全文获取类型
收费全文 | 5883篇 |
免费 | 540篇 |
国内免费 | 29篇 |
专业分类
电工技术 | 68篇 |
综合类 | 33篇 |
化学工业 | 1441篇 |
金属工艺 | 157篇 |
机械仪表 | 176篇 |
建筑科学 | 265篇 |
矿业工程 | 23篇 |
能源动力 | 216篇 |
轻工业 | 866篇 |
水利工程 | 43篇 |
石油天然气 | 44篇 |
武器工业 | 1篇 |
无线电 | 479篇 |
一般工业技术 | 1392篇 |
冶金工业 | 122篇 |
原子能技术 | 31篇 |
自动化技术 | 1095篇 |
出版年
2024年 | 28篇 |
2023年 | 71篇 |
2022年 | 85篇 |
2021年 | 205篇 |
2020年 | 206篇 |
2019年 | 160篇 |
2018年 | 309篇 |
2017年 | 346篇 |
2016年 | 388篇 |
2015年 | 227篇 |
2014年 | 300篇 |
2013年 | 663篇 |
2012年 | 345篇 |
2011年 | 415篇 |
2010年 | 347篇 |
2009年 | 325篇 |
2008年 | 304篇 |
2007年 | 292篇 |
2006年 | 205篇 |
2005年 | 163篇 |
2004年 | 144篇 |
2003年 | 127篇 |
2002年 | 131篇 |
2001年 | 54篇 |
2000年 | 64篇 |
1999年 | 43篇 |
1998年 | 53篇 |
1997年 | 43篇 |
1996年 | 44篇 |
1995年 | 32篇 |
1994年 | 25篇 |
1993年 | 21篇 |
1992年 | 18篇 |
1991年 | 21篇 |
1990年 | 12篇 |
1989年 | 16篇 |
1988年 | 13篇 |
1986年 | 8篇 |
1985年 | 23篇 |
1984年 | 11篇 |
1983年 | 11篇 |
1982年 | 17篇 |
1981年 | 14篇 |
1980年 | 11篇 |
1979年 | 14篇 |
1978年 | 11篇 |
1977年 | 8篇 |
1975年 | 7篇 |
1974年 | 10篇 |
1973年 | 10篇 |
排序方式: 共有6452条查询结果,搜索用时 15 毫秒
131.
Maria Eduarda Gonçalves 《Information & Communications Technology Law》2017,26(2):90-115
As the first broad reform of the EU data protection legislation is being achieved, and notwithstanding EU institutions’ confident discourse, scepticism remains about the reform’s ability to safeguard the fundamental right to data protection in the face of evolving data processing techniques underlying so-called big data. Yet, one might wonder whether the cause for this difficulty should be ascribed mainly to technological progresses that the law finds it hard to deal with or rather to the policy choices embedded in the legal reform itself. Indeed, a new data protection enforcement model is being adopted, which relies heavily on risk assessment and management by the data controllers themselves. Likewise, data protection authorities see their supervisory role significantly weakened. These developments and the underlying rationality are discussed. Given the limitations of the risk-based approach as currently devised, we suggest that it be reappraised in consideration of risk regulatory experiences in other domains. 相似文献
132.
Ahmad W. Bitar Rony Darazi Jean-François Couchot Raphaël Couturier 《Multimedia Tools and Applications》2017,76(1):143-161
In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency. 相似文献
133.
Chaabouni Souad Benois-pineau Jenny Tison François Ben Amar Chokri Zemmari Akka 《Multimedia Tools and Applications》2017,76(21):22527-22546
Multimedia Tools and Applications - Studies of visual attention of patients with Dementia such as Parkinson’s Disease Dementia and Alzheimer Disease is a promising way for non-invasive... 相似文献
134.
