全文获取类型
收费全文 | 1329篇 |
免费 | 141篇 |
国内免费 | 116篇 |
专业分类
电工技术 | 29篇 |
综合类 | 135篇 |
化学工业 | 19篇 |
金属工艺 | 23篇 |
机械仪表 | 74篇 |
建筑科学 | 68篇 |
矿业工程 | 12篇 |
能源动力 | 11篇 |
轻工业 | 1篇 |
水利工程 | 13篇 |
石油天然气 | 5篇 |
武器工业 | 12篇 |
无线电 | 177篇 |
一般工业技术 | 85篇 |
冶金工业 | 75篇 |
原子能技术 | 6篇 |
自动化技术 | 841篇 |
出版年
2024年 | 2篇 |
2023年 | 18篇 |
2022年 | 15篇 |
2021年 | 14篇 |
2020年 | 30篇 |
2019年 | 19篇 |
2018年 | 22篇 |
2017年 | 23篇 |
2016年 | 36篇 |
2015年 | 40篇 |
2014年 | 85篇 |
2013年 | 74篇 |
2012年 | 76篇 |
2011年 | 101篇 |
2010年 | 92篇 |
2009年 | 85篇 |
2008年 | 99篇 |
2007年 | 105篇 |
2006年 | 77篇 |
2005年 | 77篇 |
2004年 | 70篇 |
2003年 | 67篇 |
2002年 | 65篇 |
2001年 | 48篇 |
2000年 | 47篇 |
1999年 | 21篇 |
1998年 | 29篇 |
1997年 | 22篇 |
1996年 | 23篇 |
1995年 | 24篇 |
1994年 | 19篇 |
1993年 | 18篇 |
1992年 | 6篇 |
1991年 | 9篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1981年 | 2篇 |
1977年 | 2篇 |
1962年 | 1篇 |
1961年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有1586条查询结果,搜索用时 0 毫秒
21.
在程序开发过程中利用VC中所见即所得编程技术,通过设置映射模式,统一输入参数单位,调用坐标转换和字体处理函数,将实际的坐标值和字体转换为基于输出设备对象的逻辑坐标值和字体,由程序实现在不同设备上输出一致的显示结果.该方法也可用于文字处理软件,实现文字编辑的所见即所得. 相似文献
22.
Yong-Ren Huang Chung-Ming Kuo Feng-Chung Huang 《Journal of Visual Communication and Image Representation》2005,16(6):668
In the past few years, motion compensation has been widely used in the coding of image sequences. Most of motion estimation and compensation schemes belong to block-based framework. The framework simplifies the complexity of motion estimation, but gives over constraints to the motion field, which results in worse accuracy on the boundary of moving objects. This paper presents a novel technique for raising motion field accuracy. It uses several pre-defined pattern types to segment the motion fields of the previous frame of a sequence. The segmentation is based on the MAP framework that uses iterative method to obtain the solution. In addition, we develop a predictive scheme to predict the location of motion field discontinuities in the current frame, which further reduces the side information for the representation of segmentation. 相似文献
23.
田茁 《微电子学与计算机》2012,29(5):67-68,72
本文提出了一种基于移动Agent链接寻址分布式通信算法,通过分析通信位移延迟问题,对消息传递的寻址、消息排队的过程设置,实现了移动Agent的高速通信. 相似文献
24.
25.
The explosive growth of the mobile multimedia industry has accentuated the need for efficient VLSI implementations of the
associated computationally demanding signal processing algorithms. In particular, the short battery life caused by excessive
power consumption of mobile devices has become the biggest obstacle facing truly mobile multimedia. We propose novel hardware
accelerator architectures for two of the most computationally demanding algorithms of the MPEG-4 video compression standard––the
forward and inverse shape adaptive discrete cosine transforms (SA-DCT/IDCT). These accelerators have been designed using general
low-energy design philosophies at the algorithmic/architectural abstraction levels. The themes of these philosophies are avoiding
waste and trading area/performance for power and energy gains. Each core has been synthesised targeting TSMC 0.09 μm TCBN90LP
technology, and the experimental results presented in this paper show that the proposed cores improve upon the prior art.
相似文献
Noel O’ConnorEmail: |
26.
27.
MEPG-4中的二进制格式场景描述 总被引:1,自引:0,他引:1
描述了MPEG-4中二进制格式场景描述的特征,并对其流化多媒体、实现高压缩性、实现用户交互性等一组功能进行了介绍。 相似文献
28.
Jorge Granjal Edmundo Monteiro Jorge Sá Silva 《International Journal of Communication Systems》2014,27(10):1938-1963
The design of standard communications and security mechanisms for resource‐constrained sensing applications and devices may provide an important contribution for its integration with the Internet and consequently towards the realization of what we nowadays identify as the Internet of Things. This vision will only be realizable if appropriate security mechanisms are available, and in this context we target the design and experimental evaluation of security mechanisms for communications at the network‐layer with sensing devices (smart objects) using the standard IPv6 protocol. Our work proposes and evaluates the usage of new compressed security headers for the network layer with smart objects. We implement and evaluate what is, as far as we know, the first proposal of security at the network layer experimentally evaluated using the TinyOS operating system and its networking stack. As we verify in the course of our evaluation study, various scenarios employing network‐layer secure communications involving smart objects are feasible, particularly when security mechanisms are designed to benefit from cross‐layer interactions that allow the optimization of expensive cryptographic operations. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
29.
30.
A new feature selection method is proposed for high-dimensional data clustering on the basis of data field. With the potential entropy to evaluate the importance of feature subsets, features are filtered by removing unimportant features or noises from the original datasets. Experiments show that the proposed method can sharply reduce the number of dimensions and effectively improve the clustering performance on WDBC dataset. 相似文献