全文获取类型
收费全文 | 34773篇 |
免费 | 2232篇 |
国内免费 | 418篇 |
专业分类
电工技术 | 821篇 |
综合类 | 493篇 |
化学工业 | 6621篇 |
金属工艺 | 836篇 |
机械仪表 | 1014篇 |
建筑科学 | 1361篇 |
矿业工程 | 197篇 |
能源动力 | 871篇 |
轻工业 | 5196篇 |
水利工程 | 465篇 |
石油天然气 | 354篇 |
武器工业 | 77篇 |
无线电 | 2787篇 |
一般工业技术 | 5178篇 |
冶金工业 | 5947篇 |
原子能技术 | 250篇 |
自动化技术 | 4955篇 |
出版年
2024年 | 116篇 |
2023年 | 398篇 |
2022年 | 762篇 |
2021年 | 1231篇 |
2020年 | 973篇 |
2019年 | 964篇 |
2018年 | 1380篇 |
2017年 | 1283篇 |
2016年 | 1341篇 |
2015年 | 1215篇 |
2014年 | 1531篇 |
2013年 | 2517篇 |
2012年 | 2182篇 |
2011年 | 2151篇 |
2010年 | 1670篇 |
2009年 | 1575篇 |
2008年 | 1577篇 |
2007年 | 1425篇 |
2006年 | 1045篇 |
2005年 | 819篇 |
2004年 | 785篇 |
2003年 | 664篇 |
2002年 | 671篇 |
2001年 | 476篇 |
2000年 | 409篇 |
1999年 | 492篇 |
1998年 | 1979篇 |
1997年 | 1274篇 |
1996年 | 864篇 |
1995年 | 465篇 |
1994年 | 410篇 |
1993年 | 431篇 |
1992年 | 182篇 |
1991年 | 178篇 |
1990年 | 156篇 |
1989年 | 163篇 |
1988年 | 130篇 |
1987年 | 119篇 |
1986年 | 113篇 |
1985年 | 131篇 |
1984年 | 101篇 |
1983年 | 85篇 |
1982年 | 99篇 |
1981年 | 94篇 |
1980年 | 90篇 |
1979年 | 52篇 |
1978年 | 42篇 |
1977年 | 144篇 |
1976年 | 257篇 |
1975年 | 36篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
Luis Garcés-Erice 《Parallel Computing》2011,37(8):379-391
The software in modern systems has become too complex to make accurate predictions about their performance under different configurations. Real-time or even responsiveness requirements cannot be met because it is not possible to perform admission control for new or changing tasks if we cannot tell how their execution affects the other tasks already running. Previously, we proposed a resource-allocation middleware that manages the execution of tasks in a complex distributed system with real-time requirements. The middleware behavior can be modeled depending on the configuration of the tasks running, so that the performance of any given configuration can be calculated. This makes it possible to have admission control in such a system, but the model requires knowledge of run-time parameters. We propose the utilization of machine-learning algorithms to obtain the model parameters, and be able to predict the system performance under any configuration, so that we can provide a full admission control mechanism for complex software systems. In this paper, we present such an admission control mechanism, we measure its accuracy in estimating the parameters of the model, and we evaluate its performance to determine its suitability for a real-time or responsive system. 相似文献
92.
Jesus Nuevo Luis M. Bergasa David F. Llorca Manuel Ocaña 《Image and vision computing》2011,29(4):209-218
This paper describes an active model with a robust texture model built on-line. The model uses one camera and it is able to operate without active illumination. The texture model is defined by a series of clusters, which are built in a video sequence using previously encountered samples. This model is used to search for the corresponding element in the following frames. An on-line clustering method, named leaderP is described and evaluated on an application of face tracking. A 20-point shape model is used. This model is built offline, and a robust fitting function is used to restrict the position of the points. Our proposal is to serve as one of the stages in a driver monitoring system. To test it, a new set of sequences of drivers recorded outdoors and in a realistic simulator has been compiled. Experimental results for typical outdoor driving scenarios, with frequent head movement, turns and occlusions are presented. Our approach is tested and compared with the Simultaneous Modeling and Tracking (SMAT) [1], and the recently presented Stacked Trimmed Active Shape Model (STASM) [2], and shows better results than SMAT and similar fitting error levels to STASM, with much faster execution times and improved robustness. 相似文献
93.
