首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2098篇
  免费   211篇
  国内免费   134篇
电工技术   351篇
综合类   187篇
化学工业   203篇
金属工艺   35篇
机械仪表   135篇
建筑科学   61篇
矿业工程   98篇
能源动力   45篇
轻工业   122篇
水利工程   51篇
石油天然气   129篇
武器工业   17篇
无线电   236篇
一般工业技术   141篇
冶金工业   65篇
原子能技术   15篇
自动化技术   552篇
  2024年   2篇
  2023年   24篇
  2022年   40篇
  2021年   62篇
  2020年   66篇
  2019年   60篇
  2018年   50篇
  2017年   74篇
  2016年   70篇
  2015年   78篇
  2014年   121篇
  2013年   127篇
  2012年   158篇
  2011年   160篇
  2010年   123篇
  2009年   132篇
  2008年   114篇
  2007年   138篇
  2006年   141篇
  2005年   104篇
  2004年   88篇
  2003年   78篇
  2002年   63篇
  2001年   69篇
  2000年   51篇
  1999年   42篇
  1998年   27篇
  1997年   30篇
  1996年   21篇
  1995年   20篇
  1994年   15篇
  1993年   17篇
  1992年   15篇
  1991年   7篇
  1990年   11篇
  1989年   3篇
  1988年   9篇
  1987年   5篇
  1986年   3篇
  1985年   6篇
  1984年   5篇
  1983年   7篇
  1981年   2篇
  1980年   1篇
  1978年   1篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
排序方式: 共有2443条查询结果,搜索用时 187 毫秒
71.
结合HSV与纹理特征的视频阴影消除算法   总被引:1,自引:0,他引:1       下载免费PDF全文
目的 在视频监控目标检测应用中,场景中的阴影会直接影响目标检测的准确度,因此阴影抑制算法研究显得尤为重要。目前广泛使用的是HSV(hue,saturation,value)阴影抑制方法,但是该方法存在由于亮度比值的阈值不稳定而造成将运动目标也检测为阴影的问题。针对该问题,本文提出了一种结合HSV与纹理特征的视频阴影消除方法。方法 首先将输入的图像使用传统的混合高斯模型建立背景并在灰度空间中提取前景,其次在HSV空间使用亮度比的阈值方法检测阴影,二者综合得到运动目标;针对由于亮度比值的阈值不稳定而导致的前景误检为阴影的问题,采用了LBP(local binary pattern)算子结合大津阈值(OTSU)提取部分运动目标。最后将LBP算子结合大津阈值提取的部分运动目标与HSV空间检测的目标两者相或,最终去除运动目标的阴影。结果 本文选用在CVPR-ATON和CAVIAR标准视频库中多个场景的阴影视频,将本文算法与SNP算法、SP算法、DNM1算法和DNM2算法进行对比仿真,实验结果表明本文算法在阴影检测率和阴影识别率的平均值上提升约10%。结论 本文提出的视频阴影消除算法结合了HSV与纹理特征,可以在不同的环境中有效地去除阴影,运动目标保留完整,可适用于智能视频监控、遥感图像和人机交互中。  相似文献   
72.
求解最小闭包球问题改进的SMO-型算法   总被引:1,自引:0,他引:1  
研究n维空间中m个点的最小闭包球(MEB)问题。通过结合确定并删除内部点的技术到序列最小最优化(SMO)方法中,提出一种近似求解MEB问题的改进的SMO-型算法。证明了该算法具有线性收敛性。数值结果表明对于一些mn的大规模数据集,改进的算法与原算法相比速度可以提高10倍以上。尤其,当n等于100且m等于100000时,改进的SMO-型算法仅需执行8s。此外,对于n等于10000且m等于1000的大规模数据集,改进的算法也仅需执行150s。  相似文献   
73.
In this paper, we prove that a query plan is safe in tuple independent probabilistic databases if and only if its every answer tuple is tree structured in probabilistic graphical models. We classify hierarchical queries into core and non-core hierarchical queries and show that the existing methods can only generate safe plans for core hierarchical queries. Inspired by the bucket elimination framework, we give the sufficient and necessary conditions for the answer relation of every candidate sub-query to be used as a base relation. Finally, the proposed algorithm generates safe plans for extensional query evaluation on non-boolean hierarchical queries and invokes the SPROUT algorithm [24] for intensional query evaluation on boolean queries. A case study on the TPC-H benchmark reveals that the safe plans of Q7 and Q8 can be evaluated efficiently. Furthermore, extensive experiments show that safe plans generated by the proposed algorithm scale well.  相似文献   
74.
