全文获取类型
收费全文 | 900篇 |
免费 | 73篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 3篇 |
综合类 | 2篇 |
化学工业 | 301篇 |
金属工艺 | 38篇 |
机械仪表 | 22篇 |
建筑科学 | 24篇 |
矿业工程 | 2篇 |
能源动力 | 41篇 |
轻工业 | 58篇 |
水利工程 | 5篇 |
石油天然气 | 2篇 |
无线电 | 73篇 |
一般工业技术 | 166篇 |
冶金工业 | 19篇 |
原子能技术 | 2篇 |
自动化技术 | 217篇 |
出版年
2023年 | 4篇 |
2022年 | 29篇 |
2021年 | 91篇 |
2020年 | 33篇 |
2019年 | 41篇 |
2018年 | 47篇 |
2017年 | 25篇 |
2016年 | 47篇 |
2015年 | 33篇 |
2014年 | 51篇 |
2013年 | 76篇 |
2012年 | 54篇 |
2011年 | 63篇 |
2010年 | 37篇 |
2009年 | 51篇 |
2008年 | 40篇 |
2007年 | 36篇 |
2006年 | 29篇 |
2005年 | 20篇 |
2004年 | 19篇 |
2003年 | 20篇 |
2002年 | 20篇 |
2001年 | 6篇 |
2000年 | 6篇 |
1999年 | 3篇 |
1998年 | 7篇 |
1997年 | 6篇 |
1996年 | 6篇 |
1995年 | 6篇 |
1994年 | 4篇 |
1993年 | 4篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 5篇 |
1984年 | 7篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1981年 | 7篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1968年 | 1篇 |
排序方式: 共有975条查询结果,搜索用时 15 毫秒
31.
Anna Korzynska Wojciech Strojny Andreas Hoppe David Wertheim Pawel Hoser 《Pattern Analysis & Applications》2007,10(4):301-319
This paper describes a segmentation method combining a texture based technique with a contour based method. The technique
is designed to enable the study of cell behaviour over time by segmenting brightfield microscope image sequences. The technique
was tested on artificial images, based on images of living cells and on real sequences acquired from microscope observations
of neutrophils and lymphocytes as well as on a sequence of MRI images. The results of the segmentation are compared with the
results of the watershed and snake segmentation methods. The results show that the method is both effective and practical.
相似文献
Anna KorzynskaEmail: |
32.
We use automata-theoretic approach to analyze properties of Fibonacci words. The directed acyclic subword graph (dawg) is a useful deterministic automaton accepting all suffixes of the word. We show that dawg's of Fibonacci words have particularly simple structure. Our main result is a unifying framework for a large collection of relatively simple properties of Fibonacci words. The simple structure of dawgs of Fibonacci words gives in many cases simplified alternative proofs and new interpretation of several well-known properties of Fibonacci words. In particular, the structure of lengths of paths corresponds to a number-theoretic characterization of occurrences of any subword. Using the structural properties of dawg's it can be easily shown that for a string w we can check if w is a subword of a Fibonacci word in time O(|w|) and O(1) space. Compact dawg's of Fibonacci words show a very regular structure of their suffix trees and show how the suffix tree for the Fibonacci word grows (extending the leaves in a very simple way) into the suffix tree for the next Fibonacci word. 相似文献
33.
In order to investigate the identity of water-containing haematite, a method of preparation has been elaborated which leads to samples of hydrohaematite which are structurally pure and free of amorphous iron hydroxide. Differential thermal analysis by a lack of endothermic effect at 423 to 473 K on the DTA-curves and by a steady fall of the TG curves up to 1150 K revealed that water in the preparations must be tightly held in the lattice of haematite. Measurements of intensities of X-ray reflections of the (1 0 4) and (0 2 4) planes in relation to the (1 1 3) plane confirmed Fe3+-deficiency in the haematite cationic sublattice brought about by the presence of OH– ions in the anionic sublattice. The infrared spectrum of hydrohaematite, in addition to six bands from Fe-O variations, exhibits three bands from hydroxyl groups. The effect of silicates on the pattern of the infrared spectra of natural and synthetic hydrohaematites and the discrepancies in the infrared spectra of haematites published to date are discussed. 相似文献
34.
