placement strategy to dynamically place the intermediate data for the scientific workflows. Finally, our experimental results show that our strategy can effectively improve the intermediate data security while ensuring the data transfer time during the execution of scientific workflows. 相似文献
114.
基于ECT的高速数据采集系统设计 总被引:1,自引:0,他引:1
数据采集系统的速度制约了电容层析成像技术在航空发动机气路监测系统等高速设备中的应用。为此,设计了一种基于FPGA的新型电容数据采集系统,采用DDR2存储技术和PCI总线技术实现了数据的高速传输。同时应用卡尔曼滤波器代替传统的FIR滤波器,有效提高了滤波效率。测试结果表明,该系统具有抗干扰能力强、采样精度高、处理速度快等优点。 相似文献
115.
116.
为了合理地实现多接口多信道车载自组织网络(VANET)车辆节点间通信信道的动态分配,提出了一种基于通信双方车辆节点信道切换队列的动态信道分配算法。定义了车辆节点的射频接口状态,给出了信道的性能因子以及信道切换队列的生成方法,通过综合考虑通信双方车辆节点的射频接口状态和信道切换队列,快速自主地建立通信链路,从而解决了信道公平接入和分配不合理的问题。通过软件仿真比较可以看出,该算法实现了信道的动态分配,减小了平均端到端时延,增加了网络平均吞吐量,显著提高了多接口多信道VANET的网络性能。 相似文献
117.
118.
多尺度空间特征提取的脊柱图像拼接算法 总被引:1,自引:0,他引:1
针对脊柱图像视野有限,提出一种基于优化MSFE的脊柱图像自动拼接算法。设计出一种基于尺度因子变化的高斯卷积模板尺寸自适应调整以及双向配对办法;相似性度量采用城市距离;利用RANSAC算法去除错配,从而确定待拼接图像之间的变换参数,最后利用加权平均对图像融合。对实际取得的多幅脊柱图像拼接结果表明该算法具有很好的实时性和鲁棒性。 相似文献
119.
The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. In this paper, we first present a general framework for searching on error-tolerant keywords. Then we propose a concrete scheme, based on a fuzzy extractor, which is proved secure against an adaptive adversary under well-defined security definition. The scheme is suitable for all similarity metrics including Hamming distance, edit distance, and set difference. It does not require the user to construct or store anything in advance, other than the key used to calculate the trapdoor of keywords and the key to encrypt data documents. Thus, our scheme tremendously eases the users' burden. What is more, our scheme is able to transform the servers' searching for error-tolerant keywords on ciphertexts to the searching for exact keywords on plaintexts. The server can use any existing approaches of exact keywords search to search plaintexts on an index table. 相似文献
120.