全文获取类型
收费全文 | 4841篇 |
免费 | 136篇 |
国内免费 | 22篇 |
专业分类
电工技术 | 90篇 |
综合类 | 5篇 |
化学工业 | 730篇 |
金属工艺 | 84篇 |
机械仪表 | 85篇 |
建筑科学 | 162篇 |
矿业工程 | 33篇 |
能源动力 | 86篇 |
轻工业 | 362篇 |
水利工程 | 20篇 |
石油天然气 | 13篇 |
无线电 | 806篇 |
一般工业技术 | 681篇 |
冶金工业 | 1226篇 |
原子能技术 | 52篇 |
自动化技术 | 564篇 |
出版年
2021年 | 42篇 |
2020年 | 34篇 |
2019年 | 36篇 |
2018年 | 57篇 |
2017年 | 42篇 |
2016年 | 55篇 |
2015年 | 48篇 |
2014年 | 79篇 |
2013年 | 276篇 |
2012年 | 129篇 |
2011年 | 170篇 |
2010年 | 120篇 |
2009年 | 159篇 |
2008年 | 148篇 |
2007年 | 191篇 |
2006年 | 168篇 |
2005年 | 151篇 |
2004年 | 128篇 |
2003年 | 145篇 |
2002年 | 113篇 |
2001年 | 103篇 |
2000年 | 95篇 |
1999年 | 135篇 |
1998年 | 368篇 |
1997年 | 246篇 |
1996年 | 166篇 |
1995年 | 148篇 |
1994年 | 124篇 |
1993年 | 117篇 |
1992年 | 77篇 |
1991年 | 75篇 |
1990年 | 66篇 |
1989年 | 53篇 |
1988年 | 62篇 |
1987年 | 40篇 |
1986年 | 42篇 |
1985年 | 43篇 |
1984年 | 38篇 |
1983年 | 45篇 |
1982年 | 47篇 |
1981年 | 48篇 |
1980年 | 44篇 |
1979年 | 40篇 |
1978年 | 31篇 |
1977年 | 59篇 |
1976年 | 54篇 |
1975年 | 45篇 |
1974年 | 21篇 |
1973年 | 25篇 |
1972年 | 32篇 |
排序方式: 共有4999条查询结果,搜索用时 312 毫秒
131.
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing
solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was
a proposal that attempted to reduce the trust of the PKG by allowing a malicious PKG to be caught if he reveals the user’s
identity-based private key illegally. Nonetheless, the proposal does not consider that the PKG can simply decrypt the ciphertext
instead of revealing the private key itself (in the case of identity-based encryption schemes). The aim of this paper is to
present an escrow-free identity-based signature (IBS) scheme, in which the malicious PKG will be caught if it releases a signature
on behalf of the user but signed by itself. We present a formal model to capture such a scheme and provide a concrete construction. 相似文献
132.
随机采样的2DPCA人脸识别方法 总被引:1,自引:0,他引:1
在2DPCA的基础上提出一种随机采样的2DPCA人脸识别方法--RRS-2DPCA.同传统通过对特征或投影向量进行采样的方法不同的是,RRS-2DPCA(Row Random Sampling 2DPCA)将随机采样建立于图像的行向量集中,然后在行向量子集中执行2DPCA.在ORL、Yale和AR人脸数据集上进行实验,结果表明RRS-2DPCA不仅具很好的识别性能和运算效率,而且对参数具有很大的稳定性.另外针对2DPCA和RRS-2DPCA对光线、遮挡等不鲁棒问题,进一步提出了局部区域随机采样的2DPCA方法LRRS-2DPCA(Local Row Random Sampling 2DPCA),将RRS-2DPCA执行在人脸图像的局部区域中.实验结果表明LRRS-2DPCA不仅具有较好的鲁棒性更大大的提高了RRS-2DPCA的识别性能. 相似文献
133.
Most empirical investigations of the business cycles in the United States have excluded the dimension of asymmetric conditional volatility. This paper analyses the volatility dynamics of the US business cycle by comparing the performance of various multivariate generalised autoregressive conditional heteroskedasticity (GARCH) models. In particular, we propose two bivariate GARCH models to examine the evidence of volatility asymmetry and time-varying correlations concurrently, and then apply the proposed models to five sectors of Industrial Production of the United States. Our findings provide strong evidence of asymmetric conditional volatility in all sectors, and some support of time-varying correlations in various sectoral pairs. This has important policy implications for government to consider the effective countercyclical measures during recessions. 相似文献
134.
Hai-Yin Xu Author Vitae Hon Yuen Tam Author Vitae Author Vitae Li’an Hu Author Vitae 《Computer aided design》2009,41(6):432-440
The intersecting path is an important tool path generation method. This paper proposes an approach for the quart-parametric interpolation of intersecting paths. The objective of our approach is that the intersecting paths for surface machining can be directly interpolated within the computer numerical control (CNC) system. This enables the CNC interpolator to process the intersecting paths without geometric approximation as in existing approaches and take into consideration any specific feedrate profiles and further machining dynamical issues along the path.The interpolation of the intersection of two general parametric surfaces is transferred into interpolation of its projection curves and the time trajectories of four parameters along the intersecting curves are obtained. Our strategy is to carry out the quart-parametric interpolation based on the projection interpolation. The feedrate control method is developed, and then the interpolation algorithms for two projection curves are proposed. An error reduction scheme is presented to alleviate point deviation from the drive parametric surface. Simulations of quart-parametric interpolation have been carried out to verify the effectiveness of the proposed algorithm. 相似文献
135.
