全文获取类型
收费全文 | 54474篇 |
免费 | 4217篇 |
国内免费 | 2045篇 |
专业分类
电工技术 | 2823篇 |
技术理论 | 5篇 |
综合类 | 3027篇 |
化学工业 | 9416篇 |
金属工艺 | 3276篇 |
机械仪表 | 3265篇 |
建筑科学 | 3867篇 |
矿业工程 | 1786篇 |
能源动力 | 1696篇 |
轻工业 | 3796篇 |
水利工程 | 886篇 |
石油天然气 | 3870篇 |
武器工业 | 406篇 |
无线电 | 5851篇 |
一般工业技术 | 6508篇 |
冶金工业 | 3097篇 |
原子能技术 | 673篇 |
自动化技术 | 6488篇 |
出版年
2024年 | 246篇 |
2023年 | 897篇 |
2022年 | 1642篇 |
2021年 | 2347篇 |
2020年 | 1697篇 |
2019年 | 1476篇 |
2018年 | 1684篇 |
2017年 | 1811篇 |
2016年 | 1622篇 |
2015年 | 2122篇 |
2014年 | 2727篇 |
2013年 | 3142篇 |
2012年 | 3342篇 |
2011年 | 3648篇 |
2010年 | 3251篇 |
2009年 | 2903篇 |
2008年 | 2857篇 |
2007年 | 2767篇 |
2006年 | 2935篇 |
2005年 | 2490篇 |
2004年 | 1571篇 |
2003年 | 1371篇 |
2002年 | 1285篇 |
2001年 | 1015篇 |
2000年 | 1214篇 |
1999年 | 1520篇 |
1998年 | 1202篇 |
1997年 | 1035篇 |
1996年 | 1023篇 |
1995年 | 898篇 |
1994年 | 714篇 |
1993年 | 476篇 |
1992年 | 372篇 |
1991年 | 304篇 |
1990年 | 245篇 |
1989年 | 201篇 |
1988年 | 177篇 |
1987年 | 112篇 |
1986年 | 98篇 |
1985年 | 63篇 |
1984年 | 56篇 |
1983年 | 39篇 |
1982年 | 32篇 |
1981年 | 32篇 |
1980年 | 18篇 |
1979年 | 8篇 |
1978年 | 7篇 |
1977年 | 10篇 |
1976年 | 14篇 |
1975年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
We present four techniques for modeling and animating faces starting from a set of morph targets. The first technique involves obtaining parameters to control individual facial components and learning the mapping from one type of parameter to another through machine learning techniques. The second technique is to fuse visible speech and facial expressions in the lower part of a face. The third technique combines coarticulation rules and kernel smoothing techniques. Finally, a new 3D tongue model with flexible and intuitive skeleton controls is presented. The results of eight animated character models demonstrate that these techniques are powerful and effective. 相似文献
992.
Jianhua He Zongkai Yang Zhen Fan Zuoyin Tang Liren Zhang Kai-Kuang Ma 《Computer Communications》2004,27(18):1322-1850
Two important issues in assured services within differentiated services architecture are bandwidth guarantee and fair sharing of unsubscribed bandwidth among TCP flows with and without bandwidth reservations. Although the subscribed bandwidth can be guaranteed by increasing network capacity or deploying strict admission control mechanisms, the costs of such solutions are very high. The issue of fair sharing of excess bandwidth is also not well solved. To address those issues, a modified TCP, named two-windows TCP, has been proposed. The performance of the protocol is evaluated by simulations. But its effectiveness is not validated theoretically under general network conditions, which is important for understanding the benefits and costs of using the protocol. In this paper, an analytical model is developed for the purpose. The model characterizes throughput of individual two-windows TCP flow as a function of contract rate, round trip time, loss rates of In and Out packets. Extensive simulations validate the analytical model. It's shown two-windows TCP is effective not only on solving the issues of bandwidth guarantee and fair sharing of unsubscribed bandwidth, but also on increasing the utilization of bottleneck link bandwidth. Moreover, its performance is robust to network conditions, which is important for wide deployment over Internet. 相似文献
993.
Ma L. Khorasani K. 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2004,34(3):1588-1595
A new technique for facial expression recognition is proposed, which uses the two-dimensional (2D) discrete cosine transform (DCT) over the entire face image as a feature detector and a constructive one-hidden-layer feedforward neural network as a facial expression classifier. An input-side pruning technique, proposed previously by the authors, is also incorporated into the constructive learning process to reduce the network size without sacrificing the performance of the resulting network. The proposed technique is applied to a database consisting of images of 60 men, each having five facial expression images (neutral, smile, anger, sadness, and surprise). Images of 40 men are used for network training, and the remaining images of 20 men are used for generalization and testing. Confusion matrices calculated in both network training and generalization for four facial expressions (smile, anger, sadness, and surprise) are used to evaluate the performance of the trained network. It is demonstrated that the best recognition rates are 100% and 93.75% (without rejection), for the training and generalizing images, respectively. Furthermore, the input-side weights of the constructed network are reduced by approximately 30% using our pruning method. In comparison with the fixed structure back propagation-based recognition methods in the literature, the proposed technique constructs one-hidden-layer feedforward neural network with fewer number of hidden units and weights, while simultaneously provide improved generalization and recognition performance capabilities. 相似文献
994.
Proxy servers have been used to cache web objects to alleviate the load of the web servers and to reduce network congestion on the Internet. In this paper, a central video server is connected to a proxy server via wide area networks (WANs) and the proxy server can reach many clients via local area networks (LANs). We assume a video can be either entirely or partially cached in the proxy to reduce WAN bandwidth consumption. Since the storage space and the sustained disk I/O bandwidth are limited resources in the proxy, how to efficiently utilize these resources to maximize the WAN bandwidth reduction is an important issue. We design a progressive video caching policy in which each video can be cached at several levels corresponding to cached data sizes and required WAN bandwidths. For a video, the proxy server determines to cache a smaller amount of data at a lower level or to gradually accumulate more data to reach a higher level. The proposed progressive caching policy allows the proxy to adjust caching amount for each video based on its resource condition and the user access pattern. We investigate the scenarios in which the access pattern is priorly known or unknown and the effectiveness of the caching policy is evaluated. 相似文献
995.
996.
以“三个代表”重要思想为指导 ,用优秀的影视作品占领军营思想文化阵地 ,是部队影视发行放映工作必须始终遵循的原则。江泽民同志在十六大报告中指出 :全面建设小康社会 ,必须大力发展社会主义文化 ,建设社会精神文明。当今世界 ,文化、经济和政治相互交融 ,在综合国力竞争中的地位和作用越来越突出……全党同志要深刻认识文化建设的战略意义 ,推动社会主义文化的发展繁荣。艺术的民族性是民族文化意识的反映 ,民族文化具有极为强烈的感召力 ,因而也为群众所喜闻乐见。优秀国产电影作为中华民族文化的重要内容 ,历来受到国家的保护和扶植。… 相似文献
997.
998.
999.
1000.
讨论了磨削加工中激振力的模糊性,基于模糊数学理论,给出了考虑模糊性时表征激振力的模糊约束和可能性分布函数.提出了在模糊激振力作用下,磨削加工系统的模糊稳态响应. 相似文献