全文获取类型
收费全文 | 38103篇 |
免费 | 2831篇 |
国内免费 | 888篇 |
专业分类
电工技术 | 1488篇 |
技术理论 | 1篇 |
综合类 | 1383篇 |
化学工业 | 7229篇 |
金属工艺 | 1778篇 |
机械仪表 | 2297篇 |
建筑科学 | 2090篇 |
矿业工程 | 573篇 |
能源动力 | 1345篇 |
轻工业 | 2829篇 |
水利工程 | 422篇 |
石油天然气 | 1340篇 |
武器工业 | 118篇 |
无线电 | 5502篇 |
一般工业技术 | 6079篇 |
冶金工业 | 2133篇 |
原子能技术 | 498篇 |
自动化技术 | 4717篇 |
出版年
2024年 | 65篇 |
2023年 | 556篇 |
2022年 | 809篇 |
2021年 | 1473篇 |
2020年 | 1014篇 |
2019年 | 1001篇 |
2018年 | 1085篇 |
2017年 | 1236篇 |
2016年 | 1236篇 |
2015年 | 1320篇 |
2014年 | 1821篇 |
2013年 | 2442篇 |
2012年 | 2457篇 |
2011年 | 2789篇 |
2010年 | 2165篇 |
2009年 | 2259篇 |
2008年 | 2106篇 |
2007年 | 1821篇 |
2006年 | 1871篇 |
2005年 | 1624篇 |
2004年 | 1265篇 |
2003年 | 1143篇 |
2002年 | 1158篇 |
2001年 | 839篇 |
2000年 | 787篇 |
1999年 | 850篇 |
1998年 | 951篇 |
1997年 | 701篇 |
1996年 | 627篇 |
1995年 | 470篇 |
1994年 | 390篇 |
1993年 | 282篇 |
1992年 | 238篇 |
1991年 | 172篇 |
1990年 | 141篇 |
1989年 | 129篇 |
1988年 | 119篇 |
1987年 | 88篇 |
1986年 | 62篇 |
1985年 | 51篇 |
1984年 | 44篇 |
1983年 | 20篇 |
1982年 | 33篇 |
1981年 | 22篇 |
1980年 | 12篇 |
1979年 | 17篇 |
1978年 | 8篇 |
1977年 | 7篇 |
1976年 | 14篇 |
1973年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 328 毫秒
991.
呼吸是人的基本生命活动,监测呼吸可以得知呼吸道和胸廓运动的生理、病理学状态,对某些呼吸系统疾病的诊断有重要的参考价值;提出了一种非接触式呼吸监测方法:对红外视频流中的每帧胸腹部区域数据进行降维,计算所有胸腹部区域数据的方差,将一定时间段内的方差序列进行低通滤波;最后根据方差序列可以获得该段时间内的呼吸频率和呼吸暂停时间;提出的非接触式呼吸检测算法在不影响被监测者正常睡眠活动的情况下,可以准确获取呼吸频率与其他相关参数,为健康监测和相关疾病的诊断提供了数据支持;日常家居场景的实验中,检测到的呼吸次数与实际完全一致,并且与实际胸腹部起伏变化基本同步,较好的保证了结果的准确性。 相似文献
992.
Attainability of the minimum data rate for stabilization of linear systems via logarithmic quantization 总被引:1,自引:0,他引:1
This paper investigates the attainability of the minimum average data rate for stabilization of linear systems via logarithmic quantization. It is shown that a finite-level logarithmic quantizer suffices to approach the well-known minimum average data rate for stabilizing an unstable linear discrete-time system under two basic network configurations. In particular, we derive explicit finite-level logarithmic quantizers and the corresponding controllers to approach the minimum average data rate. 相似文献
993.
Target sales rebate (TSR) contracts have been shown to be useful in coordinating supply chains with risk-neutral agents. However, there have been few studies on the cases with risk sensitive agents. As a result, based on the classic Markowitz portfolio theory in finance, we carry out in this paper a mean–variance (MV) analysis of supply chains under TSR contracts. We study a supply chain with a single supplier and a single risk averse retailer. We propose TSR contracts for achieving coordination. We demonstrate how TSR contracts can coordinate the supply chain which takes into consideration the degree of risk aversion of the retailer. We find that the supplier can coordinate the channel with flexible TSR contracts. In addition, we extend the supply chain model to include sales effort decision of the retailer. Conditions for TSR contracts to coordinate the supply chain with sales effort of retailer are also derived. 相似文献
994.
