全文获取类型
收费全文 | 6310篇 |
免费 | 546篇 |
国内免费 | 17篇 |
专业分类
电工技术 | 90篇 |
综合类 | 15篇 |
化学工业 | 1459篇 |
金属工艺 | 240篇 |
机械仪表 | 436篇 |
建筑科学 | 116篇 |
矿业工程 | 2篇 |
能源动力 | 276篇 |
轻工业 | 618篇 |
水利工程 | 14篇 |
石油天然气 | 1篇 |
无线电 | 1173篇 |
一般工业技术 | 1487篇 |
冶金工业 | 264篇 |
原子能技术 | 108篇 |
自动化技术 | 574篇 |
出版年
2024年 | 13篇 |
2023年 | 110篇 |
2022年 | 151篇 |
2021年 | 271篇 |
2020年 | 207篇 |
2019年 | 210篇 |
2018年 | 272篇 |
2017年 | 253篇 |
2016年 | 309篇 |
2015年 | 258篇 |
2014年 | 332篇 |
2013年 | 438篇 |
2012年 | 453篇 |
2011年 | 550篇 |
2010年 | 414篇 |
2009年 | 438篇 |
2008年 | 326篇 |
2007年 | 233篇 |
2006年 | 235篇 |
2005年 | 184篇 |
2004年 | 177篇 |
2003年 | 159篇 |
2002年 | 141篇 |
2001年 | 87篇 |
2000年 | 88篇 |
1999年 | 86篇 |
1998年 | 126篇 |
1997年 | 78篇 |
1996年 | 66篇 |
1995年 | 56篇 |
1994年 | 30篇 |
1993年 | 15篇 |
1992年 | 22篇 |
1991年 | 14篇 |
1990年 | 16篇 |
1989年 | 9篇 |
1988年 | 9篇 |
1987年 | 8篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1980年 | 5篇 |
1979年 | 1篇 |
1976年 | 4篇 |
1975年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有6873条查询结果,搜索用时 15 毫秒
81.
Forward secrecy in an e-mail system means that compromising of the long-term secret keys of the mail users and mail servers does not affect the confidentiality of the e-mail messages. Previous forward-secure e-mail protocols used the certified public keys of the users using PKI (Public Key Infrastructure). In this paper, we propose a password-based authenticated e-mail protocol providing forward secrecy. The proposed protocol does not require certified public keys and is sufficiently efficient to be executed on resource-restricted mobile devices. 相似文献
82.
The trend of digital convergence makes multitasking common in many digital electronic products. Some applications in those systems have inherent real‐time properties, while many others have few or no timeliness requirements. Therefore the embedded Linux kernels, which are widely used in those devices, provide real‐time features in many forms. However, providing real‐time scheduling usually induces throughput degradation in heavy multitasking due to the increased context switches. Usually the throughput degradation becomes a critical problem, since the performance of the embedded processors is generally limited for cost, design and energy efficiency reasons. This paper proposes schemes to lessen the throughput degradation, which is from real‐time scheduling, by suppressing unnecessary context switches and applying real‐time scheduling mechanisms only when it is necessary. Also the suggested schemes enable the complete priority inheritance protocol to prevent the well‐known priority inversion problem. We evaluated the effectiveness of our approach with open‐source benchmarks. By using the suggested schemes, the throughput is improved while the scheduling latency is kept same or better in comparison with the existing approaches. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
83.
User authentication is one of the fundamental procedures to ensure secure communications over an insecure public network channel. Especially, due to tamper-resistance and convenience in managing a password file, various user authentication schemes using smart cards have been proposed. A smart card however far from ubiquitous because of the high cost of a smart card and the infrastructure requirements. In this paper, we study secure user authentication using only a common storage device such as a universal serial bus (USB) memory, instead of using smart cards. We first show that the existing schemes using smart cards cannot be immediately converted into schemes using a common storage device. We then propose a practical and secure user authentication scheme, capable of supporting the use of the common storage device, which retains all the advantages of schemes using smart cards. 相似文献
84.
85.
To understand the user experience in social media or to facilitate the design of human-centric services by social media, users’ opinions about specific entities in text messages should be captured. A fine-grained named entity recognizer (NER) is an essential module for identifying opinion targets in text messages, and a named-entity (NE) dictionary is a major resource that affects the performance of an NER. However, it is not easy to construct an NE dictionary manually, because human annotation is time-consuming and labor-intensive. To reduce construction time and labor, we propose a semi-automatic system to construct an NE dictionary from the free online resource, Wikipedia. The proposed system constructs a pseudo-document for each Wikipedia NE by using an active-learning technique. It then classifies Wikipedia entries into NE classes based on similarities between the entries and pseudo-documents located in a vector space. In experiments, the proposed system classified 92.3 % of Wikipedia entries into 29 NE classes. It showed a high performance, with a macro-averaging F1-measure of 0.872 and micro-averaging F1-measure of 0.935. 相似文献
86.
Lee Jae-Gu Choi Kyung-Chan Yeon Seung-Ho Kim Jeong Won Ko Young-Woong 《Multimedia Tools and Applications》2017,76(23):25477-25494
Multimedia Tools and Applications - In digital pathology, image similarity algorithms are used to find cancer in tissue cells from medical images. However, it is very difficult to apply image... 相似文献
87.
