全文获取类型
收费全文 | 247916篇 |
免费 | 12718篇 |
国内免费 | 6480篇 |
专业分类
电工技术 | 9447篇 |
技术理论 | 9篇 |
综合类 | 10880篇 |
化学工业 | 38245篇 |
金属工艺 | 14629篇 |
机械仪表 | 12964篇 |
建筑科学 | 11894篇 |
矿业工程 | 4471篇 |
能源动力 | 4707篇 |
轻工业 | 12791篇 |
水利工程 | 4384篇 |
石油天然气 | 9855篇 |
武器工业 | 1051篇 |
无线电 | 26474篇 |
一般工业技术 | 42497篇 |
冶金工业 | 13637篇 |
原子能技术 | 5061篇 |
自动化技术 | 44118篇 |
出版年
2024年 | 714篇 |
2023年 | 2316篇 |
2022年 | 4594篇 |
2021年 | 6201篇 |
2020年 | 4667篇 |
2019年 | 4018篇 |
2018年 | 19088篇 |
2017年 | 18544篇 |
2016年 | 14779篇 |
2015年 | 6221篇 |
2014年 | 7505篇 |
2013年 | 9061篇 |
2012年 | 12583篇 |
2011年 | 19371篇 |
2010年 | 16749篇 |
2009年 | 13902篇 |
2008年 | 15011篇 |
2007年 | 15511篇 |
2006年 | 7415篇 |
2005年 | 7405篇 |
2004年 | 5869篇 |
2003年 | 5855篇 |
2002年 | 5268篇 |
2001年 | 4414篇 |
2000年 | 3921篇 |
1999年 | 3370篇 |
1998年 | 2675篇 |
1997年 | 2234篇 |
1996年 | 2016篇 |
1995年 | 1740篇 |
1994年 | 1475篇 |
1993年 | 1250篇 |
1992年 | 1227篇 |
1991年 | 1096篇 |
1990年 | 1090篇 |
1989年 | 1009篇 |
1988年 | 905篇 |
1987年 | 841篇 |
1986年 | 763篇 |
1985年 | 715篇 |
1984年 | 701篇 |
1981年 | 668篇 |
1979年 | 736篇 |
1978年 | 777篇 |
1977年 | 739篇 |
1976年 | 755篇 |
1975年 | 713篇 |
1974年 | 719篇 |
1973年 | 723篇 |
1972年 | 705篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
S. N. Evdokimov S. I. Klimanov A. N. Korchagin E. A. Mikrin Yu. G. Sikharulidze 《Journal of Computer and Systems Sciences International》2012,51(6):802-817
Results concerning the terminal guidance algorithm at the reentry of the descent module into the Earth atmosphere are presented. This algorithm simultaneously eliminates predicted deviations in the downrange and crossrange directions. The restriction on the tolerable load factor n ?? 3 is taken into account. Three reentry angles are analyzed: the medium angle ?1.5°, the steep angle ?1.9°, and the flat angle ?1.2°. The motion of the descent module is considered in the disturbed Earth atmosphere represented by the TsNIIMash model. This model includes variations of the atmosphere density and the wind field. It is demonstrated that, depending on the reentry angle, the proposed algorithm guarantees the downrange maneuver zone in the range 1240?C1890 km and the crossrange maneuver zone of 210?C220 km on one side. The maximum guidance error at the altitude of 1 km does not exceed 0.8 km, and the average error is 0.1 km. The algorithm uses up to three bank angle reversals and uses the numerical prediction of the remaining part of the trajectory when choosing the guidance parameters. The concept of the automatic adjustment of the bank angle reference function depending on the entry angle and the prescribed distance to the target point in the maneuver zone is formulated. 相似文献
992.
In this paper, we present a robust and accurate algorithm for interactive image segmentation. The level set method is clearly advantageous for image objects with a complex topology and fragmented appearance. Our method integrates discriminative classification models and distance transforms with the level set method to avoid local minima and better snap to true object boundaries. The level set function approximates a transformed version of pixelwise posterior probabilities of being part of a target object. The evolution of its zero level set is driven by three force terms, region force, edge field force, and curvature force. These forces are based on a probabilistic classifier and an unsigned distance transform of salient edges. We further propose a technique that improves the performance of both the probabilistic classifier and the level set method over multiple passes. It makes the final object segmentation less sensitive to user interactions. Experiments and comparisons demonstrate the effectiveness of our method. 相似文献
993.
