全文获取类型
收费全文 | 14375篇 |
免费 | 809篇 |
国内免费 | 551篇 |
专业分类
电工技术 | 703篇 |
综合类 | 739篇 |
化学工业 | 1342篇 |
金属工艺 | 562篇 |
机械仪表 | 1954篇 |
建筑科学 | 1538篇 |
矿业工程 | 444篇 |
能源动力 | 531篇 |
轻工业 | 689篇 |
水利工程 | 207篇 |
石油天然气 | 631篇 |
武器工业 | 92篇 |
无线电 | 948篇 |
一般工业技术 | 1508篇 |
冶金工业 | 390篇 |
原子能技术 | 195篇 |
自动化技术 | 3262篇 |
出版年
2024年 | 19篇 |
2023年 | 113篇 |
2022年 | 188篇 |
2021年 | 223篇 |
2020年 | 226篇 |
2019年 | 156篇 |
2018年 | 246篇 |
2017年 | 265篇 |
2016年 | 359篇 |
2015年 | 495篇 |
2014年 | 833篇 |
2013年 | 1016篇 |
2012年 | 945篇 |
2011年 | 1229篇 |
2010年 | 792篇 |
2009年 | 810篇 |
2008年 | 728篇 |
2007年 | 815篇 |
2006年 | 781篇 |
2005年 | 724篇 |
2004年 | 630篇 |
2003年 | 594篇 |
2002年 | 535篇 |
2001年 | 396篇 |
2000年 | 388篇 |
1999年 | 400篇 |
1998年 | 334篇 |
1997年 | 253篇 |
1996年 | 243篇 |
1995年 | 224篇 |
1994年 | 162篇 |
1993年 | 93篇 |
1992年 | 90篇 |
1991年 | 75篇 |
1990年 | 56篇 |
1989年 | 43篇 |
1988年 | 51篇 |
1987年 | 28篇 |
1986年 | 20篇 |
1985年 | 32篇 |
1984年 | 30篇 |
1983年 | 17篇 |
1982年 | 25篇 |
1981年 | 16篇 |
1980年 | 7篇 |
1979年 | 9篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1976年 | 10篇 |
1975年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
21.
22.
23.
24.
25.
文章提出基于稀疏PCA的多阶次分数阶傅里叶变换(fractional Fourier features,Frft)特征的人脸识别(Multiple Order discrete fractional Fourier Features ,MOFF). 鉴于分数阶傅里叶变换对光照、表情的鲁棒性, 并已在图像处理领域得到应用,首先,Frft幅度随阶次的变换呈现压缩性,而SPCA提取其主要信息将且分为主要信息域和次要信息域,融合二者的互补信息组成混合幅度特征,然后融合混合幅度特征、实部特征和虚部特征,最后融合不同阶次下Frft域特征。此外该文提出基于贪婪算法的分数阶阶次选择算法和基于Fisherfaces的权重方法。ORL 和AR人脸数据库上的仿真证明了本算法的有效性。 相似文献
26.
The purpose of the present study was to examine the prevalence of cyber-bullying through Facebook in a sample of 226 Greek university undergraduates, and to explore whether big five personality characteristics, narcissism, as well as attitudes toward Facebook, technological knowledge and skills were predictive of such behavior. Participants completed a self-report questionnaire measuring the above constructs. Results indicated that almost one third of the sample reported Facebook bullying engagement at least once during the past month, with male students reporting more frequent involvement than females. Bullying through Facebook was predicted by low Agreeableness and more time spent on Facebook only for males, whereas for females none of the studied variables predicted engagement in Facebook bullying. Findings are discussed in terms of prevention and intervention strategies. 相似文献
27.
Block sorting in the Burrows-Wheeler transformation is to sort all of the n circular shifts of a string of length n lexicographically. We introduce a notion called the width of a sequence of n strings of length n and show that the values of widths are very different between the two types of sequences of strings; (1) a sequence of n randomly generated strings of length n, and (2) the sequence of n circular shifts of a randomly generated string of length n. 相似文献
28.
Barycentric coordinates are very popular for interpolating data values on polyhedral domains. It has been recently shown that expressing them as complex functions has various advantages when interpolating two‐dimensional data in the plane, and in particular for holomorphic maps. We extend and generalize these results by investigating the complex representation of real‐valued barycentric coordinates, when applied to planar domains. We show how the construction for generating real‐valued barycentric coordinates from a given weight function can be applied to generating complex‐valued coordinates, thus deriving complex expressions for the classical barycentric coordinates: Wachspress, mean value, and discrete harmonic. Furthermore, we show that a complex barycentric map admits the intuitive interpretation as a complex‐weighted combination of edge‐to‐edge similarity transformations, allowing the design of “home‐made” barycentric maps with desirable properties. Thus, using the tools of complex analysis, we provide a methodology for analyzing existing barycentric mappings, as well as designing new ones. 相似文献
29.
The election problem in asynchronous distributed systems with bounded faulty processes 总被引:1,自引:1,他引:0
Sung Hoon Park 《The Journal of supercomputing》2007,41(1):89-104
Determining the “weakest” failure detectors is a central topic in solving many agreement problems such as Consensus, Non-Blocking
Atomic Commit and Election in asynchronous distributed systems. So far, this has been studied extensively for several such
fundamental problems. It is stated that Perfect Failure Detector P is the weakest failure detector to solve the Election problem with any number of faulty processes. In this paper, we introduce
Modal failure detector M and show that to solve Election, M is the weakest failure detector to solve election when the number of faulty processes is less than ⌈n/2⌉. We also show that it is strictly weaker than P.
相似文献
Sung Hoon ParkEmail: |
30.
Bruno Juliá-Díaz Joseph M. Burdis Frank Tabakin 《Computer Physics Communications》2006,174(11):914-934
This Mathematica 5.2 package1 is a simulation of a Quantum Computer. The program provides a modular, instructive approach for generating the basic elements that make up a quantum circuit. The main emphasis is on using the density matrix, although an approach using state vectors is also implemented in the package. The package commands are defined in Qdensity.m which contains the tools needed in quantum circuits, e.g., multiqubit kets, projectors, gates, etc. Selected examples of the basic commands are presented here and a tutorial notebook, Tutorial.nb is provided with the package (available on our website) that serves as a full guide to the package. Finally, application is made to a variety of relevant cases, including Teleportation, Quantum Fourier transform, Grover's search and Shor's algorithm, in separate notebooks: QFT.nb, Teleportation.nb, Grover.nb and Shor.nb where each algorithm is explained in detail. Finally, two examples of the construction and manipulation of cluster states, which are part of “one way computing” ideas, are included as an additional tool in the notebook Cluster.nb. A Mathematica palette containing most commands in QDENSITY is also included: QDENSpalette.nb.