首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3896篇
  免费   286篇
  国内免费   5篇
电工技术   59篇
综合类   1篇
化学工业   873篇
金属工艺   90篇
机械仪表   65篇
建筑科学   106篇
矿业工程   7篇
能源动力   124篇
轻工业   394篇
水利工程   31篇
石油天然气   3篇
无线电   404篇
一般工业技术   795篇
冶金工业   449篇
原子能技术   32篇
自动化技术   754篇
  2024年   6篇
  2023年   41篇
  2022年   28篇
  2021年   128篇
  2020年   100篇
  2019年   113篇
  2018年   120篇
  2017年   112篇
  2016年   142篇
  2015年   134篇
  2014年   178篇
  2013年   250篇
  2012年   255篇
  2011年   318篇
  2010年   232篇
  2009年   202篇
  2008年   213篇
  2007年   193篇
  2006年   192篇
  2005年   123篇
  2004年   118篇
  2003年   96篇
  2002年   81篇
  2001年   67篇
  2000年   50篇
  1999年   50篇
  1998年   152篇
  1997年   91篇
  1996年   60篇
  1995年   47篇
  1994年   37篇
  1993年   40篇
  1992年   23篇
  1991年   20篇
  1990年   14篇
  1989年   13篇
  1988年   11篇
  1987年   13篇
  1986年   12篇
  1985年   13篇
  1984年   8篇
  1983年   8篇
  1982年   11篇
  1981年   15篇
  1980年   5篇
  1979年   11篇
  1977年   8篇
  1976年   7篇
  1975年   4篇
  1973年   6篇
排序方式: 共有4187条查询结果,搜索用时 31 毫秒
81.
82.
Facial expressions analysis plays an important part in emotion detection. However, having an automatic and non-intrusive system to detect blended facial expression is still a challenging problem, especially when the subject is unknown to the system. Here, we propose a method that adapts to the morphology of the subject and that is based on a new invariant representation of facial expressions. In our system, one expression is defined by its relative position to 8 other expressions. As the mode of representation is relative, we show that the resulting expression space is person-independent. The 8 expressions are synthesized for each unknown subject from plausible distortions. Recognition tasks are performed in this space with a basic algorithm. The experiments have been performed on 22 different blended expressions and on either known or unknown subjects. The recognition results on known subjects demonstrate that the representation is robust to the type of data (shape and/or texture information) and to the dimensionality of the expression space. The recognition results on 22 expressions of unknown subjects show that a dimensionality of the expression space of 4 is enough to outperform traditional methods based on active appearance models and accurately describe an expression.  相似文献   
83.
Matrix models are ubiquitous for constraint problems. Many such problems have a matrix of variables $\mathcal{M}$ , with the same constraint C defined by a finite-state automaton $\mathcal{A}$ on each row of $\mathcal{M}$ and a global cardinality constraint $\mathit{gcc}$ on each column of $\mathcal{M}$ . We give two methods for deriving, by double counting, necessary conditions on the cardinality variables of the $\mathit{gcc}$ constraints from the automaton $\mathcal{A}$ . The first method yields linear necessary conditions and simple arithmetic constraints. The second method introduces the cardinality automaton, which abstracts the overall behaviour of all the row automata and can be encoded by a set of linear constraints. We also provide a domain consistency filtering algorithm for the conjunction of lexicographic ordering constraints between adjacent rows of $\mathcal{M}$ and (possibly different) automaton constraints on the rows. We evaluate the impact of our methods in terms of runtime and search effort on a large set of nurse rostering problem instances.  相似文献   
84.
Sustainable water management is a global challenge for the 21st century. One key aspect remains protection against urban flooding. The main objective is to ensure or maintain an adequate level of service for all inhabitants. However, level of service is still difficult to assess and the high-risk locations difficult to identify. In this article, we propose a methodology, which (i) allows water managers to measure the service provided by the urban drainage system with regard to protection against urban flooding; and (ii) helps stakeholders to determine effective strategies for improving the service provided. One key aspect of this work is to use a database of sewer flood event records to assess flood risk. Our methodology helps urban water managers to assess the risk of sewer flooding; this approach does not seek to predict flooding but rather to inform decision makers on the current level of risk and on actions which need to be taken to reduce the risk. This work is based on a comprehensive definition of risk, including territorial vulnerability and perceptions of urban water stakeholders. This paper presents the results and the methodological contributions from implementing the methodology on two case studies: the cities of Lyon and Mulhouse.  相似文献   
85.
