首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   49448篇
  免费   2685篇
  国内免费   155篇
电工技术   708篇
综合类   65篇
化学工业   10593篇
金属工艺   2136篇
机械仪表   3241篇
建筑科学   1099篇
矿业工程   25篇
能源动力   2111篇
轻工业   3887篇
水利工程   271篇
石油天然气   88篇
武器工业   2篇
无线电   7835篇
一般工业技术   10662篇
冶金工业   3881篇
原子能技术   658篇
自动化技术   5026篇
  2024年   50篇
  2023年   570篇
  2022年   870篇
  2021年   1483篇
  2020年   1069篇
  2019年   1177篇
  2018年   1429篇
  2017年   1411篇
  2016年   1750篇
  2015年   1295篇
  2014年   2088篇
  2013年   3006篇
  2012年   3265篇
  2011年   3889篇
  2010年   2814篇
  2009年   2921篇
  2008年   2811篇
  2007年   2185篇
  2006年   2031篇
  2005年   1723篇
  2004年   1571篇
  2003年   1513篇
  2002年   1329篇
  2001年   1134篇
  2000年   996篇
  1999年   928篇
  1998年   1557篇
  1997年   991篇
  1996年   803篇
  1995年   557篇
  1994年   461篇
  1993年   406篇
  1992年   290篇
  1991年   274篇
  1990年   258篇
  1989年   241篇
  1988年   205篇
  1987年   168篇
  1986年   119篇
  1985年   115篇
  1984年   92篇
  1983年   63篇
  1982年   38篇
  1981年   39篇
  1980年   30篇
  1979年   31篇
  1978年   30篇
  1977年   38篇
  1976年   61篇
  1973年   20篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
String inclusion and non-inclusion problems have been vigorously studied in such diverse fields as molecular biology, data compression, and computer security. Among the well-known string inclusion or non-inclusion notions, we are interested in the longest common nonsuperstring. Given a set of strings, the longest common nonsuperstring problem is finding the longest string that is not a superstring of any string in the given set. It is known that the longest common nonsuperstring problem is solvable in polynomial time.In this paper, we propose an efficient algorithm for the longest common nonsuperstring problem. The running time of our algorithm is linear with respect to the sum of the lengths of the strings in the given set, using generalized suffix trees.  相似文献   
992.
Improving multikey Quicksort for sorting strings with many equal elements   总被引:1,自引:0,他引:1  
Bentley and Sedgewick proposed multikey Quicksort with ‘split-end’ partitioning for sorting strings. But it can be slow in case of many equal elements because it adopted ‘split-end’ partitioning that moves equal elements to the ends and swaps back to the middle. We present ‘collect-center’ partitioning to improve multikey Quicksort in that case. It moves equal elements to the middle directly like the ‘Dutch National Flag Problem’ partitioning approach and it uses two inner loops like Bentley and McIlroy's. In case of many equal elements such as DNA sequences, HTML files, and English texts, multikey Quicksort with ‘collect-center’ partitioning is faster than multikey Quicksort with ‘split-end’ partitioning.  相似文献   
993.
Wei-hua Tong  Tae-wan Kim 《Computing》2009,86(2-3):235-255
We develop a scheme for constructing G 1 triangular spline surfaces of arbitrary topological type. To assure that the scheme is local and singularity-free, we analyze the selection of scalar weight functions and the construction of the boundary curve network in detail. With the further requirements of interpolating positions, normals, and surface curvatures, we show that the minimum degree of such a triangular spline surface is 6. And we present a method for constructing boundary curves network, which consists of cubic Bézier curves. To deal with certain singular cases, the base mesh must be locally subdivided and we proposed an adaptive subdivision strategy for it. An application of our G 1 triangular spline surfaces to the approximation of implicit surfaces is described. The visual quality of this scheme is demonstrated by some examples.  相似文献   
994.
Fully discrete potential-based finite element methods called methods are used to solve a transient eddy current problem in a three-dimensional convex bounded polyhedron. Using methods, fully discrete coupled and decoupled numerical schemes are developed. The existence and uniqueness of solutions for these schemes together with the energy-norm error estimates are provided. To verify the validity of both schemes, some computer simulations are performed for the model from TEAM Workshop Problem 7. This work was supported by Postech BSRI Research Fund-2009, National Basic Research Program of China (2008CB425701), NSFC under the grant 10671025 and the Key Project of Chinese Ministry of Education (No. 107018).  相似文献   
995.
