全文获取类型
收费全文 | 60133篇 |
免费 | 2281篇 |
国内免费 | 235篇 |
专业分类
电工技术 | 819篇 |
综合类 | 664篇 |
化学工业 | 8316篇 |
金属工艺 | 1074篇 |
机械仪表 | 1647篇 |
建筑科学 | 1216篇 |
矿业工程 | 400篇 |
能源动力 | 1155篇 |
轻工业 | 3454篇 |
水利工程 | 681篇 |
石油天然气 | 74篇 |
武器工业 | 4篇 |
无线电 | 5140篇 |
一般工业技术 | 6839篇 |
冶金工业 | 22915篇 |
原子能技术 | 410篇 |
自动化技术 | 7841篇 |
出版年
2024年 | 71篇 |
2023年 | 358篇 |
2022年 | 352篇 |
2021年 | 478篇 |
2020年 | 319篇 |
2019年 | 445篇 |
2018年 | 960篇 |
2017年 | 1099篇 |
2016年 | 1654篇 |
2015年 | 1296篇 |
2014年 | 1183篇 |
2013年 | 1654篇 |
2012年 | 3129篇 |
2011年 | 3616篇 |
2010年 | 1584篇 |
2009年 | 1750篇 |
2008年 | 1524篇 |
2007年 | 1399篇 |
2006年 | 1303篇 |
2005年 | 3937篇 |
2004年 | 3093篇 |
2003年 | 2527篇 |
2002年 | 1379篇 |
2001年 | 1158篇 |
2000年 | 663篇 |
1999年 | 997篇 |
1998年 | 6831篇 |
1997年 | 4259篇 |
1996年 | 2843篇 |
1995年 | 1718篇 |
1994年 | 1293篇 |
1993年 | 1292篇 |
1992年 | 364篇 |
1991年 | 436篇 |
1990年 | 418篇 |
1989年 | 386篇 |
1988年 | 365篇 |
1987年 | 308篇 |
1986年 | 284篇 |
1985年 | 230篇 |
1984年 | 123篇 |
1983年 | 128篇 |
1982年 | 150篇 |
1981年 | 218篇 |
1980年 | 225篇 |
1979年 | 79篇 |
1978年 | 126篇 |
1977年 | 642篇 |
1976年 | 1365篇 |
1975年 | 115篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
961.
Jesús?MarínEmail author 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(4):683-698
Ruggedness has a strong influence on the performance of algorithms, but it has been barely studied in real-coded optimization,
mainly because of the difficulty of isolating it from a number of involved topological properties. In this paper, we propose
a framework consisting of increasing ruggedness function sets built by a mechanism which generates multiple funnels. This
mechanism introduces different levels of sinusoidal distortion which can be controlled to isolate the singular influence of
some related features. Some commonly used measures of ruggedness have been applied to analyze these sets of functions, and
a numerical study to compare the performance of some representative algorithms has been carried out. The results confirm that
ruggedness has an influence on the performance of the algorithm, proving that it depends on the multi-funnel structure and
peak features, such as height and relative size of the global peak, and not on the number of peaks. 相似文献
962.
C?t?lin Bu?neag Dana Piciu 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(10):1639-1655
The spectrum of a residuated lattice L is the set Spec(L) of all prime i-filters. It is well known that Spec(L) can be endowed with the spectral topology. The main scope of this paper is to introduce and study another topology on Spec(L),?the so called stable topology, which turns out to be coarser than the spectral one. With this and in view, we introduce the notions of pure i-filter for a residuated lattice and the notion of normal residuated lattice. So, we generalize to case of residuated lattice some results relative to MV-algebras (Belluce and Sessa in Quaest Math 23:269–277, 2000; Cavaccini et?al. in Math Japonica 45(2):303–310, 1997) or BL-algebras (Eslami and Haghani in Kybernetika 45:491–506, 2009; Leustean in Central Eur J Math 1(3): 382–397, 2003; Turunen and Sessa in Mult-Valued Log 6(1–2):229–249, 2001). 相似文献
963.
964.
Nazih Ouwayed Abdel Bela?d 《International Journal on Document Analysis and Recognition》2012,15(4):297-314
The multi-orientation occurs frequently in ancient handwritten documents, where the writers try to update a document by adding some annotations in the margins. Due to the margin narrowness, this gives rise to lines in different directions and orientations. Document recognition needs to find the lines everywhere they are written whatever their orientation. This is why we propose in this paper a new approach allowing us to extract the multi-oriented lines in scanned documents. Because of the multi-orientation of lines and their dispersion in the page, we use an image meshing allowing us to progressively and locally determine the lines. Once the meshing is established, the orientation is determined using the Wigner–Ville distribution on the projection histogram profile. This local orientation is then enlarged to limit the orientation in the neighborhood. Afterward, the text lines are extracted locally in each zone basing on the follow-up of the orientation lines and the proximity of connected components. Finally, the connected components that overlap and touch in adjacent lines are separated. The morphology analysis of the terminal letters of Arabic words is here considered. The proposed approach has been experimented on 100 documents reaching an accuracy of about 98.6%. 相似文献
965.
