全文获取类型
收费全文 | 8755篇 |
免费 | 487篇 |
国内免费 | 10篇 |
专业分类
电工技术 | 119篇 |
综合类 | 5篇 |
化学工业 | 2252篇 |
金属工艺 | 137篇 |
机械仪表 | 296篇 |
建筑科学 | 339篇 |
矿业工程 | 18篇 |
能源动力 | 358篇 |
轻工业 | 1554篇 |
水利工程 | 120篇 |
石油天然气 | 44篇 |
武器工业 | 2篇 |
无线电 | 451篇 |
一般工业技术 | 1306篇 |
冶金工业 | 848篇 |
原子能技术 | 62篇 |
自动化技术 | 1341篇 |
出版年
2024年 | 32篇 |
2023年 | 92篇 |
2022年 | 297篇 |
2021年 | 400篇 |
2020年 | 253篇 |
2019年 | 276篇 |
2018年 | 354篇 |
2017年 | 370篇 |
2016年 | 390篇 |
2015年 | 268篇 |
2014年 | 354篇 |
2013年 | 685篇 |
2012年 | 554篇 |
2011年 | 674篇 |
2010年 | 452篇 |
2009年 | 476篇 |
2008年 | 426篇 |
2007年 | 352篇 |
2006年 | 299篇 |
2005年 | 203篇 |
2004年 | 172篇 |
2003年 | 170篇 |
2002年 | 147篇 |
2001年 | 102篇 |
2000年 | 114篇 |
1999年 | 108篇 |
1998年 | 302篇 |
1997年 | 218篇 |
1996年 | 139篇 |
1995年 | 97篇 |
1994年 | 60篇 |
1993年 | 55篇 |
1992年 | 25篇 |
1991年 | 23篇 |
1990年 | 25篇 |
1989年 | 23篇 |
1988年 | 20篇 |
1987年 | 16篇 |
1986年 | 17篇 |
1985年 | 20篇 |
1984年 | 24篇 |
1983年 | 25篇 |
1982年 | 14篇 |
1981年 | 16篇 |
1980年 | 15篇 |
1979年 | 12篇 |
1978年 | 11篇 |
1977年 | 17篇 |
1976年 | 27篇 |
1971年 | 7篇 |
排序方式: 共有9252条查询结果,搜索用时 15 毫秒
71.
João André Cristina Santos Lino Costa 《Journal of Intelligent and Robotic Systems》2016,82(3-4):379-397
Robots must be able to adapt their motor behavior to unexpected situations in order to safely move among humans. A necessary step is to be able to predict failures, which result in behavior abnormalities and may cause irrecoverable damage to the robot and its surroundings, i.e. humans. In this paper we build a predictive model of sensor traces that enables early failure detection by means of a skill memory. Specifically, we propose an architecture based on a biped locomotion solution with improved robustness due to sensory feedback, and extend the concept of Associative Skill Memories (ASM) to periodic movements by introducing several mechanisms into the training workflow, such as linear interpolation and regression into a Dynamical Motion Primitive (DMP) system such that representation becomes time invariant and easily parameterizable. The failure detection mechanism applies statistical tests to determine the optimal operating conditions. Both training and failure testing were conducted on a DARwIn-OP inside a simulation environment to assess and validate the failure detection system proposed. Results show that the system performance in terms of the compromise between sensitivity and specificity is similar with and without the proposed mechanism, while achieving a significant data size reduction due to the periodic approach taken. 相似文献
72.
Gjorgji Madjarov Dejan Gjorgjevikj Ivica Dimitrovski Sašo Džeroski 《Journal of Intelligent Information Systems》2016,47(1):57-90
Instead of traditional (multi-class) learning approaches that assume label independency, multi-label learning approaches must deal with the existing label dependencies and relations. Many approaches try to model these dependencies in the process of learning and integrate them in the final predictive model, without making a clear difference between the learning process and the process of modeling the label dependencies. Also, the label relations incorporated in the learned model are not directly visible and can not be (re)used in conjunction with other learning approaches. In this paper, we investigate the use of label hierarchies in multi-label classification, constructed in a data-driven manner. We first consider flat label sets and construct label hierarchies from the label sets that appear in the annotations of the training data by using a hierarchical clustering approach. The obtained hierarchies are then used in conjunction with hierarchical multi-label classification (HMC) approaches (two local model approaches for HMC, based on SVMs and PCTs, and two global model approaches, based on PCTs for HMC and ensembles thereof). The experimental results reveal that the use of the data-derived label hierarchy can significantly improve the performance of single predictive models in multi-label classification as compared to the use of a flat label set, while this is not preserved for the ensemble models. 相似文献
73.
Juan C. Granda Pelayo Nuño Julio Molleda Rubén Usamentiaga Daniel F. García 《Multimedia Systems》2016,22(5):543-557
Real-time interactive multimedia communications are becoming increasingly useful for education, business, e-commerce and e-government, providing an enriched user experience in teleconferencing, e-meetings, distance training and product demonstrations. Large corporations are usually located at several sites, so real-time multipoint sessions within corporations are especially difficult. IP multicast is available or feasible within each site of an organization. Thus, corporate networks can be considered as various multicast-capable networks interconnected through a wide area network without multicast connectivity. This paper proposes a resilient self-managed overlay network to support real-time multipoint interactive sessions within corporate networks. The proposed overlay takes advantage of the configuration of corporate networks to self-organize and provide an efficient media delivery service, making use of multicast communications wherever available. Various self-healing techniques are implemented allowing for the continuity of ongoing sessions in spite of network disruptions and entity failures. Extensive simulations and tests have been carried out to assess the performance and resilience of the overlay facing several types of disruptions. 相似文献
74.
