全文获取类型
收费全文 | 53805篇 |
免费 | 4150篇 |
国内免费 | 1970篇 |
专业分类
电工技术 | 2681篇 |
技术理论 | 5篇 |
综合类 | 3408篇 |
化学工业 | 9596篇 |
金属工艺 | 2956篇 |
机械仪表 | 3197篇 |
建筑科学 | 4092篇 |
矿业工程 | 1434篇 |
能源动力 | 1393篇 |
轻工业 | 3320篇 |
水利工程 | 836篇 |
石油天然气 | 3532篇 |
武器工业 | 381篇 |
无线电 | 6061篇 |
一般工业技术 | 7020篇 |
冶金工业 | 2654篇 |
原子能技术 | 666篇 |
自动化技术 | 6693篇 |
出版年
2024年 | 180篇 |
2023年 | 792篇 |
2022年 | 1232篇 |
2021年 | 1896篇 |
2020年 | 1485篇 |
2019年 | 1264篇 |
2018年 | 1451篇 |
2017年 | 1679篇 |
2016年 | 1440篇 |
2015年 | 1921篇 |
2014年 | 2425篇 |
2013年 | 3050篇 |
2012年 | 3215篇 |
2011年 | 3543篇 |
2010年 | 3006篇 |
2009年 | 2804篇 |
2008年 | 2810篇 |
2007年 | 2652篇 |
2006年 | 2892篇 |
2005年 | 2705篇 |
2004年 | 1782篇 |
2003年 | 1576篇 |
2002年 | 1463篇 |
2001年 | 1262篇 |
2000年 | 1524篇 |
1999年 | 1722篇 |
1998年 | 1399篇 |
1997年 | 1250篇 |
1996年 | 1165篇 |
1995年 | 999篇 |
1994年 | 780篇 |
1993年 | 587篇 |
1992年 | 462篇 |
1991年 | 359篇 |
1990年 | 278篇 |
1989年 | 240篇 |
1988年 | 197篇 |
1987年 | 106篇 |
1986年 | 92篇 |
1985年 | 64篇 |
1984年 | 34篇 |
1983年 | 19篇 |
1982年 | 41篇 |
1981年 | 25篇 |
1980年 | 20篇 |
1979年 | 8篇 |
1978年 | 4篇 |
1977年 | 9篇 |
1976年 | 6篇 |
1970年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Yuwei Wang Yuanchun Zhou Ying Liu Ze Luo Danhuai Guo Jing Shao Fei Tan Liang Wu Jianhui Li Baoping Yan 《Frontiers of Computer Science》2013,7(4):475-485
Advanced satellite tracking technologies provide biologists with long-term location sequence data to understand movement of wild birds then to find explicit correlation between dynamics of migratory birds and the spread of avian influenza. In this paper, we propose a hierarchical clustering algorithm based on a recursive grid partition and kernel density estimation (KDE) to hierarchically identify wild bird habitats with different densities. We hierarchically cluster the GPS data by taking into account the following observations: 1) the habitat variation on a variety of geospatial scales; 2) the spatial variation of the activity patterns of birds in different stages of the migration cycle. In addition, we measure the site fidelity of wild birds based on clustering. To assess effectiveness, we have evaluated our system using a large-scale GPS dataset collected from 59 birds over three years. As a result, our approach can identify the hierarchical habitats and distribution of wild birds more efficiently than several commonly used algorithms such as DBSCAN and DENCLUE. 相似文献
992.
To prepare the coherent population trapping (CPT) states with rubidium and cesium, the commonly used atoms in CPT studies, a coherent bi-chromatic light field with frequency difference of several GHz is a basic requirement. With a 200 MHz center frequency acousto-optic modulator (AOM), we have realized bi-chromatic laser fields with several GHz frequency splits through high diffraction orders. We have experimentally studied the coherence between two frequency components of a bi-chromatic laser beam, which is composed of ±6 orders with frequency split of 3 GHz diffracted from the same laser beam, and the measured residual phase noise is Δφ(2)<0.019 rad(2). The bi-chromatic laser fields were used to prepare CPT states with (85)Rb and (87)Rb atoms, and high contrast CPT signals were obtained. For CPT states preparation, our study result shows that it is a feasible approach to generate the bi-chromatic light field with larger frequency splits through high diffraction orders of AOM. 相似文献
993.
信息化时代要求信息公开和透明,这就对信息安全的管理提出了更高的要求。信息公开的安全性成为当今社会亟待解决的一大难题,网络安全的建设势在必行。为了更好地监督政府的工作就要进行信息公开,在政府信息公开的过程中一定要保证网络运行的安全。 相似文献
994.
罗孝骞 《网络安全技术与应用》2013,(11):5-6
随着网络技术的不断发展,计算机技术在各领域得到了广泛的开发和利用.而远程监控系统因具有网络化和信息化以及直观方便的特点,被应用于许多领域,如远程协助、远程教学、远程办公等现代远程技术.本人将对计算机网络远程监控系统在代表性领域的应用以及前景情作了分析和研究. 相似文献
995.
