首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   70718篇
  免费   914篇
  国内免费   348篇
电工技术   690篇
综合类   1841篇
化学工业   10282篇
金属工艺   3930篇
机械仪表   2558篇
建筑科学   1888篇
矿业工程   455篇
能源动力   1061篇
轻工业   3292篇
水利工程   1045篇
石油天然气   347篇
无线电   7749篇
一般工业技术   13619篇
冶金工业   2330篇
原子能技术   234篇
自动化技术   20659篇
  2024年   31篇
  2023年   49篇
  2022年   111篇
  2021年   146篇
  2020年   138篇
  2019年   197篇
  2018年   11688篇
  2017年   10832篇
  2016年   8126篇
  2015年   602篇
  2014年   351篇
  2013年   509篇
  2012年   2655篇
  2011年   7746篇
  2010年   6759篇
  2009年   4548篇
  2008年   5598篇
  2007年   6336篇
  2006年   224篇
  2005年   1059篇
  2004年   999篇
  2003年   1022篇
  2002年   516篇
  2001年   133篇
  2000年   220篇
  1999年   103篇
  1998年   139篇
  1997年   64篇
  1996年   76篇
  1995年   42篇
  1994年   35篇
  1993年   32篇
  1992年   30篇
  1991年   43篇
  1988年   28篇
  1987年   37篇
  1985年   23篇
  1976年   24篇
  1969年   22篇
  1968年   35篇
  1967年   27篇
  1966年   38篇
  1965年   30篇
  1960年   23篇
  1959年   28篇
  1958年   29篇
  1957年   27篇
  1956年   26篇
  1955年   46篇
  1954年   52篇
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
61.
DCAF: An MPEG-21 Dynamic Content Adaptation Framework   总被引:1,自引:3,他引:1  
Universal Multimedia Access aims at providing a gratifying end user-experience by either adapting the content, be it static or dynamic, to suit the usage environment or adapting the usage environment, be it client- or server-centric, to suit content. This paper presents our MPEG-21 Dynamic Content Adaptation Framework, acronym DCAF, which uses a fusion of Genetic Algorithms and Strength Pareto Optimality to adapt content in order to suit the usage environment.
Marios C. Angelides (Corresponding author)Email:
  相似文献   
62.
63.
64.
Previously unexplored resonance conditions are shown to exist for the classical hydrogen atomic system, where the electron is treated as a classical charged point particle following the nonrelativistic Lorentz-Dirac equation of motion about a stationary nucleus of opposite charge. For circularly polarized (CP) light directed normal to the orbit, very pronounced subharmonic resonance behavior is shown to occur with a variety of interesting properties. In particular, only if the amplitude of the CP light exceeds a critical value, will the resonance continue without radius and energy decay. A perturbation analysis is carried out to illustrate the main features of the behavior. The present phenomena adds to a growing list of other nonlinear dynamical behaviors of this simple system, that may well be important for more deeply understanding classical and quantum connections.  相似文献   
65.
Chinese calligraphy is a unique visual art, and and is one of the material basis of China’s traditional cultural heritage. However, time had caused the old calligraphy works to weathering and damages, so it is necessary to utilize advanced technologies to protect those works. One of those technologies is digital imaging, and the obtained images by digital imaging can preserve the visual information of calligraphy works better, furthermore, they can be used in further researches. While the basic works for those researches are to extract the artistic features which include two elements, i.e., form and spirit. However, most of the existing methods only extract the form and ignore the characters’ spirit, especially they are insensitive to the slight variation in complex ink strokes. To solve these problems, this paper proposes an extraction method based on regional guided flter (RGF) with reference images, which is generated by KNN matting and used as the input image for RGF. Since RGF is sensitive to the slight variation of ink, so the detailed information of the inside of strokes can be detected better. Besides, unlike the past works, which filter the whole strokes, RGF filters the inside of strokes and edges in different windows respectively, which results in that the edges are preserved accurately. Results from a deployment of several famous Chinese calligraphy works demonstrate that our method can extract more accurate and complete form and spirit with lower error rate.  相似文献   
66.
