首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9583篇
  免费   489篇
  国内免费   20篇
电工技术   96篇
综合类   4篇
化学工业   1928篇
金属工艺   140篇
机械仪表   188篇
建筑科学   614篇
矿业工程   21篇
能源动力   318篇
轻工业   909篇
水利工程   107篇
石油天然气   27篇
无线电   696篇
一般工业技术   1955篇
冶金工业   1271篇
原子能技术   43篇
自动化技术   1775篇
  2023年   65篇
  2022年   107篇
  2021年   216篇
  2020年   175篇
  2019年   210篇
  2018年   232篇
  2017年   232篇
  2016年   254篇
  2015年   226篇
  2014年   334篇
  2013年   659篇
  2012年   556篇
  2011年   790篇
  2010年   501篇
  2009年   474篇
  2008年   587篇
  2007年   511篇
  2006年   435篇
  2005年   387篇
  2004年   329篇
  2003年   308篇
  2002年   277篇
  2001年   146篇
  2000年   157篇
  1999年   134篇
  1998年   147篇
  1997年   150篇
  1996年   134篇
  1995年   115篇
  1994年   89篇
  1993年   87篇
  1992年   79篇
  1991年   62篇
  1990年   76篇
  1989年   61篇
  1988年   42篇
  1987年   60篇
  1986年   52篇
  1985年   56篇
  1984年   53篇
  1983年   67篇
  1982年   50篇
  1981年   40篇
  1980年   36篇
  1979年   38篇
  1978年   29篇
  1977年   27篇
  1976年   23篇
  1975年   23篇
  1912年   20篇
排序方式: 共有10000条查询结果,搜索用时 698 毫秒
151.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem.  相似文献   
152.
Ecosystem energy has been shown to be a strong correlate with biological diversity at continental scales. Early efforts to characterize this association used the normalized difference vegetation index (NDVI) to represent ecosystem energy. While this spectral vegetation index covaries with measures of ecosystem energy such as net primary production, the covariation is known to degrade in areas of very low vegetation or in areas of dense forest. Two of the new vegetation products from the MODIS sensor, derived by integrating spectral reflectance, climate data, and land cover, are thought to better approximate primary productivity than NDVI. In this study, we determine if the new MODIS derived measures of primary production, gross primary productivity (GPP) and net primary productivity (NPP) better explain variation in bird richness than historically used NDVI. Moreover, we evaluate if the two productivity measures covary more strongly with bird diversity in those vegetation conditions where limitations of NDVI are well recognized.Biodiversity was represented as native landbird species richness derived from the North American Breeding Bird Survey. Analyses included correlation analyses among predictor variables, and univariate regression analyses between each predictor variable and bird species richness. Analyses were done at two levels: for all BBS routes across natural landscapes in North America; and for routes in 10 vegetation classes stratified by vegetated cover along a gradient from bare ground to herbaceous cover to tree cover. We found that NDVI, GPP and NPP were highly correlated and explained similar variation in bird species richness when analyzed for all samples across North America. However, when samples were stratified by vegetated cover, strength of correlation between NDVI and both productivity measures was low for samples with bare ground and for dense forest. The NDVI also explained substantially less variation in bird species richness than the primary production in areas with more bare ground and in areas of dense forest. We conclude that MODIS productivity measures have higher utility in studies of the relationship of species richness and productivity and that MODIS GPP and NPP improve on NDVI, especially for studies with large variation in vegetated cover and density.  相似文献   
153.
The viewfinder of a digital camera has traditionally been used for one purpose: to display to the user a preview of what is seen through the camera's lens. High quality cameras are now available on devices such as mobile phones and PDAs, which provide a platform where the camera is a programmable device, enabling applications such as online computational photography, computer vision‐based interactive gaming, and augmented reality. For such online applications, the camera viewfinder provides the user's main interaction with the environment. In this paper, we describe an algorithm for aligning successive viewfinder frames. First, an estimate of inter‐frame translation is computed by aligning integral projections of edges in two images. The estimate is then refined to compute a full 2D similarity transformation by aligning point features. Our algorithm is robust to noise, never requires storing more than one viewfinder frame in memory, and runs at 30 frames per second on standard smartphone hardware. We use viewfinder alignment for panorama capture, low‐light photography, and a camera‐based game controller.  相似文献   
154.
155.
