全文获取类型
收费全文 | 14358篇 |
免费 | 363篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 188篇 |
综合类 | 7篇 |
化学工业 | 1841篇 |
金属工艺 | 339篇 |
机械仪表 | 148篇 |
建筑科学 | 235篇 |
矿业工程 | 10篇 |
能源动力 | 227篇 |
轻工业 | 700篇 |
水利工程 | 45篇 |
石油天然气 | 7篇 |
无线电 | 626篇 |
一般工业技术 | 1081篇 |
冶金工业 | 405篇 |
原子能技术 | 112篇 |
自动化技术 | 8755篇 |
出版年
2024年 | 16篇 |
2023年 | 98篇 |
2022年 | 326篇 |
2021年 | 399篇 |
2020年 | 184篇 |
2019年 | 187篇 |
2018年 | 218篇 |
2017年 | 191篇 |
2016年 | 265篇 |
2015年 | 195篇 |
2014年 | 489篇 |
2013年 | 524篇 |
2012年 | 1110篇 |
2011年 | 2714篇 |
2010年 | 1387篇 |
2009年 | 1186篇 |
2008年 | 959篇 |
2007年 | 815篇 |
2006年 | 602篇 |
2005年 | 715篇 |
2004年 | 640篇 |
2003年 | 689篇 |
2002年 | 352篇 |
2001年 | 59篇 |
2000年 | 46篇 |
1999年 | 50篇 |
1998年 | 38篇 |
1997年 | 30篇 |
1996年 | 39篇 |
1995年 | 22篇 |
1994年 | 21篇 |
1993年 | 22篇 |
1992年 | 25篇 |
1991年 | 13篇 |
1990年 | 7篇 |
1989年 | 11篇 |
1988年 | 9篇 |
1987年 | 9篇 |
1986年 | 5篇 |
1985年 | 6篇 |
1984年 | 10篇 |
1983年 | 10篇 |
1982年 | 11篇 |
1981年 | 6篇 |
1980年 | 2篇 |
1979年 | 8篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1967年 | 2篇 |
1948年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
We first show that ground term-rewriting systems can be completed in a polynomial number of rewriting steps, if the appropriate data structure for terms is used. We then apply this result to study the lengths of critical pair proofs in non-ground systems, and obtain bounds on the lengths of critical pair proofs in the non-ground case. We show how these bounds depend on the types of inference steps that are allowed in the proofs. 相似文献
22.
The spectral properties of the incidence matrix of the communication graph are exploited to provide solutions to two multi-agent control problems. In particular, we consider the problem of state agreement with quantized communication and the problem of distance-based formation control. In both cases, stabilizing control laws are provided when the communication graph is a tree. It is shown how the relation between tree graphs and the null space of the corresponding incidence matrix encode fundamental properties for these two multi-agent control problems. 相似文献
23.
Hierarchical Interface-Based Supervisory Control employs interfaces that allow properties of a monolithic system to be verified through local analysis. By avoiding the need to verify properties globally, significant computational savings can be achieved. In this paper we provide local requirements for a multi-level architecture employing command-pair type interfaces. This multi-level architecture allows for a greater reduction in complexity and improved reconfigurability over the two-level case that has been previously studied since it allows the global system to be partitioned into smaller modules. This paper also provides results for synthesizing supervisors in the multi-level architecture that are locally maximally permissive with respect to a given specification and set of interfaces. 相似文献
24.
Yao-Tien Chen Author Vitae 《Pattern recognition》2010,43(11):3699-3711
This paper proposes an alternative criterion derived from the Bayesian risk classification error for image segmentation. The proposed model introduces a region-based force determined through the difference of the posterior image densities for the different classes, a term based on the prior probability derived from Kullback-Leibler information number, and a regularity term adopted to avoid the generation of excessively irregular and small segmented regions. Compared with other level set methods, the proposed approach relies on the optimum decision of pixel classification and the estimates of prior probabilities; thus the approach has more reliability in theory and practice. Experiments show that the proposed approach is able to extract the complicated shapes of targets and robust for various types of medical images. Moreover, the algorithm can be easily extendable for multiphase segmentation. 相似文献
25.
