全文获取类型
收费全文 | 8976篇 |
免费 | 1000篇 |
国内免费 | 289篇 |
专业分类
电工技术 | 414篇 |
技术理论 | 1篇 |
综合类 | 275篇 |
化学工业 | 1967篇 |
金属工艺 | 459篇 |
机械仪表 | 635篇 |
建筑科学 | 345篇 |
矿业工程 | 219篇 |
能源动力 | 384篇 |
轻工业 | 680篇 |
水利工程 | 116篇 |
石油天然气 | 325篇 |
武器工业 | 69篇 |
无线电 | 1266篇 |
一般工业技术 | 1580篇 |
冶金工业 | 344篇 |
原子能技术 | 106篇 |
自动化技术 | 1080篇 |
出版年
2024年 | 64篇 |
2023年 | 163篇 |
2022年 | 291篇 |
2021年 | 474篇 |
2020年 | 392篇 |
2019年 | 330篇 |
2018年 | 316篇 |
2017年 | 354篇 |
2016年 | 345篇 |
2015年 | 404篇 |
2014年 | 494篇 |
2013年 | 593篇 |
2012年 | 634篇 |
2011年 | 675篇 |
2010年 | 554篇 |
2009年 | 522篇 |
2008年 | 518篇 |
2007年 | 349篇 |
2006年 | 352篇 |
2005年 | 348篇 |
2004年 | 278篇 |
2003年 | 257篇 |
2002年 | 197篇 |
2001年 | 191篇 |
2000年 | 164篇 |
1999年 | 189篇 |
1998年 | 143篇 |
1997年 | 129篇 |
1996年 | 115篇 |
1995年 | 74篇 |
1994年 | 90篇 |
1993年 | 40篇 |
1992年 | 42篇 |
1991年 | 45篇 |
1990年 | 28篇 |
1989年 | 28篇 |
1988年 | 11篇 |
1987年 | 10篇 |
1986年 | 6篇 |
1985年 | 6篇 |
1984年 | 10篇 |
1983年 | 9篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1973年 | 3篇 |
1972年 | 2篇 |
1959年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
102.
数据频度分析是Excel的重要功能之一,Excel对学生成绩频度分析有四种方法:COUNTIF函数、COUNTIFS函数、FRE-QUENCY函数和数据透视表。四种方法均能方便快捷的完成对成绩数据的频度分析,完美高效地解决成绩统计问题。 相似文献
103.
104.
鉴于现行水工钢闸门安全检测评估中许多评价指标带有经验性和不完整性,缺乏完整的评估体系和理论支持,在水工钢闸门现有理论成果和现行国家有关标准基础上,建立多层次综合评估模型,对水工钢闸门进行模糊综合评估,并将该模型得到的结果与传统结果对比分析。所得成果可为相关研究提供参考。 相似文献
105.
106.
Through the rapid spread of smartphones, users have access to many types of applications similar to those on desktop computer systems. Smartphone applications using augmented reality (AR) technology make use of users' location information. As AR applications will require new evaluation methods, improved usability and user convenience should be developed. The purpose of the current study is to develop usability principles for the development and evaluation of smartphone applications using AR technology. We develop usability principles for smartphone AR applications by analyzing existing research about heuristic evaluation methods, design principles for AR systems, guidelines for handheld mobile device interfaces, and usability principles for the tangible user interface. We conducted a heuristic evaluation for three popularly used smartphone AR applications to identify usability problems. We suggested new design guidelines to solve the identified problems. Then, we developed an improved AR application prototype of an Android-based smartphone, which later was conducted a usability testing to validate the effects of usability principles. 相似文献
107.
The pixel labeling problems in computer vision are often formulated as energy minimization tasks. Algorithms such as graph cuts and belief propagation are prominent; however, they are only applicable for specific energy forms. For general optimization, Markov Chain Monte Carlo (MCMC) based simulated annealing can estimate the minima states very slowly.This paper presents a sampling paradigm for faster optimization. First, in contrast to previous MCMCs, the role of detailed balance constraint is eliminated. The reversible Markov chain jumps are essential for sampling an arbitrary posterior distribution, but they are not essential for optimization tasks. This allows a computationally simple window cluster sample. Second, the proposal states are generated from combined sets of local minima which achieve a substantial increase in speed compared to uniformly labeled cluster proposals. Third, under the coarse-to-fine strategy, the maximum window size variable is incorporated along with the temperature variable during simulated annealing. The proposed window annealing is experimentally shown to be many times faster and capable of finding lower energy compared to the previous Gibbs and Swendsen-Wang cut (SW-cut) sampler. In addition, the proposed method is compared with other deterministic algorithms like graph cut, belief propagation, and spectral method in their own specific energy forms. Window annealing displays competitive performance in all domains. 相似文献
108.
This paper proposes a novel object-based home network middleware for supporting the interoperability among home devices and smart grid devices. This middleware provides various types of abstract objects for flexible representation of heterogeneous home devices, which are classified based on their characteristics. It is also flexible enough to allow addition of new protocols and message conversion between different protocols through an abstraction layer, which are not supported by existing home network middlewares so that various protocols can be supported. As a result, it can be utilized to provide the interoperability among a variety of devices from sensors to typical home appliances as well as smart grid devices such as a home electric generator and a battery, which adopt different protocols. In order to demonstrate that home devices and smart grid devices are interoperable through the proposed middleware, we implement applications based on the middleware on a target platform consisting of embedded boards, sensors and laptops for emulation purposes of a home network. According to our emulation, this middleware can provide efficient interoperability among home devices and smart grid devices for future energy efficient home. 相似文献
109.
江西袁河流域水环境容量分配研究 总被引:1,自引:1,他引:0
为研究袁河流域的水环境容量,根据流域实际情况,选择沿河各县的总人口、GDP、排污量和水资源量进行水环境容量分配。对初始水环境容量采用基尼系数法对分配结果进行公平性评估,并与估算环境容量值进行比较,最终,取值小者确定流域容量分配方案。结果表明:各方案指标的基尼系数值均小于0.20,分配结果均较公平;经济为主要影响因素的方案d为最优方案;芦溪县与宜春市的最终分配量均为环境容量值,分别为3 896,10 245 t/a;新余市为可分配的容量值30 596 t/a。 相似文献
110.
Yuan-hua Li Xiao-lan Li Ming-huang Sang Yi-you Nie Zi-sheng Wang 《Quantum Information Processing》2013,12(12):3835-3844
A scheme is presented to implement bidirectional controlled quantum teleportation (QT) by using a five-qubit entangled state as a quantum channel, where Alice may transmit an arbitrary single qubit state called qubit A to Bob and at the same time, Bob may also transmit an arbitrary single qubit state called qubit B to Alice via the control of the supervisor Charlie. Based on our channel, we explicitly show how the bidirectional controlled QT protocol works. By using this bidirectional controlled teleportation, espcially, a bidirectional controlled quantum secure direct communication (QSDC) protocol, i.e., the so-called controlled quantum dialogue, is further investigated. Under the situation of insuring the security of the quantum channel, Alice (Bob) encodes a secret message directly on a sequence of qubit states and transmits them to Bob (Alice) supervised by Charlie. Especially, the qubits carrying the secret message do not need to be transmitted in quantum channel. At last, we show this QSDC scheme may be determinate and secure. 相似文献