全文获取类型
收费全文 | 18172篇 |
免费 | 468篇 |
国内免费 | 18篇 |
专业分类
电工技术 | 240篇 |
综合类 | 9篇 |
化学工业 | 3590篇 |
金属工艺 | 281篇 |
机械仪表 | 311篇 |
建筑科学 | 1101篇 |
矿业工程 | 109篇 |
能源动力 | 505篇 |
轻工业 | 1384篇 |
水利工程 | 158篇 |
石油天然气 | 194篇 |
武器工业 | 1篇 |
无线电 | 1083篇 |
一般工业技术 | 2882篇 |
冶金工业 | 4197篇 |
原子能技术 | 163篇 |
自动化技术 | 2450篇 |
出版年
2022年 | 139篇 |
2021年 | 216篇 |
2020年 | 170篇 |
2019年 | 224篇 |
2018年 | 267篇 |
2017年 | 261篇 |
2016年 | 321篇 |
2015年 | 240篇 |
2014年 | 380篇 |
2013年 | 1103篇 |
2012年 | 663篇 |
2011年 | 870篇 |
2010年 | 676篇 |
2009年 | 664篇 |
2008年 | 861篇 |
2007年 | 874篇 |
2006年 | 686篇 |
2005年 | 721篇 |
2004年 | 559篇 |
2003年 | 570篇 |
2002年 | 512篇 |
2001年 | 330篇 |
2000年 | 303篇 |
1999年 | 305篇 |
1998年 | 320篇 |
1997年 | 304篇 |
1996年 | 303篇 |
1995年 | 335篇 |
1994年 | 270篇 |
1993年 | 307篇 |
1992年 | 274篇 |
1991年 | 165篇 |
1990年 | 238篇 |
1989年 | 285篇 |
1988年 | 206篇 |
1987年 | 215篇 |
1986年 | 212篇 |
1985年 | 265篇 |
1984年 | 258篇 |
1983年 | 227篇 |
1982年 | 217篇 |
1981年 | 220篇 |
1980年 | 173篇 |
1979年 | 187篇 |
1978年 | 177篇 |
1977年 | 177篇 |
1976年 | 149篇 |
1975年 | 180篇 |
1974年 | 165篇 |
1973年 | 133篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
Richard O. Sinnott Christopher Bayliss Andrew Bromage Gerson Galang Yikai Gong Philip Greenwood Glenn Jayaputera Davis Marques Luca Morandini Ghazal Nogoorani Hossein Pursultani Muhammad Sarwar William Voorsluys Ivo Widjaja 《Journal of Grid Computing》2016,14(4):603-618
Big data technologies and a range of Government open data initiatives provide the basis for discovering new insights into cities; how they are planned, how they managed and the day-to-day challenges they face in health, transport and changing population profiles. The Australian Urban Research Infrastructure Network (AURIN – www.aurin.org.au) project is one example of such a big data initiative that is currently running across Australia. AURIN provides a single gateway providing online (live) programmatic access to over 2000 data sets from over 70 major and typically definitive data-driven organizations across federal and State government, across industry and across academia. However whilst open (public) data is useful to bring data-driven intelligence to cities, more often than not, it is the data that is not-publicly accessible that is essential to understand city challenges and needs. Such sensitive (unit-level) data has unique requirements on access and usage to meet the privacy and confidentiality demands of the associated organizations. In this paper we highlight a novel geo-privacy supporting solution implemented as part of the AURIN project that provides seamless and secure access to individual (unit-level) data from the Department of Health in Victoria. We illustrate this solution across a range of typical city challenges in localized contexts around Melbourne. We show how unit level data can be combined with other data in a privacy-protecting manner. Unlike other secure data access and usage solutions that have been developed/deployed, the AURIN solution allows any researcher to access and use the data in a manner that meets all of the associated privacy and confidentiality concerns, without obliging them to obtain ethical approval or any other hurdles that are normally put in place on access to and use of sensitive data. This provides a paradigm shift in secure access to sensitive data with geospatial content. 相似文献
992.
993.
994.
