首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9611篇
  免费   1412篇
  国内免费   963篇
电工技术   501篇
技术理论   2篇
综合类   916篇
化学工业   93篇
金属工艺   45篇
机械仪表   318篇
建筑科学   219篇
矿业工程   163篇
能源动力   20篇
轻工业   120篇
水利工程   85篇
石油天然气   42篇
武器工业   84篇
无线电   3902篇
一般工业技术   320篇
冶金工业   100篇
原子能技术   58篇
自动化技术   4998篇
  2024年   17篇
  2023年   100篇
  2022年   195篇
  2021年   242篇
  2020年   250篇
  2019年   177篇
  2018年   200篇
  2017年   287篇
  2016年   300篇
  2015年   451篇
  2014年   745篇
  2013年   725篇
  2012年   916篇
  2011年   929篇
  2010年   719篇
  2009年   676篇
  2008年   788篇
  2007年   820篇
  2006年   677篇
  2005年   657篇
  2004年   508篇
  2003年   424篇
  2002年   269篇
  2001年   231篇
  2000年   174篇
  1999年   123篇
  1998年   80篇
  1997年   81篇
  1996年   54篇
  1995年   50篇
  1994年   27篇
  1993年   21篇
  1992年   14篇
  1991年   18篇
  1990年   11篇
  1989年   9篇
  1988年   4篇
  1987年   7篇
  1986年   4篇
  1985年   3篇
  1984年   1篇
  1983年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
"互联网+"的发展和智能手机的普及推动了网络短视频平台的迅猛发展。此类平台为使用者带来乐趣的同时存在诸多问题。文章调查了高职院校学生使用短视频平台的情况,描绘出高职院校学生使用短视频平台的基本现状,并揭示了使用短视频平台对高职院校学生学习、身心、行为、交往等产生的负面影响,高职学生沉迷于短视频平台,希望相关部门及此类平台可以采取相关措施提高视频内容质量、控制视频使用时间。  相似文献   
72.
为提高群体性事件智能视频监控的可靠性,提出在传统图像处理算法实现目标检测和特征提取的基础上,采用贝叶斯网络进一步对事件特征进行分析,重点介绍人群聚集事件判定贝叶斯网络建模、参数设置和推理等关键过程,并以具体的实例进行验证。结果表明:该方法具有建模简单、对智能视频分析算法依赖性低、鲁棒性和移植性强等特点,对建立可靠的智能视频监控系统具有参考价值。  相似文献   
73.
Sex role stereotyping by players in first-person shooter games and other online gaming environments may encourage a social environment that marginalizes and alienates female players. Consistent with the social identity model of deindividuation effects (SIDE), the anonymity of online games may engender endorsement of group-consistent attitudes and amplification of social stereotyping, such as the adherence to gender norms predicted by expectations states theory. A 2 × 3 × 2 virtual field experiment (N = 520) in an online first-person shooter video game examined effects of a confederate players’ sex, communication style, and skill on players’ compliance with subsequent online friend requests. We found support for the hypothesis that, in general, women would gain more compliance with friend requests than men. We also found support for the hypothesis that women making positive utterances would gain more compliance with friend requests than women making negative utterances, whereas men making negative utterances would gain more compliance with friend requests than men making positive utterances. The hypothesis that player skill (i.e., game scores) would predict compliance with friend requests was not supported. Implications for male and female game players and computer-mediated communication in online gaming environments are discussed.  相似文献   
74.
3D video for tele-medicine applications is gradually gaining momentum since the 3D technology can provide precise location information. However, the weak link for 3D video streaming is the necessary wireless link of the communication system. Neglecting the wireless impairments can severely degrade the performance of 3D video streaming that communicates complex critical medical data. In this paper, we propose systematic methodology for ensuring high performance of the 3D medical video streaming system. First, we present a recursive end-to-end distortion estimation approach for MVC (multiview video coding)-based 3D video streaming over error-prone networks by considering the 3D inter-view prediction. Then, based on the previous model, we develop a cross-layer optimization scheme that considers the LTE wireless physical layer (PHY). In this optimization, the authentication requirements of 3D medical video are also taken into account. The proposed cross-layer optimization approach jointly controls and manages the authentication, video coding quantization of 3D video, and the modulation and channel coding scheme (MCS) of the LTE wireless PHY to minimize the end-to-end video distortion. Experimental results show that the proposed approach can provide superior 3D medical video streaming performance in terms of peak signal-to-noise ratio (PSNR) when compared to state-of-the-art approaches that include joint source-channel optimized streaming with multi-path hash-chaining based-authentication, and also conventional video streaming with single path hash-chaining-based authentication.  相似文献   
75.
Many methods for multinational License Plate Detection (LPD) have been proposed in recent times but most of them are not sophisticated enough to handle complex backgrounds. Moreover, their ability to handle various environmental and illumination conditions has been limited and still needs improvement. In this paper, we propose a novel technique to detect license plates of vehicles regardless of their color, size, and content. As the rear vehicle lights are an essential part of any vehicle, we reduce the image processing area to eliminate the complex background by detecting the rear-lights as the license plates are in a certain range of these lights. Heuristic Energy Map (HEM) of the vertical edge information in the Region of Interest (ROI) is calculated and area with the dense edges is selected using a unique histogram approach which is considered to be the license plate. The proposed algorithm is tested on 855 images from various countries including China, Pakistan, Serbia, Italy and various states of America. Experimental results show that the proposed method is able to detect license plates 90.4% of times despite of complex backgrounds in 0.25 s on average that can achieve real time performance.  相似文献   
76.
针对H.264视频压缩编码标准中去块效应滤波器部分提出了一种基于YHFT Matrix DSP的并行设计及向量实现方法。重点对H.264协议中去块效应滤波器进行理论分析,并利用向量数据访问单元、向量处理单元、高效的混洗单元和灵活的矩阵对其进行并行算法设计。将去块滤波算法分别映射到YHFT Matrix和TI的TMS320C6415中,通过统计两者性能,表明YHFT Matrix的性能优于TMS320C6415。  相似文献   
77.
This study aimed to identify preservice chemistry teachers’ understanding of redox reactions at the submicroscopic level and how they make connections to macroscopic level. Twenty‐five preservice chemistry teachers first viewed a video of a redox reaction happening between a zinc wire and a copper(II) sulfate solution, then they reflected on their macroscopic observations, and generated storyboards (a sequence of drawings) representing this reaction at the submicroscopic level. Both the reflections and the storyboards were coded, and the categories reflecting the participants’ levels of understanding were determined. Results showed that the participants usually identified the macroscopic evidences, but they had conceptual difficulties in interpreting and representing evidences at the submicroscopic level. Few participants indicated a scientific or a moderate understanding of redox reactions, whereas the majority exhibited either weak or alternative understanding of redox reactions.  相似文献   
78.
The Fourth Amendment to the U.S. Constitution functions as a shield against excess governmental or police power by prohibiting unreasonable searches and seizures. Since its ratification, legal challenges have tempered this shield by frequently disputing the application of investigative processes and tools, including those that bypass the traditional – and simpler – analysis that focused on physical trespass. But recent technological advancements have prompted novel challenges and have forced the U.S. Supreme Court to adopt a parallel inquiry that evaluates society’s expectations of privacy as an alternate path to invoke the Fourth Amendment’s protections apart from any physical trespass. As revolutionary technology continues to present unique issues, this 200-year-old shield manifests a reflective luster as if polished by years of legal discourse that reveals the priorities of those who would interpret its text. Viewing the Fourth Amendment’s shield as a mirror illustrates not only the thoughts of the drafters that revolved primarily around protecting property interests but also the expectations of modern society with its insistence on promoting privacy. And where the drafters channeled their outrage against the loathsome writs of assistance in colonial times, later Americans continued to denounce the similarly invasive general warrants and attempts by investigators to expand the tools in their arsenal beyond constitutional bounds, especially in the surveillance context. Yet, the problems posed by new technology upon privacy concerns are best resolved by relying on the core principles supporting the Fourth Amendment, previous U.S. Supreme Court precedent, and current societal perspectives regarding privacy as a top priority proven by recently enacted legislation both foreign and domestic.

