首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4192篇
  免费   154篇
  国内免费   5篇
电工技术   35篇
综合类   11篇
化学工业   620篇
金属工艺   27篇
机械仪表   91篇
建筑科学   222篇
矿业工程   3篇
能源动力   110篇
轻工业   361篇
水利工程   22篇
石油天然气   10篇
无线电   479篇
一般工业技术   787篇
冶金工业   885篇
原子能技术   21篇
自动化技术   667篇
  2024年   4篇
  2023年   46篇
  2022年   74篇
  2021年   90篇
  2020年   72篇
  2019年   69篇
  2018年   90篇
  2017年   77篇
  2016年   115篇
  2015年   85篇
  2014年   112篇
  2013年   230篇
  2012年   186篇
  2011年   239篇
  2010年   184篇
  2009年   204篇
  2008年   237篇
  2007年   209篇
  2006年   207篇
  2005年   165篇
  2004年   155篇
  2003年   154篇
  2002年   125篇
  2001年   107篇
  2000年   112篇
  1999年   81篇
  1998年   169篇
  1997年   120篇
  1996年   104篇
  1995年   72篇
  1994年   59篇
  1993年   45篇
  1992年   34篇
  1991年   26篇
  1990年   40篇
  1989年   28篇
  1988年   30篇
  1987年   23篇
  1986年   23篇
  1985年   24篇
  1984年   15篇
  1983年   9篇
  1982年   8篇
  1981年   15篇
  1980年   9篇
  1979年   4篇
  1978年   13篇
  1977年   6篇
  1976年   15篇
  1975年   8篇
排序方式: 共有4351条查询结果,搜索用时 15 毫秒
11.
12.
Attempts have been made to extend SQL to work with multimedia databases. We are reserved on the representation ability of extended SQL to cope with the richness in content of multimedia data. In this paper we present an example of a multimedia database system, Computer Aided Facial Image Inference and Retrieval system (CAFIIR). The system stores and manages facial images and criminal records, providing necessary functions for crime identification. We would like to demonstrate some core techniques for multimedia database with CAFIIR system. Firstly, CAFIIR is a integrated system. Besides database management, there are image analysis, image composition, image aging, and report generation subsystems, providing means for problem solving. Secondly, the richness of multimedia data urges feature-based database for their management. CAFIIR is feature-based. A indexing mechanism,iconic index, has been proposed for indexing facial images using hierarchical self-organization neural network. The indexing method operates on complex feature measures and provides means for visual navigation. Thirdly, special retrieval methods for facial images have been developed, including visual browsing, similarity retrieval, free text retrieval and fuzzy retrieval.  相似文献   
13.
The texture effect on visual colour difference evaluation was investigated in this study. Five colour centers were selected and textured colour pairs were generated using scanned textile woven fabrics and colour‐mapping technique. The textured and solid colour pairs were then displayed on a characterized cathode ray tube (CRT) monitor for colour difference evaluation. The colour difference values for the pairs with texture patterns are equal to 5.0 CIELAB units in lightness direction. The texture level was represented by the half‐width of histogram, which is called texture strength in this study. High correlation was found between texture strength and visual colour difference for textured colour pairs, which indicates that an increasing of 10 units of texture strength in luminance would cause a decreasing of 0.25 units visual difference for the five colour centers. The ratio of visual difference between textured and solid colour pairs also indicates a high parametric effect of texture. © 2005 Wiley Periodicals, Inc. Col Res Appl, 30, 341–347, 2005; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/col.  相似文献   
14.
The application of reflex optoelectronic switching matrices (ROSM) to signal processing in the gigahertz region is analyzed. Various signal processing functions such as delay generation, loop filtering, word generation/detection, integration, and digital to analog conversion are identified and their respective realizations in a ROSM are presented. It is found that for dedicated signal processing functions, simpler submatrices instead of full matrices can be employed with significant reduction in complexity and cost. The performance of ROSM's using currently commercially available components confirms the feasibility of gigahertz signal processing with ROSM's.  相似文献   
15.
