全文获取类型
收费全文 | 461550篇 |
免费 | 38924篇 |
国内免费 | 22544篇 |
专业分类
电工技术 | 30122篇 |
技术理论 | 79篇 |
综合类 | 55076篇 |
化学工业 | 53013篇 |
金属工艺 | 18372篇 |
机械仪表 | 25077篇 |
建筑科学 | 63285篇 |
矿业工程 | 25432篇 |
能源动力 | 15383篇 |
轻工业 | 29437篇 |
水利工程 | 22142篇 |
石油天然气 | 21355篇 |
武器工业 | 5442篇 |
无线电 | 32172篇 |
一般工业技术 | 33910篇 |
冶金工业 | 25325篇 |
原子能技术 | 4049篇 |
自动化技术 | 63347篇 |
出版年
2024年 | 1793篇 |
2023年 | 5314篇 |
2022年 | 10069篇 |
2021年 | 12682篇 |
2020年 | 12784篇 |
2019年 | 10109篇 |
2018年 | 9577篇 |
2017年 | 11912篇 |
2016年 | 14147篇 |
2015年 | 15614篇 |
2014年 | 28553篇 |
2013年 | 25491篇 |
2012年 | 31818篇 |
2011年 | 34504篇 |
2010年 | 26535篇 |
2009年 | 27161篇 |
2008年 | 25381篇 |
2007年 | 32005篇 |
2006年 | 29716篇 |
2005年 | 25989篇 |
2004年 | 21943篇 |
2003年 | 19406篇 |
2002年 | 15832篇 |
2001年 | 13361篇 |
2000年 | 11268篇 |
1999年 | 9019篇 |
1998年 | 6696篇 |
1997年 | 5868篇 |
1996年 | 5155篇 |
1995年 | 4337篇 |
1994年 | 3783篇 |
1993年 | 2816篇 |
1992年 | 2418篇 |
1991年 | 1764篇 |
1990年 | 1540篇 |
1989年 | 1378篇 |
1988年 | 1009篇 |
1987年 | 701篇 |
1986年 | 551篇 |
1985年 | 499篇 |
1984年 | 438篇 |
1983年 | 337篇 |
1982年 | 266篇 |
1981年 | 223篇 |
1980年 | 192篇 |
1979年 | 138篇 |
1978年 | 82篇 |
1977年 | 90篇 |
1976年 | 64篇 |
1975年 | 71篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
871.
用室内低光照高对比鉴别率取代野外探测目标距离作为衡量夜视系统性能优劣的标准,将给验收工作带来方便。本文给出一种实验室内测试夜视系统鉴别率的方法。文中导出了夜视系统鉴别率的一种新的表达式,从而提出了一种改进后的物理模型及其实验方案。分析表明,采用新方案,即在实验室中人为增加环境照度,由此测得的系统工作鉴别率,用以取代野外探测目标距离,其可信度可望得到明显的提高。 相似文献
872.
Joseph Dunn Michael Neufeld Anmol Sheth Dirk Grunwald John Bennett 《Mobile Networks and Applications》2006,11(1):37-45
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations
in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that
have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates,
but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and
11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11
MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution
to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike
previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no
change to the MAC protocol or the stations.
Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and
mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily
focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from
the University of Colorado at Boulder.
Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received
an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton
University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless
networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department
at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable
phase array antennas.
Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science
from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has
co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications
to mobility.
Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work
addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems,
networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying
the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer
Engineering and is also the Director of the Colorado Center for Information Storage.
John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado
at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the
CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered
a course in engineering design for both engineering and non-engineering students that has been emulated at several universities
and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering
Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior
to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific
Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's
primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information
management and distributed robotic macrosensors. 相似文献
873.
Chun-I Fan 《Information Sciences》2006,176(3):263-284
In an untraceable electronic cash protocol based on blind signatures, an identified customer can withdraw a blinded electronic cash from the bank and the unblinding operation is adopted by the customer to transform the blinded electronic cash into a valid one. Before performing the operation, the blinded electronic cash is protected well since attackers cannot convert it into a valid electronic cash without the blinding factor corresponding to the operation. However, after unblinding, the electronic cash will suffer from the theft attacks since it is not protected by any security mechanism. This paper introduces a new unblinding operation called ownership-attached unblinding which attaches the identities of a designated payee and a specified transaction to the blinded electronic cash and then produces an ownership-attached electronic cash other than a bare one such that the cash can withstand the theft attacks during the entire transaction because it is valid for the designated payee and the specified transaction only. Furthermore, the proposed scheme does not largely increase the computation cost required for each customer so that it also is a customer efficient protection solution for untraceable electronic cash and especially suitable for mobile clients and smart-card users. 相似文献
874.
