全文获取类型
收费全文 | 1819篇 |
免费 | 260篇 |
国内免费 | 162篇 |
专业分类
电工技术 | 154篇 |
综合类 | 233篇 |
化学工业 | 76篇 |
金属工艺 | 104篇 |
机械仪表 | 239篇 |
建筑科学 | 60篇 |
矿业工程 | 22篇 |
能源动力 | 23篇 |
轻工业 | 43篇 |
水利工程 | 25篇 |
石油天然气 | 30篇 |
武器工业 | 14篇 |
无线电 | 309篇 |
一般工业技术 | 141篇 |
冶金工业 | 97篇 |
原子能技术 | 6篇 |
自动化技术 | 665篇 |
出版年
2024年 | 2篇 |
2023年 | 20篇 |
2022年 | 39篇 |
2021年 | 55篇 |
2020年 | 45篇 |
2019年 | 52篇 |
2018年 | 45篇 |
2017年 | 53篇 |
2016年 | 54篇 |
2015年 | 67篇 |
2014年 | 114篇 |
2013年 | 122篇 |
2012年 | 158篇 |
2011年 | 168篇 |
2010年 | 127篇 |
2009年 | 118篇 |
2008年 | 136篇 |
2007年 | 146篇 |
2006年 | 119篇 |
2005年 | 111篇 |
2004年 | 81篇 |
2003年 | 74篇 |
2002年 | 71篇 |
2001年 | 64篇 |
2000年 | 51篇 |
1999年 | 25篇 |
1998年 | 15篇 |
1997年 | 13篇 |
1996年 | 18篇 |
1995年 | 15篇 |
1994年 | 22篇 |
1993年 | 7篇 |
1992年 | 6篇 |
1991年 | 6篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1977年 | 1篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有2241条查询结果,搜索用时 15 毫秒
1.
Miroslav Kárný Marko Ruman 《International Journal of Adaptive Control and Signal Processing》2021,35(5):660-675
Any knowledge extraction relies (possibly implicitly) on a hypothesis about the modelled-data dependence. The extracted knowledge ultimately serves to a decision-making (DM). DM always faces uncertainty and this makes probabilistic modelling adequate. The inspected black-box modeling deals with “universal” approximators of the relevant probabilistic model. Finite mixtures with components in the exponential family are often exploited. Their attractiveness stems from their flexibility, the cluster interpretability of components and the existence of algorithms for processing high-dimensional data streams. They are even used in dynamic cases with mutually dependent data records while regression and auto-regression mixture components serve to the dependence modeling. These dynamic models, however, mostly assume data-independent component weights, that is, memoryless transitions between dynamic mixture components. Such mixtures are not universal approximators of dynamic probabilistic models. Formally, this follows from the fact that the set of finite probabilistic mixtures is not closed with respect to the conditioning, which is the key estimation and predictive operation. The paper overcomes this drawback by using ratios of finite mixtures as universally approximating dynamic parametric models. The paper motivates them, elaborates their approximate Bayesian recursive estimation and reveals their application potential. 相似文献
2.
Copy Move is a technique widespreadly used in digital image tampering, meaning Copy Move Forgery Detection (CMFD) is still a significant research. In this paper, a novel CMFD method is proposed, including double matching process and region localizing process. In double matching process, the first matching is conducted on Delaunay triangles consisting of Local Intensity Order Pattern (LIOP) keypoints, to find the approximate location of suspicious regions. In order to find sufficient keypoint pairs, the existing set of matching triangles is expanded by adding their neighbors iteratively, covering the whole tampered regions, and the second matching with a looser threshold is conducted on the vertices. In the region localizing process, considering the case of multiple copies, Density-Based Spatial Clustering of Applications with Noise (DBSCAN) is used to classify the keypoint pairs described in a new model. Experimental results indicate that the proposed method, with good robustness, outperforms some state-of-the-art methods. 相似文献
3.
无证书签名具有基于身份密码体制和传统公钥密码体制的优点,可解决复杂的公钥证书管理和密钥托管问题.Wu和Jing提出了一种强不可伪造的无证书签名方案,其安全性不依赖于理想的随机预言机.针对该方案的安全性,提出了两类伪造攻击.分析结果表明,该方案无法实现强不可伪造性,并在"malicious-but-passive"的密钥生成中心攻击下也是不安全的.为了提升该方案的安全性,设计了一个改进的无证书签名方案.在标准模型中证明了改进的方案对于适应性选择消息攻击是强不可伪造的,还能抵抗恶意的密钥生成中心攻击.此外,改进的方案具有较低的计算开销和较短的私钥长度,可应用于区块链、车联网、无线体域网等领域. 相似文献
4.
