全文获取类型
收费全文 | 15977篇 |
免费 | 1709篇 |
国内免费 | 1129篇 |
专业分类
电工技术 | 1066篇 |
综合类 | 2101篇 |
化学工业 | 1001篇 |
金属工艺 | 1285篇 |
机械仪表 | 1586篇 |
建筑科学 | 1901篇 |
矿业工程 | 562篇 |
能源动力 | 521篇 |
轻工业 | 591篇 |
水利工程 | 607篇 |
石油天然气 | 1323篇 |
武器工业 | 127篇 |
无线电 | 965篇 |
一般工业技术 | 1484篇 |
冶金工业 | 593篇 |
原子能技术 | 190篇 |
自动化技术 | 2912篇 |
出版年
2024年 | 39篇 |
2023年 | 150篇 |
2022年 | 319篇 |
2021年 | 413篇 |
2020年 | 455篇 |
2019年 | 396篇 |
2018年 | 375篇 |
2017年 | 570篇 |
2016年 | 564篇 |
2015年 | 652篇 |
2014年 | 977篇 |
2013年 | 943篇 |
2012年 | 1205篇 |
2011年 | 1262篇 |
2010年 | 976篇 |
2009年 | 1045篇 |
2008年 | 978篇 |
2007年 | 1187篇 |
2006年 | 1083篇 |
2005年 | 867篇 |
2004年 | 696篇 |
2003年 | 590篇 |
2002年 | 501篇 |
2001年 | 425篇 |
2000年 | 370篇 |
1999年 | 306篇 |
1998年 | 242篇 |
1997年 | 191篇 |
1996年 | 220篇 |
1995年 | 198篇 |
1994年 | 142篇 |
1993年 | 97篇 |
1992年 | 84篇 |
1991年 | 64篇 |
1990年 | 47篇 |
1989年 | 53篇 |
1988年 | 40篇 |
1987年 | 23篇 |
1986年 | 15篇 |
1985年 | 10篇 |
1984年 | 13篇 |
1983年 | 7篇 |
1982年 | 8篇 |
1980年 | 3篇 |
1979年 | 8篇 |
1978年 | 1篇 |
1975年 | 1篇 |
1959年 | 1篇 |
1956年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
21.
为扩展B样条曲线,提出1种均匀二重混合双曲多项式B样条曲线. 该样条曲线在span{sinh t,cosh t,tsinh t,tcosh t,1,t,…,tk-6,tk-5}空间上均匀产生,其中k是大于等于5的整数. 证明k阶二重混合双曲多项式B样条基的性质和二重混合双曲多项式B样条曲线的性质. 二重混合双曲多项式B样条曲线精确地包含双曲多项式B样条曲线. 给出这种新样条曲线的细分公式并证明其有变差缩减性质和细分控制多边形逼近性质. 该性质使得通过递归细分得到曲线成为可能. 相似文献
22.
23.
Most conventional conference key agreement protocols have not been concerned with a practical situation. There may exist some
malicious conferees who attempt to block conference initiation for some purposes, e.g. commercial, political or military benefit.
Instances where conference must be launched immediately due to emergency, efficient detection of malicious behavior would
be needed. Recently, Tzeng (IEEE Trans. Comput. 51(4):373–379, 2002) proposed a fault-tolerant conference key agreement protocol
to address the issue where a conference key can be established among conferees even though malicious conferees exist. However,
his protocol might be complex and inefficient during fault-detection. In the case where a malicious conferee exists and a
fault-tolerant mechanism is launched, complicated interactions between conferees will be required. In this paper, we introduce
a novel strategy, where any malicious conferee may be identified and removed from the conferee list without any interaction.
With such a non-interactive fault-tolerance, conferences could be established and started efficiently. A complete example
of our protocol will be given to describe the fascinating fault-tolerance. We analyse the security of our protocol regarding
four aspects, i.e. correctness, fault-tolerance, active attack and passive attack. The comparisons of performance between
our protocol and that of Tzeng are also shown. As a whole, the advantage of our protocol is superior to that of Tzeng under
the situation where malicious conferees exist.
