全文获取类型
收费全文 | 4460篇 |
免费 | 220篇 |
国内免费 | 10篇 |
专业分类
电工技术 | 54篇 |
综合类 | 3篇 |
化学工业 | 950篇 |
金属工艺 | 86篇 |
机械仪表 | 67篇 |
建筑科学 | 268篇 |
矿业工程 | 4篇 |
能源动力 | 196篇 |
轻工业 | 471篇 |
水利工程 | 30篇 |
石油天然气 | 9篇 |
无线电 | 384篇 |
一般工业技术 | 822篇 |
冶金工业 | 417篇 |
原子能技术 | 32篇 |
自动化技术 | 897篇 |
出版年
2023年 | 44篇 |
2022年 | 67篇 |
2021年 | 124篇 |
2020年 | 83篇 |
2019年 | 99篇 |
2018年 | 109篇 |
2017年 | 101篇 |
2016年 | 138篇 |
2015年 | 125篇 |
2014年 | 159篇 |
2013年 | 284篇 |
2012年 | 287篇 |
2011年 | 341篇 |
2010年 | 295篇 |
2009年 | 265篇 |
2008年 | 277篇 |
2007年 | 238篇 |
2006年 | 206篇 |
2005年 | 177篇 |
2004年 | 155篇 |
2003年 | 135篇 |
2002年 | 120篇 |
2001年 | 59篇 |
2000年 | 74篇 |
1999年 | 53篇 |
1998年 | 65篇 |
1997年 | 53篇 |
1996年 | 55篇 |
1995年 | 43篇 |
1994年 | 51篇 |
1993年 | 34篇 |
1992年 | 27篇 |
1991年 | 27篇 |
1990年 | 23篇 |
1989年 | 30篇 |
1988年 | 17篇 |
1987年 | 25篇 |
1986年 | 21篇 |
1985年 | 21篇 |
1984年 | 22篇 |
1983年 | 19篇 |
1982年 | 23篇 |
1981年 | 16篇 |
1980年 | 13篇 |
1979年 | 18篇 |
1978年 | 9篇 |
1977年 | 15篇 |
1976年 | 10篇 |
1974年 | 7篇 |
1971年 | 6篇 |
排序方式: 共有4690条查询结果,搜索用时 15 毫秒
71.
Magnetic materials used in cored microinductors to supersede ferrite in the 0.5-10 MHz frequency range are investigated in
this article. The performance of electrodeposited nickel–iron, cobalt–iron–copper alloys and the commercial alloy Vitrovac
6025 have been assessed through their inclusion within a custom-made solenoid microinductor. Although the present inductor
achieves 77% power efficiency at 500 KHz for 24.7 W/cm3 power density, an optimized process predicts a power efficiency of
97% for 30.83 W/cm3 power density. The main issues regarding microinductor design and performance are discussed. 相似文献
72.
Wolfgang Fuhl Marc Tonsen Andreas Bulling Enkelejda Kasneci 《Machine Vision and Applications》2016,27(8):1275-1288
Robust and accurate detection of the pupil position is a key building block for head-mounted eye tracking and prerequisite for applications on top, such as gaze-based human–computer interaction or attention analysis. Despite a large body of work, detecting the pupil in images recorded under real-world conditions is challenging given significant variability in the eye appearance (e.g., illumination, reflections, occlusions, etc.), individual differences in eye physiology, as well as other sources of noise, such as contact lenses or make-up. In this paper we review six state-of-the-art pupil detection methods, namely ElSe (Fuhl et al. in Proceedings of the ninth biennial ACM symposium on eye tracking research & applications, ACM. New York, NY, USA, pp 123–130, 2016), ExCuSe (Fuhl et al. in Computer analysis of images and patterns. Springer, New York, pp 39–51, 2015), Pupil Labs (Kassner et al. in Adjunct proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing (UbiComp), pp 1151–1160, 2014. doi: 10.1145/2638728.2641695), SET (Javadi et al. in Front Neuroeng 8, 2015), Starburst (Li et al. in Computer vision and pattern recognition-workshops, 2005. IEEE Computer society conference on CVPR workshops. IEEE, pp 79–79, 2005), and ?wirski (?wirski et al. in Proceedings of the symposium on eye tracking research and applications (ETRA). ACM, pp 173–176, 2012. doi: 10.1145/2168556.2168585). We compare their performance on a large-scale data set consisting of 225,569 annotated eye images taken from four publicly available data sets. Our experimental results show that the algorithm ElSe (Fuhl et al. 2016) outperforms other pupil detection methods by a large margin, offering thus robust and accurate pupil positions on challenging everyday eye images. 相似文献
73.