By applying a similar method to address advancing communication technology and its use as a surveillance tool in Carpenter v. United States, the Court turned this shield-become-mirror upon society to conclude that cell phone location information deserves Fourth Amendment protection because of its untiring comprehensiveness and its uniquely detailed nature. Moreover, nearly every American adult carries a cell phone with them almost all the time, making it possible to create a time-stamped map of any cell-phone-carrying-individual’s movements reaching back years and years. Unfortunately, the Carpenter Court did not extend this crucial protection far enough to protect all cell phone location data, and the unmistakable gap in its holding leaves a potential privacy vulnerability the exploitation of which could cause greater harm than all previously disputed surveillance technology combined because of cell phone usage’s general – near universal – applicability. Allowing cell phone location information to be obtained without probable cause and a proper search warrant not only fails to meet the spirit of the Fourth Amendment, it also begins to tarnish that shield such that it no longer reflects historical or current societal values, reducing its goal of protecting Americans to a hollow incantation of words left to languish as time (and technology) marches on.  相似文献   

79.
Abstract

Recently, Gao and Tu presented an efficient algorithm for robust low bit‐rate video transmission by using a partial backward decodable bit stream (PBDBS) approach. In this paper, we first present a multiple‐PBDBS (MPBDBS) approach to improve on the previous PBDBS approach. Next a mathematical theory is provided to minimize the error propagation length in each group of blocks (GOB). Further, a novel MPBDBS‐based algorithm is presented for robust video transmission. Experimental results demonstrate that our proposed MPBDBS‐based algorithm has better image quality when compared to the previous PBDBS‐based algorithm, but has some bit‐rate and execution‐time degradation. In our experiments, both single and two‐bit error models are investigated.  相似文献   
80.
ABSTRACT

Internet voice and video calling have demonstrated a dramatic rise in quality in the past several years and have quickly become communication technologies with a disruptive impact on society. Librarians, who regularly adopt such technologies in outreach and public services, should evaluate Web-calling programs as potential sources of innovative reference programming. This article describes the development of Skype video and Internet telephony pilot reference services at the Ohio University Libraries and considers the utility of Skype and VoIP in a library setting.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号