In this paper, a new approximation to off-line signature verification is proposed based on two-class classifiers using an
expert decisions ensemble. Different methods to extract sets of local and a global features from the target sample are detailed.
Also a normalization by confidence voting method is used in order to decrease the final equal error rate (EER). Each set of
features is processed by a single expert, and on the other approach proposed, the decisions of the individual classifiers
are combined using weighted votes. Experimental results are given using a subcorpus of the large MCYT signature database for
random and skilled forgeries. The results show that the weighted combination outperforms the individual classifiers significantly.
The best EER obtained were 6.3 % in the case of skilled forgeries and 2.31 % in the case of random forgeries. 相似文献
966.
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of data having generally some recurrent events. Patterns have received a considerable attention in recent years and were widely studied in the data mining field. Various pattern mining approaches have been proposed and used for different applications such as network monitoring, moving object tracking, financial or medical data analysis, scientific data processing, etc. In these different contexts, discovered patterns were useful to detect anomalies, to predict data behavior (or trend) or, more generally, to simplify data processing or to improve system performance. However, to the best of our knowledge, patterns have never been used in the context of Web archiving. Web archiving is the process of continuously collecting and preserving portions of the World Wide Web for future generations. In this paper, we show how patterns of page changes can be useful tools to efficiently archive Websites. We first define our pattern model that describes the importance of page changes. Then, we present the strategy used to (i) extract the temporal evolution of page changes, (ii) discover patterns, to (iii) exploit them to improve Web archives. The archive of French public TV channels France Télévisions is chosen as a case study to validate our approach. Our experimental evaluation based on real Web pages shows the utility of patterns to improve archive quality and to optimize indexing or storing. 相似文献
967.
Face recognition with lattice independent component analysis and extreme learning machines 总被引:1,自引:0,他引:1
Ion Marques Manuel Gra?a 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(9):1525-1537
We focus on two aspects of the face recognition, feature extraction and classification. We propose a two component system, introducing Lattice Independent Component Analysis (LICA) for feature extraction and Extreme Learning Machines (ELM) for classification. In previous works we have proposed LICA for a variety of image processing tasks. The first step of LICA is to identify strong lattice independent components from the data. In the second step, the set of strong lattice independent vector are used for linear unmixing of the data, obtaining a vector of abundance coefficients. The resulting abundance values are used as features for classification, specifically for face recognition. Extreme Learning Machines are accurate and fast-learning innovative classification methods based on the random generation of the input-to-hidden-units weights followed by the resolution of the linear equations to obtain the hidden-to-output weights. The LICA-ELM system has been tested against state-of-the-art feature extraction methods and classifiers, outperforming them when performing cross-validation on four large unbalanced face databases. 相似文献
968.
Tomá? Kroupa 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(11):1851-1861
We generalise belief functions to many-valued events which are represented by elements of Lindenbaum algebra of infinite-valued ?ukasiewicz propositional logic. Our approach is based on mass assignments used in the Dempster–Shafer theory of evidence. A generalised belief function is totally monotone and it has Choquet integral representation with respect to a unique belief measure on Boolean events. 相似文献
969.
A population protocol is one of distributed computing models for passively-mobile systems, where a number of agents change
their states by pairwise interactions between two agents. In this paper, we investigate the solvability of the self-stabilizing
leader election in population protocols without any kind of oracles. We identify the necessary and sufficient conditions to
solve the self-stabilizing leader election in population protocols from the aspects of local memory complexity and fairness
assumptions. This paper shows that under the assumption of global fairness, no protocol using only n−1 states can solve the self-stabilizing leader election in complete interaction graphs, where n is the number of agents in the system. To prove this impossibility, we introduce a novel proof technique, called closed-set
argument. In addition, we propose a self-stabilizing leader election protocol using n states that works even under the unfairness assumption. This protocol requires the exact knowledge about the number of agents
in the system. We also show that such knowledge is necessary to construct any self-stabilizing leader election protocol. 相似文献
970.
J?rg Brunsmann Wolfgang Wilkes Gunter Schlageter Matthias Hemmje 《International Journal on Digital Libraries》2012,12(1):27-39
Providing access to digital information for the indefinite future is the intention of long-term digital preservation systems. One application domain that certainly needs to implement such long-term digital preservation processes is the design and engineering industry. In this industry, products are designed, manufactured, and operated with the help of sophisticated software tools provided by product lifecycle management (PLM) systems. During all PLM phases, including geographically distributed cross-domain and cross-company collaboration, a huge amount of heterogeneous digital product data and metadata is created. Legal and economic requirements demand that this product data has to be archived and preserved for a long-time period. Unfortunately, the software that is able to interpret the data will become obsolete earlier than the data since the software and hardware lifecycle is relatively short-lived compared to a product lifecycle. Companies in the engineering industry begin to realize that their data is in danger of becoming unusable while the products are in operation for several decades. To address this issue, different academic and industrial initiatives have been initiated that try to solve this problem. This article provides an overview of these projects including their motivations, identified problems, and proposed solutions. The studied projects are also verified against a classification of important aspects regarding scope and functionality of digital preservation in the engineering industry. Finally, future research topics are identified. 相似文献