A signature-based intrusion detection system identifies intrusions by comparing the data traffic with known signature patterns. In this process, matching of packet strings against signature patterns is the most time-consuming step and dominates the overall system performance. Many signature-based network intrusion detection systems (NIDS), e.g., the Snort, employ one or multiple pattern matching algorithms to detect multiple attack types. So far, many pattern matching algorithms have been proposed. Most of them use single-byte standard unit for search, while a few algorithms such as the Modified Wu-Manber (MWM) algorithm use typically two-byte unit, which guarantees better performance than others even as the number of different signatures increases. Among those algorithms, the MWM algorithm has been known as the fastest pattern matching algorithm when the patterns in a rule set rarely appear in packets. However, the matching time of the MWM algorithm increases as the length of the shortest pattern in a signature group decreases.In this paper, by extending the length of the shortest pattern, we minimize the pattern matching time of the algorithm which uses multi-byte unit. We propose a new pattern matching algorithm called the L+1-MWM algorithm for multi-pattern matching. The proposed algorithm minimizes the performance degradation that is originated from the dependency on the length of the shortest pattern. We show that the L+1-MWM algorithm improves the performance of the MWM algorithm by as much as 20% in average under various lengths of shortest patterns and normal traffic conditions. Moreover, when the length of the shortest pattern in a rule set is less than 5, the L+1-MWM algorithm shows 38.87% enhancement in average. We also conduct experiments on a real campus network and show that 12.48% enhancement is obtained in average. In addition, it is shown that the L+1-MWM algorithm provides a better performance than the MWM algorithm by as much as 25% in average under various numbers of signatures and normal traffic conditions, and 20.12% enhancement in average with real on-line traffic. 相似文献
995.
We propose a novel 2D image-based approach that can simultaneously handle illumination and pose variations to enhance face recognition rate. It is much simpler, requires much less computational effort than the methods based on 3D models, and provides a comparable or better recognition rate. 相似文献
996.
RFID has emerged as a potential tool to combat product counterfeiting, which undermines the global economy hugely. Recently, a number of anti-counterfeiting approaches have been proposed for such purpose. This paper presents a track-and-trace system for RFID-based anti-counterfeiting, and addresses possible implementation issues, such as tag selection, product tagging, tag programming and locking. A packaging line for bottled products is developed and integrated with the proposed system for investigation of these issues. Experiments are conducted to determine the critical tag moving speed beyond which the tag programming rate or reliability of tagged products being transferred on a convey drops significantly. The critical tag moving speed is vital not only for determining the maximum production throughput possible, but also for setting up RFID equipment needed to ensure tagged products with erroneous tagging can be sorted out from the packaging line accordingly. 相似文献
997.
Jong-Min Kim Yoon-Sung JungTaeryon Choi Engin A. Sungur 《Computational statistics & data analysis》2011,55(3):1357-1366
We propose a new partial correlation approach using Gaussian copula. Our empirical study found that the Gaussian copula partial correlation has the same value as that which is obtained by performing a Pearson’s partial correlation. With the proposed method, based on canonical vine and d-vine, we captured direct interactions among eight histone genes. 相似文献
998.
Sunghyuk Kwon Eunjung Choi Min K. Chung 《International Journal of Industrial Ergonomics》2011,41(3):322-330
Tap-n-drag is a popular navigation method for small touch-screen interfaces. When an information space is too large compared to the touch-screen size, navigating the information space using tap-n-drag requires too many drags, resulting in poor usability such as long navigation time or fatigue. In this study, the effect of control-to-display gain on the usability of tap-n-drag was experimentally investigated to determine whether increasing the control-to-display gain can resolve this problem. The effect of movement direction of the information space relative to the drag direction was also investigated (push background vs. push viewport). In experiments, increasing control-to-display gain seemed to increase the usability of tap-n-drag, but excessively large gain seemed to have the opposite effect on some measures such as task completion time, ease of use and overall preference; as a result these measures-vs.-GAIN curves were U-shaped or inverted-U-shaped. Overall, both task completion time and number of touches required to locate a target were lower when using push viewport than when using push background, except at GAIN = 1.
Relevance to industry
The results of this study can be used to enhance the usability of tap-n-drag and other navigation methods in small touch-screen devices when users navigate a large information space. 相似文献999.
Liu CC Chang CH Su MC Chu HT Hung SH Wong JM Wang PC 《Computer methods and programs in biomedicine》2011,104(3):435-442
Objective
To control the workflow for surgical patients, we in-cooperate radio-frequency identification (RFID) technology to develop a Patient Advancement Monitoring System (PAMS) in operation theater.Methods
The web-based PAMS is designed to monitor the whole workflow for the handling of surgical patients. The system integrates multiple data entry ports Across the multi-functional surgical teams. Data are entered into the system through RFID, bar code, palm digital assistance (PDA), ultra-mobile personal computer (UMPC), or traditional keyboard at designated checkpoints. Active radio-frequency identification (RFID) tag can initiate data demonstration on the computer screens upon a patient's arrival at any particular checkpoint along the advancement pathway.Results
The PAMS can manage the progress of operations, patient localization, identity verification, and peri-operative care. The workflow monitoring provides caregivers’ instant information sharing to enhance management efficiency.Conclusion
RFID-initiate surgical workflow control is valuable to meet the safety, quality, efficiency requirements in operation theater. 相似文献1000.
通过对Apriori算法的研究和分析,结合算法存在的缺陷,利用"桶"技术及压缩组合项集技术,对频繁项集提出了前缀概念,并提出了基于前缀的频繁项集挖掘算法。该算法将具有同一前缀的频繁项集的子集合作为一个节点,由频繁k-项集的子集合直接产生候选(k+1)-项集,从而省略了连接步中判断I1、I2是否能连接。同时,该算法使得整个程序中节点数目减少,这样不仅减少了内存消耗,而且提高了查找Ck和Lk的速度,尤其便于大型数据库的分布式处理。经实验证实,改进后的算法是可行的。 相似文献