全文获取类型
收费全文 | 12556篇 |
免费 | 762篇 |
国内免费 | 111篇 |
专业分类
电工技术 | 195篇 |
综合类 | 47篇 |
化学工业 | 3048篇 |
金属工艺 | 198篇 |
机械仪表 | 478篇 |
建筑科学 | 377篇 |
矿业工程 | 14篇 |
能源动力 | 824篇 |
轻工业 | 1430篇 |
水利工程 | 143篇 |
石油天然气 | 147篇 |
武器工业 | 1篇 |
无线电 | 1345篇 |
一般工业技术 | 2358篇 |
冶金工业 | 418篇 |
原子能技术 | 134篇 |
自动化技术 | 2272篇 |
出版年
2024年 | 60篇 |
2023年 | 352篇 |
2022年 | 785篇 |
2021年 | 1144篇 |
2020年 | 751篇 |
2019年 | 849篇 |
2018年 | 891篇 |
2017年 | 747篇 |
2016年 | 747篇 |
2015年 | 473篇 |
2014年 | 613篇 |
2013年 | 1055篇 |
2012年 | 596篇 |
2011年 | 802篇 |
2010年 | 526篇 |
2009年 | 470篇 |
2008年 | 382篇 |
2007年 | 304篇 |
2006年 | 235篇 |
2005年 | 165篇 |
2004年 | 145篇 |
2003年 | 143篇 |
2002年 | 106篇 |
2001年 | 71篇 |
2000年 | 86篇 |
1999年 | 63篇 |
1998年 | 94篇 |
1997年 | 52篇 |
1996年 | 61篇 |
1995年 | 56篇 |
1994年 | 43篇 |
1993年 | 54篇 |
1992年 | 45篇 |
1991年 | 39篇 |
1990年 | 31篇 |
1989年 | 25篇 |
1988年 | 39篇 |
1987年 | 35篇 |
1986年 | 21篇 |
1985年 | 21篇 |
1984年 | 30篇 |
1983年 | 24篇 |
1982年 | 27篇 |
1981年 | 19篇 |
1980年 | 22篇 |
1979年 | 19篇 |
1978年 | 20篇 |
1977年 | 15篇 |
1976年 | 18篇 |
1975年 | 19篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Abdelaziz Lakhfif Mohamed Tayeb Laskri 《International Journal of Speech Technology》2016,19(2):203-228
This paper describes the design and implementation of a computational model for Arabic natural language semantics, a semantic parser for capturing the deep semantic representation of Arabic text. The parser represents a major part of an Interlingua-based machine translation system for translating Arabic text into Sign Language. The parser follows a frame-based analysis to capture the overall meaning of Arabic text into a formal representation suitable for NLP applications that need for deep semantics representation, such as language generation and machine translation. We will show the representational power of this theory for the semantic analysis of texts in Arabic, a language which differs substantially from English in several ways. We will also show that the integration of WordNet and FrameNet in a single unified knowledge resource can improve disambiguation accuracy. Furthermore, we will propose a rule based algorithm to generate an equivalent Arabic FrameNet, using a lexical resource alignment of FrameNet1.3 LUs and WordNet3.0 synsets for English Language. A pilot study of motion and location verbs was carried out in order to test our system. Our corpus is made up of more than 2000 Arabic sentences in the domain of motion events collected from Algerian first level educational Arabic books and other relevant Arabic corpora. 相似文献
62.
Salma Kammoun Jarraya Mohamed Hammami Hanêne Ben-Abdallah 《Multimedia Tools and Applications》2016,75(18):10949-10977
The efficient application of current methods of shadow detection in video is hindered by the difficulty in defining their parameters or models and/or their application domain dependence. This paper presents a new shadow detection and removal method that aims to overcome these inefficiencies. It proposes a semi-supervised learning rule using a new variant of co-training technique for shadow detection and removal in uncontrolled scenes. The new variant both reduces the run-time through a periodical execution of a co-training process according to a novel temporal framework, and generates a more generic prediction model for an accurate classification. The efficiency of the proposed method is shown experimentally on a testbed of videos that were recorded by a static camera and that included several constraints, e.g., dynamic changes in the natural scene and various visual shadow features. The conducted experimental study produced quantitative and qualitative results that highlighted the robustness of our shadow detection method and its accuracy in removing cast shadows. In addition, the practical usefulness of the proposed method was evaluated by integrating it in a Highway Control and Management System software called RoadGuard. 相似文献
63.