The polynomial-time solvable k-hurdle problem is a natural generalization of the classical s-t minimum cut problem where we must select a minimum-cost subset S of the edges of a graph such that |pS|≥k for every s-t path p. In this paper, we describe a set of approximation algorithms for “k-hurdle” variants of the NP-hard multiway cut and multicut problems. For the k-hurdle multiway cut problem with r terminals, we give two results, the first being a pseudo-approximation algorithm that outputs a (k−1)-hurdle solution whose cost is at most that of an optimal solution for k hurdles. Secondly, we provide a 2(1-\frac1r)2(1-\frac{1}{r})-approximation algorithm based on rounding the solution of a linear program, for which we give a simple randomized half-integrality proof that works for both edge and vertex k-hurdle multiway cuts that generalizes the half-integrality results of Garg et al. for the vertex multiway cut problem. We also describe an approximation-preserving reduction from vertex cover as evidence that it may be difficult to achieve a better approximation ratio than 2(1-\frac1r)2(1-\frac{1}{r}). For the k-hurdle multicut problem in an n-vertex graph, we provide an algorithm that, for any constant ε>0, outputs a ⌈(1−ε)k⌉-hurdle solution of cost at most O(log n) times that of an optimal k-hurdle solution, and we obtain a 2-approximation algorithm for trees.  相似文献   
67.
Linear and logistic regression are popular statistical techniques for analyzing multi-variate data. Typically, analysts do not simply posit a particular form of the regression model, estimate its parameters, and use the results for inference or prediction. Instead, they first use a variety of diagnostic techniques to assess how well the model fits the relationships in the data and how well it can be expected to predict outcomes for out-of-sample records, revising the model as necessary to improve fit and predictive power. In this article, we develop \(\epsilon \)-differentially private diagnostics tools for regression, beginning to fill a gap in privacy-preserving data analysis. Specifically, we create differentially private versions of residual plots for linear regression and of receiver operating characteristic (ROC) curves as well as binned residual plot for logistic regression. The residual plot and binned residual plot help determine whether or not the data satisfy the assumptions underlying the regression model, and the ROC curve is used to assess the predictive power of the logistic regression model. These diagnostics improve the usefulness of algorithms for computing differentially private regression output, which alone does not allow analysts to assess the quality of the posited model. Our empirical studies show that these algorithms can be effective tools for allowing users to evaluate the quality of their models.  相似文献   
68.
Bankruptcy prediction has long time been an active research field in finance. One of the main approaches to this issue is dealing with it as a classification problem. Among the range of instruments available, we focus our attention on the Evolutionary Nearest Neighbor Classifier (ENPC). In this work we assess the performance of the ENPC comparing it to six alternatives. The results suggest that this algorithm might be considered a good choice.  相似文献   
69.
Business process work-arounds are specific forms of incompliant behavior, where employees intentionally decide to deviate from the required procedures although they are aware of them. Detecting and understanding the work-arounds performed can guide organizations in redesigning and improving their processes and support systems. Existing process mining techniques for compliance checking and diagnosis of incompliant behavior rely on the available information in event logs and emphasize technological capabilities for analyzing this information. They do not distinguish intentional incompliance and do not address the sources of this behavior. In contrast, the paper builds on a list of generic types of work-arounds found in practice and explores whether and how they can be detected by process mining techniques. Results obtained for four work-around types in five real-life processes are reported. The remaining two types are not reflected in events logs and cannot be currently detected by process mining. The detected work-around data are further analyzed for identifying correlations between the frequency of specific work-around types and properties of the processes and of specific activities. The analysis results promote the understanding of work-around situations and sources.  相似文献   
70.
Automatic video annotation is a critical step for content-based video retrieval and browsing. Detecting the focus of interest in video frames automatically can benefit the tedious manual labeling process. However, producing an appropriate extent of visually salient regions in video sequences is a challenging task. Therefore, in this work, we propose a novel approach for modeling dynamic visual attention based on spatiotemporal analysis. Our model first detects salient points in three-dimensional video volumes, and then uses the points as seeds to search the extent of salient regions in a novel motion attention map. To determine the extent of attended regions, we use the maximum entropy in the spatial domain to analyze the dynamics derived by spatiotemporal analysis. Our experiment results show that the proposed dynamic visual attention model achieves high precision value of 70% and reveals its robustness in successive video volumes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号