谷岩 《网络安全技术与应用》2013,(12):14-14,16
本文主要从Moodle平台的特点以及高职院校信息化教学中存在的问题展开,在做了详细的需求分析的前提下,对教学方案的实施效果和存在的问题进行了分析和总结,指出必须确立"教育的最终结果,就是培养一个独立的学习者"的目标,同时加强师生互动交流和自主学习能力建设,才能构建科学合理的符合网络教学规律的教学方案。 相似文献
996.
A new signal analysis method, known as Lv distribution (LVD), has been reported recently to provide improved estimation accuracy of centroid frequency and chirp rate. In this paper, performances of the LVD on signal concentration, detection, representation errors and computational complexity are discussed and compared with polynomial Fourier transform (PFT) and fractional Fourier transform (FrFT). Based on the results of our theoretical analysis and Monte Carlo simulations, it is shown that the LVD achieves desirable performance improvement compared with those achieved by other methods. By using the accurate estimation of chirp rate provided by the LVD, the performance of local polynomial periodogram (LPP) is investigated. Comparisons with other time–frequency representations, such as the inverse LVD (ILVD) and the PFT-based LPP, are made on signal concentration in the time–frequency domain. 相似文献
997.
Reversible watermarking can be applied to the protection for important digital media, such as medical and military image, it allows the watermark to be extracted and the original image to be restored completely, but reversible watermarking with stronger robustness is seldom discussed in existing literature. In this paper, a novel reversible watermarking algorithm based on chaotic system is proposed; chaotic system is not only used to search space of reversibility of the scheme, but also used to randomly select the position of watermarking embedding. Consequently, the proposed scheme achieves larger threshold space of reversibility and better performance of security. For some specific thresholds, the proposed algorithm is not only reversible, but also has stronger robustness against image compression. The experimental results show that the ergodicity and sensitivity to initial values of chaotic system play an important role in reversible watermarking algorithm, and the proposed scheme can achieve balance between reversibility and robustness with the help of chaotic system. 相似文献
998.
X. Chen H. He G. Zou X. Zhang X. Gu J. Hua 《Computer Vision and Image Understanding》2013,117(9):1107-1118
This paper presents an improved Euclidean Ricci flow method for spherical parameterization. We subsequently invent a scale space processing built upon Ricci energy to extract robust surface features for accurate surface registration. Since our method is based on the proposed Euclidean Ricci flow, it inherits the properties of Ricci flow such as conformality, robustness and intrinsicalness, facilitating efficient and effective surface mapping. Compared with other surface registration methods using curvature or sulci pattern, our method demonstrates a significant improvement for surface registration. In addition, Ricci energy can capture local differences for surface analysis as shown in the experiments and applications. 相似文献
999.
Xiaogang Wang Ming Yang Junzhou Luo 《Journal of Network and Computer Applications》2013,36(6):1660-1670
Network watermarking schemes have been proposed to trace secret network attack flows transferred through stepping stones as well as anonymous channels. However, most existing network flow watermark detection techniques focus on a fixed sample size of network data to achieve the required accuracy. Irrespective of the uncertainty or information content of successive observations, such detection techniques will result in low efficiency of watermark detection. We herein propose a novel sequential watermark detection model (SWDM) supporting three sequential detectors for efficient traceback of network attack flows. By exploiting the sequential probability ratio test approach, we first propose the intuitive paired-intervals-based optimum watermark detector (POWD) and the single-interval-based optimum watermark detector (SOWD) under the assumption of known parameters of the observed attack flow. We then propose the sequential sign watermark detector (SSWD) that operates on two-level quantized observations for nonparametric watermark detection. Based on our SWDM model, a statistical analysis of sequential detectors, with no assumptions or limitations concerning the distribution of the timing of packets, proves their effectiveness despite traffic timing perturbations. The experiments using a large number of synthetically-generated SSH traffic flows demonstrate that there is a significant advantage in using our sequential watermark detectors based on the proposed SWDM model over the existing fixed sample size watermark detector (FSWD). Compared to the FSWD detector, the POWD detector achieves almost 28% savings in the average number of packets. Especially, given the required probability of detection errors, the SOWD detector and the SSWD detector can achieve almost 47% and 29% savings, respectively, in the average number of required packets, thus resulting in not only guaranteed rates of detection errors but also high efficiency of flow traceback. 相似文献
1000.
Dujuan Gu Xiaohan Liu Gang Qin Shuangjian Yan Ze luo Baoping Yan 《Journal of Network and Computer Applications》2013,36(6):1579-1588
The scarcity of IPv4 makes IPv6 deployment critical for all network-based applications. However, the big issue of IPv6 is that we lack real applications that are based on IPv6. The application demands for flexibility, availability and management are hard to be met by the current network. Hence, it has become extremely urgent how IPv6 network can be tailored to meet the application specified requirements. In order to address the need, we propose IPv6 virtual network architecture (VNET6) to help to accelerate the momentum of IPv6 deployment. VNET6 differs from other proposed architectures. It supports incremental network evolution with the virtual collaboration environment, which has distinct features including flexible service provision, reliable service entity, end-to-end flow management and ubiquitous access. The collaboration mode provides the bidirectional interaction between applications and networks via intent-based interfaces. IPv6 provides feasibility for the deployment of the virtual environment and the IPv6 critical protocols are employed in VNET6. Our initial prototype study and comparative analysis demonstrate that VNET6 can be adapted to meet the specific application requirements. 相似文献