Juan Francisco Gómez-Lopera José Martínez-Aroza Aureliano M. Robles-Pérez Ramón Román-Roldán 《Journal of Mathematical Imaging and Vision》2000,13(1):35-56
This work constitutes a theoretical study of the edge-detection method by means of the Jensen-Shannon divergence, as proposed by the authors. The overall aim is to establish formally the suitability of the procedure of edge detection in digital images, as a step prior to segmentation. In specific, an analysis is made not only of the properties of the divergence used, but also of the method's sensitivity to the spatial variation, as well as the detection-error risk associated with the operating conditions due to the randomness of the spatial configuration of the pixels. Although the paper deals with the procedure based on the Jensen-Shannon divergence, some problems are also related to other methods based on local detection with a sliding window, and part of the study is focused to noisy and textured images. 相似文献
94.
Rónán Kennedy 《Information & Communications Technology Law》2008,17(2):95-106
The new industry of Massively Multi-Player Online Role-Playing Games (MMORPGs) brings together two sets of fictions: the interactive stories of shared computer games and the legal devices of intellectual property. In these virtual worlds, scarcity need not exist, but players tend to prefer the competition it creates. This leads to the development of property rights within the game world and players trading real money for virtual objects, ‘land’ and characters. This new phenomenon brings with it familiar legal problems such as theft, fraud and ownership disputes. Game creators also challenge the right of the players to claim ownership outside the game world. The volume and value of the items traded make real money trading an important area of current interest for intellectual property lawyers. Something is being traded, but does it fit neatly into existing conceptions of property rights and who owns it? Analysing the novel problems that result from various theoretical perspectives (utilitarianism, labour-desert theory and personality theory) leads to the conclusion that with time, we will see the development of property rights for players in online games. This connects with a growing understanding that the traditional conception of copyright law dealing with creative work generated by the solitary author is becoming less appropriate in the new creative spaces that information and communications technology brings, where individuals are both consumer and producer. In virtual worlds, new forms of intellectual property, and perhaps even new rights, are taking shape. 相似文献
95.
Formal translations constitute a suitable framework for dealing with many problems in pattern recognition and computational linguistics. The application of formal transducers to these areas requires a stochastic extension for dealing with noisy, distorted patterns with high variability. In this paper, some estimation criteria are proposed and developed for the parameter estimation of regular syntax-directed translation schemata. These criteria are: maximum likelihood estimation, minimum conditional entropy estimation and conditional maximum likelihood estimation. The last two criteria were proposed in order to deal with situations when training data is sparse. These criteria take into account the possibility of ambiguity in the translations: i.e., there can be different output strings for a single input string. In this case, the final goal of the stochastic framework is to find the highest probability translation of a given input string. These criteria were tested on a translation task which has a high degree of ambiguity. 相似文献
96.
Intelligence has been an object of study for a long time. Different architectures try to capture and reproduce these aspects into artificial systems (or agents), but there is still no agreement on how to integrate them into a general framework. With this objective in mind, we propose an architectural methodology based on the idea of intentional configuration of behaviors. Behavior‐producing modules are used as basic control components that are selected and modified dynamically according to the intentions of the agent. These intentions are influenced by the situation perceived, knowledge about the world, and internal variables that monitor the state of the agent. The architectural methodology preserves the emergence of functionality associated with the behavior‐based paradigm in the more abstract levels involved in configuring the behaviors. Validation of this architecture is done using a simulated world for mobile robots, in which the agent must deal with various goals such as managing its energy and its well‐being, finding targets, and acquiring knowledge about its environment. Fuzzy logic, a topologic map learning algorithm, and activation variables with a propagation mechanism are used to implement the architecture for this agent. 相似文献
97.
