全文获取类型
收费全文 | 3043篇 |
免费 | 246篇 |
国内免费 | 31篇 |
专业分类
电工技术 | 56篇 |
综合类 | 15篇 |
化学工业 | 744篇 |
金属工艺 | 71篇 |
机械仪表 | 113篇 |
建筑科学 | 150篇 |
矿业工程 | 9篇 |
能源动力 | 218篇 |
轻工业 | 209篇 |
水利工程 | 51篇 |
石油天然气 | 35篇 |
无线电 | 277篇 |
一般工业技术 | 510篇 |
冶金工业 | 183篇 |
原子能技术 | 33篇 |
自动化技术 | 646篇 |
出版年
2024年 | 10篇 |
2023年 | 59篇 |
2022年 | 106篇 |
2021年 | 191篇 |
2020年 | 164篇 |
2019年 | 203篇 |
2018年 | 203篇 |
2017年 | 196篇 |
2016年 | 187篇 |
2015年 | 122篇 |
2014年 | 205篇 |
2013年 | 319篇 |
2012年 | 227篇 |
2011年 | 258篇 |
2010年 | 161篇 |
2009年 | 161篇 |
2008年 | 93篇 |
2007年 | 57篇 |
2006年 | 61篇 |
2005年 | 45篇 |
2004年 | 31篇 |
2003年 | 30篇 |
2002年 | 28篇 |
2001年 | 20篇 |
2000年 | 15篇 |
1999年 | 15篇 |
1998年 | 26篇 |
1997年 | 14篇 |
1996年 | 13篇 |
1995年 | 12篇 |
1994年 | 6篇 |
1993年 | 10篇 |
1991年 | 6篇 |
1990年 | 8篇 |
1989年 | 2篇 |
1987年 | 5篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 6篇 |
1983年 | 5篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1975年 | 6篇 |
1970年 | 1篇 |
1969年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有3320条查询结果,搜索用时 37 毫秒
981.
A generic grouping algorithm and its quantitative analysis 总被引:1,自引:0,他引:1
Amir A. Lindenbaum M. 《IEEE transactions on pattern analysis and machine intelligence》1998,20(2):168-185
This paper presents a generic method for perceptual grouping and an analysis of its expected grouping quality. The grouping method is fairly general: It may be used for the grouping of various types of data features, and to incorporate different grouping cues operating over feature sets of different sizes. The proposed method is divided into two parts: constructing a graph representation of the available perceptual grouping evidence, and then finding the “best” partition of the graph into groups. The first stage includes a cue enhancement procedure, which integrates the information available from multifeature cues into very reliable bifeature cues. Both stages are implemented using known statistical tools such as Wald's SPRT algorithm (1952) and the maximum likelihood criterion. The accompanying theoretical analysis of this grouping criterion quantifies intuitive expectations and predicts that the expected grouping quality increases with cue reliability. It also shows that investing more computational effort in the grouping algorithm leads to better grouping results. This analysis, which quantifies the grouping power of the maximum likelihood criterion, is independent of the grouping domain. To our best knowledge, such an analysis of a grouping process is given here for the first time. Three grouping algorithms, in three different domains, are synthesized as instances of the generic method. They demonstrate the applicability and generality of this grouping method 相似文献
982.
Amir Azaron Cahit Perkgoz Hideki Katagiri Kosuke Kato Masatoshi Sakawa 《Computers & Operations Research》2009
A genetic algorithm approach is used to solve a multi-objective discrete reliability optimization problem in a k dissimilar-unit non-repairable cold-standby redundant system. Each unit is composed of a number of independent components with generalized Erlang distributions arranged in a series–parallel configuration. There are multiple component choices with different distribution parameters available for being replaced with each component of the system. The objective of the reliability optimization problem is to select the best components, from the set of available components, to be placed in the standby system in order to minimize the initial purchase cost of the system, maximize the system MTTF (mean time to failure), minimize the system VTTF (variance of time to failure) and also maximize the system reliability at the mission time. Finally, we apply a genetic algorithm with double strings using continuous relaxation based on reference solution updating (GADSCRRSU) to solve this multi-objective problem, using goal attainment formulation. The results are also compared against the results of a discrete-time approximation technique to show the efficiency of the proposed GA approach. 相似文献
983.
Amir Herzberg 《Computers & Security》2009,28(1-2):63-71
In their seminal article “Why Johnny Can't Encrypt” [Whitten A, Tygar JD. Why Johnny can't encrypt: a usability case study of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; August 1999.], Whitten and Tygar showed that usability weaknesses of encryption software may result in failure to protect users, in spite of good cryptography. A similar situation happens, on a huge scale, on the Web: the widely deployed SSL/TLS protocols provide good cryptography, yet there is a growing amount of successful attacks on web users, causing massive damages. In this article, we focus on password theft via fake websites, to which we refer as phishing. We believe that phishing is currently the most severe threat facing web users.We begin with a brief review of SSL/TLS. Many sensitive sites do not use SSL/TLS, or use it incorrectly (e.g. to encrypt password, filled into an unprotected login form); we explain why.Even if sites use SSL/TLS (correctly), this may not be enough to prevent phishing – at least, using the basic security and identification indicators of most browsers (URL, padlock and HTTPS). We discuss basic and advanced indicators, and their usability problems. We review recent usability studies, whose results are rather alarming, and put in question the ability of users to avoid phishing sites based on security and identification indicators. 相似文献
985.
