全文获取类型
收费全文 | 101574篇 |
免费 | 1779篇 |
国内免费 | 546篇 |
专业分类
电工技术 | 1074篇 |
综合类 | 2348篇 |
化学工业 | 15472篇 |
金属工艺 | 5305篇 |
机械仪表 | 3623篇 |
建筑科学 | 2533篇 |
矿业工程 | 598篇 |
能源动力 | 2473篇 |
轻工业 | 4731篇 |
水利工程 | 1404篇 |
石油天然气 | 429篇 |
武器工业 | 1篇 |
无线电 | 11416篇 |
一般工业技术 | 20243篇 |
冶金工业 | 3999篇 |
原子能技术 | 421篇 |
自动化技术 | 27829篇 |
出版年
2024年 | 103篇 |
2023年 | 421篇 |
2022年 | 1008篇 |
2021年 | 1170篇 |
2020年 | 925篇 |
2019年 | 955篇 |
2018年 | 15280篇 |
2017年 | 14042篇 |
2016年 | 10715篇 |
2015年 | 1193篇 |
2014年 | 1072篇 |
2013年 | 1710篇 |
2012年 | 4005篇 |
2011年 | 10331篇 |
2010年 | 9014篇 |
2009年 | 6295篇 |
2008年 | 7415篇 |
2007年 | 8267篇 |
2006年 | 589篇 |
2005年 | 1559篇 |
2004年 | 1389篇 |
2003年 | 1404篇 |
2002年 | 726篇 |
2001年 | 272篇 |
2000年 | 352篇 |
1999年 | 229篇 |
1998年 | 356篇 |
1997年 | 277篇 |
1996年 | 275篇 |
1995年 | 189篇 |
1994年 | 179篇 |
1993年 | 169篇 |
1992年 | 120篇 |
1991年 | 158篇 |
1990年 | 103篇 |
1989年 | 100篇 |
1988年 | 98篇 |
1987年 | 96篇 |
1986年 | 78篇 |
1985年 | 92篇 |
1984年 | 80篇 |
1983年 | 78篇 |
1982年 | 64篇 |
1981年 | 73篇 |
1980年 | 50篇 |
1968年 | 46篇 |
1966年 | 43篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 18 毫秒
971.
Some neurons in the brain of freely moving rodents show special firing pattern. The firing of head direction cells (HDCs) and grid cells (GCs) is related to the moving direction and distance, respectively. Thus, it is considered that these cells play an important role in the rodents’ path integration. To provide a bionic approach for the vehicle to achieve path integration, we present a biologically inspired model of path integration based on the firing characteristics of HDCs and GCs. The detailed implementation process of this model is discussed. Besides, the proposed model is realized by simulation, and the path integration performance is analyzed under different conditions. Simulations validate that the proposed model is effective and stable. 相似文献
972.
Identity-based signature has become an important technique for lightweight authentication as soon as it was proposed in 1984. Thereafter, identity-based signature schemes based on the integer factorization problem and discrete logarithm problem were proposed one after another. Nevertheless, the rapid development of quantum computers makes them insecure. Recently, many efforts have been made to construct identity-based signatures over lattice assumptions against attacks in the quantum era. However, their efficiency is not very satisfactory. In this study, an efficient identity-based signature scheme is presented over the number theory research unit (NTRU) lattice assumption. The new scheme is more efficient than other lattice- and identity-based signature schemes. The new scheme proves to be unforgeable against the adaptively chosen message attack in the random oracle model under the hardness of the γ-shortest vector problem on the NTRU lattice. 相似文献
973.
