全文获取类型
收费全文 | 1364篇 |
免费 | 93篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 19篇 |
综合类 | 2篇 |
化学工业 | 217篇 |
金属工艺 | 30篇 |
机械仪表 | 97篇 |
建筑科学 | 48篇 |
矿业工程 | 3篇 |
能源动力 | 42篇 |
轻工业 | 130篇 |
水利工程 | 7篇 |
石油天然气 | 2篇 |
无线电 | 183篇 |
一般工业技术 | 237篇 |
冶金工业 | 208篇 |
原子能技术 | 7篇 |
自动化技术 | 226篇 |
出版年
2024年 | 2篇 |
2023年 | 20篇 |
2022年 | 34篇 |
2021年 | 56篇 |
2020年 | 29篇 |
2019年 | 40篇 |
2018年 | 49篇 |
2017年 | 48篇 |
2016年 | 73篇 |
2015年 | 48篇 |
2014年 | 57篇 |
2013年 | 106篇 |
2012年 | 67篇 |
2011年 | 80篇 |
2010年 | 51篇 |
2009年 | 76篇 |
2008年 | 50篇 |
2007年 | 43篇 |
2006年 | 54篇 |
2005年 | 57篇 |
2004年 | 42篇 |
2003年 | 29篇 |
2002年 | 28篇 |
2001年 | 21篇 |
2000年 | 14篇 |
1999年 | 21篇 |
1998年 | 76篇 |
1997年 | 47篇 |
1996年 | 37篇 |
1995年 | 13篇 |
1994年 | 9篇 |
1993年 | 25篇 |
1992年 | 8篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1979年 | 3篇 |
1976年 | 5篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1972年 | 2篇 |
1971年 | 1篇 |
1965年 | 1篇 |
1939年 | 1篇 |
排序方式: 共有1458条查询结果,搜索用时 17 毫秒
101.
Yeom Hong-Gi Park Seung-Min Park Junheong Sim Kwee-Bo 《International Journal of Control, Automation and Systems》2011,9(3):595-600
To improve the performance of classification algorithms, we proposed a new varianceconsidered machine (VCM) classification algorithm in a previous study. The study showed theoretically that VCMs have lower error probabilities than SVMs. The purpose of this paper is to experimentally demonstrate the superiority of VCMs. Therefore, we verified our proposal with several case experiments using data following a Gaussian distribution with different variances and prior probabilities. To estimate performance, the experiment for each case was executed 1000 times and the error rates were averaged for accuracy. The data of each experiment have different distances between means of data, and different ratios between training data and testing data. Thus, we proved that the error rate of VCMs is lower than the error rate of SVMs, although their performances were not similar in each case. Consequently, we expect that VCMs will be applied to a variety fields. 相似文献
102.
The design of a microstrip‐fed annular‐ring slot antenna (ARSA) with circular polarization (CP) radiation is initially studied. To obtain CP radiation with broad 3‐dB axial ratio (AR) bandwidth that can cover the WiMAX 2.3 GHz (2305–2320 MHz, 2345–2360 MHz) and WLAN 2.4 GHz (2400–2480 MHz) bands, a novel technique of extending an inverted L‐shaped slot from the bottom section of the annular‐ring is proposed. To suppress the harmonic modes induced by the CP ARSA, the technique of integrating a defected ground structure into the annular‐ring slot is further introduced. From the measured results, 10‐dB impedance bandwidth and 3‐dB AR bandwidth of 44.86 and 9.68% were achieved by the proposed harmonic suppressed CP ARSA. Furthermore, average gain and radiation efficiency of ~4.7 dBic and 71%, respectively, were also exhibited across the bands of interest. © 2014 Wiley Periodicals, Inc. Int J RF and Microwave CAE 25:337–345, 2015. 相似文献
103.
104.
Fault based testing aims at detecting hypothesized faults based on specifications or program source. There are some fault
based techniques for testing Boolean expressions which are commonly used to model conditions in specifications as well as
logical decisions in program source. The MUMCUT strategy has been proposed to generate test cases from Boolean expressions.
Moreover, it detects eight common types of hypothesized faults provided that the original expression is in irredundant disjunctive
normal form, IDNF. Software practitioners are more likely to write the conditions and logical decisions in general form rather
than IDNF. Hence, it is interesting to investigate the fault detecting capability of the MUMCUT strategy with respect to general
form Boolean expressions. In this article, we perform empirical studies to investigate the fault detection capability of the
MUMCUT strategy with respect to general form Boolean expressions as well as mutated expressions. A mutated expression can
be obtained from the original given Boolean expression by making a syntactic change based on a particular type of fault.