Kinsinger CR Apffel J Baker M Bian X Borchers CH Bradshaw R Brusniak MY Chan DW Deutsch EW Domon B Gorman J Grimm R Hancock W Hermjakob H Horn D Hunter C Kolar P Kraus HJ Langen H Linding R Moritz RL Omenn GS Orlando R Pandey A Ping P Rahbar A Rivers R Seymour SL Simpson RJ Slotta D Smith RD Stein SE Tabb DL Tagle D Yates JR Rodriguez H 《Proteomics. Clinical applications》2011,5(11-12):580-589
Policies supporting the rapid and open sharing of proteomic data are being implemented by the leading journals in the field. The proteomics community is taking steps to ensure that data are made publicly accessible and are of high quality, a challenging task that requires the development and deployment of methods for measuring and documenting data quality metrics. On September 18, 2010, the U.S. National Cancer Institute (NCI) convened the "International Workshop on Proteomic Data Quality Metrics" in Sydney, Australia, to identify and address issues facing the development and use of such methods for open access proteomics data. The stakeholders at the workshop enumerated the key principles underlying a framework for data quality assessment in mass spectrometry data that will meet the needs of the research community, journals, funding agencies, and data repositories. Attendees discussed and agreed up on two primary needs for the wide use of quality metrics: (i) an evolving list of comprehensive quality metrics and (ii) standards accompanied by software analytics. Attendees stressed the importance of increased education and training programs to promote reliable protocols in proteomics. This workshop report explores the historic precedents, key discussions, and necessary next steps to enhance the quality of open access data. By agreement, this article is published simultaneously in Proteomics, Proteomics Clinical Applications, Journal of Proteome Research, and Molecular and Cellular Proteomics, as a public service to the research community. The peer review process was a coordinated effort conducted by a panel of referees selected by the journals. 相似文献
986.
Every Boolean function on n variables can be expressed as a unique multivariate polynomial modulo p for every prime p. In this work, we study how the degree of a function in one characteristic affects its complexity in other characteristics.
We establish the following general principle: functions with low degree modulo p must have high complexity in every other characteristic q. More precisely, we show the following results about Boolean functions f : {0, 1}n → {0, 1} which depend on all n variables, and distinct primes p, q:
o If f has degree o(log n) modulo p, then it must have degree Ω(n1−o(1)) modulo q. Thus a Boolean function has degree o(log n) in at most one characteristic. This result is essentially tight as there exist functions that have degree log n in every characteristic. 相似文献
987.
Seyed Javad Mirabedini Mohammad Teshnehlab Mohammad Hassan Shenasa Amir Masoud Rahmani 《控制论与系统》2013,44(7):686-704
Swarm intelligence, as demonstrated by a natural biological swarm, such as an ant colony, has many powerful properties that are desirable for effective routing in communications networks. In this paper, we propose an intelligent routing algorithm that we are calling Fuzzy Logic Ant-based Routing (FLAR), which is inspired by ant colonies and enhanced by fuzzy logic techniques. Using a fuzzy system as an intelligent and expert mechanism allows multiple constraints to be considered in a simple and intuitive way. Simulation results and a comparison of the proposed method with two state-of-the-art routing algorithms show better performance and a higher fault tolerance for our approach, particularly in regard to link failures. 相似文献
988.
Sara Bilal Rini Akmeliawati Amir A. Shafie Momoh Jimoh E. Salami 《Artificial Intelligence Review》2013,40(4):495-516
Human hand recognition plays an important role in a wide range of applications ranging from sign language translators, gesture recognition, augmented reality, surveillance and medical image processing to various Human Computer Interaction (HCI) domains. Human hand is a complex articulated object consisting of many connected parts and joints. Therefore, for applications that involve HCI one can find many challenges to establish a system with high detection and recognition accuracy for hand posture and/or gesture. Hand posture is defined as a static hand configuration without any movement involved. Meanwhile, hand gesture is a sequence of hand postures connected by continuous motions. During the past decades, many approaches have been presented for hand posture and/or gesture recognition. In this paper, we provide a survey on approaches which are based on Hidden Markov Models (HMM) for hand posture and gesture recognition for HCI applications. 相似文献
989.
990.
Amir Rezaei Alireza Akbarzadeh Payam Mahmoodi Nia Mohammad-R. Akbarzadeh-T 《Robotics and Computer》2013
This paper investigates the problems of kinematics, Jacobian, singularity and workspace analysis of a spatial type of 3-PSP parallel manipulator. First, structure and motion variables of the robot are addressed. Two operational modes, non-pure translational and coupled mixed-type are considered. Two inverse kinematics solutions, an analytical and a numerical, for the two operational modes are presented. The direct kinematics of the robot is also solved utilizing a new geometrical approach. It is shown, unlike most parallel robots, the direct kinematics problem of this robot has a unique solution. Next, analytical expressions for the velocity and acceleration relations are derived in invariant form. Auxiliary vectors are introduced to eliminate passive velocity and acceleration vectors. The three types of conventional singularities are analyzed. The notion of non-pure rotational and non-pure translational Jacobian matrices is introduced. The non-pure rotational and non-pure translational Jacobian matrices are combined to form the Jacobian of constraint matrix which is then used to obtain the constraint singularity. Finally, two methods, a discretization method and one based on direct kinematics are presented and robot non-pure translation and coupled mixed-type reachable workspaces are obtained. The influence of tool length on workspace is also studied. 相似文献
|