全文获取类型
收费全文 | 5310篇 |
免费 | 51篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 32篇 |
综合类 | 5篇 |
化学工业 | 296篇 |
金属工艺 | 32篇 |
机械仪表 | 37篇 |
建筑科学 | 83篇 |
矿业工程 | 5篇 |
能源动力 | 30篇 |
轻工业 | 89篇 |
水利工程 | 36篇 |
石油天然气 | 3篇 |
无线电 | 235篇 |
一般工业技术 | 337篇 |
冶金工业 | 3949篇 |
原子能技术 | 22篇 |
自动化技术 | 176篇 |
出版年
2022年 | 18篇 |
2021年 | 26篇 |
2019年 | 14篇 |
2018年 | 24篇 |
2017年 | 17篇 |
2016年 | 21篇 |
2015年 | 25篇 |
2014年 | 28篇 |
2013年 | 59篇 |
2012年 | 47篇 |
2011年 | 78篇 |
2010年 | 53篇 |
2009年 | 56篇 |
2008年 | 73篇 |
2007年 | 69篇 |
2006年 | 63篇 |
2005年 | 49篇 |
2004年 | 62篇 |
2003年 | 60篇 |
2002年 | 42篇 |
2001年 | 43篇 |
2000年 | 54篇 |
1999年 | 143篇 |
1998年 | 1197篇 |
1997年 | 649篇 |
1996年 | 500篇 |
1995年 | 274篇 |
1994年 | 241篇 |
1993年 | 254篇 |
1992年 | 38篇 |
1991年 | 54篇 |
1990年 | 71篇 |
1989年 | 71篇 |
1988年 | 63篇 |
1987年 | 70篇 |
1986年 | 70篇 |
1985年 | 43篇 |
1984年 | 25篇 |
1983年 | 28篇 |
1982年 | 28篇 |
1981年 | 34篇 |
1980年 | 51篇 |
1979年 | 15篇 |
1978年 | 22篇 |
1977年 | 98篇 |
1976年 | 216篇 |
1975年 | 16篇 |
1974年 | 11篇 |
1972年 | 9篇 |
1971年 | 13篇 |
排序方式: 共有5367条查询结果,搜索用时 15 毫秒
141.
M Labuda JM Austyn E Zuffova O Kozuch N Fuchsberger J Lysy PA Nuttall 《Canadian Metallurgical Quarterly》1996,219(2):357-366
Arboviruses are transmitted to vertebrates by the "bite" of infected arthropods. Events at the site of virus deposition are largely unknown despite increasing evidence that blood-sucking arthropods immunomodulate their skin site of feeding. This question is particularly relevant for ixodid ticks that feed for several days. To examine events under conditions mimicking tick-borne encephalitis (TBE) virus transmission in nature (i.e., infected and uninfected Ixodes ricinus ticks feeding on the same animal), infected adult and uninfected nymphal ticks were placed in one retaining chamber (skin site A) and uninfected nymphs were placed within a second chamber posteriorly (skin site B) on two natural host species, yellow-necked field mice (Apodemus flavicollis) and bank voles (Clethrionomys glareolus). Virus transmission from infected to uninfected cofeeding ticks was correlated with infection in the skin site of tick feeding. Furthermore, virus was recruited preferentially to the site in which ticks were feeding compared with uninfested skin sites. Viremia did not correspond with a generalized infection of the skin; virus was not detected in an uninfested skin site (C) of 12/13 natural hosts that had viremia levels > or = 2.0 log10 ic mouse LD50/0.02 ml blood. To characterize infected cells, laboratory mouse strains were infested with infected ticks and then explants were removed from selected skin sites and floated on culture medium. Numerous leukocytes were found to migrate from the skin explants of tick feeding sites. Two-color immunocytochemistry revealed viral antigen in both migratory Langerhans cells and neutrophils; in addition, the migratory monocyte/macrophages were shown to produce infectious virus. The results indicate that the local skin site of tick feeding is an important focus of viral replication early after TBE virus transmission by ticks. Cellular infiltration of tick feeding sites, and the migration of cells from such sites, may provide a vehicle for transmission between infected and uninfected cofeeding ticks that is independent of a patent viremia. The data support the hypothesis that viremia is a product, rather than a prerequisite, of tick-borne virus transmission. 相似文献
142.
Sven A. Carlsson Stefan Henningsson Stefan Hrastinski Christina Keller 《Information Systems and E-Business Management》2011,9(1):109-131
Design science research is an essential part of IS research since the field should not only try to understand how the world
is, but also how to change it. We argue that the aim of IS design science research should be to develop practical knowledge
not only for the design of novel information technology (IT), but also for IS governance and management. Whereas at least
some methodological support exists for researchers engaged in IT-centric design science research, limited support is available
for researchers who want to develop design knowledge and theory for IS governance and management. To overcome this shortcoming,
we suggest a socio-technical IS design science research approach. The approach has four main activities: (1) identifying problem
situations and desired outcomes, (2) reviewing extant theories, knowledge and data, (3) proposing/refining design theory and
knowledge, and (4) testing design theory and knowledge. The applicability and usefulness of the proposed approach is shown
by means of a design science research project concerning IS integration management in the context of mergers and acquisitions. 相似文献
143.