Use Case modeling is a popular technique for documenting functional requirements of software systems. Refactoring is the process of enhancing the structure of a software artifact without changing its intended behavior. Refactoring, which was first introduced for source code, has been extended for use case models. Antipatterns are low quality solutions to commonly occurring design problems. The presence of antipatterns in a use case model is likely to propagate defects to other software artifacts. Therefore, detection and refactoring of antipatterns in use case models is crucial for ensuring the overall quality of a software system. Model transformation can greatly ease several software development activities including model refactoring. In this paper, a model transformation approach is proposed for improving the quality of use case models. Model transformations which can detect antipattern instances in a given use case model, and refactor them appropriately are defined and implemented. The practicability of the approach is demonstrated by applying it on a case study that pertains to biodiversity database system. The results show that model transformations can efficiently improve quality of use case models by saving time and effort. 相似文献
64.
Richard O. Sinnott Christopher Bayliss Andrew Bromage Gerson Galang Yikai Gong Philip Greenwood Glenn Jayaputera Davis Marques Luca Morandini Ghazal Nogoorani Hossein Pursultani Muhammad Sarwar William Voorsluys Ivo Widjaja 《Journal of Grid Computing》2016,14(4):603-618
Big data technologies and a range of Government open data initiatives provide the basis for discovering new insights into cities; how they are planned, how they managed and the day-to-day challenges they face in health, transport and changing population profiles. The Australian Urban Research Infrastructure Network (AURIN – www.aurin.org.au) project is one example of such a big data initiative that is currently running across Australia. AURIN provides a single gateway providing online (live) programmatic access to over 2000 data sets from over 70 major and typically definitive data-driven organizations across federal and State government, across industry and across academia. However whilst open (public) data is useful to bring data-driven intelligence to cities, more often than not, it is the data that is not-publicly accessible that is essential to understand city challenges and needs. Such sensitive (unit-level) data has unique requirements on access and usage to meet the privacy and confidentiality demands of the associated organizations. In this paper we highlight a novel geo-privacy supporting solution implemented as part of the AURIN project that provides seamless and secure access to individual (unit-level) data from the Department of Health in Victoria. We illustrate this solution across a range of typical city challenges in localized contexts around Melbourne. We show how unit level data can be combined with other data in a privacy-protecting manner. Unlike other secure data access and usage solutions that have been developed/deployed, the AURIN solution allows any researcher to access and use the data in a manner that meets all of the associated privacy and confidentiality concerns, without obliging them to obtain ethical approval or any other hurdles that are normally put in place on access to and use of sensitive data. This provides a paradigm shift in secure access to sensitive data with geospatial content. 相似文献
65.
Mohamed?Lamine?KerdoudiEmail author Chouki?Tibermacine Salah?Sadou 《Service Oriented Computing and Applications》2016,10(4):437-463
Web applications are nowadays prevalent software systems in our everyday’s life. A lot of these applications have been developed for end users only. Thus, they are not designed by considering future extensions that would be developed by third parties. One possible and interesting solution for opening these applications for such kind of extension development is to create and deploy Web services starting from these applications. In this paper, we present a method and a tool for semiautomatically creating Web service implementations from applications having Web interfaces. The proposed method generates operations that are published in Web services for each functionality provided by a Web application. In addition, it generates new operations starting from Web interfaces. Our approach goes further in the creation of services by generating executable orchestrations, as BPEL processes, starting from navigations in the Web interfaces of these applications and by providing BPMN choreography specifications starting from the collaborations between the generated Web services. We implemented and experimented our solution in the migration of three real-world Web applications toward Web service-oriented systems. 相似文献
66.
Recommendations in location-based social networks: a survey 总被引:2,自引:0,他引:2
67.