Abstract This paper reports on some interesting experiments performed on a simulated model of a living cell. The basic model is that of Weinberg [35] and the underlying techniques employed are described by Zeigler and Weinberg [41]. The cell was subjected to step changes in its nutrient environment. 相似文献
995.
Richard I. Polis 《Cryptologia》2013,37(4):234-239
The needs for security of information (in computer systems, on telecommunications and on media) are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is, however, quite varied; attitudes towards the best methods for satisfying the needs are even more varied. The situation with respect to these needs and attitudes is described for the major countries of Western Europe. The official and unofficial attitudes towards policy and regulation of information security technology (particularly cryptology) is also described for these countries. In particular, it is clear that, with a very few exceptions, neither official nor unofficial policy level organizations are prepared to follow the position advocated by the U.S. Government in such matters. 相似文献
996.
In this paper, we introduce a new class of queueing networks called arrival first networks. We characterise its transition rates and derive the relationship between arrival rules, linear partial balance equations, and product form stationary distributions. This model is motivated by production systems operating under a kanban protocol. In contrast with the conventional departure first networks, where a transition is initiated by service completion of items at the originating nodes that are subsequently routed to the destination nodes (push system), in an arrival first network a transition is initiated by the destination nodes of the items and subsequently those items are processed at and removed from the originating nodes (pull system). These are similar to the push and pull systems in manufacturing systems.
Our characterisation provides necessary and sufficient conditions for the network to possess linear traffic equations, and sufficient conditions for the network to have a product form stationary distribution. We apply our results to networks operating under a kanban mechanism and characterise the rate at which items are pulled as well as the routing and blocking protocols that give rise to a product form stationary distribution. 相似文献
997.
998.
Fault tolerance and safety verification of control systems are essential for the success of autonomous robotic systems. A control architecture called Mission Data System (MDS), developed at the Jet Propulsion Laboratory, addresses these needs with a goal-based control approach. In this paper, a software algorithm for converting goal network control systems into linear hybrid systems is described. The conversion process is a bisimulation; the resulting linear hybrid system can be verified for safety in the presence of failures using existing symbolic model checkers, and thus the original goal network is verified. A moderately complex example goal network control system is converted to a linear hybrid system using the automatic conversion software that is based on the bisimulation and then is verified. 相似文献
999.
Multicamera people tracking with a probabilistic occupancy map 总被引:1,自引:0,他引:1
Fleuret F Berclaz J Lengagne R Fua P 《IEEE transactions on pattern analysis and machine intelligence》2008,30(2):267-282
Given two to four synchronized video streams taken at eye level and from different angles, we show that we can effectively combine a generative model with dynamic programming to accurately follow up to six individuals across thousands of frames in spite of significant occlusions and lighting changes. In addition, we also derive metrically accurate trajectories for each one of them.Our contribution is twofold. First, we demonstrate that our generative model can effectively handle occlusions in each time frame independently, even when the only data available comes from the output of a simple background subtraction algorithm and when the number of individuals is unknown a priori. Second, we show that multi-person tracking can be reliably achieved by processing individual trajectories separately over long sequences, provided that a reasonable heuristic is used to rank these individuals and avoid confusing them with one another. 相似文献
1000.
Mosaliganti K Cooper L Sharp R Machiraju R Leone G Huang K Saltz J 《IEEE transactions on visualization and computer graphics》2008,14(4):863-876
Developments in optical microscopy imaging have generated large high-resolution data sets that have spurred medical researchers to conduct investigations into mechanisms of disease, including cancer at cellular and subcellular levels. The work reported here demonstrates that a suitable methodology can be conceived that isolates modality-dependent effects from the larger segmentation task and that 3D reconstructions can be cognizant of shapes as evident in the available 2D planar images. In the current realization, a method based on active geodesic contours is first deployed to counter the ambiguity that exists in separating overlapping cells on the image plane. Later, another segmentation effort based on a variant of Voronoi tessellations improves the delineation of the cell boundaries using a Bayesian formulation. In the next stage, the cells are interpolated across the third dimension thereby mitigating the poor structural correlation that exists in that dimension. We deploy our methods on three separate data sets obtained from light, confocal, and phase-contrast microscopy and validate the results appropriately. 相似文献