In 2 studies, the relation between measures of self-assessed health (SAH) and automatic processing of health-relevant information was investigated. In Study 1, 84 male and 86 female undergraduate students completed a modified Stroop task. Results indicated that participants with poorer SAH showed enhanced interference effects for illness versus non-illness words. In Study 2, 27 male and 30 female undergraduate students completed a self-referent encoding task. Results offered a conceptual replication and extension of Study 1 by confirming the specificity of the relation between SAH measures and automatic processing of health (vs negative or positive general trait) information. These studies provide evidence that individual differences in SAH are reflected in schematic processing of health-relevant information. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
16.
17.
Our previous receiver operating characteristic (ROC) study indicated that the detection accuracy of microcalcifications by radiologists is significantly reduced if mammograms are digitized at 0.1 mm x 0.1 mm. Our recent study also showed that detection accuracy by computer decreases as the pixel size increases from 0.035 mm x 0.035 mm. It is evident that very large matrix sizes have to be used for digitizing mammograms in order to preserve the information in the image. Efficient compression techniques will be needed to facilitate communication and archiving of digital mammograms. In this study, we evaluated two compression techniques: full frame discrete cosine transform (DCT) with entropy coding and Laplacian pyramid hierarchical coding (LPHC). The dependence of their efficiency on the compression parameters was investigated. The techniques were compared in terms of the trade-off between the bit rate and the detection accuracy of subtle microcalcifications by an automated detection algorithm. The mean-square errors in the reconstructed images were determined and the visual quality of the error images was examined. It was found that with the LPHC method, the highest compression ratio achieved without a significant degradation in the detectability was 3.6:1. The full frame DCT method with entropy coding provided a higher compression efficiency of 9.6:1 at comparable detection accuracy. The mean-square errors did not correlate with the detection accuracy of the microcalcifications. This study demonstrated the importance of determining the quality of the decompressed images by the specific requirements of the task for which the decompressed images are to be used. Further investigation is needed for selection of optimal compression technique for digital mammograms.  相似文献   
18.
The development of verbal and spatial working memory was investigated with an interference paradigm. Memory spans were obtained from 3 groups (8-, 10-, and 19-yr olds) under 6 different conditions: Two primary memory tasks (1 verbal, 1 spatial) were administered in isolation and in conjunction with 2 versions of a secondary task. The primary tasks required recalling a series of visually presented digits and recalling the locations of Xs in a series of visually presented grids. The secondary tasks required reporting the color of the stimuli as they were presented using either a verbal or a spatial response. Analyses revealed that all age groups showed domain-specific interference (i.e., interference by a secondary task from the same domain as the primary task), but only the 8-yr-olds also showed nonspecific interference (i.e., interference by a secondary task from a domain different than the primary memory task), suggesting that at least some executive functions do not reach adult levels of efficiency until approximately age 10. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
19.
This paper presents a new model to study the reliability of communication networks in which link failures are statistically dependent. The approach tries to identify and model explicitly the events that cause communication link failures. No conditional probabilities are needed, and so two major difficulties inherent to them, namely, an exponential number of conditional probabilities to deal with and a consistency requirement to satisfy, are avoided. For reliability computations, some existing algorithms for finding network reliability can be used with minor modifications and no significant increase in computational complexity.  相似文献   
20.
We present the design and specification of a protocol for scalable and reliable group rekeying together with performance evaluation results. The protocol is based upon the use of key trees for secure groups and periodic batch rekeying. At the beginning of each rekey interval, the key server sends a rekey message to all users consisting of encrypted new keys (encryptions, in short) carried in a sequence of packets. We present a scheme for identifying keys, encryptions, and users, and a key assignment algorithm that ensures that the encryptions needed by a user are in the same packet. Our protocol provides reliable delivery of new keys to all users eventually. It also attempts to deliver new keys to all users with a high probability by the end of the rekey interval. For each rekey message, the protocol runs in two steps: a multicast step followed by a unicast step. Proactive forward error correction (FEC) multicast is used to reduce delivery latency. Our experiments show that a small FEC block size can be used to reduce encoding time at the server without increasing server bandwidth overhead. Early transition to unicast, after at most two multicast rounds, further reduces the worst-case delivery latency as well as user bandwidth requirement. The key server adaptively adjusts the proactivity factor based upon past feedback information; our experiments show that the number of NACKs after a multicast round can be effectively controlled around a target number. Throughout the protocol design, we strive to minimize processing and bandwidth requirements for both the key server and users.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号