全文获取类型
收费全文 | 119517篇 |
免费 | 9517篇 |
国内免费 | 5635篇 |
专业分类
电工技术 | 7227篇 |
技术理论 | 10篇 |
综合类 | 9042篇 |
化学工业 | 19750篇 |
金属工艺 | 7145篇 |
机械仪表 | 8014篇 |
建筑科学 | 8235篇 |
矿业工程 | 3860篇 |
能源动力 | 3384篇 |
轻工业 | 9059篇 |
水利工程 | 2187篇 |
石油天然气 | 7492篇 |
武器工业 | 979篇 |
无线电 | 12349篇 |
一般工业技术 | 13725篇 |
冶金工业 | 6050篇 |
原子能技术 | 1332篇 |
自动化技术 | 14829篇 |
出版年
2024年 | 449篇 |
2023年 | 1706篇 |
2022年 | 3160篇 |
2021年 | 4299篇 |
2020年 | 3250篇 |
2019年 | 2882篇 |
2018年 | 3339篇 |
2017年 | 3649篇 |
2016年 | 3186篇 |
2015年 | 4434篇 |
2014年 | 5653篇 |
2013年 | 7002篇 |
2012年 | 7751篇 |
2011年 | 8464篇 |
2010年 | 7665篇 |
2009年 | 7389篇 |
2008年 | 7515篇 |
2007年 | 7333篇 |
2006年 | 7164篇 |
2005年 | 6206篇 |
2004年 | 4389篇 |
2003年 | 3628篇 |
2002年 | 3292篇 |
2001年 | 2880篇 |
2000年 | 2816篇 |
1999年 | 2767篇 |
1998年 | 2251篇 |
1997年 | 1848篇 |
1996年 | 1762篇 |
1995年 | 1485篇 |
1994年 | 1246篇 |
1993年 | 889篇 |
1992年 | 688篇 |
1991年 | 513篇 |
1990年 | 388篇 |
1989年 | 327篇 |
1988年 | 271篇 |
1987年 | 174篇 |
1986年 | 140篇 |
1985年 | 100篇 |
1984年 | 71篇 |
1983年 | 46篇 |
1982年 | 47篇 |
1981年 | 37篇 |
1980年 | 30篇 |
1979年 | 15篇 |
1977年 | 8篇 |
1976年 | 9篇 |
1975年 | 8篇 |
1959年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Web服务在信用信息工程中的应用 总被引:2,自引:2,他引:0
目前的社会信用信息工程中,许多的政府部门都建立了自己的信用信息数据库,但在政府各级部门数据库之间进行数据交流和共享存在着许多的问题,在许多地方,数据共享还是一片空白。Web服务技术是应用程序通过内联网或者因特网发布和利用软件服务的一种标准机制。利用WEB服务可以方便地实现不同系统之间的数据交换和集成。该文提出利用web服务技术来解决信用信息工程中的信息数据共享问题。并在此基础上提出利用WEB服务工作流技术将信用评估整合到电子商务过程,以实现可信用电子商务 相似文献
62.
Zhishou Zhang Qibin Sun Wai-Choong Wong John Apostolopoulos Susie Wee 《Multimedia, IEEE Transactions on》2007,9(2):320-331
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required 相似文献
63.
64.
65.
Chor Ping Low 《Communications Letters, IEEE》2005,9(11):1012-1014
One of the main issues to be addressed in topological design of centralized networks is that of assigning terminals to concentrators in such a way that each terminal is assigned to one (and only one) concentrator and the total number of terminals assigned to any concentrator (which is referred to as load in this paper) does not overload that concentrator, i.e. is within the concentrator's capacity. Under these constraints, an assignment with the lowest possible cost is sought. An assignment of terminals to concentrators which minimizes the maximum load among the concentrators (which qualitatively represents congestion at some hot spots in a network service area) is referred to as a min-max load assignment. In this paper, we consider the problem of finding a min-max load assignment with the-lowest cost. We call this problem the Minimum Cost Min-Max Load Terminal Assignment Problem (MCMLTAP). We present an algorithm for MCMLTAP and prove that the problem is optimally solvable in polynomial time using our proposed algorithm. 相似文献
66.
67.
The strengths of two graphite/epoxy notched laminate systems with a softening strip were investigated. The softening strip was created by replacing the 0°-graphite/epoxy plies by a glass/epoxy composite. Experimental results indicated that the use of softening strips could significantly increase the laminate strength. Analysis was performed with finite elements developed using the classical laminated plate theory and was shown to be adequate. A simple point-stress failure criterion was used to predict the strength of notched laminates with softening strips and the result was found to be satisfactory. 相似文献
68.
本文介绍了笔者设计并实现的一种新型的面向对象的程序设计语言,着重讨论了在设计过程中采用的新的概念,并和其它类似语言作了比较. 相似文献
69.
Jenghwa Chang Graber H.L. Ping Chen Koo Aronson R. Barbour S.-L.S. Barbour R.L. 《IEEE transactions on medical imaging》1997,16(1):68-77
Presents a model suitable for computing images of absorption cross sections of thick tissue structures illuminated at near infrared (NIR) wavelengths from tomographic projection data. Image reconstruction is accomplished by solving a system of linear equations derived from transport theory. Reconstruction results using different algebraic solvers are shown for anatomical maps of the breast, derived from magnetic resonance imaging data, containing two simulated pathologies, in which case qualitatively good reconstructions were obtained. Evaluation of magnetic resonance (MR) data to optimize NIR optical tomographic imaging methods and to assess the feasibility of a combined MR-optical measurement scheme is discussed 相似文献
70.
用单透镜变换由多模光纤出射的大功率Nd:YAG激光束的特性 总被引:1,自引:0,他引:1
根据理论假设,通过选取单透镜的参数和位置,计算说明了单透镜使经由多模光纤出射的大功率Nd:YAG激光束的发射角压缩,光束聚焦效率提高,光束截面场为高斯分布;文中的计算结果符合已知规律,从而说明了理论假设的正确性。 相似文献