全文获取类型
收费全文 | 2988篇 |
免费 | 73篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 36篇 |
综合类 | 3篇 |
化学工业 | 636篇 |
金属工艺 | 34篇 |
机械仪表 | 34篇 |
建筑科学 | 197篇 |
矿业工程 | 21篇 |
能源动力 | 62篇 |
轻工业 | 160篇 |
水利工程 | 27篇 |
石油天然气 | 48篇 |
无线电 | 170篇 |
一般工业技术 | 384篇 |
冶金工业 | 815篇 |
原子能技术 | 19篇 |
自动化技术 | 418篇 |
出版年
2022年 | 27篇 |
2021年 | 35篇 |
2019年 | 34篇 |
2018年 | 36篇 |
2017年 | 54篇 |
2016年 | 48篇 |
2015年 | 42篇 |
2014年 | 42篇 |
2013年 | 179篇 |
2012年 | 71篇 |
2011年 | 104篇 |
2010年 | 83篇 |
2009年 | 93篇 |
2008年 | 105篇 |
2007年 | 109篇 |
2006年 | 95篇 |
2005年 | 110篇 |
2004年 | 74篇 |
2003年 | 96篇 |
2002年 | 68篇 |
2001年 | 74篇 |
2000年 | 51篇 |
1999年 | 64篇 |
1998年 | 97篇 |
1997年 | 65篇 |
1996年 | 69篇 |
1995年 | 45篇 |
1994年 | 40篇 |
1993年 | 40篇 |
1992年 | 38篇 |
1991年 | 32篇 |
1990年 | 53篇 |
1989年 | 46篇 |
1988年 | 47篇 |
1987年 | 52篇 |
1986年 | 35篇 |
1985年 | 49篇 |
1984年 | 39篇 |
1983年 | 35篇 |
1982年 | 37篇 |
1981年 | 32篇 |
1980年 | 26篇 |
1979年 | 34篇 |
1978年 | 34篇 |
1977年 | 31篇 |
1976年 | 50篇 |
1975年 | 30篇 |
1974年 | 33篇 |
1973年 | 42篇 |
1972年 | 23篇 |
排序方式: 共有3064条查询结果,搜索用时 15 毫秒
71.
Nishant Doshi Saru Kumari Dheerendra Mishra Xiong Li Kim-Kwang Raymond Choo Arun Kumar Sangaiah 《Multimedia Tools and Applications》2017,76(24):25893-25918
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems. 相似文献
72.
Spacecraft formation reconfiguration with collision avoidance 总被引:1,自引:0,他引:1
In this paper we present a behavioral control solution for reconfiguration of a spacecraft formation using the Null-Space Based (NSB) concept. The solution is task based, and aims to reconfigure and maintain a rigid formation while avoiding collisions between spacecraft. A model of relative translation is derived, together with a passivity-based sliding surface controller which globally stabilizes the equilibrium point of the closed-loop system. The NSB control method is implemented by giving each task different priorities and then calculating desired velocity and a Jacobian matrix for each spacecraft and each task. The velocity vector for each task is then projected into the null-space for higher prioritized tasks to remove conflicting velocity components. Simulation results are presented, showing that each spacecraft moves into the predefined formation without breaking any rules for the higher priority tasks, and all collisions are avoided. 相似文献
73.
Deepak Kapur Victor L. Winter Raymond S. Berg 《Electronic Notes in Theoretical Computer Science》2001,50(1)
The use of formal methods for analyzing and synthesizing a controller for a multi-train multi-track railway system is discussed. The research was motivated by a case study involving the Bay Area Rapid Transit (BART) system. The overall goal is to design a train acceleration control function that enables trains to be safely placed but also increases system throughput. The use of a modeling language for specifying safety properties and a control function is illustrated. The program transformation methodology supported in the HATS system is employed to generate an efficient implementation from a high-level specification of a controller. This implementation can then be used to simulate the controller behavior, thus further enhancing confidence in the design. Properties of optimization transformations can be verified using an rewrite-rule based induction theorem prover Rewrite Rule Laboratory (RRL). 相似文献
74.
75.
Li Jiuyong Wong Raymond Chi-Wing Fu Ada Wai-Chee Pei Jian 《Knowledge and Data Engineering, IEEE Transactions on》2008,20(9):1181-1194
Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. Among a number of k-anonymisation schemes, local recoding methods are promising for minimising the distortion of a k-anonymity view. This paper addresses two major issues in local recoding k-anonymisation in attribute hierarchical taxonomies. Firstly, we define a proper distance metric to achieve local recoding generalisation with small distortion. Secondly, we propose a means to control the inconsistency of attribute domains in a generalised view by local recoding. We show experimentally that our proposed local recoding method based on the proposed distance metric produces higher quality k-anonymity tables in three quality measures than a global recoding anonymisation method, Incognito, and a multidimensional recoding anonymisation method, Multi. The proposed inconsistency handling method is able to balance distortion and consistency of a generalised view. 相似文献
76.