Computational science is increasingly supporting advances in scientific and engineering knowledge. The unique constraints of these types of projects result in a development process that differs from the process more traditional information technology projects use. This article reports the results of the sixth case study conducted under the support of the Darpa High Productivity Computing Systems Program. The case study aimed to investigate the technical challenges of code development in this environment, understand the use of development tools, and document the findings as concrete lessons learned for other developers' benefit. The project studied here is a major component of a weather forecasting system of systems. It includes complex behavior and interaction of several individual physical systems (such as the atmosphere and the ocean). This article describes the development of the code and presents important lessons learned.  相似文献   
156.
Variable symmetries in a constraint satisfaction problem can be broken by adding lexicographic ordering constraints. Existing general methods of generating such sets of ordering constraints can require a huge number of constraints. This adds an unacceptable overhead to the solving process. Methods exist by which this large set of ordering constraints can be reduced to a much smaller set automatically, but their application is also prohibitively costly. In contrast, this paper takes a bottom-up approach. It examines some commonly-occurring families of groups and derives a minimal set of ordering constraints sufficient to break the symmetry each group describes. These minimal sets are then used as building blocks to generate minimal sets of ordering constraints for groups constructed via direct and imprimitive wreath products. Experimental results confirm the value of minimal sets of ordering constraints, which can now be generated much more cheaply than with previous methods.  相似文献   
157.
We describe here a method for the analysis of materials on a conveyor belt using the natural gamma spectra collected with a BGO (Bismuth Germanate) gamma ray detector. This detector collects gamma ray emissions from the Potassium (K), Uranium (U), and Thorium (Th) atoms in the materials. Based on these data, and using a Poisson model for the data generation, a statistical model is proposed and an approximate maximum likelihood (ML) technique based on the expectation-maximization (EM) algorithm is then used to estimate the amount of each of the three elements in the material. The statistical model is further refined to incorporate parameters of drift in the detector and an estimation technique for this is developed and tested against real data. The Cramér–Rao lower bounds for the estimators are calculated.  相似文献   
158.
Most assessments of whether a water body will comply with pollutant standards after modification of land use, loading, or climate change are based on the results of deterministic simulation models. These models, including those used to support the United States Environmental Protection Agency (USEPA) total maximum daily load (TMDL) program, typically do not account for common sources of assessment uncertainty. Instead, model results are typically represented by a time series of predicted pollutant concentration values or the parameters of a frequency-based distribution of these values over a specified time period. The rate of exceedance of relevant pollutant limits is then assessed directly from this time series or distribution to determine standard compliance. In this way, sampling and analysis-based variability and model uncertainty are typically ignored, although they may substantially influence the probability of non-compliance. To help address this problem, we introduce ProVAsT (Probabilistic Water Quality Standard Violation Assessment Tool), a software tool encoded in the graphical model-based package Analytica®. Here, we present a version of ProVAsT which translates model-predicted in situ fecal indicator bacteria (FIB) pollutant concentrations into the expected frequency of water quality standard violations and provides a Bayesian measure of the degree of confidence in this assessment. We call this version ProVAsT-FIB. Along with inputting their own simulation model results, users can specify the particular water quality analysis methods employed (e.g. the analytic procedure used and the number and volume of sample aliquots) as well as the numeric limits pertaining to local water quality standards. It is our hope that ProVAsT will encourage the rational consideration of uncertainty and variability in water quality assessments by reducing the burden of complex statistical calculations.  相似文献   
159.
Motivated by the importance of accurate identification for a range of applications, this paper compares and contrasts the effective and efficient classification of network-based applications using behavioral observations of network-traffic and those using deep-packet inspection.Importantly, throughout our work we are able to make comparison with data possessing an accurate, independently determined ground-truth that describes the actual applications causing the network-traffic observed.In a unique study in both the spatial-domain: comparing across different network-locations and in the temporal-domain: comparing across a number of years of data, we illustrate the decay in classification accuracy across a range of application–classification mechanisms. Further, we document the accuracy of spatial classification without training data possessing spatial diversity.Finally, we illustrate the classification of UDP traffic. We use the same classification approach for both stateful flows (TCP) and stateless flows based upon UDP. Importantly, we demonstrate high levels of accuracy: greater than 92% for the worst circumstance regardless of the application.  相似文献   
160.
This paper presents an overview and discusses the role of certification in safety-critical computer systems focusing on software, and partially hardware, used in the civil aviation domain. It discusses certification activities according to RTCA DO-178B “Software Considerations in Airborne Systems and Equipment Certification” and touches on tool qualification according to RTCA DO-254 “Design Assurance Guidance for Airborne Electronic Hardware.” Specifically, certification issues as related to real-time operating systems and programming languages are reviewed, as well as software development tools and complex electronic hardware tool qualification processes are discussed. Results of an independent industry survey done by the authors are also presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号