首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1582篇
  免费   49篇
  国内免费   3篇
电工技术   48篇
综合类   6篇
化学工业   410篇
金属工艺   23篇
机械仪表   28篇
建筑科学   203篇
矿业工程   5篇
能源动力   21篇
轻工业   201篇
水利工程   11篇
石油天然气   2篇
无线电   92篇
一般工业技术   236篇
冶金工业   109篇
原子能技术   16篇
自动化技术   223篇
  2023年   11篇
  2022年   24篇
  2021年   42篇
  2020年   18篇
  2019年   25篇
  2018年   19篇
  2017年   17篇
  2016年   52篇
  2015年   50篇
  2014年   55篇
  2013年   95篇
  2012年   69篇
  2011年   96篇
  2010年   43篇
  2009年   69篇
  2008年   78篇
  2007年   69篇
  2006年   54篇
  2005年   61篇
  2004年   56篇
  2003年   31篇
  2002年   36篇
  2001年   19篇
  2000年   11篇
  1999年   26篇
  1998年   18篇
  1997年   11篇
  1996年   14篇
  1995年   17篇
  1994年   10篇
  1993年   16篇
  1992年   20篇
  1991年   16篇
  1990年   15篇
  1988年   10篇
  1987年   19篇
  1986年   16篇
  1985年   14篇
  1984年   23篇
  1983年   22篇
  1982年   15篇
  1981年   16篇
  1980年   22篇
  1979年   10篇
  1975年   21篇
  1973年   11篇
  1971年   10篇
  1970年   10篇
  1969年   11篇
  1937年   10篇
排序方式: 共有1634条查询结果,搜索用时 31 毫秒
31.
We propose an approach that achieves high-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding. In particular, we encode a key with the Chebyshev-map values corresponding to Lucas numbers and then use k-Chebyshev maps to achieve consecutive and flexible key expansion and apply the pre-shared classical information between Alice and Bob and fountain codes for privacy amplification to solve the security of the exchange of classical information via the classical channel. Consequently, our high-capacity protocol does not have the limitations imposed by orbital angular momentum and down-conversion bandwidths, and it meets the requirements for longer distances and lower error rates simultaneously.  相似文献   
32.
33.
Recognition of faces in arbitrary pose is addressed in this paper. For this task, an MRF-based classification approach is proposed which employs the energy of the established match between a pair of images as a criterion of goodness-of-match. By incorporating an image matching method as part of the recognition process, the system is made robust to moderate global spatial transformations. The approach draws on a method [1] which has the potential to cope with pose changes but a direct application of which suffers from several shortcomings. In order to overcome these problems, a number of enhancements are proposed. First, by adopting a multi-scale relaxation scheme based on super coupling transform, the inference using sequential tree re-weighted message passing approach [2] is accelerated. Next, by taking advantage of a statistical shape prior for the matching, the results are regularized and constrained, making the system robust to spurious structures and outliers. For classification, both textural and structural similarities of the facial images are taken into account. The method is evaluated on two databases and promising results are obtained.  相似文献   
34.
35.
This paper presents an incremental learning solution for Linear Discriminant Analysis (LDA) and its applications to object recognition problems. We apply the sufficient spanning set approximation in three steps i.e. update for the total scatter matrix, between-class scatter matrix and the projected data matrix, which leads an online solution which closely agrees with the batch solution in accuracy while significantly reducing the computational complexity. The algorithm yields an efficient solution to incremental LDA even when the number of classes as well as the set size is large. The incremental LDA method has been also shown useful for semi-supervised online learning. Label propagation is done by integrating the incremental LDA into an EM framework. The method has been demonstrated in the task of merging large datasets which were collected during MPEG standardization for face image retrieval, face authentication using the BANCA dataset, and object categorisation using the Caltech101 dataset.  相似文献   
36.
A procedure is presented to automatically assign a modified Pfafstetter code to a stream network and its associated watersheds. The first step is to build a topological network according to the object-oriented Arc Hydro framework definition in ArcGIS. These network relations are then mapped into a code that fully represents the stream hierarchy of a basin in a single attribute. Its use does not depend on ArcGIS object orientation and facilitates simple hierarchical aggregation and querying using only the attribute tables of shapefile versions of the stream network and watershed datasets. The code was implemented for the whole of Austria to support the flexible presentation and user-defined aggregation of water balance results in the digital version of the Hydrological Atlas of Austria.  相似文献   
37.
38.
39.
OBJECTIVE: An evaluation study was conducted to answer the question of which system properties of night vision enhancement systems (NVESs) provide a benefit for drivers without increasing their workload. BACKGROUND: Different infrared sensor, image processing, and display technologies can be integrated into an NVES to support nighttime driving. Because each of these components has its specific strengths and weaknesses, careful testing is required to determine their best combination. METHOD: Six prototypical systems were assessed in two steps. First, a heuristic evaluation with experts from ergonomics, perception, and traffic psychology was conducted. It produced a broad overview of possible effects of system properties on driving. Based on these results, an experimental field study with 15 experienced drivers was performed. Criteria used to evaluate the development potential of the six prototypes were the usability dimensions of effectiveness, efficiency, and user satisfaction (International Organization for Standardization, 1998). RESULTS: Results showed that the intelligibility of information, the easiness with which obstacles could be located in the environment, and the position of the display presenting the output of the system were of crucial importance for the usability of the NVES and its acceptance. Conclusion: All relevant requirements are met best by NVESs that are positioned at an unobtrusive location and are equipped with functions for the automatic identification of objects and for event-based warnings. APPLICATION: These design recommendations and the presented approach to evaluate the systems can be directly incorporated into the development process of future NVESs.  相似文献   
40.
In the constructive setting, membership predicates over recursive types are inhabited by terms indexing the elements that satisfy the criteria for membership. In this paper, we motivate and explore this idea in the concrete setting of lists and trees. We show that the inhabitants of membership predicates are precisely the inhabitants of a generic shape type. We show that membership of x (of type T) in structure S, (xTS) can not, in general, index all parts of a structure S and we generalize to a form ρS where ρ is a predicate over S. Under this scheme, (λx.True)S is the set of all indexes into S, but we show that not all subsets of indexes are expressible by strictly local predicates. Accordingly, we extend our membership predicates to predicates that retain state “from above” as well as allow “looking below”. Predicates of this form are complete in the sense that they can express every subset of indexes in S. These ideas are motivated by experience programming in Nuprl's constructive type theory and examining the constructive content of mechanically checked formal proofs involving membership predicates.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号