In this paper, we present an efficient way of implementing OpenGL ES 1.1 3D graphics API library for the environments with
hardware-supported OpenGL facility, typically as desktop PCs. Although OpenGL ES was started from the existing OpenGL features,
it rapidly became the standard 3D graphics library customized for embedded systems through introducing fixed-point arithmetic
operations, buffer management with fixed-point data type supports, completely new texture mapping functions and others. Currently,
it is the official 3D graphics API for Google Android, Apple iPhone, Sony PlayStation3, etc. In this paper, we achieved improvements
on the arithmetic operations for the fixed-point number representation, which is the most characteristic data type for OpenGL
ES 1.1. For the conversion of fixed-point data types to the floating-point number representations for the underlying OpenGL,
we show the way of efficient conversion processes even with satisfying OpenGL ES standard requirements. We also introduced
a specialized memory management scheme to manage the converted data from the buffer containing fixed-point numbers. In the
case of texture processing, the requirements in both standards are quite different, and thus we used completely new software-implementations.
Our final implementation of OpenGL ES library provides all of more than 200 functions in the standard specification and passed
its conformance test, to show its compliance with the standard. From the efficiency point of view, we measured its execution
times for several OpenGL ES-specific application programs and achieved remarkable improvements. 相似文献
994.
Bettina Berendt 《Data mining and knowledge discovery》2012,24(3):697-737
Over the last decade, privacy has been widely recognised as one of the major problems of data collections in general and the
Web in particular. This concerns specifically data arising from Web usage (such as querying or transacting) and social networking
(characterised by rich self-profiling including relational information) and the inferences drawn from them. The data mining
community has been very conscious of these issues and has addressed in particular the inference problems through various methods
for “privacy-preserving data mining” and “privacy-preserving data publishing”. However, it appears that these approaches by
themselves cannot effectively solve the privacy problems posed by mining. We argue that this is due to the underlying notions
of privacy and of data mining, both of which are too narrow. Drawing on notions of privacy not only as hiding, but as control
and negotiation, as well as on data mining not only as modelling, but as the whole cycle of knowledge discovery, we offer
an alternative view. This is intended to be a comprehensive view of the privacy challenges as well as solution approaches
along all phases of the knowledge discovery cycle. The paper thus combines a survey with an outline of an agenda for a comprehensive,
interdisciplinary view of Web mining and privacy. 相似文献
995.
Efficient compression and network adaptive video coding for distributed video surveillance 总被引:1,自引:1,他引:0
The availability of cheap network based video cameras and the prevalence of wireless networks has lead to a major thrust towards
deployment of large scale Distributed Video Surveillance (DVS) systems. This has opened up an important area of research to
deal with the issues involved in DVS system for efficient collection and transmission of large scale video streams from the
cameras at the guarded sites, to the end users in possibly constrained network conditions. In this paper, we propose a framework
based on content-based video classification and scalable compression scheme to provide a robust bandwidth efficient video
transmission for DVS. The scheme builds on a Discrete Wavelet Transform (DWT) based Color-Set Partitioning for Hierarchical
Trees (CSPIHT) coding to obtain a scalable bitstream. Wavelet domain segmentation and compression assists in development of
a DVS architecture. The architecture includes a novel module for dynamic allocation of Network bandwidth based on the current
available resources and constraints. Different frame constituents are optimally coded based on their relative significance,
perceptual quality, and available estimate of network bandwidth. Experimental result over different video sequences and simulations
for Network conditions demonstrate the efficient performance of the approach. 相似文献
996.
997.
998.
Jung Nam Bae Jin Young Kim Geon Kim Yong Tae Lee Jae Sang Cha 《Multimedia Tools and Applications》2012,57(2):359-372
Recently, watermarking based data transmission techniques using terrestrial digital TV signal have been proposed since they
are also cost-free and can overcome the limitations of GPS. However, in the previous watermarking based methods, the detection
accuracy is low and additional data rate is too low. Thus, we propose the throughput enhancement method by employing the TZCD-MBOK
watermarking technique in T-DMB system. By applying the proposed scheme to T-DMB, it allows additional data transmission for
disaster broadcasting and improves efficiency of data transmission in shadow region and indoor to mobile environment through
watermarking spread code. From the simulation results, we confirm the proposed watermarking scheme affected on the existing
T-DMB signal. Moreover, it was also confirmed that the system capacity increases as the power of additional watermarking signal
rose. The results of the paper can be applied to wireless multimedia digital broadcasting systems. 相似文献
999.
Many video service sites headed by YouTube know what content requires copyright protection. However, they lack a copyright
protection system that automatically distinguishes whether uploaded videos contain legal or illegal content. Existing protection
techniques use content-based retrieval methods that compare the features of video. However, if the video encoding has changed
in resolution, bit-rate or codec, these techniques do not perform well. Thus, this paper proposes a novel video matching algorithm
even if the type of encoding has changed. We also suggest an intelligent copyright protection system using the proposed algorithm.
This can serve to automatically prevent the uploading of illegal content. The proposed method has represented the accuracy
of 97% with searching algorithm in video-matching experiments and 98.62% with automation algorithm in copyright-protection
experiments. Therefore, this system could form a core technology that identifies illegal content and automatically excludes
access to illegal content by many video service sites. 相似文献
1000.