全文获取类型
收费全文 | 1717篇 |
免费 | 113篇 |
国内免费 | 81篇 |
专业分类
电工技术 | 23篇 |
综合类 | 72篇 |
化学工业 | 133篇 |
金属工艺 | 78篇 |
机械仪表 | 52篇 |
建筑科学 | 79篇 |
矿业工程 | 19篇 |
能源动力 | 13篇 |
轻工业 | 190篇 |
水利工程 | 5篇 |
石油天然气 | 36篇 |
武器工业 | 4篇 |
无线电 | 275篇 |
一般工业技术 | 45篇 |
冶金工业 | 84篇 |
原子能技术 | 47篇 |
自动化技术 | 756篇 |
出版年
2023年 | 11篇 |
2022年 | 14篇 |
2021年 | 28篇 |
2020年 | 40篇 |
2019年 | 19篇 |
2018年 | 31篇 |
2017年 | 40篇 |
2016年 | 61篇 |
2015年 | 62篇 |
2014年 | 146篇 |
2013年 | 121篇 |
2012年 | 127篇 |
2011年 | 166篇 |
2010年 | 91篇 |
2009年 | 105篇 |
2008年 | 85篇 |
2007年 | 99篇 |
2006年 | 98篇 |
2005年 | 77篇 |
2004年 | 67篇 |
2003年 | 73篇 |
2002年 | 60篇 |
2001年 | 50篇 |
2000年 | 38篇 |
1999年 | 37篇 |
1998年 | 33篇 |
1997年 | 18篇 |
1996年 | 20篇 |
1995年 | 18篇 |
1994年 | 16篇 |
1993年 | 26篇 |
1992年 | 11篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1984年 | 4篇 |
1979年 | 1篇 |
排序方式: 共有1911条查询结果,搜索用时 31 毫秒
1.
2.
3.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination. 相似文献
4.
In this paper, we propose content adaptive denoising in highly corrupted videos based on human visual perception. We introduce the human visual perception in video denoising to achieve good performance. In general, smooth regions corrupted by noise are much more annoying to human observers than complex regions. Moreover, human eyes are more interested in complex regions with image details and more sensitive to luminance than chrominance. Based on the human visual perception, we perform perceptual video denoising to effectively preserve image details and remove annoying noise. To successfully remove noise and recover the image details, we extend nonlocal mean filtering to the spatiotemporal domain. With the guidance of content adaptive segmentation and motion detection, we conduct content adaptive filtering in the YUV color space to consider context in images and obtain perceptually pleasant results. Extensive experiments on various video sequences demonstrate that the proposed method reconstructs natural-looking results even in highly corrupted images and achieves good performance in terms of both visual quality and quantitative measures. 相似文献
5.
Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is gaining popularity in enterprise networks for flexibility in network management service and reduced operational cost. There seems a trend for the two technologies to go hand-in-hand in providing an enterprise’s IT services. However, the new challenges brought by the marriage of cloud computing and SDN, particularly the implications on enterprise network security, have not been well understood. This paper sets to address this important problem.We start by examining the security impact, in particular, the impact on DDoS attack defense mechanisms, in an enterprise network where both technologies are adopted. We find that SDN technology can actually help enterprises to defend against DDoS attacks if the defense architecture is designed properly. To that end, we propose a DDoS attack mitigation architecture that integrates a highly programmable network monitoring to enable attack detection and a flexible control structure to allow fast and specific attack reaction. To cope with the new architecture, we propose a graphic model based attack detection system that can deal with the dataset shift problem. The simulation results show that our architecture can effectively and efficiently address the security challenges brought by the new network paradigm and our attack detection system can effectively report various attacks using real-world network traffic. 相似文献
6.
采用结合粉末工艺的两步法搅拌摩擦加工制备石墨烯增强铝基复合材料,研究了石墨烯添加量对复合材料力学性能和导电性能的影响。结果表明,石墨烯的添加对铝基复合材料性能有明显的影响,随石墨烯添加量增加,复合材料的硬度逐渐提高、塑性持续下降,而抗拉强度和电导率均呈先增后减的趋势。石墨烯体积分数为3.7%时,复合材料的抗拉强度最高,达到146.5 MPa,与同等加工条件下的纯铝相比,提高了78.7%,而石墨烯体积分数为1.3%时,复合材料的电导率最高,达到30.62 MS/m,较同等加工条件下的纯铝基体提高了53.4%。 相似文献
7.
Frequent content retrieval leads to significant energy consumption in cellular networks. Thereby, device-to-device (D2D) communication is used for proximal content delivery. Be aware that social friends may have common content interests, D2D content delivery is further improved by considering social network. However, how to implement efficient D2D multicast with the aid of social relationship needs further consideration. In this paper, with a proposed architecture on combined networks, the cooperation range of content sharing is investigated for D2D multicast to minimize the average energy consumption of serving a content request. Based on combined networks, a cooperation group formation scheme is proposed. Simulation results verify our analyzes and the advantage of proposed scheme. 相似文献
8.
采用光学显微镜、扫描电镜、万能拉伸机、显微硬度计等手段研究了不同Fe含量对热挤压再生铝合金组织和性能的影响,并探讨富Fe相形态演变机制。结果表明,Fe含量的增加有利于抑制再生铝晶粒尺寸的长大。随着Fe含量增加,晶粒尺寸逐渐减小,减小幅度达25%。热挤压后再生铝中富Fe相发生了折断和破碎,并沿着挤压方向呈带状分布。随着Fe含量增加,富Fe相的面积分数和平均长度均逐渐提高,当Fe含量分别为0.10%~1.24%时,面积分数和平均长度增长最快;而富Fe相的圆整度则随Fe含量的增加稍有降低。同时,再生铝的抗拉强度、屈服强度和伸长率均随着Fe含量的增加呈现逐渐降低的趋势,最大降低幅度分别为10.4%、23.2%和46.0%,而显微硬度则逐渐提高,最大提高幅度为21.7%。断口形貌也由纯韧性断裂转变为混合型断裂模式。 相似文献
9.
Many organizations struggle to meaningfully engage with their stakeholders on political, societal and environmental topics via social media. Often such discourses unravel into splintered and negative conversations, raising the question whether organizations can and should exercise some level of control and ‘steering’ in these conversations and, if so, how stakeholders would react to such ‘top down’ moderation. Existing studies lack empirical insights into the impacts of different levels of moderation in social media conversations on stakeholder attitudes. Two experimental studies were developed to test the effect of different levels of organizational moderation on stakeholder attitudes towards organizations. We show that increased levels of moderation negatively affect attitudes towards an organization, satisfaction with an organization's performance, and trust in the organization. Increased moderation also significantly undermines beliefs in the commitment of the organization to its stakeholders and control mutuality. This paper extends recent qualitative attempts to build new theory around stakeholder dialogues on social media by testing the effects of varying levels of moderation in such dialogues. 相似文献
10.
In this digitalised world, crossing boundaries between life domains is becoming increasingly easy. We are constantly faced with the need to define whether we are online or offline, and technology management is now an integral part of daily life. Technology management, which is affected by the individual's networking position, has different components: connectivity management, online self-presentation and privacy management. The objective of this study is to explore technology management strategies among working adult students. The study identifies three networking positions: socio-affective enthusiasts, context-contingent pragmatists and pragmatic avoiders. These three groups have specific approaches to technology management. 相似文献