Jan Novák Derek Nowrouzezahrai Carsten Dachsbacher Wojciech Jarosz 《Computer Graphics Forum》2012,31(4):1407-1413
A recent technique that forms virtual ray lights (VRLs) from path segments in media, reduces the artifacts common to VPL approaches in participating media, however, distracting singularities still remain. We present Virtual Beam Lights (VBLs), a progressive many‐lights algorithm for rendering complex indirect transport paths in, from, and to media. VBLs are efficient and can handle heterogeneous media, anisotropic scattering, and moderately glossy surfaces, while provably converging to ground truth. We inflate ray lights into beam lights with finite thicknesses to eliminate the remaining singularities. Furthermore, we devise several practical schemes for importance sampling the various transport contributions between camera rays, light rays, and surface points. VBLs produce artifact‐free images faster than VRLs, especially when glossy surfaces and/or anisotropic phase functions are present. Lastly, we employ a progressive thickness reduction scheme for VBLs in order to render results that converge to ground truth. 相似文献
35.
Raouf Boutaba Wojciech Golab Youssef Iraqi Tianshu Li Bill St. Arnaud 《Journal of Grid Computing》2003,1(4):387-394
Grid applications call for high performance networking support. One attractive solution is to deploy Grids over optical networks. However, resource management in optical domains is traditionally very rigid and cannot successfully meet the requirements of Grid applications, such as flexible provisioning and configuration. In this paper, we present a customizable resource management solution for optical networks where users can create lightpaths on demand and manage their own network resources. Thanks to a Grid-centric system architecture, lightpath resources can be shared among users and easily integrated with data and computation Grids. 相似文献
36.
Wojciech Grohman 《Data mining and knowledge discovery》2004,9(3):275-295
In this paper a new, abstract method for analysis and visualization of multidimensional data sets in pattern recognition problems
is introduced. It can be used to determine the properties of an unknown, complex data set and to assist in finding the most
appropriate recognition algorithm. Additionally, it can be employed to design layers of a feedforward artificial neural network
or to visualize the higher-dimensional problems in 2-D and 3-D without losing relevant data set information. The method is
derived from the convex set theory and works by considering convex subsets within the data and analyzing their respective
positions in the original dimension. Its ability to describe certain set features that cannot be explicitly projected into
lower dimensions sets it apart from many other visualization techniques. Two classical multidimensional problems are analyzed
and the results show the usefulness of the presented method and underline its strengths and weaknesses. 相似文献
37.
38.
Patrick G. Clark Jerzy W. Grzymala-Busse Wojciech Rzasa 《Journal of Intelligent Information Systems》2016,47(3):515-529
A probabilistic approximation is a generalization of the standard idea of lower and upper approximations, defined for equivalence relations. Recently probabilistic approximations were additionally generalized to an arbitrary binary relation so that probabilistic approximations may be applied for incomplete data. We discuss two ways to induce rules from incomplete data using probabilistic approximations, by applying true MLEM2 algorithm and an emulated MLEM2 algorithm. In this paper we report novel research on a comparison of both approaches: new results of experiments on incomplete data with three interpretations of missing attribute values. Our results show that both approaches do not differ much. 相似文献
39.
Piotr Szwed Pawel Skrzynski Wojciech Chmiel 《Multimedia Tools and Applications》2016,75(17):10667-10690
For various IT systems security is considered a key quality factor. In particular, it might be crucial for video surveillance systems, as their goal is to provide continuous protection of critical infrastructure and other facilities. Risk assessment is an important activity in security management; it aims at identifying assets, threats and vulnerabilities, analysis of implemented countermeasures and their effectiveness in mitigating risks. This paper discusses an application of a new risk assessment method, in which risk calculation is based on Fuzzy Cognitive Maps (FCMs) to a complex automated video surveillance system. FCMs are used to capture dependencies between assets and FCM based reasoning is applied to aggregate risks assigned to lower-level assets (e.g. cameras, hardware, software modules, communications, people) to such high level assets as services, maintained data and processes. Lessons learned indicate, that the proposed method is an efficient and low-cost approach, giving instantaneous feedback and enabling reasoning on effectiveness of security system. 相似文献
40.