全文获取类型
收费全文 | 104986篇 |
免费 | 10600篇 |
国内免费 | 6510篇 |
专业分类
电工技术 | 7982篇 |
技术理论 | 1篇 |
综合类 | 8548篇 |
化学工业 | 14815篇 |
金属工艺 | 6932篇 |
机械仪表 | 7233篇 |
建筑科学 | 8285篇 |
矿业工程 | 3632篇 |
能源动力 | 2665篇 |
轻工业 | 8154篇 |
水利工程 | 2541篇 |
石油天然气 | 5172篇 |
武器工业 | 1145篇 |
无线电 | 12314篇 |
一般工业技术 | 11009篇 |
冶金工业 | 4396篇 |
原子能技术 | 1349篇 |
自动化技术 | 15923篇 |
出版年
2024年 | 521篇 |
2023年 | 1575篇 |
2022年 | 3408篇 |
2021年 | 4494篇 |
2020年 | 3344篇 |
2019年 | 2653篇 |
2018年 | 2894篇 |
2017年 | 3315篇 |
2016年 | 3036篇 |
2015年 | 4607篇 |
2014年 | 5614篇 |
2013年 | 6710篇 |
2012年 | 7774篇 |
2011年 | 8236篇 |
2010年 | 7696篇 |
2009年 | 7524篇 |
2008年 | 7340篇 |
2007年 | 7185篇 |
2006年 | 6562篇 |
2005年 | 5532篇 |
2004年 | 3830篇 |
2003年 | 3015篇 |
2002年 | 2816篇 |
2001年 | 2429篇 |
2000年 | 2054篇 |
1999年 | 1736篇 |
1998年 | 1123篇 |
1997年 | 989篇 |
1996年 | 867篇 |
1995年 | 701篇 |
1994年 | 569篇 |
1993年 | 423篇 |
1992年 | 330篇 |
1991年 | 264篇 |
1990年 | 219篇 |
1989年 | 186篇 |
1988年 | 137篇 |
1987年 | 88篇 |
1986年 | 75篇 |
1985年 | 36篇 |
1984年 | 34篇 |
1983年 | 13篇 |
1982年 | 24篇 |
1981年 | 18篇 |
1980年 | 22篇 |
1979年 | 11篇 |
1978年 | 8篇 |
1976年 | 7篇 |
1959年 | 13篇 |
1951年 | 18篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
提出了一种基于与或图表示的多风格肖像画自动生成方法.与或图表示是一种分层次的产生式模型,能够分离肖像画的结构和风格并解释其多样性.采用这种模型,该方法能够从一幅正面的人脸图像自动地产生出一系列不同风格的肖像画.该方法将肖像画分解成各个部分,每一部分都对应许多子模板,这些子模板作为肖像画与或图中的叶子结点.而肖像画与或图就像一个"母模板"能够产生出大量的由子模板组合而成有效的新肖像画.该方法受益于多个不同风格的模板库,改变模板库的风格就能方便地更改生成肖像画的风格.文中所提供的例子表明了该方法的有效性. 相似文献
992.
993.
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles 总被引:1,自引:0,他引:1
DENG Robert 《中国科学:信息科学(英文版)》2010,(3):593-606
Up to now, it is still an open question of how to construct a chosen-ciphertext secure unidirectional proxy re-encryption scheme in the adaptive corruption model. To address this problem, we propose a new unidirectional proxy re-encryption scheme, and prove its chosen-ciphertext security in the adaptive corruption model without random oracles. Compared with the best known unidirectional proxy re-encryption scheme proposed by Libert and Vergnaud in PKC’08, our scheme enjoys the advantages of both higher effi... 相似文献
994.
SAIL: Structure-aware indexing for effective and progressive top-k keyword search over XML documents
Keyword search in XML documents has recently gained a lot of research attention. Given a keyword query, existing approaches first compute the lowest common ancestors (LCAs) or their variants of XML elements that contain the input keywords, and then identify the subtrees rooted at the LCAs as the answer. In this the paper we study how to use the rich structural relationships embedded in XML documents to facilitate the processing of keyword queries. We develop a novel method, called SAIL, to index such structural relationships for efficient XML keyword search. We propose the concept of minimal-cost trees to answer keyword queries and devise structure-aware indices to maintain the structural relationships for efficiently identifying the minimal-cost trees. For effectively and progressively identifying the top-k answers, we develop techniques using link-based relevance ranking and keyword-pair-based ranking. To reduce the index size, we incorporate a numbering scheme, namely schema-aware dewey code, into our structure-aware indices. Experimental results on real data sets show that our method outperforms state-of-the-art approaches significantly, in both answer quality and search efficiency. 相似文献
995.