During summer and autumn 2007, a 11 GHz microwave radiometer was deployed in an experimental tree plantation in Sardinilla, Panama. The opacity of the tree canopy was derived from incoming brightness temperatures received on the ground. A collocated eddy-covariance flux tower measured water vapor fluxes and meteorological variables above the canopy. In addition, xylem sapflow of trees was measured within the flux tower footprint. We observed considerable diurnal differences between measured canopy opacities and modeled theoretical opacities that were closely linked to xylem sapflow. It is speculated that dielectric changes in the leaves induced by the sapflow are causing the observed diurnal changes. In addition, canopy intercepted rain and dew formation also modulated the diurnal opacity cycle. With an enhanced canopy opacity model accounting for water deposited on the leaves, we quantified the influence of canopy stored water (i.e. intercepted water and dew) on the opacity. A time series of dew formation and rain interception was directly monitored during a period of two weeks. We found that during light rainfall up to 60% of the rain amount is intercepted by the canopy whereas during periods of intense rainfall only 4% were intercepted. On average, 0.17 mm of dew was formed during the night. Dew evaporation contributed 5% to the total water vapor flux measured above the canopy. 相似文献
74.
This paper presents a scheme that employs TCP-aware network coding with opportunistic scheduling to enhance TCP throughput in wireless mobile ad hoc networks. Specifically, it considers a TCP parameter, congestion window size, and wireless channel conditions simultaneously to improve TCP throughput performance. Evaluation of this scheme is carried out by using ns2 simulations in different scenarios. The results show that the proposed scheme gives approximately 35% throughput improvement in a high mobility environment and about 33% throughput increase in no or low mobility environment as compared to traditional network coding with opportunistic scheduling. This paper also proposes a new adaptive-W (i.e., adaptive Waiting time) scheme whose objective is to adaptively control waiting time of overheard packets that are stored in a buffer to achieve tradeoff between throughput and overhead. 相似文献
75.
76.
We introduce a method based on Kolmogorov complexity to prove lower bounds on communication complexity. The intuition behind our technique is close to information theoretic methods.We use Kolmogorov complexity for three different things: first, to give a general lower bound in terms of Kolmogorov mutual information; second, to prove an alternative to Yao’s minmax principle based on Kolmogorov complexity; and finally, to identify hard inputs.We show that our method implies the rectangle and corruption bounds, known to be closely related to the subdistribution bound. We apply our method to the hidden matching problem, a relation introduced to prove an exponential gap between quantum and classical communication. We then show that our method generalizes the VC dimension and shatter coefficient lower bounds. Finally, we compare one-way communication and simultaneous communication in the case of distributional communication complexity and improve the previous known result. 相似文献
77.
Marc Hassenzahl 《Behaviour & Information Technology》2000,19(1):29-42
Software-ergonomic system analysis often reveals numerous usability problems. Given that system design suffers from limited resources, the prioritization of usability problems seems inevitable. Surprisingly enough, prioritization is not in the focus of scientific interest. Within this paper, approaches to prioritization relying on severity estimates will be presented. Two of the approaches, namely priorities based on data about the impact of a problem (data-driven) and priorities based on judgements of interest group members (judgement-driven) will be further explored. In the data-driven approach total problem-handling time caused by a usability problem is presented as a measure of severity. The major disadvantage of the data-driven approach is its costs. A possible alternative are severity estimates based on judgements by members of involved interest groups. The first of two studies shows how to obtain judgement driven severity estimates and reveals a fundamental lack of correspondence between data-driven and judgement-driven severity estimates. The second study supports the notion that the lack of correspondence may stem from a difference between assumptions of the data-driven approach and the naive judgement model of interest group members in the judgement-driven approach. A hypothetical model for severity estimates by interest group members is presented. 相似文献
78.
Controlling the dynamics of a constrained manipulator includesposition tracking as well as stabilization of the contact wrench.In this paper we derive a control scheme, that makes it possible to treat position and force control independently.The approach is based on a mass-orthogonal splitting of the space of joint torques, allowing independent actuation and therefore independent specification of control laws. An appropriate definition of the reference wrenchmakes it possible to achieve independent stability of the position and force loop. 相似文献
79.
Valette S Chassery JM Prost R 《IEEE transactions on visualization and computer graphics》2008,14(2):369-381
In this paper, we propose a generic framework for 3D surface remeshing. Based on a metric-driven Discrete Voronoi Diagram construction, our output is an optimized 3D triangular mesh with a user defined vertex budget. Our approach can deal with a wide range of applications, from high quality mesh generation to shape approximation. By using appropriate metric constraints the method generates isotropic or anisotropic elements. Based on point-sampling, our algorithm combines the robustness and theoretical strength of Delaunay criteria with the efficiency of entirely discrete geometry processing . Besides the general described framework, we show experimental results using isotropic, quadric-enhanced isotropic and anisotropic metrics which prove the efficiency of our method on large meshes, for a low computational cost. 相似文献
80.
Network-on-chip-based multiprocessor systems-on-chip are considered as future embedded systems platforms. One of the steps in mapping an application onto such a parallel platform involves scheduling the communication on the network-on-chip. This paper presents different scheduling strategies that minimize resource usage by exploiting all scheduling freedom offered by networks-on-chip. It also introduces a technique to take the dynamism in applications into account when scheduling the communication of an application on the network-on-chip while minimizing the resource usage. Our experiments show that resource-utilization is improved when compared to existing techniques. 相似文献