全文获取类型
收费全文 | 199292篇 |
免费 | 10698篇 |
国内免费 | 5342篇 |
专业分类
电工技术 | 7853篇 |
技术理论 | 7篇 |
综合类 | 9683篇 |
化学工业 | 31366篇 |
金属工艺 | 11129篇 |
机械仪表 | 10237篇 |
建筑科学 | 11743篇 |
矿业工程 | 3982篇 |
能源动力 | 4573篇 |
轻工业 | 11136篇 |
水利工程 | 3335篇 |
石油天然气 | 7602篇 |
武器工业 | 879篇 |
无线电 | 22293篇 |
一般工业技术 | 30066篇 |
冶金工业 | 8064篇 |
原子能技术 | 1531篇 |
自动化技术 | 39853篇 |
出版年
2024年 | 553篇 |
2023年 | 2031篇 |
2022年 | 3527篇 |
2021年 | 4877篇 |
2020年 | 3748篇 |
2019年 | 3152篇 |
2018年 | 17318篇 |
2017年 | 16853篇 |
2016年 | 12913篇 |
2015年 | 5267篇 |
2014年 | 5918篇 |
2013年 | 6954篇 |
2012年 | 10450篇 |
2011年 | 17108篇 |
2010年 | 14993篇 |
2009年 | 11973篇 |
2008年 | 13002篇 |
2007年 | 13681篇 |
2006年 | 6442篇 |
2005年 | 6688篇 |
2004年 | 4854篇 |
2003年 | 4427篇 |
2002年 | 3596篇 |
2001年 | 2894篇 |
2000年 | 3117篇 |
1999年 | 3215篇 |
1998年 | 2721篇 |
1997年 | 2300篇 |
1996年 | 2140篇 |
1995年 | 1833篇 |
1994年 | 1484篇 |
1993年 | 1066篇 |
1992年 | 872篇 |
1991年 | 699篇 |
1990年 | 491篇 |
1989年 | 436篇 |
1988年 | 362篇 |
1987年 | 245篇 |
1986年 | 167篇 |
1985年 | 97篇 |
1984年 | 65篇 |
1983年 | 49篇 |
1982年 | 63篇 |
1981年 | 39篇 |
1968年 | 43篇 |
1966年 | 42篇 |
1965年 | 47篇 |
1959年 | 39篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.
Chengyao Lv Huihua Liu Yuanxing Dong Yunliang Chen 《International Journal of Speech Technology》2016,19(3):647-654
In natural language processing, a crucial subsystem in a wide range of applications is a part-of-speech (POS) tagger, which labels (or classifies) unannotated words of natural language with POS labels corresponding to categories such as noun, verb or adjective. Mainstream approaches are generally corpus-based: a POS tagger learns from a corpus of pre-annotated data how to correctly tag unlabeled data. Presented here is a brief state-of-the-art account on POS tagging. POS tagging approaches make use of labeled corpus to train computational trained models. Several typical models of three kings of tagging are introduced in this article: rule-based tagging, statistical approaches and evolution algorithms. The advantages and the pitfalls of each typical tagging are discussed and analyzed. Some rule-based and stochastic methods have been successfully achieved accuracies of 93–96 %, while that of some evolution algorithms are about 96–97 %. 相似文献
952.
Hesam Sagha Feipeng Li Ehsan Variani José del R. Millán Ricardo Chavarriaga Björn Schuller 《International Journal of Speech Technology》2016,19(4):669-675
Multi-stream automatic speech recognition (MS-ASR) has been confirmed to boost the recognition performance in noisy conditions. In this system, the generation and the fusion of the streams are the essential parts and need to be designed in such a way to reduce the effect of noise on the final decision. This paper shows how to improve the performance of the MS-ASR by targeting two questions; (1) How many streams are to be combined, and (2) how to combine them. First, we propose a novel approach based on stream reliability to select the number of streams to be fused. Second, a fusion method based on Parallel Hidden Markov Models is introduced. Applying the method on two datasets (TIMIT and RATS) with different noises, we show an improvement of MS-ASR. 相似文献
953.
