全文获取类型
收费全文 | 205736篇 |
免费 | 15372篇 |
国内免费 | 7807篇 |
专业分类
电工技术 | 11244篇 |
技术理论 | 14篇 |
综合类 | 11215篇 |
化学工业 | 35696篇 |
金属工艺 | 10539篇 |
机械仪表 | 11999篇 |
建筑科学 | 16409篇 |
矿业工程 | 4942篇 |
能源动力 | 5849篇 |
轻工业 | 12682篇 |
水利工程 | 3212篇 |
石油天然气 | 11072篇 |
武器工业 | 1345篇 |
无线电 | 25483篇 |
一般工业技术 | 26716篇 |
冶金工业 | 10934篇 |
原子能技术 | 2114篇 |
自动化技术 | 27450篇 |
出版年
2024年 | 881篇 |
2023年 | 3262篇 |
2022年 | 5827篇 |
2021年 | 7927篇 |
2020年 | 5796篇 |
2019年 | 5013篇 |
2018年 | 5414篇 |
2017年 | 6200篇 |
2016年 | 5692篇 |
2015年 | 7290篇 |
2014年 | 9520篇 |
2013年 | 12270篇 |
2012年 | 12224篇 |
2011年 | 13870篇 |
2010年 | 11611篇 |
2009年 | 11460篇 |
2008年 | 10872篇 |
2007年 | 10469篇 |
2006年 | 10857篇 |
2005年 | 9629篇 |
2004年 | 6563篇 |
2003年 | 5777篇 |
2002年 | 5251篇 |
2001年 | 4723篇 |
2000年 | 4868篇 |
1999年 | 5637篇 |
1998年 | 5283篇 |
1997年 | 4351篇 |
1996年 | 3956篇 |
1995年 | 3311篇 |
1994年 | 2768篇 |
1993年 | 2187篇 |
1992年 | 1700篇 |
1991年 | 1277篇 |
1990年 | 1018篇 |
1989年 | 877篇 |
1988年 | 681篇 |
1987年 | 496篇 |
1986年 | 394篇 |
1985年 | 334篇 |
1984年 | 212篇 |
1983年 | 198篇 |
1982年 | 163篇 |
1981年 | 145篇 |
1980年 | 131篇 |
1979年 | 97篇 |
1978年 | 63篇 |
1977年 | 63篇 |
1976年 | 77篇 |
1975年 | 38篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
This paper proposes a general method for dealing with the problem of recovering the low-rank structure, in which the data can be deformed by some unknown transformations and corrupted by sparse or nonsparse noises. Nonconvex penalization method is used to remedy the drawbacks of existing convex penalization method and a quadratic penalty is further used to better tackle the nonsparse noises in the data. We exploits the local linear approximation (LLA) method for turning the resulting nonconvex penalization problem into a series of weighted convex penalization problems and these subproblems are efficiently solved via the augmented Lagrange multiplier (ALM). Besides comparing with the method of robust alignment by sparse and low-rank decomposition for linearly correlated images (RASL), we also propose a nonconvex penalized lowrank and sparse decomposition (NLSD) model as comparison. Numerical experiments are conducted on both controlled and uncontrolled data to demonstrate the outperformance of the proposed method over RASL and NLSD. 相似文献
942.
Transaction processing performance council benchmark C (TPC-C) is the de facto standard for evaluating the performance of high-end computers running on-line transaction processing applications. Differing from other standard benchmarks, the transaction processing performance council only defines specifications for the TPC-C benchmark, but does not provide any standard implementation for end-users. Due to the complexity of the TPC-C workload, it is a challenging task to obtain optimal performance for TPC-C evaluation on a large-scale high-end computer. In this paper, we designed and implemented a large-scale TPC-C evaluation system based on the latest TPC-C specification using solid-state drive (SSD) storage devices. By analyzing the characteristics of the TPC-C workload, we propose a series of system-level optimization methods to improve the TPC-C performance. First, we propose an approach based on SmallFile table space to organize the test data in a round-robin method on all of the disk array partitions; this can make full use of the underlying disk arrays. Second, we propose using a NOOP-based disk scheduling algorithm to reduce the utilization rate of processors and improve the average input/output service time. Third, to improve the system translation lookaside buffer hit rate and reduce the processor overhead, we take advantage of the huge page technique to manage a large amount of memory resources. Lastly, we propose a locality-aware interrupt mapping strategy based on the asymmetry characteristic of non-uniform memory access systems to improve the system performance. Using these optimization methods, we performed the TPC-C test on two large-scale high-end computers using SSD arrays. The experimental results show that our methods can effectively improve the TPC-C performance. For example, the performance of the TPC-C test on an Intel Westmere server reached 1.018 million transactions per minute. 相似文献
943.
Model-based testing can use a model to test a concrete program’s implementation. When the model is changed due to the evolution of the specification, it is important to maintain the test suites up to date, such that it can be used for regression testing. A complete regeneration of the whole test suite from the new model, although inefficient, is still frequently used in practice. To address this problem effectively, we propose a test case reusability analysis technique to identify reusable test cases of the original test suite based on graph analysis, such that we can generate new test cases to cover only the change-related parts of the new model. The Market Information System (MIS) is employed to demonstrate the feasibility and effectiveness of the proposed method. Our experimental results show that the use of our method saves about 31.5% test case generation cost. 相似文献
944.
