全文获取类型
收费全文 | 414895篇 |
免费 | 27541篇 |
国内免费 | 13939篇 |
专业分类
电工技术 | 19616篇 |
技术理论 | 35篇 |
综合类 | 23059篇 |
化学工业 | 68608篇 |
金属工艺 | 23986篇 |
机械仪表 | 24599篇 |
建筑科学 | 28691篇 |
矿业工程 | 11052篇 |
能源动力 | 10442篇 |
轻工业 | 23835篇 |
水利工程 | 7050篇 |
石油天然气 | 22394篇 |
武器工业 | 2656篇 |
无线电 | 46247篇 |
一般工业技术 | 55301篇 |
冶金工业 | 19312篇 |
原子能技术 | 3721篇 |
自动化技术 | 65771篇 |
出版年
2024年 | 1152篇 |
2023年 | 5058篇 |
2022年 | 9047篇 |
2021年 | 13131篇 |
2020年 | 9664篇 |
2019年 | 8293篇 |
2018年 | 22176篇 |
2017年 | 22492篇 |
2016年 | 18386篇 |
2015年 | 13718篇 |
2014年 | 16463篇 |
2013年 | 19710篇 |
2012年 | 24036篇 |
2011年 | 31888篇 |
2010年 | 27804篇 |
2009年 | 24087篇 |
2008年 | 24906篇 |
2007年 | 25379篇 |
2006年 | 18975篇 |
2005年 | 17814篇 |
2004年 | 11971篇 |
2003年 | 10851篇 |
2002年 | 9940篇 |
2001年 | 8347篇 |
2000年 | 8647篇 |
1999年 | 9699篇 |
1998年 | 7741篇 |
1997年 | 6567篇 |
1996年 | 6145篇 |
1995年 | 5086篇 |
1994年 | 4242篇 |
1993年 | 3003篇 |
1992年 | 2395篇 |
1991年 | 1830篇 |
1990年 | 1308篇 |
1989年 | 1047篇 |
1988年 | 865篇 |
1987年 | 552篇 |
1986年 | 409篇 |
1985年 | 272篇 |
1984年 | 187篇 |
1983年 | 116篇 |
1982年 | 143篇 |
1981年 | 99篇 |
1980年 | 81篇 |
1968年 | 43篇 |
1966年 | 42篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 281 毫秒
991.
992.
Zhishou Zhang Qibin Sun Wai-Choong Wong John Apostolopoulos Susie Wee 《Multimedia, IEEE Transactions on》2007,9(2):320-331
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required 相似文献
993.
Domain-Driven, Actionable Knowledge Discovery 总被引:1,自引:0,他引:1
Data mining increasingly faces complex challenges in the real-life world of business problems and needs. The gap between business expectations and R&D results in this area involves key aspects of the field, such as methodologies, targeted problems, pattern interestingness, and infrastructure support. Both researchers and practitioners are realizing the importance of domain knowledge to close this gap and develop actionable knowledge for real user needs. 相似文献
994.
995.
996.
Compared to other fields of engineering, in mechanical engineering, the Discrete Element Method (DEM) is not yet a well known
method. Nevertheless, there is a variety of simulation problems where the method has obvious advantages due to its meshless
nature. For problems where several free bodies can collide and break after having been largely deformed, the DEM is the method
of choice. Neighborhood search and collision detection between bodies as well as the separation of large solids into smaller
particles are naturally incorporated in the method. The main DEM algorithm consists of a relatively simple loop that basically
contains the three substeps contact detection, force computation and integration. However, there exists a large variety of
different algorithms to choose the substeps to compose the optimal method for a given problem. In this contribution, we describe
the dynamics of particle systems together with appropriate numerical integration schemes and give an overview over different
types of particle interactions that can be composed to adapt the method to fit to a given simulation problem. Surface triangulations
are used to model complicated, non-convex bodies in contact with particle systems. The capabilities of the method are finally
demonstrated by means of application examples.
Commemorative Contribution. 相似文献
997.
998.
999.
1000.