Achraf Benba Abdelilah Jilbab Ahmed Hammouch 《International Journal of Speech Technology》2016,19(4):743-754
In this study, we wanted to discriminate between two groups of people. The database used in this study contains 20 patients with Parkinson’s disease and 20 healthy people. Three types of sustained vowels (/a/, /o/ and /u/) were recorded from each participant and then the analyses were done on these voice samples. Firstly, an initial feature vector extracted from time, frequency and cepstral domains. Then we used linear and nonlinear feature extraction techniques, principal component analysis (PCA), and nonlinear PCA. These techniques reduce the number of parameters and choose the most effective acoustic features used for classification. Support vector machine with its different kernel was used for classification. We obtained an accuracy up to 87.50 % for discrimination between PD patients and healthy people. 相似文献
954.
Paolo Turrini 《Autonomous Agents and Multi-Agent Systems》2016,30(5):765-792
Boolean games have been developed as a paradigm for modelling societies of goal-directed agents. In boolean games agents exercise control over propositional variables and strive to achieve a goal formula whose realization might require the opponents’ cooperation. The presence of agents that are goal-directed makes it difficult for an external authority to be able to remove undesirable properties that are inconsistent with agents’ goals, as shown by recent contributions in the multi-agent literature. What this paper does is to analyse the problem of regulation of goal-direct agents from within the system, i.e., what happens when agents themselves are given the chance to negotiate the strategies to be played with one another. Concretely, we introduce endogenous games with goals, obtained coupling a general model of goal-directed agents (strategic games with goals) with a general model of pre-play negotiations (endogenous games) coming from game theory. Strategic games with goals are shown to have a direct correspondence with strategic games (Proposition 1) but, when side-payments are allowed in the pre-play phase, display a striking imbalance (Proposition 4). The effect of side-payments can be fully simulated by taxation mechanisms studied in the literature (Proposition 7), yet we show sufficient conditions under which outcomes can be rationally sustained without external intervention (Proposition 5). Also, integrating taxation mechanisms and side-payments, we are able to transform our starting models in such a way that outcomes that are theoretically sustainable thanks to a pre-play phase can be actually sustained even with limited resources (Proposition 8). Finally, we show how an external authority incentivising a group of agents can be studied as a special agent of an appropriately extended endogenous game with goals (Proposition 11). 相似文献
955.
Jörg Becker Patrick Delfmann Hanns-Alexander Dietrich Matthias Steinhorst Mathias Eggert 《Information Systems Frontiers》2016,18(2):359-405
Given the strong increase in regulatory requirements for business processes the management of business process compliance becomes a more and more regarded field in IS research. Several methods have been developed to support compliance checking of conceptual models. However, their focus on distinct modeling languages and mostly linear (i.e., predecessor-successor related) compliance rules may hinder widespread adoption and application in practice. Furthermore, hardly any of them has been evaluated in a real-world setting. We address this issue by applying a generic pattern matching approach for conceptual models to business process compliance checking in the financial sector. It consists of a model query language, a search algorithm and a corresponding modelling tool prototype. It is (1) applicable for all graph-based conceptual modeling languages and (2) for different kinds of compliance rules. Furthermore, based on an applicability check, we (3) evaluate the approach in a financial industry project setting against its relevance for decision support of audit and compliance management tasks. 相似文献
956.
In game theoretical analysis of incentive mechanisms, all players are assumed to be rational. Since it is likely that mechanism participants in the real world may not be fully rational, such mechanisms may not work as effectively as in the idealized settings for which they were designed. Therefore, it is important to evaluate the robustness of incentive mechanisms against various types of agents with bounded rational behaviors. Such evaluations would provide us with the information needed to choose mechanisms with desired properties in real environments. In this article, we first propose a general robustness measure, inspired by research in evolutionary game theory, as the maximal percentage of invaders taking non-equilibrium strategies such that the agents sustain the desired equilibrium strategy. We then propose a simulation framework based on evolutionary dynamics to empirically evaluate the equilibrium robustness. The proposed simulation framework is validated by comparing the simulated results with the analytical predictions based on a modified simplex analysis approach. Finally, we implement the proposed simulation framework for evaluating the robustness of incentive mechanisms in reputation systems for electronic marketplaces. The results from the implementation show that the evaluated mechanisms have high robustness against a certain non-equilibrium strategy, but is vulnerable to another strategy, indicating the need for designing more robust incentive mechanisms for reputation management in e-marketplaces. 相似文献
957.