An approximate duplicate elimination in RFID data streams   总被引:1,自引:0,他引:1  
The RFID technology has been applied to a wide range of areas since it does not require contact in detecting RFID tags. However, due to the multiple readings in many cases in detecting an RFID tag and the deployment of multiple readers, RFID data contains many duplicates. Since RFID data is generated in a streaming fashion, it is difficult to remove duplicates in one pass with limited memory. We propose one pass approximate methods based on Bloom Filters using a small amount of memory. We first devise Time Bloom Filters as a simple extension to Bloom Filters. We then propose Time Interval Bloom Filters to reduce errors. Time Interval Bloom Filters need more space than Time Bloom Filters. We propose a method to reduce space for Time Interval Bloom Filters. Since Time Bloom Filters and Time Interval Bloom Filters are based on Bloom Filters, they do not produce false negative errors. Experimental results show that our approaches can effectively remove duplicates in RFID data streams in one pass with a small amount of memory.  相似文献   
75.
Free-cut elimination allows cut elimination to be carried out in the presence of non-logical axioms. Formulas in a proof are anchored provided they originate in a non-logical axiom or non-logical inference. This paper corrects and strengthens earlier upper bounds on the size of free-cut elimination. The correction requires that the notion of a free cut be modified so that a cut formula is anchored provided that all of its introductions are anchored, instead of only requiring that one of its introductions is anchored. With the correction, the originally proved size upper bounds remain unchanged. These results also apply to partial cut elimination. We also apply these bounds to elimination of cuts in propositional logic.If the non-logical inferences are closed under cut and infer only atomic formulas, then all cuts can be eliminated. This extends earlier results of Takeuti and of Negri and von Plato.  相似文献   
76.
Image reconstruction from in-line Fresnel holograms by eliminating a coherent background is studied by computer simulation. The coherent background is calculated by averaging an intensity of a recorded hologram. The quality of the reconstructed image is measured by using a ratio of peak signal to noise. In comparison with the conventional reconstruction method, the results show that the background elimination can improve significantly the quality of the reconstructed images. The text was submitted by the authors in English.  相似文献   
77.
Aligning DNA and protein sequences is a core technique in molecular biology. Often, it is desirable to include partial prior knowledge and conditions in an alignment. Going beyond prior work, we aim at the integration of such side constraints in free combination into alignment algorithms. The most common and successful technique for efficient alignment algorithms is dynamic programming (DP). However, a weakness of DP is that one cannot include additional constraints without specifically tailoring a new DP algorithm. Here, we discuss a declarative approach that is based on constraint techniques and show how it can be extended by formulating additional knowledge as constraints. We take special care to obtain the efficiency of DP for sequence alignment. This is achieved by careful modeling and applying proper solving strategies. Finally, we apply our method to the scanning for RNA motifs in large sequences. This case study demonstrates how the new approach can be used in real biological problems. A prototypic implementation of the method is available at .  相似文献   
78.
Gaussian elimination and LU factoring have been greatly studied from the algorithmic point of view, but much less from the point view of the best output format. In this paper, we give new output formats for fraction free LU factoring and for QR factoring. The formats and the algorithms used to obtain them are valid for any matrix system in which the entries are taken from an integral domain, not just for integer matrix systems. After discussing the new output format of LU factoring, the complexity analysis for the fraction free algorithm and fraction free output is given. Our new output format contains smaller entries than previously suggested forms, and it avoids the gcd computations required by some other partially fraction free computations. As applications of our fraction free algorithm and format, we demonstrate how to construct a fraction free QR factorization and how to solve linear systems within a given domain.  相似文献   
79.
计算对称带状矩阵特征值问题的并行二分/多分法   总被引:1,自引:1,他引:0  
文中提出了在分布式环境下并行求解对称带状矩阵特征值问题的并行二分.多分法及其改进,该算法利用变形高斯消去法计算对称带状矩阵的Sturm序列,并利用Rayleigh商迭代对二分/多分法加以改进,在算法的并行执行过程中,各处理机间不需通信,特别适用在分布式环境下的并行计算,最后给出了数值实验结果。  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号