Luis Rueda B John Oommen 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2006,36(5):1196-1200
This correspondence shows that learning automata techniques, which have been useful in developing weak estimators, can be applied to data compression applications in which the data distributions are nonstationary. The adaptive coding scheme utilizes stochastic learning-based weak estimation techniques to adaptively update the probabilities of the source symbols, and this is done without resorting to either maximum likelihood, Bayesian, or sliding-window methods. The authors have incorporated the estimator in the adaptive Fano coding scheme and in an adaptive entropy-based scheme that "resembles" the well-known arithmetic coding. The empirical results obtained for both of these adaptive methods are obtained on real-life files that possess a fair degree of nonstationarity. From these results, it can be seen that the proposed schemes compress nearly 10% more than their respective adaptive methods that use maximum-likelihood estimator-based estimates. 相似文献
98.
Ji Feng Zhang Le Yi Wang 《Automatic Control, IEEE Transactions on》2001,46(7):1137-1141
The fundamental issues of capability of robust and adaptive control in dealing with uncertainty are investigated in stochastic systems. It is revealed that to capture the intrinsic limitations of adaptive control, it is necessary to use supt types of transient and persistent performance, rather than lim supt types which reflect only asymptotic behavior of a system. For clarity and technical tractability, a simple first-order linear time-varying system is employed as a vehicle to explore performance lower bounds of robust and adaptive control. Optimal performances of nominal, robust and adaptive control are explicitly derived and their implications are discussed in an information framework. An adaptive strategy is scrutinized for its achievable performance bounds. The results indicate that intimate interaction and inherent conflict between identification and control result in a certain performance lower bound which does not approach the nominal performance even when the system varies very slowly. Explicit lower bounds are obtained when disturbances are either normally or uniformly distributed 相似文献
99.
Luis Gouveia 《Telecommunication Systems》1993,1(1):51-76
In this paper, we compare linear integer programming directed formulations for the capacitated minimal spanning tree (CMST) problem. This problem is directly related to network design and consists of finding the cheapest way to link a set of terminals at different locations with a central node (a computer site, for instance). The present work focuses on a single commodity flow formulation presented in [3,4]. This formulation includes two sets of variables and, hence, it also must include coupling constraints between the two sets of variables. These coupling constraints can be defined in several ways. The main result of this work establishes that when the strongest form of the coupling constraints is used in the flow formulation (as in [4]), the equivalent formulation using only theX
ij
variables satisfies the so-called multistar constraints. These constraints are shown to be stronger than the weakest form of the generalized subtour breaking constraints and, hence, our result improves on the characterization given in [5] for the flow formulation presented in [4]. For certain parameters, the multistar constraints induce facets of the non-directed CMST polytope (see [2]). We also show that it is not possible to compare the linear relaxations of a formulation that involves the multistar constraints with one that involves the generalized subtour breaking constraints. 相似文献
100.
S.J. Sherwin J. Peiró O. Shah G.-S. Karamanos D.J. Doorly 《Computing and Visualization in Science》2000,3(1-2):77-83
The increased availability of large scale computational facilities is enabling the use of computational modelling for the
treatment of complex problems of industrial interest. Computational haemodynamics is an area where improved computational
power and algorithmic development have permitted the application in biomechanics of techniques originally devised for direct
numerical simulations in others areas of scientific interest. In this paper we present a highly accurate algorithm for the
numerical solution of the incompressible Navier–Stokes equations which employs a spectral/hp element spatial discretisation
and a high-order time splitting. Two important developments discussed in this paper are the coupling of these techniques with
unstructured mesh generation, used in many everyday engineering applications, and the introduction of a non-Newtonian viscosity
model to account for the shear thinning properties of blood. The proposed method will be applied to the analysis of shear
stress distributions in flows of interest in haemodynamics.
Received: 5 May 1999 / Accepted: 21 september 1999 相似文献