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, while the output key-stream is a relatively simple function of the state. It has been heuristically shown in several situations [3], [8], [9], [10], [11] and [14] that this structure may lead to distinguishing attacks on the cipher. In this note we present a more rigorous treatment of this structural attack. First, we present a rigorous proof of the main probabilistic claim behind it in the basic cases. We then apply it concretely to the cipher sn3 [12], and demonstrate that the heuristic assumptions of the attack are remarkably precise in more complicated cases. 相似文献
144.
Chertok M Keller Y 《IEEE transactions on pattern analysis and machine intelligence》2010,32(12):2205-2215
We present a computational approach to high-order matching of data sets in IR(d). Those are matchings based on data affinity measures that score the matching of more than two pairs of points at a time. High-order affinities are represented by tensors and the matching is then given by a rank-one approximation of the affinity tensor and a corresponding discretization. Our approach is rigorously justified by extending Zass and Shashua's hypergraph matching to high-order spectral matching. This paves the way for a computationally efficient dual-marginalization spectral matching scheme. We also show that, based on the spectral properties of random matrices, affinity tensors can be randomly sparsified while retaining the matching accuracy. Our contributions are experimentally validated by applying them to synthetic as well as real data sets. 相似文献
145.
146.
Sabrina Dammertz Holger Dammertz Alexander Keller Hendrik P. A. Lensch 《Computer Graphics Forum》2009,28(7):1945-1954
Storing textures on orthogonal tensor product lattices is predominant in computer graphics, although it is known that their sampling efficiency is not optimal. In two dimensions, the hexagonal lattice provides the maximum sampling efficiency. However, handling these lattices is difficult, because they are not able to tile an arbitrary rectangular region and have an irrational basis. By storing textures on rank‐1 lattices, we resolve both problems: Rank‐1 lattices can closely approximate hexagonal lattices, while all coordinates of the lattice points remain integer. At identical memory footprint texture quality is improved as compared to traditional orthogonal tensor product lattices due to the higher sampling efficiency. We introduce the basic theory of rank‐1 lattice textures and present an algorithmic framework which easily can be integrated into existing off‐line and real‐time rendering systems. 相似文献
147.
This paper presents a new technique for clustering either object or relational data. First, the data are represented as a matrix D of dissimilarity values. D is reordered to D * using a visual assessment of cluster tendency algorithm. If the data contain clusters, they are suggested by visually apparent dark squares arrayed along the main diagonal of an image I( D *) of D *. The suggested clusters in the object set underlying the reordered relational data are found by defining an objective function that recognizes this blocky structure in the reordered data. The objective function is optimized when the boundaries in I( D *) are matched by those in an aligned partition of the objects. The objective function combines measures of contrast and edginess and is optimized by particle swarm optimization. We prove that the set of aligned partitions is exponentially smaller than the set of partitions that needs to be searched if clusters are sought in D . Six numerical examples are given to illustrate various facets of the algorithm. © 2009 Wiley Periodicals, Inc. 相似文献
148.
Identification of statistical patterns from observed time series of spatially distributed sensor data is critical for performance monitoring and decision making in human-engineered complex systems, such as electric power generation, petrochemical, and networked transportation. This paper presents an information-theoretic approach to identification of statistical patterns in such systems, where the main objective is to enhance structural integrity and operation reliability. The core concept of pattern identification is built upon the principles of Symbolic Dynamics, Automata Theory, and Information Theory. To this end, a symbolic time series analysis method has been formulated and experimentally validated on a special-purpose test apparatus that is designed for data acquisition and real-time analysis of fatigue damage in polycrystalline alloys. 相似文献
149.
Salama CR Keller M Kohlmann P 《IEEE transactions on visualization and computer graphics》2006,12(5):1021-1028
Many sophisticated techniques for the visualization of volumetric data such as medical data have been published. While existing techniques are mature from a technical point of view, managing the complexity of visual parameters is still difficult for non-expert users. To this end, this paper presents new ideas to facilitate the specification of optical properties for direct volume rendering. We introduce an additional level of abstraction for parametric models of transfer functions. The proposed framework allows visualization experts to design high-level transfer function models which can intuitively be used by non-expert users. The results are user interfaces which provide semantic information for specialized visualization problems. The proposed method is based on principal component analysis as well as on concepts borrowed from computer animation. 相似文献
150.
The mountain clustering method and the subtractive clustering method are useful methods for finding cluster centers based on local density in object data. These methods have been extended to shell clustering. In this article, we propose a relational mountain clustering method (RMCM), which produces a set of (proto) typical objects as well as a crisp partition of the objects generating the relation, using a new concept that we call relational density. We exemplify RMCM by clustering several relational data sets that come from object data. Finally, RMCM is applied to web log analysis, where it produces useful user profiles from web log data. © 2005 Wiley Periodicals, Inc. Int J Int Syst 20: 375–392, 2005. 相似文献