全文获取类型
收费全文 | 2972篇 |
免费 | 75篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 36篇 |
综合类 | 3篇 |
化学工业 | 623篇 |
金属工艺 | 34篇 |
机械仪表 | 34篇 |
建筑科学 | 197篇 |
矿业工程 | 21篇 |
能源动力 | 62篇 |
轻工业 | 159篇 |
水利工程 | 27篇 |
石油天然气 | 48篇 |
无线电 | 170篇 |
一般工业技术 | 384篇 |
冶金工业 | 815篇 |
原子能技术 | 19篇 |
自动化技术 | 418篇 |
出版年
2021年 | 34篇 |
2020年 | 20篇 |
2019年 | 34篇 |
2018年 | 36篇 |
2017年 | 54篇 |
2016年 | 48篇 |
2015年 | 42篇 |
2014年 | 42篇 |
2013年 | 179篇 |
2012年 | 71篇 |
2011年 | 104篇 |
2010年 | 83篇 |
2009年 | 93篇 |
2008年 | 105篇 |
2007年 | 109篇 |
2006年 | 95篇 |
2005年 | 110篇 |
2004年 | 74篇 |
2003年 | 96篇 |
2002年 | 68篇 |
2001年 | 74篇 |
2000年 | 51篇 |
1999年 | 64篇 |
1998年 | 97篇 |
1997年 | 65篇 |
1996年 | 69篇 |
1995年 | 45篇 |
1994年 | 40篇 |
1993年 | 40篇 |
1992年 | 38篇 |
1991年 | 32篇 |
1990年 | 53篇 |
1989年 | 46篇 |
1988年 | 47篇 |
1987年 | 52篇 |
1986年 | 35篇 |
1985年 | 49篇 |
1984年 | 39篇 |
1983年 | 35篇 |
1982年 | 37篇 |
1981年 | 32篇 |
1980年 | 26篇 |
1979年 | 34篇 |
1978年 | 34篇 |
1977年 | 30篇 |
1976年 | 49篇 |
1975年 | 30篇 |
1974年 | 32篇 |
1973年 | 42篇 |
1972年 | 23篇 |
排序方式: 共有3050条查询结果,搜索用时 156 毫秒
71.
Hao Chen Juan He Raymond Lanzafame Istvan Stadler Hamid El Hamidi Hui Liu Jonathan Celli Michael R. Hamblin Yingying Huang Emily Oakley Gal Shafirstein Ho‐Kyoon Chung Shin‐Tson Wu Yajie Dong 《Journal of the Society for Information Display》2017,25(3):177-184
While OLEDs have struggled to find a niche lighting application that can fully take advantage of their unique form factors as thin, flexible, lightweight and uniformly large‐area luminaire, photomedical researchers have been in search of low‐cost, effective illumination devices with such form factors that could facilitate widespread clinical applications of photodynamic therapy (PDT) or photobiomodulation (PBM). Although existing OLEDs with either fluorescent or phosphorescent emitters cannot achieve the required high power density at the right wavelength windows for photomedicine, the recently developed ultrabright and efficient deep red quantum dot light emitting devices (QLEDs) can nicely fit into this niche. Here, we report for the first time the in‐vitro study to demonstrate that this QLED‐based photomedical approach could increase cell metabolism over control systems for PBM and kill cancerous cells efficiently for PDT. The perspective of developing wavelength‐specific, flexible QLEDs for two critical photomedical fields (wound repair and cancer treatment) will be presented with their potential impacts summarized. The work promises to generate flexible QLED‐based light sources that could enable the widespread use and clinical acceptance of photomedical strategies including PDT and PBM. 相似文献
72.
Abdullah Azfar Kim-Kwang Raymond Choo Lin Liu 《Multimedia Tools and Applications》2017,76(3):3313-3341
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices. 相似文献
73.
Yu-Chen Hu Kim-Kwang Raymond Choo Wu-Lin Chen 《Multimedia Tools and Applications》2017,76(14):15435-15463
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme. 相似文献
74.
