全文获取类型
收费全文 | 47808篇 |
免费 | 4571篇 |
国内免费 | 2708篇 |
专业分类
电工技术 | 2228篇 |
技术理论 | 2篇 |
综合类 | 3925篇 |
化学工业 | 4701篇 |
金属工艺 | 2861篇 |
机械仪表 | 3487篇 |
建筑科学 | 1326篇 |
矿业工程 | 1625篇 |
能源动力 | 658篇 |
轻工业 | 5794篇 |
水利工程 | 463篇 |
石油天然气 | 1591篇 |
武器工业 | 920篇 |
无线电 | 7478篇 |
一般工业技术 | 3812篇 |
冶金工业 | 2342篇 |
原子能技术 | 457篇 |
自动化技术 | 11417篇 |
出版年
2024年 | 211篇 |
2023年 | 697篇 |
2022年 | 1110篇 |
2021年 | 1437篇 |
2020年 | 1403篇 |
2019年 | 1084篇 |
2018年 | 1017篇 |
2017年 | 1376篇 |
2016年 | 1493篇 |
2015年 | 1781篇 |
2014年 | 2564篇 |
2013年 | 2554篇 |
2012年 | 3229篇 |
2011年 | 3587篇 |
2010年 | 2581篇 |
2009年 | 2695篇 |
2008年 | 2677篇 |
2007年 | 3242篇 |
2006年 | 2901篇 |
2005年 | 2610篇 |
2004年 | 2166篇 |
2003年 | 2010篇 |
2002年 | 1641篇 |
2001年 | 1341篇 |
2000年 | 1237篇 |
1999年 | 927篇 |
1998年 | 830篇 |
1997年 | 757篇 |
1996年 | 665篇 |
1995年 | 517篇 |
1994年 | 506篇 |
1993年 | 414篇 |
1992年 | 321篇 |
1991年 | 268篇 |
1990年 | 238篇 |
1989年 | 204篇 |
1988年 | 147篇 |
1987年 | 85篇 |
1986年 | 72篇 |
1985年 | 88篇 |
1984年 | 69篇 |
1983年 | 81篇 |
1982年 | 57篇 |
1981年 | 41篇 |
1980年 | 31篇 |
1979年 | 29篇 |
1978年 | 19篇 |
1977年 | 24篇 |
1976年 | 13篇 |
1973年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
The twisted cube is an important variant of the most popular hypercube network for parallel processing. In this paper, we consider the problem of embedding multi-dimensional meshes into twisted cubes in a systematic way. We present a recursive method for embedding a family of disjoint multi-dimensional meshes into a twisted cube with dilation 1 and expansion 1. We also prove that a single multi-dimensional mesh can be embedded into a twisted cube with dilation 2 and expansion 1. Our work extends some previously known results. 相似文献
72.
An important step towards the successful integration of information and communication technology (ICT) in schools is to facilitate their capacity to develop a school‐based ICT policy resulting in an ICT policy plan. Such a plan can be defined as a school document containing strategic and operational elements concerning the integration of ICT in education. To write such a plan in an efficient way is challenging for schools. Therefore, an online tool [Planning for ICT in Schools (pICTos)] has been developed to guide schools in this process. A multiple case study research project was conducted with three Flemish primary schools to explore the process of developing a school‐based ICT policy plan and the supportive role of pICTos within this process. Data from multiple sources (i.e. interviews with school leaders and ICT coordinators, school policy documents analysis and a teacher questionnaire) were collected and analysed. The results indicate that schools shape their ICT policy based on specific school data collected and presented by the pICTos environment. School teams learned about the actual and future place of ICT in teaching and learning. Consequently, different policy decisions were made according to each school's vision on ‘good’ education and ICT integration. 相似文献
73.
During the past decade, feature extraction and knowledge acquisition based on video analysis have been extensively researched and tested on many applications such as closed-circuit television(CCTV)data analysis, large-scale public event control, and other daily security monitoring and surveillance operations with various degrees of success. However, since the actual video process is a multi-phased one and encompasses extensive theories and techniques ranging from fundamental image processing, computational geometry and graphics, and machine vision, to advanced artificial intelligence, pattern analysis, and even cognitive science, there are still many important problems to resolve before it can be widely applied. Among them, video event identification and detection are two prominent ones. Comparing with the most popular frame-to-frame processing mode of most of today's approaches and systems, this project reorganizes video data as a 3D volume structure that provides the hybrid spatial and temporal information in a unified space. This paper reports an innovative technique to transform original video frames to 3D volume structures denoted by spatial and temporal features. It then highlights the volume array structure in a so-called "pre-suspicion" mechanism for a later process. The focus of this report is the development of an effective and efficient voxel-based segmentation technique suitable to the volumetric nature of video events and ready for deployment in 3D clustering operations. The paper is concluded with a performance evaluation of the devised technique and discussion on the future work for accelerating the pre-processing of the original video data. 相似文献
74.
We introduce a class of tree bimorphisms that define exactly the translations performed by syntax-directed translation schemata. We also show that these “quasi-alphabetic” tree bimorphisms preserve recognizability, and that their class is closed under composition and inverses. 相似文献
75.
Bentley T 《Applied ergonomics》2009,40(2):175-180
The vast majority of the published workplace slips, trips and falls (STF) literature is exceedingly narrow in its focus and often ignores wider systems issues in workplace STF aetiology. There is little recognition within the published literature of the importance of latent failures or the upstream organisational and cultural contexts within which workplace STF occur. This is unfortunate, as a systems approach to workplace STF analysis, that is inclusive of latent design and work organisation factors that often shape worker behaviour patterns related to STF risk (e.g. rushing, risk taking), is fundamental to the development of effective prevention measures. The aims of this paper are to provide an understanding of workplace STF causation that is cognisant of the potential role of both active and latent failures in STF causation. The paper presents an ergonomics model for workplace STF analysis that highlights information processing in STF aetiology, the STF incident process and the interaction between latent and active failures in STF causation. The paper draws upon ergonomics research conducted in a range of occupational contexts to illustrate the key features of the model as it applies to workplace STF. Implications of the model for analysis and prevention of STF are discussed. 相似文献
76.
Prakash Ramanan 《Journal of Computer and System Sciences》2009,75(8):465-485
We consider the XPath evaluation problem: Evaluate an XPath query Q on a streaming XML document D; i.e., determine the set Q(D) of document elements selected by Q. We mainly consider Conjunctive XPath queries that involve only the child and descendant axes. Previously known in-memory algorithms for this problem use O(|D|) space and O(|Q||D|) time. Several previously known algorithms for the streaming version use Ω(dn) space and Ω(dn|D|) time in the worst case; d denotes the depth of D, and n denotes the number of location steps in Q. Their exponential space requirement could well exceed the O(|D|) space used by the in-memory algorithms. We present an efficient algorithm that uses O(d|Q|+nc) space and O((|Q|+dn)|D|) time in the worst case; c denotes the maximum number of elements of D that can be candidates for output, at any one instant. For some worst case Q and D, the memory space used by our algorithm matches our lower bound proved in a different paper; so, our algorithm uses optimal memory space in the worst case. 相似文献
77.
78.
79.
80.