B. Fishbain Dorit S. Hochbaum Stefan Mueller 《Journal of Real-Time Image Processing》2016,11(3):589-609
Rapid advances in image acquisition and storage technology underline the need for real-time algorithms that are capable of solving large-scale image processing and computer-vision problems. The minimum s–t cut problem, which is a classical combinatorial optimization problem, is a prominent building block in many vision and imaging algorithms such as video segmentation, co-segmentation, stereo vision, multi-view reconstruction, and surface fitting to name a few. That is why finding a real-time algorithm which optimally solves this problem is of great importance. In this paper, we introduce to computer vision the Hochbaum’s pseudoflow (HPF) algorithm, which optimally solves the minimum s–t cut problem. We compare the performance of HPF, in terms of execution times and memory utilization, with three leading published algorithms: (1) Goldberg’s and Tarjan’s Push-Relabel; (2) Boykov’s and Kolmogorov’s augmenting paths; and (3) Goldberg’s partial augment-relabel. While the common practice in computer-vision is to use either BK or PRF algorithms for solving the problem, our results demonstrate that, in general, HPF algorithm is more efficient and utilizes less memory than these three algorithms. This strongly suggests that HPF is a great option for many real-time computer-vision problems that require solving the minimum s–t cut problem. 相似文献
974.
Gradient vector flow (GVF) is a feature-preserving spatial diffusion of image gradients. It was introduced to overcome the limited capture range in traditional active contour segmentation. However, the original iterative solver for GVF, using Euler’s method, converges very slowly. Thus, many iterations are needed to achieve the desired capture range. Several groups have investigated the use of graphic processing units (GPUs) to accelerate the GVF computation. Still, this does not reduce the number of iterations needed. Multigrid methods, on the other hand, have been shown to provide a much better capture range using considerable less iterations. However, non-GPU implementations of the multigrid method are not as fast as the Euler method when executed on the GPU. In this paper, a novel GPU implementation of a multigrid solver for GVF written in OpenCL is presented. The results show that this implementation converges and provides a better capture range about 2–5 times faster than the conventional iterative GVF solver on the GPU. 相似文献
975.
Andrea Miele 《Journal in Computer Virology》2016,12(2):113-120
We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs. We show how an attacker can overrun a buffer to corrupt sensitive data or steer the execution flow by overwriting function pointers, e.g., manipulating the virtual table of a C++ object. In view of a potential mass market diffusion of GPU accelerated software this may be a major concern. 相似文献
976.
Statistical detection of mass malware has been shown to be highly successful. However, this type of malware is less interesting to cyber security officers of larger organizations, who are more concerned with detecting malware indicative of a targeted attack. Here we investigate the potential of statistically based approaches to detect such malware using a malware family associated with a large number of targeted network intrusions. Our approach is complementary to the bulk of statistical based malware classifiers, which are typically based on measures of overall similarity between executable files. One problem with this approach is that a malicious executable that shares some, but limited, functionality with known malware is likely to be misclassified as benign. Here a new approach to malware classification is introduced that classifies programs based on their similarity with known malware subroutines. It is illustrated that malware and benign programs can share a substantial amount of code, implying that classification should be based on malicious subroutines that occur infrequently, or not at all in benign programs. Various approaches to accomplishing this task are investigated, and a particularly simple approach appears the most effective. This approach simply computes the fraction of subroutines of a program that are similar to malware subroutines whose likes have not been found in a larger benign set. If this fraction exceeds around 1.5 %, the corresponding program can be classified as malicious at a 1 in 1000 false alarm rate. It is further shown that combining a local and overall similarity based approach can lead to considerably better prediction due to the relatively low correlation of their predictions. 相似文献
977.