Nishant Doshi Saru Kumari Dheerendra Mishra Xiong Li Kim-Kwang Raymond Choo Arun Kumar Sangaiah 《Multimedia Tools and Applications》2017,76(24):25893-25918
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems. 相似文献
75.
Spacecraft formation reconfiguration with collision avoidance 总被引:1,自引:0,他引:1
In this paper we present a behavioral control solution for reconfiguration of a spacecraft formation using the Null-Space Based (NSB) concept. The solution is task based, and aims to reconfigure and maintain a rigid formation while avoiding collisions between spacecraft. A model of relative translation is derived, together with a passivity-based sliding surface controller which globally stabilizes the equilibrium point of the closed-loop system. The NSB control method is implemented by giving each task different priorities and then calculating desired velocity and a Jacobian matrix for each spacecraft and each task. The velocity vector for each task is then projected into the null-space for higher prioritized tasks to remove conflicting velocity components. Simulation results are presented, showing that each spacecraft moves into the predefined formation without breaking any rules for the higher priority tasks, and all collisions are avoided. 相似文献
76.
Deepak Kapur Victor L. Winter Raymond S. Berg 《Electronic Notes in Theoretical Computer Science》2001,50(1)
The use of formal methods for analyzing and synthesizing a controller for a multi-train multi-track railway system is discussed. The research was motivated by a case study involving the Bay Area Rapid Transit (BART) system. The overall goal is to design a train acceleration control function that enables trains to be safely placed but also increases system throughput. The use of a modeling language for specifying safety properties and a control function is illustrated. The program transformation methodology supported in the HATS system is employed to generate an efficient implementation from a high-level specification of a controller. This implementation can then be used to simulate the controller behavior, thus further enhancing confidence in the design. Properties of optimization transformations can be verified using an rewrite-rule based induction theorem prover Rewrite Rule Laboratory (RRL). 相似文献
77.
78.
Li Jiuyong Wong Raymond Chi-Wing Fu Ada Wai-Chee Pei Jian 《Knowledge and Data Engineering, IEEE Transactions on》2008,20(9):1181-1194
Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. Among a number of k-anonymisation schemes, local recoding methods are promising for minimising the distortion of a k-anonymity view. This paper addresses two major issues in local recoding k-anonymisation in attribute hierarchical taxonomies. Firstly, we define a proper distance metric to achieve local recoding generalisation with small distortion. Secondly, we propose a means to control the inconsistency of attribute domains in a generalised view by local recoding. We show experimentally that our proposed local recoding method based on the proposed distance metric produces higher quality k-anonymity tables in three quality measures than a global recoding anonymisation method, Incognito, and a multidimensional recoding anonymisation method, Multi. The proposed inconsistency handling method is able to balance distortion and consistency of a generalised view. 相似文献
79.
Jian-Feng Cai Raymond H. Chan Carmine Di Fiore 《Journal of Mathematical Imaging and Vision》2007,29(1):79-91
Recently, a powerful two-phase method for restoring images corrupted with high level impulse noise has been developed. The
main drawback of the method is the computational efficiency of the second phase which requires the minimization of a non-smooth
objective functional. However, it was pointed out in (Chan et al. in Proc. ICIP 2005, pp. 125–128) that the non-smooth data-fitting
term in the functional can be deleted since the restoration in the second phase is applied to noisy pixels only. In this paper,
we study the analytic properties of the resulting new functional ℱ. We show that ℱ, which is defined in terms of edge-preserving
potential functions φ
α
, inherits many nice properties from φ
α
, including the first and second order Lipschitz continuity, strong convexity, and positive definiteness of its Hessian. Moreover,
we use these results to establish the convergence of optimization methods applied to ℱ. In particular, we prove the global
convergence of some conjugate gradient-type methods and of a recently proposed low complexity quasi-Newton algorithm. Numerical
experiments are given to illustrate the convergence and efficiency of the two methods.
相似文献
Carmine Di FioreEmail: |
80.