Lina Yao Quan Z. Sheng Anne H. H. Ngu Byron J. Gao Xue Li Sen Wang 《World Wide Web》2016,19(6):1125-1149
Automatic annotation is an essential technique for effectively handling and organizing Web objects (e.g., Web pages), which have experienced an unprecedented growth over the last few years. Automatic annotation is usually formulated as a multi-label classification problem. Unfortunately, labeled data are often time-consuming and expensive to obtain. Web data also accommodate much richer feature space. This calls for new semi-supervised approaches that are less demanding on labeled data to be effective in classification. In this paper, we propose a graph-based semi-supervised learning approach that leverages random walks and ? 1 sparse reconstruction on a mixed object-label graph with both attribute and structure information for effective multi-label classification. The mixed graph contains an object-affinity subgraph, a label-correlation subgraph, and object-label edges with adaptive weight assignments indicating the assignment relationships. The object-affinity subgraph is constructed using ? 1 sparse graph reconstruction with extracted structural meta-text, while the label-correlation subgraph captures pairwise correlations among labels via linear combination of their co-occurrence similarity and kernel-based similarity. A random walk with adaptive weight assignment is then performed on the constructed mixed graph to infer probabilistic assignment relationships between labels and objects. Extensive experiments on real Yahoo! Web datasets demonstrate the effectiveness of our approach. 相似文献
958.
Use Case modeling is a popular technique for documenting functional requirements of software systems. Refactoring is the process of enhancing the structure of a software artifact without changing its intended behavior. Refactoring, which was first introduced for source code, has been extended for use case models. Antipatterns are low quality solutions to commonly occurring design problems. The presence of antipatterns in a use case model is likely to propagate defects to other software artifacts. Therefore, detection and refactoring of antipatterns in use case models is crucial for ensuring the overall quality of a software system. Model transformation can greatly ease several software development activities including model refactoring. In this paper, a model transformation approach is proposed for improving the quality of use case models. Model transformations which can detect antipattern instances in a given use case model, and refactor them appropriately are defined and implemented. The practicability of the approach is demonstrated by applying it on a case study that pertains to biodiversity database system. The results show that model transformations can efficiently improve quality of use case models by saving time and effort. 相似文献
959.
Francisco J. Gutierrez Sergio F. Ochoa Gustavo Zurita Nelson Baloian 《Information Systems Frontiers》2016,18(1):7-21
Participation is the cornerstone of any community. Promoting, understanding and properly managing it allows not only keeping the community sustainable, but also providing personalized services to its members and managers. This article presents a case study in which student participation in a course community was motivated using two different extrinsic mechanisms, and mediated by a software platform. The results were compared with a baseline community of the same course, in which participation was not motivated by external means. The analysis of these results indicates that managing a partially virtual course community requires the introduction of monitoring services, community managers and extrinsic mechanisms to motivate participation. These findings allow community managers to improve their capability for promoting participation and keeping the community sustainable. The findings also raise several implications that should be considered in the design of software supporting this kind of community, when managing the participation of its members. 相似文献
960.
Rami Rashkovits 《World Wide Web》2016,19(3):323-350
This work introduces and establishes a new model for cache management, where clients suggest preferences regarding their expectations for the time they are willing to wait, and the level of obsolescence they are willing to tolerate. The cache uses these preferences to decide upon entrance and exit of objects to and from its storage, and select the best copy of requested object among all available copies (fresh, cached, remote). We introduce three replacement policies, each evicts objects based on ongoing scores, considering users’ preferences combined with other objects’ properties such as size, obsolescence rate and popularity. Each replacement algorithm follows a different strategy: (a) an optimal solution that use dynamic programming approach to find the best objects to be kept (b) another optimal solution that use branch and bound approach to find the worst objects to be thrown out (c) an algorithm that use heuristic approach to efficiently select the objects to be evicted. Using these replacement algorithms the cache is able to keep the objects that are best suited for users preferences and dump the other objects. We compare our proposed algorithms to the Least-Recently-Used algorithm, and provide evidence to the advantages of our algorithms providing better service to cache’s users with less burden on network resources and reduced workloads on origin servers. 相似文献