In the context of fault detection and isolation of linear parameter‐varying systems, a challenging task appears when the dynamics and the available measurements render the model unobservable, which invalidates the use of standard set‐valued observers. Two results are obtained in this paper, namely, using a left‐coprime factorization, one can achieve set‐valued estimates with ultimately bounded hyper‐volume and convergence dependent on the slowest unobservable mode; and by rewriting the set‐valued observer equations and taking advantage of a coprime factorization, it is possible to have a low‐complexity fault detection and isolation method. Performance is assessed through simulation, illustrating, in particular, the detection time for various types of faults. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
75.
Sylvio BarbonJr Rodrigo Augusto Igawa Bruno Bogaz Zarpelão 《Multimedia Tools and Applications》2017,76(3):3213-3233
Compromising legitimate accounts has been the most used strategy to spread malicious content on OSN (Online Social Network). To address this problem, we propose a pure text mining approach to check if an account has been compromised based on its posts content. In the first step, the proposed approach extracts the writing style from the user account. The second step comprehends the k-Nearest Neighbors algorithm (k-NN) to evaluate the post content and identify the user. Finally, Baseline Updating (third step) consists of a continuous updating of the user baseline to support the current trends and seasonality issues of user’s posts. Experiments were carried out using a dataset from Twitter composed by tweets of 1000 users. All the three steps were individually evaluated, and the results show that the developed method is stable and can detect the compromised accounts. An important observation is the Baseline Updating contribution, which leads to an enhancement of accuracy superior of 60 %. Regarding average accuracy, the developed method achieved results over 93 %. 相似文献
76.
Rui C. Gonçalves Don Batory João L. Sobral Taylor L. Riché 《Software and Systems Modeling》2017,16(4):929-947
Dataflow programs are widely used. Each program is a directed graph where nodes are computations and edges indicate the flow of data. In prior work, we reverse-engineered legacy dataflow programs by deriving their optimized implementations from a simple specification graph using graph transformations called refinements and optimizations. In MDE speak, our derivations were PIM-to-PSM mappings. In this paper, we show how extensions complement refinements, optimizations, and PIM-to-PSM derivations to make the process of reverse engineering complex legacy dataflow programs tractable. We explain how optional functionality in transformations can be encoded, thereby enabling us to encode product lines of transformations as well as product lines of dataflow programs. We describe the implementation of extensions in the \(\mathtt{ReFlO}\) tool and present two non-trivial case studies as evidence of our work’s generality. 相似文献
77.
Rita Cunha Carlos Silvestre João Hespanha A. Pedro AguiarAuthor vitae 《Automatica》2011,(5):1020-1027
This paper addresses the problem of stabilizing to a desired equilibrium point an eye-in-hand system, which consists of a single camera mounted on a rigid body free to move on . It is assumed that there is a collection of landmarks fixed in the environment and that the image coordinates of those landmarks are provided to the system by an on-board CCD camera. The proposed method addresses not only the problem of stabilization but also that of maintaining feature visibility along the system’s trajectory. The resulting solution consists of a feedback control law based on the current and desired image coordinates and reconstructed attitude and depth ratio information, which guarantees that (i) the desired equilibrium point is an almost global attractor; (ii) a set of necessary conditions for feature visibility holds throughout the system’s trajectories; and (iii) the image of a predefined feature point is kept inside the camera’s field of view. 相似文献
78.
André Tavares da Silva Alexandre Xavier Falcão Léo Pini MagalhãesAuthor vitae 《Pattern recognition》2011,44(12):2971-2978
This paper discusses methods for content-based image retrieval (CBIR) systems based on relevance feedback according to two active learning paradigms, named greedy and planned. In greedy methods, the system aims to return the most relevant images for a query at each iteration. In planned methods, the most informative images are returned during a few iterations and the most relevant ones are only presented afterward. In the past, we proposed a greedy approach based on optimum-path forest classification (OPF) and demonstrated its gain in effectiveness with respect to a planned method based on support-vector machines and another greedy approach based on multi-point query. In this work, we introduce a planned approach based on the OPF classifier and demonstrate its gain in effectiveness over all methods above using more image databases. In our tests, the most informative images are better obtained from images that are classified as relevant, which differs from the original definition. The results also indicate that both OPF-based methods require less user involvement (efficiency) to satisfy the user's expectation (effectiveness), and provide interactive response times. 相似文献
79.
L. Beirão da Veiga A. Buffa D. Cho G. Sangalli 《Computer Methods in Applied Mechanics and Engineering》2011,200(21-22):1787-1803
We develop optimal approximation estimates for T-splines in the case of geometries obtained by gluing two standard tensor product patches. We derive results both for the T-spline space in the parametric domain and the mapped T-NURBS in the physical one. A set of numerical tests in complete accordance with the theoretical developments is also presented. 相似文献
80.
In the last few decades the continuous monitoring of complex dynamic systems has become an increasingly important issue across diverse engineering areas. This paper presents a pattern recognition based system that uses visual-based efficient invariants features for continuous monitoring of induction motors. The procedures presented here are based on the image identification of the 3-D current state space patterns that allow the identification of distinct fault types and, furthermore, their corresponding severity. This automatic fault detection system deals with time-variant electric currents and is based on the identification of three-phase stator currents specified patterns. Several simulation and experimental results are also presented in order to verify the effectiveness of the proposed methodology. 相似文献