This paper develops a framework for the consideration of internal markets as an alternative to information systems (IS) outsourcing. It is based on an assessment of the pros and cons of both outsourcing and of insourcing based on the internal markets approach. It is formulated in terms of the operational, tactical, and strategic impacts of the choice among the alternatives. The framework, and the propositions that are developed from it, should be useful both for researchers, who can use it for developing testable research hypotheses, and for practitioners, who may use it as a basis for developing a comprehensive set of criteria for the evaluation of these sourcing options. 相似文献
136.
In this paper, we propose a novel large margin classifier, called the maxi-min margin machine M(4). This model learns the decision boundary both locally and globally. In comparison, other large margin classifiers construct separating hyperplanes only either locally or globally. For example, a state-of-the-art large margin classifier, the support vector machine (SVM), considers data only locally, while another significant model, the minimax probability machine (MPM), focuses on building the decision hyperplane exclusively based on the global information. As a major contribution, we show that SVM yields the same solution as M(4) when data satisfy certain conditions, and MPM can be regarded as a relaxation model of M(4). Moreover, based on our proposed local and global view of data, another popular model, the linear discriminant analysis, can easily be interpreted and extended as well. We describe the M(4) model definition, provide a geometrical interpretation, present theoretical justifications, and propose a practical sequential conic programming method to solve the optimization problem. We also show how to exploit Mercer kernels to extend M(4) for nonlinear classifications. Furthermore, we perform a series of evaluations on both synthetic data sets and real-world benchmark data sets. Comparison with SVM and MPM demonstrates the advantages of our new model. 相似文献
137.
Incremental linear discriminant analysis for face recognition. 总被引:3,自引:0,他引:3
Haitao Zhao Pong Chi Yuen 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2008,38(1):210-221
Dimensionality reduction methods have been successfully employed for face recognition. Among the various dimensionality reduction algorithms, linear (Fisher) discriminant analysis (LDA) is one of the popular supervised dimensionality reduction methods, and many LDA-based face recognition algorithms/systems have been reported in the last decade. However, the LDA-based face recognition systems suffer from the scalability problem. To overcome this limitation, an incremental approach is a natural solution. The main difficulty in developing the incremental LDA (ILDA) is to handle the inverse of the within-class scatter matrix. In this paper, based on the generalized singular value decomposition LDA (LDA/GSVD), we develop a new ILDA algorithm called GSVD-ILDA. Different from the existing techniques in which the new projection matrix is found in a restricted subspace, the proposed GSVD-ILDA determines the projection matrix in full space. Extensive experiments are performed to compare the proposed GSVD-ILDA with the LDA/GSVD as well as the existing ILDA methods using the face recognition technology face database and the Carneggie Mellon University Pose, Illumination, and Expression face database. Experimental results show that the proposed GSVD-ILDA algorithm gives the same performance as the LDA/GSVD with much smaller computational complexity. The experimental results also show that the proposed GSVD-ILDA gives better classification performance than the other recently proposed ILDA algorithms. 相似文献
138.
Armstrong MR Boyden K Browning ND Campbell GH Colvin JD DeHope WJ Frank AM Gibson DJ Hartemann F Kim JS King WE LaGrange TB Pyke BJ Reed BW Shuttlesworth RM Stuart BC Torralva BR 《Ultramicroscopy》2007,107(4-5):356-367
Although recent years have seen significant advances in the spatial resolution possible in the transmission electron microscope (TEM), the temporal resolution of most microscopes is limited to video rate at best. This lack of temporal resolution means that our understanding of dynamic processes in materials is extremely limited. High temporal resolution in the TEM can be achieved, however, by replacing the normal thermionic or field emission source with a photoemission source. In this case the temporal resolution is limited only by the ability to create a short pulse of photoexcited electrons in the source, and this can be as short as a few femtoseconds. The operation of the photo-emission source and the control of the subsequent pulse of electrons (containing as many as 5 x 10(7) electrons) create significant challenges for a standard microscope column that is designed to operate with a single electron in the column at any one time. In this paper, the generation and control of electron pulses in the TEM to obtain a temporal resolution <10(-6)s will be described and the effect of the pulse duration and current density on the spatial resolution of the instrument will be examined. The potential of these levels of temporal and spatial resolution for the study of dynamic materials processes will also be discussed. 相似文献
139.
The Journal of Supercomputing - Rapid advances in interconnection networks in multiprocessors are closing the gap between computation and communication. Given this trend, how can we utilize fast... 相似文献
140.
In this paper, we study the bandwidth allocation problem for serving video requests in a mobile real-time video player system.
One of the main issues to maintain the quality of services (QoS) in mobile video playback is to ensure sufficient number of
video frames available at the client side while a video is being played. However, due to the limited bandwidth of a mobile
network and variable workload streaming video, this is not easy to achieve in practice. In addition, the communication link
between mobile clients and a video server is subject to frequent errors and temporary disconnection. In this paper, we propose
to use the notion of buffered bandwidth in addition to the network bandwidth to support real-time playback of videos at mobile clients. Based on this, we designed
a bandwidth allocation scheme called Cooperative Pre-Fetching (CP) in which the amount of bandwidth to be allocated to serve a video request depends on the current buffer level of the
video at the client relative to the target buffer level of the client. In determining the target buffer level, we consider
the errors in communication to the client as well as the other clients who are concurrently served by the system. The buffered
video frames at the clients are then used to minimize the impact of error in communications on the overall QoS of video playbacks
in the whole system.
相似文献
Kam-Yiu Lam (Corresponding author)Email: |