Stephen G. McGill Seung‐Joon Yi Hak Yi Min Sung Ahn Sanghyun Cho Kevin Liu Daniel Sun Bhoram Lee Heejin Jeong Jinwook Huh Dennis Hong Daniel D. Lee 《野外机器人技术杂志》2017,34(4):775-801
This paper describes Team THOR's approach to human‐in‐the‐loop disaster response robotics for the 2015 DARPA Robotics Challenge (DRC) Finals. Under the duress of unpredictable networking and terrain, fluid operator interactions and dynamic disturbance rejection become major concerns for effective teleoperation. We present a humanoid robot designed to effectively traverse a disaster environment while allowing for a wide range of manipulation abilities. To complement the robot hardware, a hierarchical software foundation implements network strategies that provide real‐time feedback to an operator under restricted bandwidth using layered user interfaces. Our strategy for humanoid locomotion includes a backward‐facing knee configuration paired with specialized toe and heel lifting strategies that allow the robot to traverse difficult surfaces while rejecting external perturbations. With an upper body planner that encodes operator preferences, predictable motion plans are executed in unforeseen circumstances. These plans are critical for manipulation in unknown environments. Our approach was validated during the DRC Finals competition, where Team THOR scored three points in 18 min of operation time, and the results are presented along with an analysis of each task. 相似文献
88.
Young-Seon Jeong Author Vitae Author Vitae Olufemi A. Omitaomu Author Vitae 《Pattern recognition》2011,44(9):2231-2240
Dynamic time warping (DTW), which finds the minimum path by providing non-linear alignments between two time series, has been widely used as a distance measure for time series classification and clustering. However, DTW does not account for the relative importance regarding the phase difference between a reference point and a testing point. This may lead to misclassification especially in applications where the shape similarity between two sequences is a major consideration for an accurate recognition. Therefore, we propose a novel distance measure, called a weighted DTW (WDTW), which is a penalty-based DTW. Our approach penalizes points with higher phase difference between a reference point and a testing point in order to prevent minimum distance distortion caused by outliers. The rationale underlying the proposed distance measure is demonstrated with some illustrative examples. A new weight function, called the modified logistic weight function (MLWF), is also proposed to systematically assign weights as a function of the phase difference between a reference point and a testing point. By applying different weights to adjacent points, the proposed algorithm can enhance the detection of similarity between two time series. We show that some popular distance measures such as DTW and Euclidean distance are special cases of our proposed WDTW measure. We extend the proposed idea to other variants of DTW such as derivative dynamic time warping (DDTW) and propose the weighted version of DDTW. We have compared the performances of our proposed procedures with other popular approaches using public data sets available through the UCR Time Series Data Mining Archive for both time series classification and clustering problems. The experimental results indicate that the proposed approaches can achieve improved accuracy for time series classification and clustering problems. 相似文献
89.
Jeong Eun Min Matthew D. WhitesideFiona S.L. Brinkman Brad McNeneyJinko Graham 《Computational statistics & data analysis》2011,55(1):935-943
Orthologs are genes in different species that have diverged from a common ancestral gene after speciation. In contrast, paralogs are genes that have diverged after a gene duplication event. For many comparative analyses, it is of interest to identify orthologs with similar functions. Such orthologs tend to support species divergence (ssd-orthologs) in the sense that they have diverged only due to speciation, to the same relative degree as their species. However, due to incomplete sequencing or gene loss in a species, predicted orthologs can sometimes be paralogs or other non-ssd-orthologs. To increase the specificity of ssd-ortholog prediction, Fulton et al. [Fulton, D., Li, Y., Laird, M., Horsman, B., Roche, F., Brinkman, F., 2006. Improving the specificity of high-throughput ortholog prediction. BMC Bioinformatics 7 (1), 270] developed Ortholuge, a bioinformatics tool that identifies predicted orthologs with atypical genetic divergence. However, when the initial list of putative orthologs contains a non-negligible number of non-ssd-orthologs, the cut-off values that Ortholuge generates for orthology classification are difficult to interpret and can be too high, leading to decreased specificity of ssd-ortholog prediction. Therefore, we propose a complementary statistical approach to determining cut-off values. A benefit of the proposed approach is that it gives the user an estimated conditional probability that a predicted ortholog pair is unusually diverged. This enables the interpretation and selection of cut-off values based on a direct measure of the relative composition of ssd-orthologs versus non-ssd-orthologs. In a simulation comparison of the two approaches, we find that the statistical approach provides more stable cut-off values and improves the specificity of ssd-ortholog prediction for low-quality data sets of predicted orthologs. 相似文献
90.
Chi‐Woo Kim Chang‐Oh Jeong Jean‐Ho Song Hyung‐Guel Kim 《Journal of the Society for Information Display》2001,9(3):139-143
Abstract— TFT‐LCD panels for notebook‐PC applications requires a thin and light form factor, low power consumption, and good display quality, whereas the desktop monitor has different requirements such as large panel size, wide viewing angle, high resolution, brightness, etc. However, for the fifth‐generation of mass production, current panel technologies have to improve in order to cope with these requirements. In this article, various approaches to the manufacturing technologies of next‐generation TFT‐LCDs are discussed. 相似文献