Though cryptography is being used more and more widely in reality, it seems that there exists no scheme or a concatenation of some existing schemes that could deal soundly with such practical situations as providing a clue, where the provider of the clue may want to reserve his beneficial rights while keeping his identity secret. To address this problem, inspired by the two notions of the ring signature and the authenticated encryption signature, we propose a new type of authenticated encryption scheme, which we call the ring authenticated encryption scheme, which can enable any member of a group of persons to provide a clue to some designated recipient wisely.  相似文献   
996.
The trend of digital convergence makes multitasking common in many digital electronic products. Some applications in those systems have inherent real‐time properties, while many others have few or no timeliness requirements. Therefore the embedded Linux kernels, which are widely used in those devices, provide real‐time features in many forms. However, providing real‐time scheduling usually induces throughput degradation in heavy multitasking due to the increased context switches. Usually the throughput degradation becomes a critical problem, since the performance of the embedded processors is generally limited for cost, design and energy efficiency reasons. This paper proposes schemes to lessen the throughput degradation, which is from real‐time scheduling, by suppressing unnecessary context switches and applying real‐time scheduling mechanisms only when it is necessary. Also the suggested schemes enable the complete priority inheritance protocol to prevent the well‐known priority inversion problem. We evaluated the effectiveness of our approach with open‐source benchmarks. By using the suggested schemes, the throughput is improved while the scheduling latency is kept same or better in comparison with the existing approaches. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   
997.
A method of generating modified advancing layers mesh is proposed. In this paper the mesh generation process of semi-unstructured prismatic/tetrahedral mesh is presented for relatively thin three-dimensional geometries with variable thickness, as in the case of injection molding analysis. Prismatic meshes are generated by offsetting initial surface triangular meshes. During the mesh generation process, mesh quality is efficiently improved with the use of a new node relocation method. Finally, tetrahedral meshes are automatically generated in the rest of the domain. The mesh generating capability of the proposed algorithm is demonstrated with the several practical test cases.  相似文献   
998.
In IEEE 802.16 networks, bandwidth request–grant schemes are employed for reducing data collision and supporting various QoS requirements. In this paper, we investigate the impact of such schemes on Best-Effort (BE) traffic. We examine three candidate schemes. In the first scheme, each Subscribe Station (SS) attempts to request bandwidth in every frame to reduce delay. In the second scheme, the number of bandwidth request is limited to avoid collisions in bandwidth request. In the third scheme, a base station allocates bandwidth to each SS based on the measured sending rate without explicit bandwidth request. We quantitatively analyze the performance of these schemes in terms of the collision rate and buffer length. We also present a simulation study to validate our analysis and to observe the impact of these schemes on BE traffic. This paper shows that IEEE 802.16 networks can be effectively managed through appropriate bandwidth request schemes. It is also shown that bandwidth allocation without request can be an alternative for increasing utilization.  相似文献   
999.
The active appearance model (AAM) is a well-known model that can represent a non-rigid object effectively. However, the fitting result is often unsatisfactory when an input image deviates from the training images due to its fixed shape and appearance model. To obtain more robust AAM fitting, we propose a tensor-based AAM that can handle a variety of subjects, poses, expressions, and illuminations in the tensor algebra framework, which consists of an image tensor and a model tensor. The image tensor estimates image variations such as pose, expression, and illumination of the input image using two different variation estimation techniques: discrete and continuous variation estimation. The model tensor generates variation-specific AAM basis vectors from the estimated image variations, which leads to more accurate fitting results. To validate the usefulness of the tensor-based AAM, we performed variation-robust face recognition using the tensor-based AAM fitting results. To do, we propose indirect AAM feature transformation. Experimental results show that tensor-based AAM with continuous variation estimation outperforms that with discrete variation estimation and conventional AAM in terms of the average fitting error and the face recognition rate.  相似文献   
1000.
In this paper, we propose a simple algorithm for detecting scanning worms with high detection rate and low false positive rate. The novelty of our algorithm is inspecting the frequency characteristic of scanning worms instead of counting the number of suspicious connections or packets from a monitored network. Its low complexity allows it to be used on any network-based intrusion detection system as a real-time detection module for high-speed networks.Our algorithm need not be adjusted to network status because its parameters depend on application types, which are generally and widely used in any networks such as web and P2P services. By using real traces, we evaluate the performance of our algorithm and compare it with that of SNORT. The results confirm that our algorithm outperforms SNORT with respect to detection rate and false positive rate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号