全文获取类型
收费全文 | 238篇 |
免费 | 11篇 |
专业分类
电工技术 | 9篇 |
化学工业 | 22篇 |
金属工艺 | 3篇 |
机械仪表 | 12篇 |
建筑科学 | 14篇 |
矿业工程 | 2篇 |
能源动力 | 3篇 |
轻工业 | 31篇 |
无线电 | 29篇 |
一般工业技术 | 21篇 |
冶金工业 | 30篇 |
自动化技术 | 73篇 |
出版年
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 10篇 |
2020年 | 12篇 |
2019年 | 10篇 |
2018年 | 5篇 |
2017年 | 12篇 |
2016年 | 15篇 |
2015年 | 4篇 |
2014年 | 5篇 |
2013年 | 8篇 |
2012年 | 15篇 |
2011年 | 10篇 |
2010年 | 4篇 |
2009年 | 13篇 |
2008年 | 6篇 |
2007年 | 6篇 |
2006年 | 6篇 |
2005年 | 5篇 |
2004年 | 9篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 2篇 |
2000年 | 5篇 |
1999年 | 2篇 |
1998年 | 10篇 |
1997年 | 7篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 6篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1985年 | 4篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1975年 | 2篇 |
1973年 | 2篇 |
1971年 | 2篇 |
排序方式: 共有249条查询结果,搜索用时 15 毫秒
1.
JM Samet 《Canadian Metallurgical Quarterly》1994,86(24):1813-1814
2.
Comments on B. Vandenberg's (see record 1992-12211-001) article on epistemology and an existential consideration of development, taking exception with both his definition of existentialism and his characterization of Piaget's work. Existentialism, it is argued, is not an alternative to epistemology, but a particular style of responding to philosophic questions. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
3.
A natural byproduct of the tree-like nature of the quadtree is that many basic image processing operations can be implemented as tree traversals which differ in the nature of the computation that is performed at each node. Some of these computations involve the inspection of a node's adjacent neighbors (termed neighbor finding). A new model is developed for images represented by quadtrees, and it is used to analyze various neighbor-finding techniques. The model's predicted costs for neighbor finding correlate very closely with empirical results and it is superior to the model that was used previously. 相似文献
4.
Ramzi Guesmi Mohamed Amine Ben Farah Abdennaceur Kachouri Mounir Samet 《Multimedia Tools and Applications》2016,75(8):4753-4769
This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. 相似文献
5.
6.
The objective of this study is to assess the effectiveness of the educational environment supported by computer aided presentations at primary school. The effectiveness of the environment has been evaluated in terms of students’ learning and remembering what they have learnt. In the study, we have compared experimental group and control group in terms of learning and recalling what has been learned regarding the effect which computer aided learning environment imposes. Data have been collected through the control grouped pretest–final test model. During the experiment, we have prepared an achievement test, which explains behaviors the students should acquire. According to the findings obtained, a computer aided educational environment has been observed to be more effective than that of conventional education in terms of learning. However, in terms of the permanence of what has been learned, no meaningful difference between the educational environment supported by computer aided presentations and that of conventional education has come out. According to the results of the follow-up tests performed, even though students in the test group have forgotten more of what they have learnt, it has been concluded that students in both groups have forgotten on the same level. Consequently, it has been observed that though the educational environment supported by computer aided presentations has positive contributions to learning activity, it does not have effects on the permanence of what has been learnt. 相似文献
7.
Ahmed Samet Eric Lefèvre Sadok Ben Yahia 《Journal of Intelligent Information Systems》2016,47(1):135-163
Associative classification has been shown to provide interesting results whenever of use to classify data. With the increasing complexity of new databases, retrieving valuable information and classifying incoming data is becoming a thriving and compelling issue. The evidential database is a new type of database that represents imprecision and uncertainty. In this respect, extracting pertinent information such as frequent patterns and association rules is of paramount importance task. In this work, we tackle the problem of pertinent information extraction from an evidential database. A new data mining approach, denoted EDMA, is introduced that extracts frequent patterns overcoming the limits of pioneering works of the literature. A new classifier based on evidential association rules is thus introduced. The obtained association rules, as well as their respective confidence values, are studied and weighted with respect to their relevance. The proposed methods are thoroughly experimented on several synthetic evidential databases and showed performance improvement. 相似文献
8.
In this paper we investigate data structures obtained by a recursive partitioning of the multi- dimensional input domain
into regions of equal size. One of the best known examples of such a structure is the quadtree . It is used here as a basis for more complex data structures. We also provide multidimensional versions of the stratified tree by van Emde Boas [vEB]. We show that under the assumption that the input points have limited precision (i.e., are drawn
from the integer grid of size u ) these data structures yield efficient solutions to many important problems. In particular, they allow us to achieve O(log log u) time per operation for dynamic approximate nearest neighbor (under insertions and deletions) and exact on-line closest pair
(under insertions only) in any constant number of dimensions. They allow O(log log u) point location in a given planar shape or in its expansion (dilation by a ball of a given radius). Finally, we provide a
linear time (optimal) algorithm for computing the expansion of a shape represented by a region quadtree. This result shows
that the spatial order imposed by this regular data structure is sufficient to optimize the operation of dilation by a ball.
Received January 19, 1999; revised November 4, 1999. 相似文献
9.
The region quadtree is a hierarchical data structure that finds use in applications such as image processing, computer graphics, pattern recognition, robotics, and cartography. In order to save space, a number of pointerless quadtree representations (termed linear quadtrees) have been proposed. One representation maintains the nodes in a list ordered according to a preorder traversal of the quadtree. Using such an image representation and a graph definition of a quadtree, a general algorithm to compute geometric image properties such as the perimeter, the Euler number, and the connected components of an image is developed and analyzed. The algorithm differs from the conventional approaches to images represented by quadtrees in that it does not make use of neighbor finding methods that require the location of a nearest common ancestor. Instead, it makes use of a staircase-like data structure to represent the blocks that have been already processed. The worst-case execution time of the algorithm, when used to compute the perimeter, is proportional to the number of leaf nodes in the quadtree, which is optimal. For an image of size 2n × 2n, the perimeter algorithm requires only four arrays of 2n positions each for working storage. This makes it well suited to processing linear quadtrees residing in secondary storage. Implementation experience has confirmed its superiority to existing approaches to computing geometric properties for images represented by quadtrees. 相似文献
10.