全文获取类型
收费全文 | 26923篇 |
免费 | 3001篇 |
国内免费 | 2455篇 |
专业分类
电工技术 | 1706篇 |
技术理论 | 2篇 |
综合类 | 2434篇 |
化学工业 | 1418篇 |
金属工艺 | 344篇 |
机械仪表 | 927篇 |
建筑科学 | 599篇 |
矿业工程 | 198篇 |
能源动力 | 444篇 |
轻工业 | 200篇 |
水利工程 | 232篇 |
石油天然气 | 158篇 |
武器工业 | 121篇 |
无线电 | 5788篇 |
一般工业技术 | 1583篇 |
冶金工业 | 386篇 |
原子能技术 | 44篇 |
自动化技术 | 15795篇 |
出版年
2024年 | 54篇 |
2023年 | 541篇 |
2022年 | 580篇 |
2021年 | 670篇 |
2020年 | 805篇 |
2019年 | 715篇 |
2018年 | 662篇 |
2017年 | 870篇 |
2016年 | 1042篇 |
2015年 | 1156篇 |
2014年 | 1616篇 |
2013年 | 1941篇 |
2012年 | 1764篇 |
2011年 | 2000篇 |
2010年 | 1590篇 |
2009年 | 1936篇 |
2008年 | 2036篇 |
2007年 | 1958篇 |
2006年 | 1602篇 |
2005年 | 1370篇 |
2004年 | 1201篇 |
2003年 | 1031篇 |
2002年 | 896篇 |
2001年 | 764篇 |
2000年 | 662篇 |
1999年 | 533篇 |
1998年 | 477篇 |
1997年 | 411篇 |
1996年 | 335篇 |
1995年 | 269篇 |
1994年 | 205篇 |
1993年 | 170篇 |
1992年 | 119篇 |
1991年 | 71篇 |
1990年 | 51篇 |
1989年 | 37篇 |
1988年 | 30篇 |
1987年 | 21篇 |
1986年 | 16篇 |
1985年 | 43篇 |
1984年 | 37篇 |
1983年 | 35篇 |
1982年 | 40篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 6篇 |
1978年 | 3篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
81.
In line with the pervasive vision, pervasive sensing allows the provision of ubiquitous and pervasive monitoring and heterogeneous data collection. In the past decade, two dominant pervasive sensing paradigms have emerged: a mostly human-free paradigm centered around wireless sensor networks and a human-centric paradigm fueled by the rise of personal smart devices (smartphones and wearables). In this paper, we review the key advances in these areas and outline our vision for future directions and developments. 相似文献
82.
83.
84.
We investigate the problem of efficient wireless power transfer in wireless sensor networks. In our approach, special mobile entities (called the Mobile Chargers) traverse the network and wirelessly replenish the energy of sensor nodes. In contrast to most current approaches, we envision methods that are distributed and use limited network information. We propose four new protocols for efficient charging, addressing key issues which we identify, most notably (i) what are good coordination procedures for the Mobile Chargers and (ii) what are good trajectories for the Mobile Chargers. Two of our protocols (DC, DCLK) perform distributed, limited network knowledge coordination and charging, while two others (CC, CCGK) perform centralized, global network knowledge coordination and charging. As detailed simulations demonstrate, one of our distributed protocols outperforms a known state of the art method, while its performance gets quite close to the performance of the powerful centralized global knowledge method. 相似文献
85.
Zhi Zhang Xin Huang Yebin Chen Jianping Zhou 《International Journal of Adaptive Control and Signal Processing》2021,35(8):1438-1453
This article deals with the issue of input-to-state stabilization for recurrent neural networks with delay and external disturbance. The goal is to design a suitable weight-learning law to make the considered network input-to-state stable with a predefined -gain. Based on the solution of linear matrix inequalities, two schemes for the desired learning law are presented via using decay-rate-dependent and decay-rate-independent Lyapunov functionals, respectively. It is shown that, in the absence of external disturbance, the proposed learning law also guarantees the exponential stability of the network. To illustrate the applicability of the present weight-learning law, two numerical examples with simulations are given. 相似文献
86.
