首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3197篇
  免费   178篇
  国内免费   4篇
电工技术   46篇
综合类   21篇
化学工业   823篇
金属工艺   54篇
机械仪表   39篇
建筑科学   216篇
矿业工程   8篇
能源动力   105篇
轻工业   259篇
水利工程   27篇
石油天然气   5篇
无线电   299篇
一般工业技术   638篇
冶金工业   244篇
原子能技术   18篇
自动化技术   577篇
  2023年   58篇
  2022年   88篇
  2021年   171篇
  2020年   90篇
  2019年   86篇
  2018年   93篇
  2017年   89篇
  2016年   127篇
  2015年   98篇
  2014年   167篇
  2013年   186篇
  2012年   194篇
  2011年   254篇
  2010年   164篇
  2009年   150篇
  2008年   164篇
  2007年   139篇
  2006年   134篇
  2005年   120篇
  2004年   94篇
  2003年   67篇
  2002年   66篇
  2001年   32篇
  2000年   55篇
  1999年   40篇
  1998年   58篇
  1997年   46篇
  1996年   48篇
  1995年   41篇
  1994年   35篇
  1993年   22篇
  1992年   14篇
  1991年   17篇
  1990年   11篇
  1989年   14篇
  1988年   8篇
  1987年   9篇
  1986年   7篇
  1985年   12篇
  1984年   8篇
  1983年   12篇
  1982年   10篇
  1981年   9篇
  1980年   6篇
  1979年   9篇
  1978年   11篇
  1977年   5篇
  1976年   9篇
  1973年   6篇
  1916年   4篇
排序方式: 共有3379条查询结果,搜索用时 15 毫秒
51.
52.
Group-wise registration of a set of shapes represented by unlabeled point-sets is a challenging problem since, usually this involves solving for point correspondence in a nonrigid motion setting. In this paper, we propose a novel and robust algorithm that is capable of simultaneously computing the mean shape represented by a probability density function from multiple unlabeled point-sets and registering them non-rigidly to this emerging mean shape. This algorithm avoids the correspondence problem by minimizing the Jensen-Shannon (JS) divergence between the point sets. We motivate the use of the JS divergence by pointing out its close relationship to hypothesis testing. We derive the analytic gradient of the cost function in order to efficiently achieve the optimal solution. JS-divergence is symmetric with no bias toward any of the given shapes to be registered and whose mean is being sought. A by product of the registration process is a probabilistic atlas defined as the convex combination of the probability densities of the input point sets being aligned. Our algorithm can be especially useful for creating atlases of various shapes present in images as well as for simultaneously (rigidly or non-rigidly) registering 3D range data sets without having to establish any correspondence. We present experimental results on real and synthetic data.  相似文献   
53.
This paper presents fill algorithms for boundary-defined regions in raster graphics. The algorithms require only a constant-size working memory. The methods presented are based on the so-called seed fill algorithms that use the internal connectivity of the region with a given inner point. Basic methods, as well as additional hcuristics for speeding up the algorithm, are described and verified. Empirical results are used to compare the time complexities of the algorithms for different classes of regions.  相似文献   
54.
The selective removal of one ligand in mixed-ligand MOFs upon thermolysis provides a powerful strategy to introduce additional mesopores without affecting the overall MOF structure. By varying the initial ligand ratio, MOFs of the MIL-125-Ti family with two distinct hierarchical pore architectures are synthesized, resembling either large cavities or branching fractures. The performance of the resulting hierarchically porous MOFs is evaluated toward the adsorptive removal of glyphosate (N-(phosphonomethyl)glycine) from water, and the adsorption kinetics and mechanism are examined. Due to their strong affinity for phosphoric groups, the numerous Ti–OH groups resulting from the selective ligand removal act as natural anchor points for effective glyphosate uptake. The relationships between contact duration, glyphosate concentration, and adsorbent dosage are investigated, and the impact of these parameters on the effectiveness of glyphosate removal from contaminated water samples is examined. The introduction of additional mesopores has increased the adsorption capacities by nearly 3 times with record values exceeding 440.9 mg g−1, which ranks these MOFs among the best-reported adsorbents.  相似文献   
55.