Anas Hatim Said Belkouch Mohamed El Aakif Moha M’rabet Hassani Noureddine Chabini 《Multimedia Tools and Applications》2013,67(3):667-685
The Discrete Cosine Transform (DCT) is one of the most widely used techniques for image compression. Several algorithms are proposed to implement the DCT-2D. The scaled SDCT algorithm is an optimization of the DCT-1D, which consists in gathering all the multiplications at the end. In this paper, in addition to the hardware implementation on an FPGA, an extended optimization has been performed by merging the multiplications in the quantization block without having an impact on the image quality. A simplified quantization has been performed also to keep higher the performances of the all chain. Tests using MATLAB environment have shown that our proposed approach produces images with nearly the same quality of the ones obtained using the JPEG standard. FPGA-based implementations of this proposed approach is presented and compared to other state of the art techniques. The target is an an Altera Cyclone II FPGA using the Quartus synthesis tool. Results show that our approach outperforms the other ones in terms of processing-speed, used resources and power consumption. A comparison has been done between this architecture and a distributed arithmetic based architecture. 相似文献
68.
Masoom Alam Xinwen Zhang Mohammad Nauman Tamleek Ali Muhammad Ali Sajid Anwar Quratulain Alam 《Multimedia Tools and Applications》2013,66(2):283-302
Service Oriented Architecture with underlying technologies like web services and web service orchestration opens new vistas for integration among business processes operating in heterogeneous environments. However, such dynamic collaborations require a highly secure environment at each respective business partner site. Existing web services standards address the issue of security only on the service provider platform. The partner platforms to which sensitive information is released have till now been neglected. Remote Attestation is a relatively new field of research which enables an authorized party to verify that a trusted environment actually exists on a partner platform. To incorporate this novel concept in to the web services realm, a new mechanism called WS-Attestation has been proposed. This mechanism provides a structural paradigm upon which more fine-grained solutions can be built. In this paper, we present a novel framework, Behavioral Attestation for Web Services, in which XACML is built on top of WS-Attestation in order to enable more flexible remote attestation at the web services level. We propose a new type of XACML policy called XACML behavior policy, which defines the expected behavior of a partner platform. Existing web service standards are used to incorporate remote attestation at the web services level and a prototype is presented, which implements XACML behavior policy using low-level attestation techniques. 相似文献
69.
Mohamed Hammami Salma Kammoun Jarraya Hanene Ben-Abdallah 《Multimedia Tools and Applications》2013,63(3):899-926
Fast and accurate moving object segmentation in dynamic scenes is the first step in many computer vision applications. In this paper, we propose a new background modeling method for moving object segmentation based on dynamic matrix and spatio-temporal analyses of scenes. Our method copes with some challenges related to this field. A new algorithm is proposed to detect and remove cast shadow. A comparative study by quantitative evaluations shows that the proposed approach can detect foreground robustly and accurately from videos recorded by a static camera and which include several constraints. A Highway Control and Management System called RoadGuard is proposed to show the robustness of our method. In fact, our system has the ability to control highway by detecting strange events that can happen like vehicles suddenly stopped in roads, parked vehicles in emergency zones or even illegal conduct such as going out from the road. Moreover, RoadGuard is capable of managing highways by saving information about the date and time of overloaded roads. 相似文献
70.
Naveed Aslam Mirza Hikmat Ullah Khan Khalid Iqbal Saqib Iqbal Muhammad Imran 《New Review of Hypermedia and Multimedia》2013,19(4):335-345
ABSTRACTThe quality of user-generated content over World Wide Web media is a matter of serious concern for both creators and users. To measure the quality of content, webometric techniques are commonly used. In recent times, bibliometric techniques have been introduced to good effect for evaluation of the quality of user-generated content, which were originally used for scholarly data. However, the application of bibliometric techniques to evaluate the quality of YouTube content is limited to h-index and g-index considering only views. This paper advocates for and demonstrates the adaptation of existing Bibliometric indices including h-index, g-index and M-index exploiting both views and comments and proposes three indices hvc, gvc and mvc for YouTube video channel ranking. The empirical results prove that the proposed indices using views along with the comments outperform the existing approaches on a real-world dataset of YouTube. 相似文献