Dual-color fluorescence correlation spectroscopy is an interesting method to quantify protein interaction in living cells. But, when performing these experiments, one must compensate for a known spectral bleed through artifact that corrupts cross-correlation data. In this article, problems with crosstalk were overcome with an approach based on fluorescence lifetime correlation spectroscopy (FLCS). We show that FLCS applied to dual-color EGFP and mCherry cross-correlation allows the determination of protein-protein interactions in living cells without the need of spectral bleed through calibration. The methodology was validated by using EGFP-mCherry tandem in comparison with coexpressed EGFP and mCherry in live cell. The dual-color FLCS experimental procedure where the different laser intensities do not have to be controlled during experiment is really very helpful to study quantitatively protein interactions in live sample.  相似文献   
86.
We show that from a communication-complexity perspective, the primitive called oblivious transfer—which was introduced in a cryptographic context—can be seen as the classical analogue to a quantum channel in the same sense as non-local boxes are of maximally entangled qubits. More explicitly, one realization of non-cryptographic oblivious transfer allows for the perfect simulation of sending one qubit and measuring it in an orthogonal basis. On the other hand, a qubit channel allows for realizing non-cryptographic oblivious transfer with probability roughly 85 %, whereas 75 % is the classical limit.  相似文献   
87.
Typically, flow volumes are visualized by defining their boundary as iso‐surface of a level set function. Grid‐based level sets offer a good global representation but suffer from numerical diffusion of surface detail, whereas particle‐based methods preserve details more accurately but introduce the problem of unequal global representation. The particle level set (PLS) method combines the advantages of both approaches by interchanging the information between the grid and the particles. Our work demonstrates that the PLS technique can be adapted to volumetric dye advection via streak volumes, and to the visualization by time surfaces and path volumes. We achieve this with a modified and extended PLS, including a model for dye injection. A new algorithmic interpretation of PLS is introduced to exploit the efficiency of the GPU, leading to interactive visualization. Finally, we demonstrate the high quality and usefulness of PLS flow visualization by providing quantitative results on volume preservation and by discussing typical applications of 3D flow visualization.  相似文献   
88.
Interoperability is a key property of enterprise applications, which is hard to achieve due to the large number of interoperating components and semantic heterogeneity. The inherent complexity of interoperability problems implies that there exists no silver bullet to solve them. Rather, the knowledge about how to solve wicked interoperability problems is hidden in the application cases that expose those problems. The paper addresses the question of how to organise and use method knowledge to resolve interoperability problems. We propose the structure of a knowledge-based system that can deliver situation-specific solutions, called method chunks. Situational Method Engineering promotes modularisation and formalisation of method knowledge in the form of reusable method chunks, which can be combined to compose a situation-specific method. The method chunks are stored in a method chunk repository. In order to cater for management and retrieval, we introduce an Interoperability Classification Framework, which is used to classify and tag method chunks and to assess the project situation in which they are to be used. The classification framework incorporates technical as well as business and organisational aspects of interoperability. This is an important feature as interoperability problems typically are multifaceted spanning multiple aspects. We have applied the approach to analyse an industry case from the insurance sector to identify and classify a set of method chunks.  相似文献   
89.
Deep belief networks (DBN) are generative neural network models with many layers of hidden explanatory factors, recently introduced by Hinton, Osindero, and Teh (2006) along with a greedy layer-wise unsupervised learning algorithm. The building block of a DBN is a probabilistic model called a restricted Boltzmann machine (RBM), used to represent one layer of the model. Restricted Boltzmann machines are interesting because inference is easy in them and because they have been successfully used as building blocks for training deeper models. We first prove that adding hidden units yields strictly improved modeling power, while a second theorem shows that RBMs are universal approximators of discrete distributions. We then study the question of whether DBNs with more layers are strictly more powerful in terms of representational power. This suggests a new and less greedy criterion for training RBMs within DBNs.  相似文献   
90.
Search games are attractive for their correspondence with classical width parameters. For instance, the invisible search number (a.k.a. node search number) of a graph is equal to its pathwidth plus 1, and the visible search number of a graph is equal to its treewidth plus 1. The connected variants of these games ask for search strategies that are connected, i.e., at every step of the strategy, the searched part of the graph induces a connected subgraph. We focus on monotone search strategies, i.e., strategies for which every node is searched exactly once. The monotone connected visible search number of an n-node graph is at most O(logn) times its visible search number. First, we prove that this logarithmic bound is tight. Precisely, we prove that there is an infinite family of graphs for which the ratio monotone connected visible search number over visible search number is Ω(logn). Second, we prove that, as opposed to the non-connected variant of visible graph searching, “recontamination helps” for connected visible search. Precisely, we prove that, for any k4, there exists a graph with connected visible search number at most k, and monotone connected visible search number >k  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号