全文获取类型
收费全文 | 3742篇 |
免费 | 50篇 |
国内免费 | 14篇 |
专业分类
电工技术 | 46篇 |
综合类 | 10篇 |
化学工业 | 578篇 |
金属工艺 | 161篇 |
机械仪表 | 82篇 |
建筑科学 | 192篇 |
矿业工程 | 25篇 |
能源动力 | 424篇 |
轻工业 | 130篇 |
水利工程 | 122篇 |
石油天然气 | 7篇 |
无线电 | 266篇 |
一般工业技术 | 524篇 |
冶金工业 | 230篇 |
原子能技术 | 34篇 |
自动化技术 | 975篇 |
出版年
2023年 | 29篇 |
2022年 | 39篇 |
2021年 | 78篇 |
2020年 | 83篇 |
2019年 | 80篇 |
2018年 | 31篇 |
2017年 | 88篇 |
2016年 | 140篇 |
2015年 | 85篇 |
2014年 | 193篇 |
2013年 | 243篇 |
2012年 | 201篇 |
2011年 | 223篇 |
2010年 | 203篇 |
2009年 | 227篇 |
2008年 | 177篇 |
2007年 | 163篇 |
2006年 | 185篇 |
2005年 | 132篇 |
2004年 | 89篇 |
2003年 | 104篇 |
2002年 | 85篇 |
2001年 | 69篇 |
2000年 | 56篇 |
1999年 | 57篇 |
1998年 | 51篇 |
1997年 | 35篇 |
1996年 | 46篇 |
1995年 | 31篇 |
1994年 | 46篇 |
1993年 | 27篇 |
1992年 | 36篇 |
1991年 | 32篇 |
1990年 | 27篇 |
1989年 | 33篇 |
1988年 | 31篇 |
1987年 | 42篇 |
1986年 | 46篇 |
1985年 | 35篇 |
1984年 | 52篇 |
1983年 | 32篇 |
1982年 | 24篇 |
1981年 | 26篇 |
1980年 | 23篇 |
1979年 | 16篇 |
1978年 | 18篇 |
1977年 | 11篇 |
1976年 | 14篇 |
1975年 | 4篇 |
1974年 | 6篇 |
排序方式: 共有3806条查询结果,搜索用时 15 毫秒
91.
Outdoor tasks operated by construction workers are physically demanding, requiring awkward postures leading to pain, injury, accident, or permanent disability. Ergonomic posture recognition (EPR) technique could be a novel solution for ergonomic hazard monitoring and assessment, yet non-intrusiveness and applicability in complex outdoor environment are always critical considerations for device selection in construction site. Thus, we choose RGB camera to capture skeleton motions, which is non-intrusive for workers compared with wearable sensors. It is also stable and widely used in an outdoor construction site considering various light conditions and complex working areas. This study aims to develop an ergonomic posture recognition technique based on 2D ordinary camera for construction hazard prevention through view-invariant features in 2D skeleton motion. Based on captured 2D skeleton motion samples in the test-run, view-invariant features as classifier inputs were extracted to ensure the learned classifier not sensitive to various camera viewpoints and distances to a worker. Three posture classifiers regarding human back, arms, and legs were employed to ensure three postures to be recognized simultaneously in one video frame. The average accuracies of three classifiers in 5-fold cross validation were as high as 95.0%, 96.5%, and 97.6%, respectively, and the overall accuracies tested by three new activities regarding ergonomic assessment scores captured from different camera heights and viewpoints were 89.2%, 88.3%, and 87.6%, respectively. The developed EPR-aided construction accident auto-prevention technique demonstrated robust accuracy to support on-site postural ergonomic assessment for construction workers’ safety and health assurance. 相似文献
92.
The study aims were, in a population of university students, staff, and faculty (n = 140), to: 1) determine the distribution of seven measures of mobile device use; 2) determine the distribution of musculoskeletal symptoms of the upper extremity, upper back and neck; and 3) assess the relationship between device use and symptoms. 137 of 140 participants (98%) reported using a mobile device. Most participants (84%) reported pain in at least one body part. Right hand pain was most common at the base of the thumb. Significant associations found included time spent internet browsing and pain in the base of the right thumb (odds ratio 2.21, 95% confidence interval 1.02–4.78), and total time spent using a mobile device and pain in the right shoulder (2.55, 1.25–5.21) and neck (2.72, 1.24–5.96). Although this research is preliminary, the observed associations, together with the rising use of these devices, raise concern for heavy users. 相似文献
93.
This paper presents a blind watermarking approach to protecting vector geo-spatial data from illegal use. By taking into account usability, invisibility, robustness, and blindness, the approach firstly determines three feature layers of the geo-spatial data and selects the key points from each layer as watermark embedding positions. Then it shuffles the watermark and embeds it in the least significant bits (LSBs) of the coordinates of the key points. A similar process for selecting the feature layers and the key points in the watermark embedding process is carried out to detect the watermark followed by obtaining the embedded watermark from the LSBs of the coordinates of the key points. Finally, the similarity degrees of three versions of the watermark from three feature layers are calculated to check if the data contains the watermark. Our experiments show that the method is rarely affected by data format change, random noise, similarity transformation of the data, and data editing. 相似文献
94.