Julián D. Arias-Londoño Author Vitae Juan I. Godino-Llorente Author Vitae Nicolás Sáenz-Lechón Author Vitae Author Vitae Germán Castellanos-Domínguez Author Vitae 《Pattern recognition》2010,43(9):3100-3112
This paper presents new a feature transformation technique applied to improve the screening accuracy for the automatic detection of pathological voices. The statistical transformation is based on Hidden Markov Models, obtaining a transformation and classification stage simultaneously and adjusting the parameters of the model with a criterion that minimizes the classification error. The original feature vectors are built up using classic short-term noise parameters and mel-frequency cepstral coefficients. With respect to conventional approaches found in the literature of automatic detection of pathological voices, the proposed feature space transformation technique demonstrates a significant improvement of the performance with no addition of new features to the original input space. In view of the results, it is expected that this technique could provide good results in other areas such as speaker verification and/or identification. 相似文献
26.
In this paper, we present a method for action categorization with a modified hidden conditional random field (HCRF). Specifically, effective silhouette-based action features are extracted using motion moments and spectrum of chain code. We formulate a modified HCRF (mHCRF) to have a guaranteed global optimum in the modelling of the temporal action dependencies after the HMM pathing stage. Experimental results on action categorization using this model are compared favorably against several existing model-based methods including GMM, SVM, Logistic Regression, HMM, CRF and HCRF. 相似文献
27.
T. Nguyen-Ky Author Vitae J. Leis Author Vitae Author Vitae 《Computers & Electrical Engineering》2010,36(4):664-675
In this paper, we propose an new error estimate algorithm (NEEA) for stereophonic acoustic echo cancellation (SAEC) that is based on the error estimation algorithm (EEA) in [Nguyen-Ky T, Leis J, Xiang W. An improved error estimate algorithm for stereophonic acoustic echo cancellation system. In: International conference on signal processing and communication systems, ICSPCS’2007, Australia; December 2007]. In the EEA and NEEA, with the minimum error signal fixed, we compute the filter lengths so that the error signal may approximate the minimum error signal. When the echo paths change, the adaptive filter automatically adjusts the filter lengths to the optimum values. We also investigate the difference between the adaptive filter lengths. In contrast with the conclusions in [Khong AWH, Naylor PA. Stereophonic acoustic echo cancellation employing selective-tap adaptive algorithms. IEEE Trans Audio, Speech, Lang Process 2006;14(3):785-96, Gansler T, Benesty J. Stereophonic acoustic echo cancellation and two channel adaptive filtering: an overview. Int J Adapt Control Signal Process 2000;4:565-86, Benesty J, Gansler T. A multichannel acoustic echo canceler double-talk detector based on a normalized cross-correlation matrix. Acoust Echo Noise Control 2002;13(2):95-101, Gansler T, Benesty J. A frequency-domain double-talk detector based on a normalized cross-correlation vector. Signal Process 2001;81:1783-7, Eneroth P, Gay SL, Gansler T, Benesty J. A real-time implementation of a stereophonic acoustic echo canceler. IEEE Trans. Speech Audio Process 2001;9(5):513-23, Gansler T, Benesty J. New insights into the stereophonic acoustic echo cancellation problem and an adaptive nonlinearity solution. IEEE Trans. Speech Audio Process 2002; 10(5):257-67, Benesty J, Gansler T, Morgan DR, Sondhi MM, Gay SL. Advances in network and acoustic echo cancellation. Berlin: Springer-Verlag; 2001], our simulation results have shown that the filter lengths can be different. Our simulation results also confirm that the NEEA is better than EEA and SM-NLMS algorithm in terms of echo return loss enhancement. 相似文献
28.
Gyrd Brændeland Author Vitae Atle Refsdal Author Vitae Author Vitae 《Journal of Systems and Software》2010,83(10):1995-2013
The risk analysis of critical infrastructures such as the electric power supply or telecommunications is complicated by the fact that such infrastructures are mutually dependent. We propose a modular approach to the modelling and analysis of risk scenarios with dependencies. Our approach may be used to deduce the risk level of an overall system from previous risk analyses of its constituent systems. A custom made assumption-guarantee style is put forward as a means to describe risk scenarios with external dependencies. We also define a set of deduction rules facilitating various kinds of reasoning, including the analysis of mutual dependencies between risk scenarios expressed in the assumption-guarantee style. 相似文献
29.
30.
In this paper we propose a heuristic approach for the problem of packing equal rectangles within a convex region. The approach is based on an Iterated Local Search scheme, in which the key step is the perturbation move. Different perturbation moves, both combinatorial and continuous ones, are proposed and compared through extensive computational experiments on a set of test instances. The overall results are quite encouraging. 相似文献