Magnetic Resonance Materials in Physics, Biology and Medicine - Oncometabolite D-2-hydroxyglutarate (2HG) is pooled in isocitrate dehydrogenase (IDH)-mutant glioma cells. Detecting 2HG by MR...  相似文献   
56.

In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information from various sources, which brings the importance of securing the data. Many researchers implemented techniques to hide secret information to maintain the integrity and privacy of data. In order to protect confidential data, histogram-based reversible data hiding with other cryptographic algorithms are widely used. Therefore, in the proposed work, a robust method for securing digital video is suggested. We implemented histogram bit shifting based reversible data hiding by embedding the encrypted watermark in featured video frames. Histogram bit shifting is used for hiding highly secured watermarks so that security for the watermark symbol is also being achieved. The novelty of the work is that only based on the quality threshold a few unique frames are selected, which holds the encrypted watermark symbol. The optimal value for this threshold is obtained using the Firefly Algorithm. The proposed method is capable of hiding high-capacity data in the video signal. The experimental result shows the higher capacity and video quality compared to other reversible data hiding techniques. The recovered watermark provides better identity identification against various attacks. A high value of PSNR and a low value of BER and MSE is reported from the results.

  相似文献   
57.
The finite cell method (FCM) is an immersed domain finite element method that combines higher‐order non‐boundary‐fitted meshes, weak enforcement of Dirichlet boundary conditions, and adaptive quadrature based on recursive subdivision. Because of its ability to improve the geometric resolution of intersected elements, it can be characterized as an immersogeometric method. In this paper, we extend the FCM, so far only used with Cartesian hexahedral elements, to higher‐order non‐boundary‐fitted tetrahedral meshes, based on a reformulation of the octree‐based subdivision algorithm for tetrahedral elements. We show that the resulting TetFCM scheme is fully accurate in an immersogeometric sense, that is, the solution fields achieve optimal and exponential rates of convergence for h‐refinement and p‐refinement, if the immersed geometry is resolved with sufficient accuracy. TetFCM can leverage the natural ability of tetrahedral elements for local mesh refinement in three dimensions. Its suitability for problems with sharp gradients and highly localized features is illustrated by the immersogeometric phase‐field fracture analysis of a human femur bone. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
58.
59.
Attribute selection with fuzzy decision reducts   总被引:2,自引:0,他引:2  
Rough set theory provides a methodology for data analysis based on the approximation of concepts in information systems. It revolves around the notion of discernibility: the ability to distinguish between objects, based on their attribute values. It allows to infer data dependencies that are useful in the fields of feature selection and decision model construction. In many cases, however, it is more natural, and more effective, to consider a gradual notion of discernibility. Therefore, within the context of fuzzy rough set theory, we present a generalization of the classical rough set framework for data-based attribute selection and reduction using fuzzy tolerance relations. The paper unifies existing work in this direction, and introduces the concept of fuzzy decision reducts, dependent on an increasing attribute subset measure. Experimental results demonstrate the potential of fuzzy decision reducts to discover shorter attribute subsets, leading to decision models with a better coverage and with comparable, or even higher accuracy.  相似文献   
60.
Classifiers based on radial basis function neural networks have a number of useful properties that can be exploited in many practical applications. Using sample data, it is possible to adjust their parameters (weights), to optimize their structure, and to select appropriate input features (attributes). Moreover, interpretable rules can be extracted from a trained classifier and input samples can be identified that cannot be classified with a sufficient degree of “certainty”. These properties support an analysis of radial basis function classifiers and allow for an adaption to “novel” kinds of input samples in a real-world application. In this article, we outline these properties and show how they can be exploited in the field of intrusion detection (detection of network-based misuse). Intrusion detection plays an increasingly important role in securing computer networks. In this case study, we first compare the classification abilities of radial basis function classifiers, multilayer perceptrons, the neuro-fuzzy system NEFCLASS, decision trees, classifying fuzzy-k-means, support vector machines, Bayesian networks, and nearest neighbor classifiers. Then, we investigate the interpretability and understandability of the best paradigms found in the previous step. We show how structure optimization and feature selection for radial basis function classifiers can be done by means of evolutionary algorithms and compare this approach to decision trees optimized using certain pruning techniques. Finally, we demonstrate that radial basis function classifiers are basically able to detect novel attack types. The many advantageous properties of radial basis function classifiers could certainly be exploited in other application fields in a similar way.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号