The wide availability of affordable RGB-D sensors changes the landscape of indoor scene analysis. Years of research on simultaneous localization and mapping (SLAM) have made it possible to merge multiple RGB-D images into a single point cloud and provide a 3D model for a complete indoor scene. However, these reconstructed models only have geometry information, not including semantic knowledge. The advancements in robot autonomy and capabilities for carrying out more complex tasks in unstructured environments can be greatly enhanced by endowing environment models with semantic knowledge. Towards this goal, we propose a novel approach to generate 3D semantic maps for an indoor scene. Our approach creates a 3D reconstructed map from a RGB-D image sequence firstly, then we jointly infer the semantic object category and structural class for each point of the global map. 12 object categories (e.g. walls, tables, chairs) and 4 structural classes (ground, structure, furniture and props) are labeled in the global map. In this way, we can totally understand both the object and structure information. In order to get semantic information, we compute semantic segmentation for each RGB-D image and merge the labeling results by a Dense Conditional Random Field. Different from previous techniques, we use temporal information and higher-order cliques to enforce the label consistency for each image labeling result. Our experiments demonstrate that temporal information and higher-order cliques are significant for the semantic mapping procedure and can improve the precision of the semantic mapping results. 相似文献
978.
Wail Mardini Yaser Khamayseh Abdalrhman Abdalkareem Almodawar Ehab Elmallah 《Peer-to-Peer Networking and Applications》2016,9(6):991-1004
Range of applications for Wireless Sensor Networks (WSNs) is increasing rapidly. One class of such applications is Energy-Aware Wireless Positioning Systems for situation awareness. Localization deals with determining a target node’s position in WSN by analyzing signals exchanged between nodes. Received Signal Strength Indicator (RSSI) represents the ratio between received signal power and a reference power, and is typically used to estimate distances between nodes. RSSI distance estimations are affected by many factors. This paper aims to enhance the accuracy of RSSI-based localization techniques in ZigBee Networks through studying the communication channel status between two nodes. As the network nodes are exposed to high noise levels, position estimation accuracy deteriorates. A novel adaptive localization scheme is proposed; Two-State Markov model with moving average is employed to detect unpredictable RSSI readings that may reflect badly on the estimation. The proposed scheme achieves better estimation accuracy, for example, the estimation error was reduced from 11.7 m to just 3 m using the proposed scheme. 相似文献
979.
Peng Qin Bin Dai Guan Xu Kui Wu Benxiong Huang 《Peer-to-Peer Networking and Applications》2016,9(6):1047-1059
A Peer-to-Peer (P2P) network can boost its performance if peers are provided with underlying network-layer routing topology. The task of inferring the network-layer routing topology and link performance from an end host to a set of other hosts is termed as network tomography, and it normally requires host computers to send probing messages. We design a passive network tomography method that does not require any probing messages and takes a free ride over data flows in P2P networks. It infers routing topology based on end-to-end delay correlation estimation (DCE) without requiring any synchronization or cooperation from the intermediate routers. We implement and test our method in the real world Internet environment and achieved the accuracy of 92 % in topology recovery. We also perform extensive simulation in OMNeT++ to evaluate its performance over large scale networks, showing that its topology recovery accuracy is about 95 % for large networks. 相似文献
980.
Xiao Liu Kaoru Ota Anfeng Liu Zhigang Chen 《Peer-to-Peer Networking and Applications》2016,9(4):692-711
Crowd sensing networks can be used for large scale sensing of the physical world or other information service by leveraging the available sensors on the phones. The collector hopes to collect as much as sensed data at relatively low cost. However, the sensing participants want to earn much money at low cost. This paper examines the evolutionary process among participants sensing networks and proposes an evolutionary game model to depict collaborative game phenomenon in the crowd sensing networks based on the principles of game theory in economics. A effectively incentive mechanism is established through corrected the penalty function of the game model accordance with the cooperation rates of the participant, and corrected the game times in accordance with it’s payoff. The collector controls the process of game by adjusting the price function. We find that the proposed incentive game based evolutionary model can help decision makers simulate evolutionary process under various scenarios. The crowd sensing networks structure significantly influence cooperation ratio and the total number of participant involved in the game, and the distribution of population with different game strategy. Through evolutionary game model, the manager can select an optimal price to facilitate the system reach equilibrium state quickly, and get the number of participants involved in the game. The incentive game based evolutionary model in crowd sensing networks provides valuable decision-making support to managers. 相似文献