全文获取类型
收费全文 | 9583篇 |
免费 | 489篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 96篇 |
综合类 | 4篇 |
化学工业 | 1928篇 |
金属工艺 | 140篇 |
机械仪表 | 188篇 |
建筑科学 | 614篇 |
矿业工程 | 21篇 |
能源动力 | 318篇 |
轻工业 | 909篇 |
水利工程 | 107篇 |
石油天然气 | 27篇 |
无线电 | 696篇 |
一般工业技术 | 1955篇 |
冶金工业 | 1271篇 |
原子能技术 | 43篇 |
自动化技术 | 1775篇 |
出版年
2023年 | 65篇 |
2022年 | 107篇 |
2021年 | 216篇 |
2020年 | 175篇 |
2019年 | 210篇 |
2018年 | 232篇 |
2017年 | 232篇 |
2016年 | 254篇 |
2015年 | 226篇 |
2014年 | 334篇 |
2013年 | 659篇 |
2012年 | 556篇 |
2011年 | 790篇 |
2010年 | 501篇 |
2009年 | 474篇 |
2008年 | 587篇 |
2007年 | 511篇 |
2006年 | 435篇 |
2005年 | 387篇 |
2004年 | 329篇 |
2003年 | 308篇 |
2002年 | 277篇 |
2001年 | 146篇 |
2000年 | 157篇 |
1999年 | 134篇 |
1998年 | 147篇 |
1997年 | 150篇 |
1996年 | 134篇 |
1995年 | 115篇 |
1994年 | 89篇 |
1993年 | 87篇 |
1992年 | 79篇 |
1991年 | 62篇 |
1990年 | 76篇 |
1989年 | 61篇 |
1988年 | 42篇 |
1987年 | 60篇 |
1986年 | 52篇 |
1985年 | 56篇 |
1984年 | 53篇 |
1983年 | 67篇 |
1982年 | 50篇 |
1981年 | 40篇 |
1980年 | 36篇 |
1979年 | 38篇 |
1978年 | 29篇 |
1977年 | 27篇 |
1976年 | 23篇 |
1975年 | 23篇 |
1912年 | 20篇 |
排序方式: 共有10000条查询结果,搜索用时 698 毫秒
151.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem. 相似文献
152.
Linda B. Phillips Andrew J. Hansen Curtis H. Flather 《Remote sensing of environment》2008,112(12):4381-4392
Ecosystem energy has been shown to be a strong correlate with biological diversity at continental scales. Early efforts to characterize this association used the normalized difference vegetation index (NDVI) to represent ecosystem energy. While this spectral vegetation index covaries with measures of ecosystem energy such as net primary production, the covariation is known to degrade in areas of very low vegetation or in areas of dense forest. Two of the new vegetation products from the MODIS sensor, derived by integrating spectral reflectance, climate data, and land cover, are thought to better approximate primary productivity than NDVI. In this study, we determine if the new MODIS derived measures of primary production, gross primary productivity (GPP) and net primary productivity (NPP) better explain variation in bird richness than historically used NDVI. Moreover, we evaluate if the two productivity measures covary more strongly with bird diversity in those vegetation conditions where limitations of NDVI are well recognized.Biodiversity was represented as native landbird species richness derived from the North American Breeding Bird Survey. Analyses included correlation analyses among predictor variables, and univariate regression analyses between each predictor variable and bird species richness. Analyses were done at two levels: for all BBS routes across natural landscapes in North America; and for routes in 10 vegetation classes stratified by vegetated cover along a gradient from bare ground to herbaceous cover to tree cover. We found that NDVI, GPP and NPP were highly correlated and explained similar variation in bird species richness when analyzed for all samples across North America. However, when samples were stratified by vegetated cover, strength of correlation between NDVI and both productivity measures was low for samples with bare ground and for dense forest. The NDVI also explained substantially less variation in bird species richness than the primary production in areas with more bare ground and in areas of dense forest. We conclude that MODIS productivity measures have higher utility in studies of the relationship of species richness and productivity and that MODIS GPP and NPP improve on NDVI, especially for studies with large variation in vegetated cover and density. 相似文献
153.
The viewfinder of a digital camera has traditionally been used for one purpose: to display to the user a preview of what is seen through the camera's lens. High quality cameras are now available on devices such as mobile phones and PDAs, which provide a platform where the camera is a programmable device, enabling applications such as online computational photography, computer vision‐based interactive gaming, and augmented reality. For such online applications, the camera viewfinder provides the user's main interaction with the environment. In this paper, we describe an algorithm for aligning successive viewfinder frames. First, an estimate of inter‐frame translation is computed by aligning integral projections of edges in two images. The estimate is then refined to compute a full 2D similarity transformation by aligning point features. Our algorithm is robust to noise, never requires storing more than one viewfinder frame in memory, and runs at 30 frames per second on standard smartphone hardware. We use viewfinder alignment for panorama capture, low‐light photography, and a camera‐based game controller. 相似文献
154.
155.