相似文献
Chi-Sung LaihEmail: |
24.
A spatial join is a query that searches for a set of object pairs satisfying a given spatial relationship from a database. It is one of the most costly queries, and thus requires an efficient processing algorithm that fully exploits the features of the underlying spatial indexes. In our earlier work, we devised a fairly effective algorithm for processing spatial joins with double transformation (DOT) indexing, which is one of several spatial indexing schemes. However, the algorithm is restricted to only the one-dimensional cases. In this paper, we extend the algorithm for the two-dimensional cases, which are general in Geographic Information Systems (GIS) applications. We first extend DOT to two-dimensional original space. Next, we propose an efficient algorithm for processing range queries using extended DOT. This algorithm employs the quarter division technique and the tri-quarter division technique devised by analyzing the regularity of the space-filling curve used in DOT. This greatly reduces the number of space transformation operations. We then propose a novel spatial join algorithm based on this range query processing algorithm. In processing a spatial join, we determine the access order of disk pages so that we can minimize the number of disk accesses. We show the superiority of the proposed method by extensive experiments using data sets of various distributions and sizes. The experimental results reveal that the proposed method improves the performance of spatial join processing up to three times in comparison with the widely-used R-tree-based spatial join method. 相似文献
25.
Barycentric coordinates are very popular for interpolating data values on polyhedral domains. It has been recently shown that expressing them as complex functions has various advantages when interpolating two‐dimensional data in the plane, and in particular for holomorphic maps. We extend and generalize these results by investigating the complex representation of real‐valued barycentric coordinates, when applied to planar domains. We show how the construction for generating real‐valued barycentric coordinates from a given weight function can be applied to generating complex‐valued coordinates, thus deriving complex expressions for the classical barycentric coordinates: Wachspress, mean value, and discrete harmonic. Furthermore, we show that a complex barycentric map admits the intuitive interpretation as a complex‐weighted combination of edge‐to‐edge similarity transformations, allowing the design of “home‐made” barycentric maps with desirable properties. Thus, using the tools of complex analysis, we provide a methodology for analyzing existing barycentric mappings, as well as designing new ones. 相似文献
26.
27.
基因方法是基于自然选择和自然基因机制的并行随机自适应工程模型参数全局优化估计的通用数值方法。它不限制模型结构、优化准则、被估参数的数目、约束条件等,已开始广泛用于各种工程模型的优化设计之中。文中对它的原理、步骤、特点进行初步探讨,并针对基因方法的弱点,作者提出予以改进的加速基因方法,后者在最大流量频率曲线参数估计中得到成功应用 相似文献
28.
29.
吴 《南昌大学学报(工科版)》2004,26(3):38-40
在数控加工中,通常需要将空间曲线用合适的样条拟合出来,以方便加工.B样条概念于20世纪40年代由Sehoenberg提出后,已广泛应用于曲线、曲面的造型中.该文以变直径、变螺距的转向蜗杆的空间曲线为例,介绍了用B样条拟合空间曲线的方法,具体讨论了空间曲线反求控制点的计算方法,通过模拟仿真,该方法所拟合的曲线比较平整光滑、误差较小.用此方法拟合出的曲线可以直接用API得出加工程序. 相似文献
30.
依据赫兹强度理论 ,指出一对标准渐开线直齿齿轮啮合时 ,最大接触应力位于齿轮单啮合区靠近小齿轮处单双啮合区的分界线上。小齿轮点蚀发生在分度圆与齿根圆之间 ,大齿轮点蚀发生在分度圆与齿顶圆之间。并列举实例 ,证明目前传统设计方法计算点蚀处齿轮综合曲率半径误差较大 ,绘制出精确计算值与传统计算值的比值曲线 ,并给出结论 :传统设计方法得到的结果不安全 ,有误差 ;误差与齿轮模数无关 ,误差随着小齿轮齿数的增加渐小 ,误差随着齿轮齿数比的增大先渐大后渐小 相似文献