全文获取类型
收费全文 | 40578篇 |
免费 | 3964篇 |
国内免费 | 1937篇 |
专业分类
电工技术 | 2535篇 |
技术理论 | 3篇 |
综合类 | 2754篇 |
化学工业 | 6543篇 |
金属工艺 | 2255篇 |
机械仪表 | 2538篇 |
建筑科学 | 3032篇 |
矿业工程 | 1178篇 |
能源动力 | 1179篇 |
轻工业 | 2624篇 |
水利工程 | 831篇 |
石油天然气 | 2505篇 |
武器工业 | 391篇 |
无线电 | 4948篇 |
一般工业技术 | 4790篇 |
冶金工业 | 1776篇 |
原子能技术 | 418篇 |
自动化技术 | 6179篇 |
出版年
2024年 | 120篇 |
2023年 | 816篇 |
2022年 | 1383篇 |
2021年 | 2067篇 |
2020年 | 1540篇 |
2019年 | 1150篇 |
2018年 | 1368篇 |
2017年 | 1433篇 |
2016年 | 1200篇 |
2015年 | 1716篇 |
2014年 | 2188篇 |
2013年 | 2472篇 |
2012年 | 2807篇 |
2011年 | 3035篇 |
2010年 | 2694篇 |
2009年 | 2258篇 |
2008年 | 2377篇 |
2007年 | 2132篇 |
2006年 | 2062篇 |
2005年 | 1778篇 |
2004年 | 1170篇 |
2003年 | 975篇 |
2002年 | 951篇 |
2001年 | 817篇 |
2000年 | 812篇 |
1999年 | 994篇 |
1998年 | 779篇 |
1997年 | 610篇 |
1996年 | 565篇 |
1995年 | 474篇 |
1994年 | 396篇 |
1993年 | 266篇 |
1992年 | 238篇 |
1991年 | 175篇 |
1990年 | 131篇 |
1989年 | 100篇 |
1988年 | 84篇 |
1987年 | 51篇 |
1986年 | 44篇 |
1985年 | 36篇 |
1984年 | 29篇 |
1983年 | 28篇 |
1982年 | 23篇 |
1981年 | 21篇 |
1980年 | 21篇 |
1979年 | 12篇 |
1978年 | 12篇 |
1977年 | 11篇 |
1976年 | 8篇 |
1973年 | 12篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In a recent paper presented by Lin et al., a block-based hierarchical watermarking algorithm for digital images is proposed. It adopts parity check and the intensity-relation check to conduct the experiment of image tamper detection. Their experimental results indicate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspections, respectively. The proposed attacks demonstrate that this watermarking algorithm is fundamentally flawed in that the attacker can tamper a watermarked image easily without being detected. In this paper, a four-scanning attack aimed to Lin et al.'s watermarking method is presented to create tampered images. Furthermore, in case they use encryption to protect their 3-tuple-watermark, we proposed a blind attack to tamper watermarked images without being detected. Experimental results are given to support and enhance our conclusions, and demonstrate that our attacks are successful in tampering watermarked images. 相似文献
992.
Abdolhossein Sarrafzadeh Samuel Alexander Farhad Dadgostar Chao Fan Abbas Bigdeli 《Computers in human behavior》2008,24(4):1342-1363
Many software systems would significantly improve performance if they could adapt to the emotional state of the user, for example if Intelligent Tutoring Systems (ITSs), ATM’s, ticketing machines could recognise when users were confused, frustrated or angry they could guide the user back to remedial help systems so improving the service. Many researchers now feel strongly that ITSs would be significantly enhanced if computers could adapt to the emotions of students. This idea has spawned the developing field of affective tutoring systems (ATSs): ATSs are ITSs that are able to adapt to the affective state of students. The term “affective tutoring system” can be traced back as far as Rosalind Picard’s book Affective Computing in 1997.This paper presents research leading to the development of Easy with Eve, an ATS for primary school mathematics. The system utilises a network of computer systems, mainly embedded devices to detect student emotion and other significant bio-signals. It will then adapt to students and displays emotion via a lifelike agent called Eve. Eve’s tutoring adaptations are guided by a case-based method for adapting to student states; this method uses data that was generated by an observational study of human tutors. This paper presents the observational study, the case-based method, the ATS itself and its implementation on a distributed computer systems for real-time performance, and finally the implications of the findings for Human Computer Interaction in general and e-learning in particular. Web-based applications of the technology developed in this research are discussed throughout the paper. 相似文献
993.