Kendall Richard Carver Jeffrey C. Fisher David Henderson Dale Mark Andrew Post Douglass Rhoades Jr. Clifford E. Squires Susan 《Software, IEEE》2008,25(4):59-65
Computational science is increasingly supporting advances in scientific and engineering knowledge. The unique constraints of these types of projects result in a development process that differs from the process more traditional information technology projects use. This article reports the results of the sixth case study conducted under the support of the Darpa High Productivity Computing Systems Program. The case study aimed to investigate the technical challenges of code development in this environment, understand the use of development tools, and document the findings as concrete lessons learned for other developers' benefit. The project studied here is a major component of a weather forecasting system of systems. It includes complex behavior and interaction of several individual physical systems (such as the atmosphere and the ocean). This article describes the development of the code and presents important lessons learned. 相似文献
156.
Andrew Grayland Chris Jefferson Ian Miguel Colva M. Roney-Dougal 《Annals of Mathematics and Artificial Intelligence》2009,57(1):75-102
Variable symmetries in a constraint satisfaction problem can be broken by adding lexicographic ordering constraints. Existing general methods of generating such sets of ordering constraints can require a huge number of constraints. This adds an unacceptable overhead to the solving process. Methods exist by which this large set of ordering constraints can be reduced to a much smaller set automatically, but their application is also prohibitively costly. In contrast, this paper takes a bottom-up approach. It examines some commonly-occurring families of groups and derives a minimal set of ordering constraints sufficient to break the symmetry each group describes. These minimal sets are then used as building blocks to generate minimal sets of ordering constraints for groups constructed via direct and imprimitive wreath products. Experimental results confirm the value of minimal sets of ordering constraints, which can now be generated much more cheaply than with previous methods. 相似文献
157.
Bill Moran Du Q. Huynh Xuezhi Wang Michael Edwards Andrew Harris Barbara F. La Scala 《Digital Signal Processing》2009,19(5):793-808
We describe here a method for the analysis of materials on a conveyor belt using the natural gamma spectra collected with a BGO (Bismuth Germanate) gamma ray detector. This detector collects gamma ray emissions from the Potassium (K), Uranium (U), and Thorium (Th) atoms in the materials. Based on these data, and using a Poisson model for the data generation, a statistical model is proposed and an approximate maximum likelihood (ML) technique based on the expectation-maximization (EM) algorithm is then used to estimate the amount of each of the three elements in the material. The statistical model is further refined to incorporate parameters of drift in the detector and an estimation technique for this is developed and tested against real data. The Cramér–Rao lower bounds for the estimators are calculated. 相似文献
158.
Most assessments of whether a water body will comply with pollutant standards after modification of land use, loading, or climate change are based on the results of deterministic simulation models. These models, including those used to support the United States Environmental Protection Agency (USEPA) total maximum daily load (TMDL) program, typically do not account for common sources of assessment uncertainty. Instead, model results are typically represented by a time series of predicted pollutant concentration values or the parameters of a frequency-based distribution of these values over a specified time period. The rate of exceedance of relevant pollutant limits is then assessed directly from this time series or distribution to determine standard compliance. In this way, sampling and analysis-based variability and model uncertainty are typically ignored, although they may substantially influence the probability of non-compliance. To help address this problem, we introduce ProVAsT (Probabilistic Water Quality Standard Violation Assessment Tool), a software tool encoded in the graphical model-based package Analytica®. Here, we present a version of ProVAsT which translates model-predicted in situ fecal indicator bacteria (FIB) pollutant concentrations into the expected frequency of water quality standard violations and provides a Bayesian measure of the degree of confidence in this assessment. We call this version ProVAsT-FIB. Along with inputting their own simulation model results, users can specify the particular water quality analysis methods employed (e.g. the analytic procedure used and the number and volume of sample aliquots) as well as the numeric limits pertaining to local water quality standards. It is our hope that ProVAsT will encourage the rational consideration of uncertainty and variability in water quality assessments by reducing the burden of complex statistical calculations. 相似文献
159.
Efficient application identification and the temporal and spatial stability of classification schema
Motivated by the importance of accurate identification for a range of applications, this paper compares and contrasts the effective and efficient classification of network-based applications using behavioral observations of network-traffic and those using deep-packet inspection.Importantly, throughout our work we are able to make comparison with data possessing an accurate, independently determined ground-truth that describes the actual applications causing the network-traffic observed.In a unique study in both the spatial-domain: comparing across different network-locations and in the temporal-domain: comparing across a number of years of data, we illustrate the decay in classification accuracy across a range of application–classification mechanisms. Further, we document the accuracy of spatial classification without training data possessing spatial diversity.Finally, we illustrate the classification of UDP traffic. We use the same classification approach for both stateful flows (TCP) and stateless flows based upon UDP. Importantly, we demonstrate high levels of accuracy: greater than 92% for the worst circumstance regardless of the application. 相似文献
160.
This paper presents an overview and discusses the role of certification in safety-critical computer systems focusing on software,
and partially hardware, used in the civil aviation domain. It discusses certification activities according to RTCA DO-178B
“Software Considerations in Airborne Systems and Equipment Certification” and touches on tool qualification according to RTCA
DO-254 “Design Assurance Guidance for Airborne Electronic Hardware.” Specifically, certification issues as related to real-time
operating systems and programming languages are reviewed, as well as software development tools and complex electronic hardware
tool qualification processes are discussed. Results of an independent industry survey done by the authors are also presented. 相似文献