T. Y. Chen obtained his BSc and MPhil from the University of Hong Kong, MSc and DIC from the Imperial College of Science and Technology, PhD from the University of Melbourne. He is currently a Professor of Software Engineering at the Swinburne University of Technology. Prior to joining Swinburne, he has taught at the University of Hong Kong and the University of Melbourne. His research interests include software testing, debugging, maintenance, and validation of requirements. M. F. Lau received the Ph.D. degree in Software Engineering from the University of Melbourne, Australia. He is currently a Senior Lecturer in the Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia. His research publications have appeared in various scholarly journals, including ACM Transactions on Software Engineering and Methodology, The Journal of Systems and Software, The Computer Journal, Software Testing, Verification and Reliability, Information and Software Technology, Information Sciences, and Information Processing Letters. His research interests include software testing, software quality, software specification and computers in education. K. Y. Sim received his Bachelor of Engineering in Electrical, Electronics and Systems from the National University of Malaysia in 1999 and the Master of Computer Science from the University of Malaya, Malaysia in 2001. Currently, he is a Senior Lecturer in the School of Engineering, Swinburne University of Technology, Sarawak Campus, Malaysia. His current research interests include software testing and information security. C. A. Sun received the PhD degree in Computer Software and Theory in 2002 from Beijing University of Aeronautics and Astronautics, China; the bachelor degree in Computer and Its application in 1997 from University of Science and Technology Beijing, China. He is currently an Assistant Professor in the School of Computer and Information Technology, Beijing Jiaotong University, China. His research areas are software testing, software architecture and service-oriented computing. He has published about 40 referred papers in the above areas. He is an IEEE member. 相似文献
M. F. LauEmail: |
T. Y. Chen obtained his BSc and MPhil from the University of Hong Kong, MSc and DIC from the Imperial College of Science and Technology, PhD from the University of Melbourne. He is currently a Professor of Software Engineering at the Swinburne University of Technology. Prior to joining Swinburne, he has taught at the University of Hong Kong and the University of Melbourne. His research interests include software testing, debugging, maintenance, and validation of requirements. M. F. Lau received the Ph.D. degree in Software Engineering from the University of Melbourne, Australia. He is currently a Senior Lecturer in the Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia. His research publications have appeared in various scholarly journals, including ACM Transactions on Software Engineering and Methodology, The Journal of Systems and Software, The Computer Journal, Software Testing, Verification and Reliability, Information and Software Technology, Information Sciences, and Information Processing Letters. His research interests include software testing, software quality, software specification and computers in education. K. Y. Sim received his Bachelor of Engineering in Electrical, Electronics and Systems from the National University of Malaysia in 1999 and the Master of Computer Science from the University of Malaya, Malaysia in 2001. Currently, he is a Senior Lecturer in the School of Engineering, Swinburne University of Technology, Sarawak Campus, Malaysia. His current research interests include software testing and information security. C. A. Sun received the PhD degree in Computer Software and Theory in 2002 from Beijing University of Aeronautics and Astronautics, China; the bachelor degree in Computer and Its application in 1997 from University of Science and Technology Beijing, China. He is currently an Assistant Professor in the School of Computer and Information Technology, Beijing Jiaotong University, China. His research areas are software testing, software architecture and service-oriented computing. He has published about 40 referred papers in the above areas. He is an IEEE member. 相似文献
105.
The two-dimensional suffix tree of a matrix A is a compacted tree that represents all square submatrices of A. We present the first complete version of a deterministic linear-time algorithm to construct the two-dimensional suffix tree by applying a divide-and-conquer approach. 相似文献
106.
Shin Hansub Sim Sungyong Kwon Hyukyoon Hwang Sangheum Lee Younho 《International Journal of Information Security》2022,21(1):25-36
International Journal of Information Security - This paper deals with a well-known problem in the area of the smudge attacks: when a user draws a pattern to unlock the pattern lock on a smartphone... 相似文献
107.
Bargaining is an effective paradigm to solve the problem of resource allocation. The consideration of factors such as bounded rationality of negotiators, time constraints, incomplete information, and complexity of dynamic environment make the design of optimal strategy for one-shot bargaining much tougher than the situation that all bargainers are assumed to be absolutely rational. Lots of prediction-based strategies have been explored either based on assuming a finite number of models for opponents, or focusing on the prediction of opponent’s reserve price, deadline, or the probabilities of different behaviors. Following the methods of estimating opponent’s private information, this paper gives a strategy which improves the BLGAN strategy to adapt to various possible bargaining situations and deal with multifarious opponents. In addition, this paper compares the improved BLGAN strategy with related work. Experimental results show that the improved BLGAN strategy can outperform related ones when faced with various opponents, especially the agents who frequently change their strategies for anti-learning. 相似文献
108.
Software developers often need to understand a large body of unfamiliar code with little or no documentation, no experts to consult, and little time to do it. A post appeared in January 2008 on Slashdot, a technology news Web site, asking for tools and techniques that could help. This article analyzes 301 often passionate and sometimes articulate responses to this query, including the themes and the associated tool recommendations. The most common suggestions were to use a code navigation tool, use a design recovery tool, use a debugger to step through the code, create a runtime trace, use problem-based learning, ask people for help, study the code from top down, and print out all the code. This analysis presents an intriguing snapshot of how software developers in industry go about comprehending big code. 相似文献
109.
Robust reweighted MAP motion estimation 总被引:2,自引:0,他引:2
Dong-Gyu Sim Rae-Hong Park 《IEEE transactions on pattern analysis and machine intelligence》1998,20(4):353-365
This paper proposes a motion estimation algorithm that is robust to motion discontinuity and noise. The proposed algorithm is constructed by embedding the least median squares (LMedS) of robust statistics into the maximum a posteriori (MAP) estimator. Difficulties in accurate estimation of the motion field arise from the smoothness constraint and the sensitivity to noise. To cope robustly with these problems, a median operator and the concept of reweighted least squares (RLS) are applied to the MAP motion estimator, resulting in the reweighted robust MAP (RRMAP). The proposed RRMAP motion estimation algorithm is also generalized for multiple image frame cases. Computer simulation with various synthetic image sequences shows that the proposed algorithm reduces errors, compared to three existing robust motion estimation algorithms that are based on M-estimation, total least squares (TLS), and Hough transform. It is also observed that the proposed algorithm is statistically efficient and robust to additive Gaussian noise and impulse noise. Furthermore, the proposed algorithm yields reasonable performance for real image sequences 相似文献
110.