Kobus Barnard Quanfu Fan Ranjini Swaminathan Anthony Hoogs Roderic Collins Pascale Rondot John Kaufhold 《International Journal of Computer Vision》2008,77(1-3):199-217
We present a new data set of 1014 images with manual segmentations and semantic labels for each segment, together with a methodology
for using this kind of data for recognition evaluation. The images and segmentations are from the UCB segmentation benchmark
database (Martin et al., in International conference on computer vision, vol. II, pp. 416–421, 2001). The database is extended by manually labeling each segment with its most specific semantic concept in WordNet (Miller et al.,
in Int. J. Lexicogr. 3(4):235–244, 1990). The evaluation methodology establishes protocols for mapping algorithm specific localization (e.g., segmentations) to our
data, handling synonyms, scoring matches at different levels of specificity, dealing with vocabularies with sense ambiguity
(the usual case), and handling ground truth regions with multiple labels. Given these protocols, we develop two evaluation
approaches. The first measures the range of semantics that an algorithm can recognize, and the second measures the frequency
that an algorithm recognizes semantics correctly. The data, the image labeling tool, and programs implementing our evaluation
strategy are all available on-line (kobus.ca//research/data/IJCV_2007).
We apply this infrastructure to evaluate four algorithms which learn to label image regions from weakly labeled data. The
algorithms tested include two variants of multiple instance learning (MIL), and two generative multi-modal mixture models.
These experiments are on a significantly larger scale than previously reported, especially in the case of MIL methods. More
specifically, we used training data sets up to 37,000 images and training vocabularies of up to 650 words.
We found that one of the mixture models performed best on image annotation and the frequency correct measure, and that variants
of MIL gave the best semantic range performance. We were able to substantively improve the performance of MIL methods on the
other tasks (image annotation and frequency correct region labeling) by providing an appropriate prior. 相似文献
994.
Michael M. Li Brijesh Verma Xiaolong Fan Kevin Tickle 《Neural computing & applications》2008,17(4):391-397
This paper investigates a new method to solve the inverse problem of Rutherford backscattering (RBS) data. The inverse problem
is to determine the sample structure information from measured spectra, which can be defined as a function approximation problem.
We propose using radial basis function (RBF) neural networks to approximate an inverse function. Each RBS spectrum, which
may contain up to 128 data points, is compressed by the principal component analysis, so that the dimensionality of input
data and complexity of the network are reduced significantly. Our theoretical consideration is tested by numerical experiments
with the example of the SiGe thin film sample and corresponding backscattering spectra. A comparison of the RBF method with
multilayer perceptrons reveals that the former has better performance in extracting structural information from spectra. Furthermore,
the proposed method can handle redundancies properly, which are caused by the constraint of output variables. This study is
the first method based on RBF to deal with the inverse RBS data analysis problem. 相似文献
995.
996.
997.
模糊提取从生物特征输入中以容错的方式可靠地提取出均匀分布的随机密钥,当输入发生变化且变化很小时,该密钥可以保持不变,研究了当汉明距离作为生物特征匹配的度量标准时,结合纠错编码学与传统密码学实现模糊提取的虹膜鉴别方法,分析了虹膜特征编码之间的差异对正确鉴别性能的影响,设计了重复码和Reed-Solomon码的两层级联纠错编码方案,并对128只虹膜的各3个样本进行了模拟实验,所给方案使用户虹膜特征模板的安全性和隐私性得到了有效保护,并能够支持用户虹膜的注册更新,此外,实验表明该方案同时具有较理想的识别性能. 相似文献
998.
999.
1000.
Spring Acegi的安全应用与扩展 总被引:2,自引:0,他引:2
Spring框架作为一个优秀的多层J2EE系统框架,本身没有提供对系统的安全性支持。Acegi是基于Spring基于IoC(Inversion of Control)和AOP(Aspect Oriented Programming)机制实现的一个安全框架。主要说明了如何在Spring Acegi框架下对资源进行认证和授权,进一步通过对Acegi的扩展,实现了直接从数据库读取权限,增强控制资源的灵活性。 相似文献