This paper presents a new method for copy-move forgery detection of duplicated objects. A bounding rectangle is drawn around the detected object to form a sub-image. Morphological operator is used to remove the unnecessary small objects. Highly accurate polar complex exponential transform moments are used as features for the detected objects. Euclidian distance and correlation coefficient between the feature vectors are calculated and used for searching the similar objects. A set of 20 forged images with duplicated objects is carefully selected from previously published works. Additional 80 non-forged images are edited by the authors and forged by duplicating different kinds of objects. Numerical simulation is performed where the results show that the proposed method successfully detect different kinds of duplicated objects. The proposed method is much faster than the previously existing methods. Also, it exhibits high robustness to various attacks such as additive white Gaussian noise, JPEG compression, rotation, and scaling. 相似文献
5.
Huan Li Dr. Yidan Tang Dr. Bingling Li 《Chembiochem : a European journal of chemical biology》2020,21(10):1418-1422
Toehold switch sensors represent a class of new advances that allow specific targets to trigger in situ expression of a protein reporter. Although they offer unique advantages of a label-free nature and high portability, they generally require repeated sequence design, high expenditure, and laborious optimization of toehold switch sequences according to different targets. To simplify the sensing process further and to improve its practicability, we innovatively introduce a dual-step pre-transduction upon traditional toehold switch sensor. Through two successive toehold-mediated strand-displacement reactions that are initiated, respectively, by a linear and an associative trigger, different DNAs, RNAs, or ligands of functional nucleic acids can be generally transduced into the input of one high-performance toehold switch sensor. This advance greatly increases the target range. Furthermore, the whole process is signal-on, homogeneous, and free of any requirements for complicated operations such as probe labeling, separation, and reconstruction of the toehold switch, being promising and practical even in portable or point-of-care assays. 相似文献
6.
7.
In the present era of machines and edge-cutting technologies, still document frauds persist. They are done intuitively by using almost identical inks, that it becomes challenging to detect them—this demands an approach that efficiently investigates the document and leaves it intact. Hyperspectral imaging is one such a type of approach that captures the images from hundreds to thousands of spectral bands and analyzes the images through their spectral and spatial features, which is not possible by conventional imaging. Deep learning is an edge-cutting technology known for solving critical problems in various domains. Utilizing supervised learning imposes constraints on its usage in real scenarios, as the inks used in forgery are not known prior. Therefore, it is beneficial to use unsupervised learning. An unsupervised feature extraction through a Convolutional Autoencoder (CAE) followed by Logistic Regression (LR) for classification is proposed (CAE-LR). Feature extraction is evolved around spectral bands, spatial patches, and spectral-spatial patches. We inspected the impact of spectral, spatial, and spectral-spatial features by mixing inks in equal and unequal proportion using CAE-LR on the UWA writing ink hyperspectral images dataset for blue and black inks. Hyperspectral images are captured at multiple correlated spectral bands, resulting in information redundancy handled by restoring certain principal components. The proposed approach is compared with eight state-of-art approaches used by the researchers. The results depicted that by using the combination of spectral and spatial patches, the classification accuracy enhanced by 4.85% for black inks and 0.13% for blue inks compared to state-of-art results. In the present scenario, the primary area concern is to identify and detect the almost similar inks used in document forgery, are efficiently managed by the proposed approach. 相似文献
8.
介绍了ASTM标准中圆形拉伸试样主要部位的尺寸与要求。采用国产万能工具显微镜-投影法对试样在平行长度部位的锥度进行了测量。该方法简便易行,结果准确可靠,满足了标准要求,同时发挥了老设备的作用,保证了试样的加工精度。 相似文献
9.
Dr. Valérie Pezo Guy Schepers Dr. Catia Lambertucci Dr. Philippe Marlière Prof. Piet Herdewijn 《Chembiochem : a European journal of chemical biology》2014,15(15):2255-2258
The templating potential of anhydrohexitol oligonucleotides bearing ambiguous bases was studied in vivo, by using a selection screen for mosaic heteroduplex plasmids in Escherichia coli. 1,5‐Anhydro‐2,3‐dideoxy‐2‐(5‐nitroindazol‐1‐yl)‐D ‐arabino‐hexitol showed the greatest ambiguity among the three nucleosides tested. At most two successive ambiguous bases could be tolerated on hexitol templates read in bacterial cells. Hexitol nucleosides bearing simplified heterocycles thus stand as promising monomers for generating random DNA sequences in vivo from defined synthetic oligonucleotides. 相似文献
10.
申遗背景下的中国自然遗产潜力评估 总被引:1,自引:0,他引:1
参照世界自然遗产地学、美学、生物生态过程和濒危物种栖息地4项申遗评选标准,依据地貌景观、生物景观等价值构成,建立美学价值评估方法;依据世界遗产13类地学主题评价框架、地质演化过程、典型类型地貌等价值构成,建立地学价值评估方法;依据生态系统过程、物种多样性、栖息地等价值构成,建立生物生态学价值评估方法。利用全球对比的方法提取和评估突出普遍价值,将中国自然遗产潜力区分为青藏高原区、西北干旱区、东部季风区等生态环境基本单元,筛选我国世界自然遗产潜力区。重点提出海洋类世界自然遗产和西部北部地区申遗的可能性,提出中国申报世界自然遗产突出普遍价值的评估策略与优先原则。 相似文献