全文获取类型
收费全文 | 414823篇 |
免费 | 25413篇 |
国内免费 | 13236篇 |
专业分类
电工技术 | 19009篇 |
技术理论 | 56篇 |
综合类 | 21790篇 |
化学工业 | 67817篇 |
金属工艺 | 23195篇 |
机械仪表 | 24197篇 |
建筑科学 | 28211篇 |
矿业工程 | 11591篇 |
能源动力 | 10914篇 |
轻工业 | 22585篇 |
水利工程 | 6614篇 |
石油天然气 | 23575篇 |
武器工业 | 2652篇 |
无线电 | 45488篇 |
一般工业技术 | 55163篇 |
冶金工业 | 20997篇 |
原子能技术 | 3534篇 |
自动化技术 | 66084篇 |
出版年
2024年 | 1325篇 |
2023年 | 5285篇 |
2022年 | 9122篇 |
2021年 | 12846篇 |
2020年 | 10051篇 |
2019年 | 8176篇 |
2018年 | 22213篇 |
2017年 | 22508篇 |
2016年 | 18451篇 |
2015年 | 13066篇 |
2014年 | 16376篇 |
2013年 | 19717篇 |
2012年 | 23447篇 |
2011年 | 31513篇 |
2010年 | 27142篇 |
2009年 | 23668篇 |
2008年 | 24556篇 |
2007年 | 24941篇 |
2006年 | 18666篇 |
2005年 | 17500篇 |
2004年 | 11588篇 |
2003年 | 10379篇 |
2002年 | 8802篇 |
2001年 | 7665篇 |
2000年 | 8317篇 |
1999年 | 9842篇 |
1998年 | 8306篇 |
1997年 | 6872篇 |
1996年 | 6482篇 |
1995年 | 5402篇 |
1994年 | 4421篇 |
1993年 | 3125篇 |
1992年 | 2527篇 |
1991年 | 2006篇 |
1990年 | 1519篇 |
1989年 | 1243篇 |
1988年 | 1039篇 |
1987年 | 685篇 |
1986年 | 542篇 |
1985年 | 342篇 |
1984年 | 245篇 |
1983年 | 205篇 |
1982年 | 197篇 |
1981年 | 129篇 |
1980年 | 134篇 |
1979年 | 67篇 |
1976年 | 55篇 |
1965年 | 49篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 18 毫秒
991.
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity 总被引:1,自引:0,他引:1 下载免费PDF全文
This paper presents a construction for a class of 1-resilient functions with optimal algebraic immunity on an even number
of variables. The construction is based on the concatenation of two balanced functions in associative classes. For some n, a part of 1-resilient functions with maximum algebraic immunity constructed in the paper can achieve almost optimal nonlinearity.
Apart from their high nonlinearity, the functions reach Siegenthaler's upper bound of algebraic degree. Also a class of 1-resilient
functions on any number n > 2 of variables with at least sub-optimal algebraic immunity is provided. 相似文献
992.
The geometric element transformation method (GETMe) is a geometry-based smoothing method for mixed and non-mixed meshes. It
is based on a simple geometric transformation applicable to elements bounded by polygons with an arbitrary number of nodes.
The transformation, if applied iteratively, leads to a regularization of the polygons. Global mesh smoothing is accomplished
by averaging the new node positions obtained by local element transformations. Thereby, the choice of transformation parameters
as well as averaging weights can be based on the element quality which leads to high quality results. In this paper, a concept
of an enhanced transformation approach is presented and a proof for the regularizing effect of the transformation based on
eigenpolygons is given. Numerical examples confirm that the GETMe approach leads to superior mesh quality if compared to other
geometry-based methods. In terms of quality it can even compete with optimization-based techniques, despite being conceptually
significantly simpler. 相似文献
993.
This paper addresses the food distribution decision from a wholesaler's perspective, as the wholesalers are often faced with thorny issues such as when, where, how to deliver products at the lowest costs to best satisfy the retailers’ changing needs. This research relies on a distribution problem encountered at Northern Grocery Company in Beijing as an example to develop a two-stage solution procedure and subsequent computer-enabled programs for identifying efficient vehicle routing alternatives. The solution process, which integrates heuristic search algorithms and an integer programming model, can be applied to a wide range of distribution problems with specified route durations and a circular transportation network structure as exemplified by City of Beijing. 相似文献
994.
The last generation of infrared imaging aircraft seekers and trackers uses pattern recognition algorithms to find and keep
a lock on an aircraft in the presence of decoy flares. These algorithms identify targets, based on the features of the various
objects in the missile’s field of view. Because modern both aircrafts and missiles fly faster than sound, speed of operation
of the target identifier is critical. In this article, we propose a target recognition system that respects this time constraint.
It is based on an artificial neural network implemented in hardware, as a set of parallel processors on a commercially available
silicon chip called a ZISC, for zero instruction set computer. This chip would be integrated in the infrared missile seeker
and tracker. We describe the characteristics of the images that the image processing module of this seeker and tracker extracts
from the infrared video frames and show how to construct from these translation and rotation invariant features that can be
used as input to the neural network. We determine the individual discriminating power of these features by constructing their
histograms, which allows us to eliminate some as not being useful for our purpose. Finally, by testing our system on real
data, we show that it has a 90% success rate in aircraft-flare identification, and a processing time that during this time,
the aircrafts and missiles will have traveled only a few millimeters. Most of the images on which the neural network makes
its mistakes are seen to be hard to recognize even by a human expert. 相似文献
995.