We study the problem of maintaining a dynamic ordered tree succinctly under updates of the following form: insertion or deletion of a leaf, insertion of a node on an edge (edge subdivision) or deletion of a node with only one child (the child becomes a child of its former grandparent). We allow satellite data of a fixed size to be associated to the nodes of the tree.We support update operations in constant amortized time and support access to satellite data and basic navigation operations in worst-case constant time; the basic navigation operations include parent, first/last-child, previous/next-child. These operations are moving from a node to its parent, leftmost/rightmost child, and its previous and next child respectively.We demonstrate that to efficiently support more extended operations, such as determining the i-th child of a node, rank of a child among its siblings, or size of the subtree rooted at a node, one requires a restrictive pattern for update strategy, for which we propose the finger-update model. In this model, updates are performed at the location of a finger that is only allowed to crawl on the tree between a child and a parent or between consecutive siblings. Under this model, we describe how the named extended operations are performed in worst-case constant time.Previous work on dynamic succinct trees (Munro et al., 2001 [17]; Raman and Rao, 2003 [19]) is mainly restricted to binary trees and achieves poly-logarithmic (Munro et al., 2001 [17]) or “poly-log-log” (Raman and Rao, 2003 [19]) update time under a more restricted model, where updates are performed in traversals starting at the root and ending at the root and queries can be answered when the traversal is completed. A previous result on ordinal trees achieves only sublinear amortized update time and “poly-log-log” query time (Gupta et al., 2007 [11]). More recently, the update time has been improved to O(logn/loglogn) while queries can be performed in O(logn/loglogn) time (Sadakane and Navarro, 2010 [20]). 相似文献
95.
The deformation field commonly used for Euler–Bernoulli beamsin structural dynamics is investigated to determine its suitability foruse in flexible multibody dynamics. It is found that the traditionaldeformation field fails to produce an elastic rotation matrix that iscomplete to second-order in the deformation variables. A completesecond-order deformation field is proposed along with the equationsneeded to incorporate the beam model into a graph-theoretic formulationfor flexible multibody dynamics [1]. This beam modeland formulation have been implemented in a symbolic computer programcalled DynaFlex that can use Taylor, Chebyshev, or Legendrepolynomials as the basis functions in a Rayleigh–Ritz discretizationof the beam's deformation variables. To demonstrate the effects of the proposed second-order deformationfield on the response of a flexible multibody system,two examples are presented. 相似文献
96.
The robust stability and stabilization, and H-infinity control problems for discrete-time Markovian jump singular systems with parameter uncertainties are discussed. Based on the restricted system equivalent (r.s.e.) transformation and by introducing new state vectors, the singular system is transformed into a discrete-time Markovian jump standard linear system, and the linear matrix inequality (LMI) conditions for the discrete-time Markovian jump singular systems to be regular, causal, stochastically stable, and stochastically stable with 7- disturbance attenuation are obtained, respectively. With these conditions, the robust state feedback stochastic stabilization problem and H-infinity control problem are solved, and the LMI conditions are obtained. A numerical example illustrates the effectiveness of the method given in the oaoer. 相似文献
97.
98.
We consider the problem of testing the commutativity of a black-box group specified by its k generators. The complexity (in
terms of k) of this problem was first considered by Pak, who gave a randomized algorithm involving O(k) group operations.
We construct a quite optimal quantum algorithm for this problem whose complexity is in
. The algorithm uses and highlights the power of the quantization method of
Szegedy. For the lower bound of
, we give a reduction from a special case of Element Distinctness to our problem. Along the way, we prove the optimality of
the algorithm of Pak for the randomized model. 相似文献
99.
In this paper we provide an explicit way to compute asymptotically almost sure upper bounds on the bisection width of random d-regular graphs, for any value of d. The upper bounds are obtained from the analysis of the performance of a randomized greedy algorithm to find bisections of d-regular graphs. We provide bounds for 5≤d≤12. We also give empirical values of the size of the bisection found by the algorithm for some small values of d and compare them with numerical approximations of our theoretical bounds. Our analysis also gives asymptotic lower bounds for the size of the maximum bisection. 相似文献
100.
Charles J. Colbourn Jeffrey H. Dinitz Douglas R. Stinson 《Information and Computation》2001,169(2):160
A quorum system is a set system in which any two subsets have nonempty intersection. Quorum systems have been extensively studied as a method of maintaining consistency in distributed systems. Important attributes of a quorum system include the load, balancing ratio, rank (i.e., quorum size), and availability. Many constructions have been presented in the literature for quorum systems in which these attributes take on optimal or otherwise favorable values. In this paper, we point out an elementary connection between quorum systems and the classical covering systems studied in combinatorial design theory. We look more closely at the quorum systems that are obtained from balanced incomplete block designs (BIBDs). We study the properties of these quorum systems and observe that they have load, balancing ratio, and rank that are all within a constant factor of being optimal. We also provide several observations about computing the failure polynomials of a quorum system (failure polynomials are used to measure availability). Asymptotic properties of failure polynomials have previously been analyzed for certain infinite families of quorum systems. We give an explicit formula for the failure polynomials for an easily constructed infinite class of quorum systems. We also develop two algorithms that are useful for computing failure polynomials for quorum systems and prove that computing failure polynomials is #P-hard. Computational results are presented for several “small” quorum systems obtained from BIBDs. 相似文献