Recent soft shadow mapping techniques based on back-projection can render high quality soft shadows in real time. However, real time high quality rendering of large penumbrae is still challenging, especially when multilayer shadow maps are used to reduce single light sample silhouette artifact. In this paper, we present an efficient algorithm to attack this problem. We first present a GPU-friendly packet-based approach rendering a packet of neighboring pixels together to amortize the cost of computing visibility factors. Then, we propose a hierarchical technique to quickly locate the contour edges, further reducing the computation cost. At last, we suggest a multi-view shadow map approach to reduce the single light sample artifact. We also demonstrate its higher image quality and higher efficiency compared to the existing depth peeling approaches. 相似文献
996.
Voting systems are common tools in a variety of areas. This paper studies parameterized computational complexity of control of Plurality, Condorcet and Approval voting systems, respectively. The types of controls considered include adding or deleting candidates or voters, under constructive or destructive setting. We obtain the following results: (1) constructive control by adding candidates in Plurality voting is W[2]-hard with respect to the parameter “number of added candidates”, (2) destructive control by adding candidates in Plurality voting is W[2]-hard with respect to the parameter “number of added candidates”, (3) constructive control by adding voters in Condorcet voting is W[1]-hard with respect to the parameter “number of added voters”, (4) constructive control by deleting voters in Condorcet voting is W[1]-hard with respect to the parameter “number of deleted voters”, (5) constructive control by adding voters in Approval voting is W[1]-hard with respect to the parameter “number of added voters”, and (6) constructive control by deleting voters in Approval voting is W[2]-hard with respect to the parameter “number of deleted voters”. 相似文献
997.
Margin based feature extraction has become a hot topic in machine learning and pattern recognition. In this paper, we present
a novel feature extraction method called Adaptive Margin Maximization (AMM) in which margin is defined to measure the discrimination
ability of the features. The motivation comes principally from the iterative weight modification mechanism of the powerful
boosting algorithms. In our AMM, the samples are dynamically weighted and features are learned sequentially. After one new
feature is learned by maximizing the weighted total margin of data, the weights are updated so that the samples with smaller
margins receive larger weights. The feature learned in the next round will thus try to concentrate more on these “hard” samples
adaptively. We show that when the data are projected onto the feature space learned by AMM, most examples have large margins,
and therefore the nearest neighbor classifier yields small generalization error. This is in contrast to existing margin maximization
based feature extraction approaches, in which the goal is to maximize the total margin. Extensive experimental results on
benchmark datasets demonstrate the effectiveness of our method. 相似文献
998.
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof. 相似文献
999.
Heng Qi Yuhong Liu Xuan Wang Feng Shen Yong Yu Tao Chen Tiechuan Zuo 《Microsystem Technologies》2009,15(2):297-300
Excimer laser ablation technique was introduced into this work to fabricate a passive planar micromixer on the PMMA substrate.
T-junction shaped and width-changed S-shaped microchannels were both designed in this micromixer to enhance mixing effect.
The mixing experiment of distilled water and Rhodamine B with injection flow rate of 500 and 1,500 μm/s validates the mixing
effectivity of this micromixer, and indicates the feasibility of excimer laser ablation in the microfabrication of μ-TAS device. 相似文献
1000.
Feng Cui Wenyuan Chen Weiping Zhang Qijun Xiao Gaoyin Ma Wu Liu 《Microsystem Technologies》2009,15(12):1885-1896
A micromachined electrostatically suspended gyroscope, with a wheel-like rotor housed by top stator and bottom stator, using
UV-LIGA microfabrication technology, was presented. The designed structure and basic operating principle of the gyroscope
are described. The key steps in the fabrication process, such as wet etching of Pyrex glass pits for soldering, and integration
of thick nickel structures by removal of SU-8 mold, were considered in detail and well solved. Cr/Pt/photoresist was used
as etching mask and the etched pits, in depth of near 30 μm, with aspect ratio (depth to undercutting) of 0.75, were obtained.
With metal foundations constructed for consolidation, successful integration of the nickel structures, in thickness of 200 μm,
was achieved by successful removal of the SU-8 mold using oleum. After the two stators and the rotor were fabricated separately,
they were assembled and soldering bonded to form axial and radial small gaps, hence, the initial prototype of the microgyroscope
was realized. The key techniques described in this paper can be applied to fabrication of other micro devices. The metal foundation
method, associated with removal of SU-8 mold by oleum, is expected to make SU-8 wider applications in making integrated microstructures
with fabricated circuitry on the same chip. 相似文献