Kalliopi Tzantzara Anastasios A. Economides 《Peer-to-Peer Networking and Applications》2010,3(2):161-171
This study examines gender differences among Greek Internet users in using digital music distribution methods. First, a Web-based
questionnaire was developed and placed on most popular Greek forums. Then, 300 Greek Internet users stated their opinions
regarding digital music and the following downloading methods: 1) Http downloading, 2) P2P downloading, 3) Torrent downloading,
and 4) Combined iTunes method. The results revealed that P2P programs are the first choice for downloading mp3. The responders
were satisfied with the P2P’s easiness of use, the variety of songs and the no need to pay. However, they worried about P2P’s
safety. Gender differences were identified in several areas. Music industry managers could consider these findings in their
strategies to reach the consumers. Advertising companies could use the results to target differently male or female consumers. 相似文献
996.
A new elegant and simple algorithm for mutual exclusion of N processes is proposed. It only requires shared variables in a memory model where shared variables need not be accessed atomically.
We prove mutual exclusion by reformulating the algorithm as a transition system (automaton), and applying simulation of automata.
The proof has been verified with the higher-order interactive theorem prover PVS. Under an additional atomicity assumption,
the algorithm is starvation free, and we conjecture that no competing process is passed by any other process more than once.
This conjecture was verified by model checking for systems with at most five processes. 相似文献
997.
Lei Ye Zhijun Wang Hao Che Henry B.C. Chan Constantino M. Lagoa 《Computer Communications》2009,32(5):800-805
Understanding the TCP congestion control mechanism from a global optimization point of view is not only important in its own right, but also crucial to the design of other transport layer traffic control protocols with provable properties. In this paper, we derive a global utility function and the corresponding optimal control law, known as TCP control law, which maximizes the global utility. The TCP control law captures the essential behaviors of TCP, including slow start, congestion avoidance, and the binary nature of congestion feedback in TCP. We find that the utility function of TCP is linear in the slow start phase and is proportional to the additive increase rate and approaches the well-known logarithm function as the data rate becomes large in the congestion avoidance phase. We also find that understanding the slow start phase with a fixed threshold is critical to the design of new transport layer control protocols to enable quality of service features. Finally, as an application, we design a Minimum Rate Guaranteed (MRG) traffic control law that shares the same utility function as the TCP control law. Our simulation study of the MRG control law indicates that it is indeed TCP friendly and can provide minimum rate guarantee as long as the percentage of network resource consumed by the MRG flows is moderately small. 相似文献
998.
Backbone-based broadcast schemes are effective in alleviating the broadcast storm problem in mobile ad hoc networks (MANETs). However, periodically hello packets used to maintain a backbone usually lead to extra control overhead. In this paper, passive tree-based backbone construction scheme (PTBCS) is proposed as a backbone construction scheme for MANETs. Different from other schemes, each node in PTBCS determines its role by intercepting packet transmissions in the air during a special waiting period. Hence, its most remarkable advantage is that there are no periodical packet transmissions specially for backbone construction. The property that the nodes selected by PTBCS make up a connected dominating set (CDS) of the network is proven with several ideal assumptions. Simulation results show that PTBCS is effective when compared with some other typical backbone construction schemes. 相似文献
999.
Zhe-Ming Lu Author Vitae Jun-Xiang Wang Author Vitae Bei-Bei Liu Author Vitae 《Journal of Systems and Software》2009,82(6):1016-1024
Copyright protection and information security have become serious problems due to the ever growing amount of digital data over the Internet. Reversible data hiding is a special type of data hiding technique that guarantees not only the secret data but also the cover media can be reconstructed without any distortion. Traditional schemes are based on spatial, discrete cosine transformation (DCT) and discrete wavelet transformation (DWT) domains. Recently, some vector quantization (VQ) based reversible data hiding schemes have been proposed. This paper proposes an improved reversible data hiding scheme based on VQ-index residual value coding. Experimental results show that our scheme outperforms two recently proposed schemes, namely side-match vector quantization (SMVQ)-based data hiding and modified fast correlation vector quantization (MFCVQ)-based data hiding. 相似文献
1000.
We propose a computationally efficient method for cross-validation of the Support Vector Regression (SVR) by generalizing the decremental algorithm of SVR. Incremental and decremental algorithm of Support Vector Machines (SVM) 2, 8, 9) efficiently update the trained SVM model when a single data point is added to or removed from the training set. The computational cost of leave-one-out cross-validation can be reduced using the decremental algorithm. However, when we perform leave-m-out cross-validation (m > 1), we have to repeatedly apply the decremental algorithm for each data point. In this paper, we extend the decremental algorithm of SVR8, 9) in such a way that several data points can be removed more efficiently. Experimental results indicate that the proposed approach can reduce the computational cost. In particular, we observed that the number of breakpoints, which is the main computational cost of the involved path-following, were reduced from \({\mathcal O}(m)\) to \({\mathcal O}(\sqrt{m})\). 相似文献