建立二阶自治广义Birkhoff系统的微分方程.给出该系统的线性化方程,得到该线性方程转化为梯度系统的条件,利用梯度系统的性质对线性系统的奇点进行了分析,然后再利用Perron定理探讨了相应的非线性系统的奇点类型.结果表明,如果线性系统能成为梯度系统,那么相应的非线性系统的奇点可能是结点或者鞍点. 相似文献
945.
The wide availability of affordable RGB-D sensors changes the landscape of indoor scene analysis. Years of research on simultaneous localization and mapping (SLAM) have made it possible to merge multiple RGB-D images into a single point cloud and provide a 3D model for a complete indoor scene. However, these reconstructed models only have geometry information, not including semantic knowledge. The advancements in robot autonomy and capabilities for carrying out more complex tasks in unstructured environments can be greatly enhanced by endowing environment models with semantic knowledge. Towards this goal, we propose a novel approach to generate 3D semantic maps for an indoor scene. Our approach creates a 3D reconstructed map from a RGB-D image sequence firstly, then we jointly infer the semantic object category and structural class for each point of the global map. 12 object categories (e.g. walls, tables, chairs) and 4 structural classes (ground, structure, furniture and props) are labeled in the global map. In this way, we can totally understand both the object and structure information. In order to get semantic information, we compute semantic segmentation for each RGB-D image and merge the labeling results by a Dense Conditional Random Field. Different from previous techniques, we use temporal information and higher-order cliques to enforce the label consistency for each image labeling result. Our experiments demonstrate that temporal information and higher-order cliques are significant for the semantic mapping procedure and can improve the precision of the semantic mapping results. 相似文献
946.
Xiao Liu Kaoru Ota Anfeng Liu Zhigang Chen 《Peer-to-Peer Networking and Applications》2016,9(4):692-711
Crowd sensing networks can be used for large scale sensing of the physical world or other information service by leveraging the available sensors on the phones. The collector hopes to collect as much as sensed data at relatively low cost. However, the sensing participants want to earn much money at low cost. This paper examines the evolutionary process among participants sensing networks and proposes an evolutionary game model to depict collaborative game phenomenon in the crowd sensing networks based on the principles of game theory in economics. A effectively incentive mechanism is established through corrected the penalty function of the game model accordance with the cooperation rates of the participant, and corrected the game times in accordance with it’s payoff. The collector controls the process of game by adjusting the price function. We find that the proposed incentive game based evolutionary model can help decision makers simulate evolutionary process under various scenarios. The crowd sensing networks structure significantly influence cooperation ratio and the total number of participant involved in the game, and the distribution of population with different game strategy. Through evolutionary game model, the manager can select an optimal price to facilitate the system reach equilibrium state quickly, and get the number of participants involved in the game. The incentive game based evolutionary model in crowd sensing networks provides valuable decision-making support to managers. 相似文献
947.
Meiyu Huang Yiqiang Chen Bo-Wei Chen Junfa Liu Seungmin Rho Wen Ji 《Peer-to-Peer Networking and Applications》2016,9(5):864-875
With the proliferation of healthcare data, the cloud mining technology for E-health services and applications has become a hot research topic. While on the other hand, these rapidly evolving cloud mining technologies and their deployment in healthcare systems also pose potential threats to patient’s data privacy. In order to solve the privacy problem in the cloud mining technique, this paper proposes a semi-supervised privacy-preserving clustering algorithm. By employing a small amount of supervised information, the method first learns a Large Margin Nearest Cluster metric using convex optimization. Then according to the trained metric, the method imposes multiplicative perturbation on the original data, which can change the distribution shape of the original data and thus protect the privacy information as well as ensuring high data usability. The experimental results on the brain fiber dataset provided by the 2009 PBC demonstrated that the proposed method could not only protect data privacy towards secure attacks, but improve the clustering purity. 相似文献
948.
949.
Hui Zhao Dan-yang Wang Chao-qing Tang Ya-ping Liu Gao-feng Pan Ting-ting Li Yun-fei Chen 《浙江大学学报:C卷英文版》2016,17(9):929-937
We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with M (M ≥ 1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N (N ≥ 1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability. 相似文献
950.
A co-location pattern is a set of spatial features whose instances frequently appear in a spatial neighborhood. This paper efficiently mines the top-k probabilistic prevalent co-locations over spatially uncertain data sets and makes the following contributions: 1) the concept of the top-k probabilistic prevalent co-locations based on a possible world model is defined; 2) a framework for discovering the top-k probabilistic prevalent co-locations is set up; 3) a matrix method is proposed to improve the computation of the prevalence probability of a top-k candidate, and two pruning rules of the matrix block are given to accelerate the search for exact solutions; 4) a polynomial matrix is developed to further speed up the top-k candidate refinement process; 5) an approximate algorithm with compensation factor is introduced so that relatively large quantity of data can be processed quickly. The efficiency of our proposed algorithms as well as the accuracy of the approximation algorithms is evaluated with an extensive set of experiments using both synthetic and real uncertain data sets. 相似文献