Jian-Feng Cai Raymond H. Chan Carmine Di Fiore 《Journal of Mathematical Imaging and Vision》2007,29(1):79-91
Recently, a powerful two-phase method for restoring images corrupted with high level impulse noise has been developed. The
main drawback of the method is the computational efficiency of the second phase which requires the minimization of a non-smooth
objective functional. However, it was pointed out in (Chan et al. in Proc. ICIP 2005, pp. 125–128) that the non-smooth data-fitting
term in the functional can be deleted since the restoration in the second phase is applied to noisy pixels only. In this paper,
we study the analytic properties of the resulting new functional ℱ. We show that ℱ, which is defined in terms of edge-preserving
potential functions φ
α
, inherits many nice properties from φ
α
, including the first and second order Lipschitz continuity, strong convexity, and positive definiteness of its Hessian. Moreover,
we use these results to establish the convergence of optimization methods applied to ℱ. In particular, we prove the global
convergence of some conjugate gradient-type methods and of a recently proposed low complexity quasi-Newton algorithm. Numerical
experiments are given to illustrate the convergence and efficiency of the two methods.
相似文献
Carmine Di FioreEmail: |
77.
78.
H.V. Jagadish Olga Kapitskaia Raymond T. Ng Divesh Srivastava 《The VLDB Journal The International Journal on Very Large Data Bases》2000,9(3):214-230
With the increasing importance of XML, LDAP directories, and text-based information sources on the Internet, there is an
ever-greater need to evaluate queries involving (sub)string matching. In many cases, matches need to be on multiple attributes/dimensions,
with correlations between the multiple dimensions. Effective query optimization in this context requires good selectivity
estimates. In this paper, we use pruned count-suffix trees (PSTs) as the basic data structure for substring selectivity estimation.
For the 1-D problem, we present a novel technique called MO (Maximal Overlap). We then develop and analyze two 1-D estimation
algorithms, MOC and MOLC, based on MO and a constraint-based characterization of all possible completions of a given PST.
For the k-D problem, we first generalize PSTs to multiple dimensions and develop a space- and time-efficient probabilistic algorithm
to construct k-D PSTs directly. We then show how to extend MO to multiple dimensions. Finally, we demonstrate, both analytically and experimentally,
that MO is both practical and substantially superior to competing algorithms.
Received April 28, 2000 / Accepted July 11, 2000 相似文献
79.
Colin Harris Raymond Tedstrom Murray S. Daw Michael J. Mills 《Computational Materials Science》2006,37(4):462-469
We present a systematic microscopic approach to diffusion and diffusion-limited processes in Ni3Al. These processes have been identified as controlling the deformation of the material under specific circumstances. The embedded atom method calculations are done using kinetic Monte Carlo combined with the Dimer method of finding saddlepoints. We compute the tracer diffusivities as functions of composition and temperature. The comparison with available experiments is good. We find that at temperatures below about 1000 K, the diffusivity is a sharp function of composition, showing a pronounced dip on the Ni-rich side at 76 at.% Ni. This agrees well with experiment, except that the experiments show this structure setting in a temperatures below about 1300 K. We show that the structure arises from the composition dependence of both the vacancy formation energy and pre-exponential of the diffusivity. We also compute the mobility of an anti-phase boundary perpendicular to its plane, and conclude that vacancy-assistance is very plausible. We conclude that the kMC + Dimer method works well for these problems above 700 K but less effectively below, owing to the presence of short-range, low-energy hops that tend to localize the vacancy and lower the efficiency of the calculation. 相似文献
80.
Knee C. Raymond; Lonsbary Cynthia; Canevello Amy; Patrick Heather 《Canadian Metallurgical Quarterly》2005,89(6):997
Four studies examined associations between E. L. Deci and R. M. Ryan's (1985, 2000) construct of autonomy, responses to relationship disagreements, and dissatisfaction after conflict. In Study 1, diary data showed that trait autonomy predicted relationship autonomy, which in turn predicted relative satisfaction after disagreements. In Study 2, trait autonomy predicted relationship autonomy, which was associated with less defensive and more understanding responses to conflict. Studies 3 and 4 examined whether one's partner's relationship autonomy uniquely predicted reported and observed behavior during conflict. Autonomous reasons for being in the relationship (of both self and partner) predicted both reported and observed responses to conflict and feelings of satisfaction. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献