We present a new background-subtraction technique fusing contours from thermal and visible imagery for persistent object detection in urban settings. Statistical background-subtraction in the thermal domain is used to identify the initial regions-of-interest. Color and intensity information are used within these areas to obtain the corresponding regions-of-interest in the visible domain. Within each region, input and background gradient information are combined to form a Contour Saliency Map. The binary contour fragments, obtained from corresponding Contour Saliency Maps, are then fused into a single image. An A* path-constrained search along watershed boundaries of the regions-of-interest is used to complete and close any broken segments in the fused contour image. Lastly, the contour image is flood-filled to produce silhouettes. Results of our approach are evaluated quantitatively and compared with other low- and high-level fusion techniques using manually segmented data. 相似文献
875.
介绍了造成铁路油槽车底油收不尽的原因,一是节约意识差;二是设备设施陈旧或维护不够;三是操作不当。提出了增强节约意识,挖掘设备潜力,采用合理的吸油方法的对策。 相似文献
876.
大红山铜矿岩体结构调查分析 总被引:2,自引:1,他引:1
大量工程实践已证明岩体结构是控制岩体稳定性的重要影响因素。为此,以大红山铜矿为研究背景,在选定有代表性调查地段的基础上,引入详细观测线法对其岩体结构进行了详细调查与统计。分析结果表明:调查区域内巷道岩体节理裂隙比较密集和发育,主要发育有倾向N53E、走向N37W、倾角53°,倾向W26S、走向N36W、倾角68°;倾向E1S、走向NIE、倾角89°的三组优势结构面,其中优势结构面第二组和第三组构成不稳定块体,并且断层及软弱夹层比较发育,加剧了巷道的破碎程度,对巷道围岩的稳定性有控制作用。最后提出了在巷道施工中密切注意围岩稳定性变化,避免工程事故的发生的建议。 相似文献
877.
We present a technique for approximating isotropic BRDFs and precomputed self-occlusion that enables accurate and efficient prefiltered environment map rendering. Our approach uses a nonlinear approximation of the BRDF as a weighted sum of isotropic Gaussian functions. Our representation requires a minimal amount of storage, can accurately represent BRDFs of arbitrary sharpness, and is above all, efficient to render. We precompute visibility due to self-occlusion and store a low-frequency approximation suitable for glossy reflections. We demonstrate our method by fitting our representation to measured BRDF data, yielding high visual quality at real-time frame rates. 相似文献
878.
A method of processing complex signals in passive multi-element antenna arrays based on an analysis of the natural values of the correlation matrix of the signal is considered. By means of the method it is possible to substantially increase the output signal-to-noise ratio. An iterational process by means of which optimal estimators of both the signal and the amplitude-phase distribution may be obtained, is proposed. Theoretical estimators of the efficiency of the method are given. It is proved that, in terms of the efficiency, the approach considered in the article comes close to the technique of matched filtration. Results of statistical modeling that confirm the statistical results are presented. 相似文献
879.
Due to their simplicity and intuitiveness, swept surfaces are widely used in many surface modelling applications. In this paper, we present a versatile swept surface technique called the boundary constrained swept surfaces. The most distinct feature is its ability to satisfy boundary constraints, including the shape and tangent conditions at the boundaries of a swept surface. This permits significantly varying surfaces to be both modelled and smoothly assembled, leading to the construction of complex objects. The representation, similar to an ordinary swept surface, is analytical in nature and thus it is light in storage cost and numerically very stable to compute. We also introduce a number of useful shape manipulation tools, such as sculpting forces, to deform a surface both locally and globally. In addition to being a complementary method to the mainstream surface modelling and deformation techniques, we have found it very effective in automatically rebuilding existing complex models. Model reconstruction is arguably one of the most laborious and expensive tasks in modelling complex animated characters. We demonstrate how our technique can be used to automate this process. 相似文献
880.
随着我国经济的迅速发展,能源消耗不断增加,节约能源、降低能源消耗势在必行,余热利用是节约能源的一个重要环节,冶金行业高炉冲渣水作为采暖热媒可以节约大量能源。 相似文献