首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6943篇
  免费   481篇
  国内免费   9篇
电工技术   87篇
综合类   3篇
化学工业   2004篇
金属工艺   117篇
机械仪表   217篇
建筑科学   292篇
矿业工程   24篇
能源动力   276篇
轻工业   1029篇
水利工程   62篇
石油天然气   36篇
无线电   436篇
一般工业技术   1066篇
冶金工业   308篇
原子能技术   48篇
自动化技术   1428篇
  2024年   22篇
  2023年   100篇
  2022年   297篇
  2021年   342篇
  2020年   228篇
  2019年   252篇
  2018年   301篇
  2017年   316篇
  2016年   307篇
  2015年   250篇
  2014年   335篇
  2013年   597篇
  2012年   459篇
  2011年   560篇
  2010年   379篇
  2009年   409篇
  2008年   344篇
  2007年   319篇
  2006年   266篇
  2005年   201篇
  2004年   146篇
  2003年   166篇
  2002年   134篇
  2001年   76篇
  2000年   83篇
  1999年   64篇
  1998年   49篇
  1997年   55篇
  1996年   50篇
  1995年   39篇
  1994年   30篇
  1993年   27篇
  1992年   15篇
  1991年   21篇
  1990年   12篇
  1989年   19篇
  1988年   11篇
  1987年   11篇
  1986年   11篇
  1985年   15篇
  1984年   9篇
  1983年   8篇
  1982年   14篇
  1981年   6篇
  1980年   9篇
  1979年   10篇
  1978年   20篇
  1976年   8篇
  1975年   5篇
  1973年   5篇
排序方式: 共有7433条查询结果,搜索用时 15 毫秒
61.
Automated virtual camera control has been widely used in animation and interactive virtual environments. We have developed a multiple sparse camera based free view video system prototype that allows users to control the position and orientation of a virtual camera, enabling the observation of a real scene in three dimensions (3D) from any desired viewpoint. Automatic camera control can be activated to follow selected objects by the user. Our method combines a simple geometric model of the scene composed of planes (virtual environment), augmented with visual information from the cameras and pre-computed tracking information of moving targets to generate novel perspective corrected 3D views of the virtual camera and moving objects. To achieve real-time rendering performance, view-dependent textured mapped billboards are used to render the moving objects at their correct locations and foreground masks are used to remove the moving objects from the projected video streams. The current prototype runs on a PC with a common graphics card and can generate virtual 2D views from three cameras of resolution 768×576 with several moving objects at about 11 fps.  相似文献   
62.
63.
Building visualization and analysis pipelines is a large hurdle in the adoption of visualization and workflow systems by domain scientists. In this paper, we propose techniques to help users construct pipelines by consensus--automatically suggesting completions based on a database of previously created pipelines. In particular, we compute correspondences between existing pipeline subgraphs from the database, and use these to predict sets of likely pipeline additions to a given partial pipeline. By presenting these predictions in a carefully designed interface, users can create visualizations and other data products more efficiently because they can augment their normal work patterns with the suggested completions. We present an implementation of our technique in a publicly-available, open-source scientific workflow system and demonstrate efficiency gains in real-world situations.  相似文献   
64.
Learning vector quantization with training data selection   总被引:2,自引:0,他引:2  
In this paper, we propose a method that selects a subset of the training data points to update LVQ prototypes. The main goal is to conduct the prototypes to converge at a more convenient location, diminishing misclassification errors. The method selects an update set composed by a subset of points considered to be at the risk of being captured by another class prototype. We associate the proposed methodology to a weighted norm, instead of the Euclidean, in order to establish different levels of relevance for the input attributes. The technique was implemented on a controlled experiment and on Web available data sets.  相似文献   
65.
We consider weighted finite transducers over arbitrary groups, that is finite transducers having a counter in which, at any step, a value of the group is stored but no information regarding the content of this counter is available until the computation is finished. The computation is valid if the counter value is the neutral element of the group. We generalize here some results from [8] and [17]. Received: 28 January 2001 / 5 June 2001  相似文献   
66.
67.
Assuming that the probability of obtaining a defective unit in a production process, p, is not constant, a versatile methodology is presented for determining optimal failure-censored reliability sampling plans for log-location-scale lifetime models. The optimization procedure to decide the acceptability of a product is usually sufficiently accurate for the most widely used parametric lifetime models, such as the Weibull and lognormal distributions, and fairly robust to small deviations in the prior knowledge. Moreover, lower and upper bounds on the optimal sample size, and the corresponding acceptance constants, are derived in closed-forms. The proposed approach extends the traditional sampling plans to those cases in which appreciable prior information on p exists, and also allows the analyst the flexibility to delimitate the range of p and to incorporate into the reliability analysis prior impartiality between the producer and the consumer. In addition, the practitioners may achieve substantial savings in sample size, better information on the production process and better assessment of the true producer and consumer risks. An example related to the acceptability of a certain kind of gyroscope is included for illustrative purposes. Various practical prior distributions are considered to describe the random fluctuations in the proportion defective.  相似文献   
68.
In this paper text segmentation in generic displays is proposed through learning the best binarization values for a commercial optical character recognition (OCR) system. The commercial OCR is briefly introduced as well as the parameters that affect the binarization for improving the classification scores. The purpose of this work is to provide the capability to automatically evaluate standard textual display information, so that tasks that involve visual user verification can be performed without human intervention. The problem to be solved is to recognize text characters that appear on the display, as well as the color of the characters’ foreground and background. The paper introduces how the thresholds are learnt through: (a) selecting lightness or hue component of a color input cell, (b) enhancing the bitmaps’ quality, and (c) calculating the segmentation threshold range for this cell. Then, starting from the threshold ranges learnt at each display cell, the best threshold for each cell is gotten. The input and output data sets for testing the algorithms proposed are described, as well as the analysis of the results obtained.  相似文献   
69.
The second-order stiffness matrix and corresponding loading vector of a prismatic beam–column subjected to a constant axial load and supported on a uniformly distributed elastic foundation (Winkler type) along its span with its ends connected to elastic supports are derived in a classical manner. The stiffness coefficients are expressed in terms of the ballast coefficient of the elastic foundation, applied axial load, support conditions, bending, and shear deformations. These individual parameters may be dropped when the appropriate effect is not considered; therefore, the proposed model captures all the different models of beams and beam–columns including those based on the theories of Bernoulli–Euler, Timoshenko, Rayleigh, and bending and shear.The expressions developed for the load vector are also general for any type or combinations of transverse loads including concentrated and partially nonuniform distributed loads. In addition, the transfer equations necessary to determine the transverse deflections, rotations, shear, and bending moments along the member are also developed and presented.  相似文献   
70.
Component adaptation is widely recognised to be one of the crucial problems in Component-Based Software Engineering (CBSE). We present here a formal methodology for the soft adaptation of components presenting mismatching interaction behaviours. The notions of access rights (associating components with the services they are allowed to use) and subservicing (providing alternative services in place of those requested by components lacking the required access rights) are exploited to feature a secure and flexible adaptation of third-party components.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号