Gregory Hitz Enric Galceran Marie‐Ève Garneau François Pomerleau Roland Siegwart 《野外机器人技术杂志》2017,34(8):1427-1449
Autonomous mobile robots are increasingly employed to take measurements for environmental monitoring, but planning informative, measurement‐rich paths through large three‐dimensional environments is still challenging. Designing such paths, known as the informative path planning (IPP) problem, has been shown to be NP‐hard. Existing algorithms focus on providing guarantees on suboptimal solutions, but do not scale well to large problems. In this paper, we introduce a novel IPP algorithm that uses an evolutionary strategy to optimize a parameterized path in continuous space, which is subject to various constraints regarding path budgets and motion capabilities of an autonomous mobile robot. Moreover, we introduce a replanning scheme to adapt the planned paths according to the measurements taken in situ during data collection. When compared to two state‐of‐the‐art solutions, our method provides competitive results at significantly lower computation times and memory requirements. The proposed replanning scheme enables to build models with up to 25% lower uncertainty within an initially unknown area of interest. Besides presenting theoretical results, we tailored the proposed algorithms for data collection using an autonomous surface vessel for an ecological study, during which the method was validated through three field deployments on Lake Zurich, Switzerland. Spatiotemporal variations are shown over a period of three months and in an area of 350 m × 350 m × 13 m. Whereas our theoretical solution can be applied to multiple applications, our field results specifically highlight the effectiveness of our planner for monitoring toxic microorganisms in a pre‐alpine lake, and for identifying hot‐spots within their distribution. 相似文献
135.
Rui C. Gonçalves Don Batory João L. Sobral Taylor L. Riché 《Software and Systems Modeling》2017,16(4):929-947
Dataflow programs are widely used. Each program is a directed graph where nodes are computations and edges indicate the flow of data. In prior work, we reverse-engineered legacy dataflow programs by deriving their optimized implementations from a simple specification graph using graph transformations called refinements and optimizations. In MDE speak, our derivations were PIM-to-PSM mappings. In this paper, we show how extensions complement refinements, optimizations, and PIM-to-PSM derivations to make the process of reverse engineering complex legacy dataflow programs tractable. We explain how optional functionality in transformations can be encoded, thereby enabling us to encode product lines of transformations as well as product lines of dataflow programs. We describe the implementation of extensions in the \(\mathtt{ReFlO}\) tool and present two non-trivial case studies as evidence of our work’s generality. 相似文献
136.
137.
138.
Jean-François Monin 《Formal Methods in System Design》2000,17(3):221-243
Conformance control for ATM cells is based on a real-time reactive algorithm which delivers a value depending on inputs from the network. This value must always fit with a well defined theoretical value. We present here the correctness proof of the algorithm standardized for the ATM transfer capability called ABR. The proof turned out to produce a key argument during the standardization process of ABR. 相似文献
139.
2 1/2 D Visual Servoing with Respect to Unknown Objects Through a New Estimation Scheme of Camera Displacement 总被引:9,自引:0,他引:9
Classical visual servoing techniques need a strong a priori knowledge of the shape and the dimensions of the observed objects. In this paper, we present how the 2 1/2 D visual servoing scheme we have recently developed, can be used with unknown objects characterized by a set of points. Our scheme is based on the estimation of the camera displacement from two views, given by the current and desired images. Since vision-based robotics tasks generally necessitate to be performed at video rate, we focus only on linear algorithms. Classical linear methods are based on the computation of the essential matrix. In this paper, we propose a different method, based on the estimation of the homography matrix related to a virtual plane attached to the object. We show that our method provides a more stable estimation when the epipolar geometry degenerates. This is particularly important in visual servoing to obtain a stable control law, especially near the convergence of the system. Finally, experimental results confirm the improvement in the stability, robustness, and behaviour of our scheme with respect to classical methods. 相似文献
140.
António V. Sousa Ana Maria Mendonça Aurélio Campilho 《Pattern Analysis & Applications》2008,11(3-4):409-423
This paper proposes a non-parametric method for the classification of thin-layer chromatographic (TLC) images from patterns represented in a dissimilarity space. Each pattern corresponds to a mixture of Gaussian approximation of the intensity profile. The methodology comprises various phases, including image processing and analysis steps to extract the chromatographic profiles and a classification phase to discriminate among two groups, one corresponding to normal cases and the other to three pathological classes. We present an extensive study of several dissimilarity-based approaches analysing the influence of the dissimilarity measure and the prototype selection method on the classification performance. The main conclusions of this paper are that, Match and Profile-difference dissimilarity measures present better results, and a new prototype selection methodology achieves a performance similar or even better than conventional methods. Furthermore, we also concluded that simplest classifiers, such as k-NN and linear discriminant classifiers (LDCs), present good performance being the overall classification error less than 10% for the four-class problem. 相似文献