全文获取类型
收费全文 | 28002篇 |
免费 | 3150篇 |
国内免费 | 1689篇 |
专业分类
电工技术 | 4208篇 |
综合类 | 2402篇 |
化学工业 | 3261篇 |
金属工艺 | 624篇 |
机械仪表 | 1632篇 |
建筑科学 | 1389篇 |
矿业工程 | 436篇 |
能源动力 | 914篇 |
轻工业 | 1560篇 |
水利工程 | 407篇 |
石油天然气 | 660篇 |
武器工业 | 244篇 |
无线电 | 2643篇 |
一般工业技术 | 2829篇 |
冶金工业 | 2162篇 |
原子能技术 | 186篇 |
自动化技术 | 7284篇 |
出版年
2024年 | 108篇 |
2023年 | 480篇 |
2022年 | 612篇 |
2021年 | 837篇 |
2020年 | 902篇 |
2019年 | 776篇 |
2018年 | 754篇 |
2017年 | 953篇 |
2016年 | 1010篇 |
2015年 | 1154篇 |
2014年 | 1434篇 |
2013年 | 1858篇 |
2012年 | 1667篇 |
2011年 | 2077篇 |
2010年 | 1541篇 |
2009年 | 1695篇 |
2008年 | 1679篇 |
2007年 | 1994篇 |
2006年 | 1734篇 |
2005年 | 1489篇 |
2004年 | 1247篇 |
2003年 | 1083篇 |
2002年 | 918篇 |
2001年 | 754篇 |
2000年 | 629篇 |
1999年 | 556篇 |
1998年 | 588篇 |
1997年 | 369篇 |
1996年 | 309篇 |
1995年 | 229篇 |
1994年 | 215篇 |
1993年 | 171篇 |
1992年 | 171篇 |
1991年 | 131篇 |
1990年 | 123篇 |
1989年 | 70篇 |
1988年 | 66篇 |
1987年 | 56篇 |
1986年 | 64篇 |
1985年 | 85篇 |
1984年 | 55篇 |
1983年 | 56篇 |
1982年 | 39篇 |
1981年 | 20篇 |
1980年 | 22篇 |
1979年 | 13篇 |
1978年 | 13篇 |
1977年 | 8篇 |
1976年 | 5篇 |
1974年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 147 毫秒
991.
Gamma mixture models for target recognition 总被引:6,自引:0,他引:6
Andrew R. 《Pattern recognition》2000,33(12):2045-2054
This paper considers a mixture model approach to automatic target recognition using high-resolution radar measurements. The mixture model approach is motivated from several perspectives including requirements that the target classifier is robust to uncertainty in amplitude scaling, rotation and translation of the target. Estimation of the model parameters is achieved using the expectation-maximisation (EM) algorithm. Gamma mixtures are introduced and the re-estimation equations derived. The models are applied to the classification of high-resolution radar range profiles of ships and results compared with a previously published self-organising map approach. 相似文献
992.
We consider a class of time-varying
-valued control models, and with possibly unbounded costs. The processes evolve according to the system equation xn+1=Gn(xn,an)+ξn (
), where {ξn} are i.i.d. random vectors and {Gn} a sequence of known functions converging to some function G∞. Under suitable hypotheses, we show the existence of an α-discount optimal policy for the limiting system xn+1=G∞(xn,an)+ξn. 相似文献
993.
994.
正规网格等值线的虚路径扫描算法 总被引:5,自引:0,他引:5
等值线图在工程分析和计算领域有着广泛的应用。该文以正规化的采样数据为研究对象,提出了一种全新的虚路径扫描算法。算法在数据网格基础之上构筑一虚拟的路径网格,利用路径网格上的线段(虚路径)来记录等值点的追踪路径信息。所有等值线的虚路径的捕获只需通过一次性扫描即可完成,不仅提高了追踪效率,而且避免了以往等值线追踪算法初始点选择困难、网格出口边判断复杂等一系列问题。算法的另一优点是追踪结果的精度是可控的,取决于等值点如何取值。该算法在土地定级中的作用分等值线图绘制中得到很好的应用。虚路径的思想同样适用于非正规的采样数据。 相似文献
995.
996.
997.
M. V. Mikhalevich I. V. Sergienko L. B. Koshlai 《Cybernetics and Systems Analysis》2001,37(4):515-532
A system of mathematical models of foreign economic activity under transition economy conditions is considered. Input-output optimization models and econometric micromodels are the basis of this system. Simulation using real data and the mentioned models is performed. The obtained results allow us to explain some features of the structure of the Ukrainian export. 相似文献
998.
Multi-Modal Dialog Scene Detection Using Hidden Markov Models for Content-Based Multimedia Indexing 总被引:1,自引:1,他引:0
A class of audio-visual data (fiction entertainment: movies, TV series) is segmented into scenes, which contain dialogs, using a novel hidden Markov model-based (HMM) method. Each shot is classified using both audio track (via classification of speech, silence and music) and visual content (face and location information). The result of this shot-based classification is an audio-visual token to be used by the HMM state diagram to achieve scene analysis. After simulations with circular and left-to-right HMM topologies, it is observed that both are performing very good with multi-modal inputs. Moreover, for circular topology, the comparisons between different training and observation sets show that audio and face information together gives the most consistent results among different observation sets. 相似文献
999.
Data-Intensive Web Sites: Design and Maintenance 总被引:1,自引:0,他引:1
1000.
The execution of workflow processes requires authorizations for enforcing the assignment of tasks to agents, either human or automated, according to the security policy of the organization. This paper presents a workflow authorization framework based on roles and organizational levels, and on authorization constraints. To facilitate the assignment of tasks to agents, roles and organizational levels are organized into hierarchies. Authorization constraints are introduced to specify instance-dependent, time-dependent, and history-dependent authorizations. Authorization constraints are specified in terms of active rules, used also for authorization management. The Workflow Management System determines authorized agents on the basis of the contents of an authorization base maintained through the active rules defined in the system. 相似文献