Vehicular networks have tremendous potential to improve road safety, traffic efficiency, and driving comfort, where cooperative vehicular safety applications are a significant branch. In cooperative vehicular safety applications, through the distributed data fusion for large amounts of data from multiple nearby vehicles, each vehicle can intelligently perceive the surrounding conditions beyond the capability of its own onboard sensors. Trust evaluation and privacy preservation are two primary concerns for facilitating the distributed data fusion in cooperative vehicular safety applications. They have conflicting requirements and a good balance between them is urgently needed. Meanwhile, the computation, communication, and storage overheads will all influence the applicability of a candidate scheme. In this paper, we propose a Lightweight Privacy-Preserving Trust Evaluation (LPPTE) scheme which can primely balance the trust evaluation and privacy preservation with low overheads for facilitating the distributed data fusion in cooperative vehicular safety applications. Furthermore, we provide exhaustive theoretical analysis and simulation evaluation for the LPPTE scheme, and the results demonstrate that the LPPTE scheme can obviously improve the accuracy of fusion results and is significantly superior to the state-of-the-art schemes in multiple aspects. 相似文献
87.
Simon Alexanderson Gustav Eje Henter Taras Kucherenko Jonas Beskow 《Computer Graphics Forum》2020,39(2):487-496
Automatic synthesis of realistic gestures promises to transform the fields of animation, avatars and communicative agents. In off-line applications, novel tools can alter the role of an animator to that of a director, who provides only high-level input for the desired animation; a learned network then translates these instructions into an appropriate sequence of body poses. In interactive scenarios, systems for generating natural animations on the fly are key to achieving believable and relatable characters. In this paper we address some of the core issues towards these ends. By adapting a deep learning-based motion synthesis method called MoGlow, we propose a new generative model for generating state-of-the-art realistic speech-driven gesticulation. Owing to the probabilistic nature of the approach, our model can produce a battery of different, yet plausible, gestures given the same input speech signal. Just like humans, this gives a rich natural variation of motion. We additionally demonstrate the ability to exert directorial control over the output style, such as gesture level, speed, symmetry and spacial extent. Such control can be leveraged to convey a desired character personality or mood. We achieve all this without any manual annotation of the data. User studies evaluating upper-body gesticulation confirm that the generated motions are natural and well match the input speech. Our method scores above all prior systems and baselines on these measures, and comes close to the ratings of the original recorded motions. We furthermore find that we can accurately control gesticulation styles without unnecessarily compromising perceived naturalness. Finally, we also demonstrate an application of the same method to full-body gesticulation, including the synthesis of stepping motion and stance. 相似文献
88.
《Digital Communications & Networks》2020,6(2):229-237
With the rapid development and widespread application of Wireless Body Area Networks (WBANs), the traditional centralized system architecture cannot handle the massive data generated by the edge devices. Meanwhile, in order to ensure the security of physiological privacy data and the identity privacy of patients, this paper presents a privacy protection strategy for Mobile Edge Computing(MEC) enhanced WBANs, which leverages the blockchain-based decentralized MEC paradigm to support efficient transmission of privacy information with low latency, high reliability within a high-demand data security scenario. On this basis, the Merkle tree optimization model is designed to authenticate nodes and to verify the source of physiological data. Furthermore, a hybrid signature algorithm is devised to guarantee the node anonymity with unforgeability, data integrity and reduced delay. The security performance analysis and simulation results show that our proposed strategy not only reduces the delay, but also secures the privacy and transmission of sensitive WBANs data. 相似文献
89.
For the last decades, the concern of producing convincing facial animation has garnered great interest, that has only been accelerating with the recent explosion of 3D content in both entertainment and professional activities. The use of motion capture and retargeting has arguably become the dominant solution to address this demand. Yet, despite high level of quality and automation performance-based animation pipelines still require manual cleaning and editing to refine raw results, which is a time- and skill-demanding process. In this paper, we look to leverage machine learning to make facial animation editing faster and more accessible to non-experts. Inspired by recent image inpainting methods, we design a generative recurrent neural network that generates realistic motion into designated segments of an existing facial animation, optionally following user-provided guiding constraints. Our system handles different supervised or unsupervised editing scenarios such as motion filling during occlusions, expression corrections, semantic content modifications, and noise filtering. We demonstrate the usability of our system on several animation editing use cases. 相似文献
90.
ABSTRACTLearning parameters of a probabilistic model is a necessary step in machine learning tasks. We present a method to improve learning from small datasets by using monotonicity conditions. Monotonicity simplifies the learning and it is often required by users. We present an algorithm for Bayesian Networks parameter learning. The algorithm and monotonicity conditions are described, and it is shown that with the monotonicity conditions we can better fit underlying data. Our algorithm is tested on artificial and empiric datasets. We use different methods satisfying monotonicity conditions: the proposed gradient descent, isotonic regression EM, and non-linear optimization. We also provide results of unrestricted EM and gradient descent methods. Learned models are compared with respect to their ability to fit data in terms of log-likelihood and their fit of parameters of the generating model. Our proposed method outperforms other methods for small sets, and provides better or comparable results for larger sets. 相似文献