全文获取类型
收费全文 | 9102篇 |
免费 | 346篇 |
国内免费 | 38篇 |
专业分类
电工技术 | 127篇 |
综合类 | 22篇 |
化学工业 | 2131篇 |
金属工艺 | 170篇 |
机械仪表 | 231篇 |
建筑科学 | 574篇 |
矿业工程 | 31篇 |
能源动力 | 175篇 |
轻工业 | 778篇 |
水利工程 | 54篇 |
石油天然气 | 11篇 |
武器工业 | 1篇 |
无线电 | 595篇 |
一般工业技术 | 1498篇 |
冶金工业 | 1539篇 |
原子能技术 | 70篇 |
自动化技术 | 1479篇 |
出版年
2023年 | 51篇 |
2022年 | 100篇 |
2021年 | 145篇 |
2020年 | 108篇 |
2019年 | 127篇 |
2018年 | 169篇 |
2017年 | 112篇 |
2016年 | 193篇 |
2015年 | 195篇 |
2014年 | 253篇 |
2013年 | 568篇 |
2012年 | 400篇 |
2011年 | 551篇 |
2010年 | 417篇 |
2009年 | 394篇 |
2008年 | 434篇 |
2007年 | 429篇 |
2006年 | 371篇 |
2005年 | 319篇 |
2004年 | 295篇 |
2003年 | 226篇 |
2002年 | 231篇 |
2001年 | 185篇 |
2000年 | 172篇 |
1999年 | 168篇 |
1998年 | 267篇 |
1997年 | 200篇 |
1996年 | 164篇 |
1995年 | 144篇 |
1994年 | 123篇 |
1993年 | 138篇 |
1992年 | 134篇 |
1991年 | 77篇 |
1990年 | 92篇 |
1989年 | 79篇 |
1988年 | 98篇 |
1987年 | 66篇 |
1986年 | 54篇 |
1985年 | 79篇 |
1984年 | 94篇 |
1983年 | 60篇 |
1982年 | 66篇 |
1981年 | 83篇 |
1980年 | 69篇 |
1979年 | 85篇 |
1978年 | 68篇 |
1977年 | 69篇 |
1976年 | 58篇 |
1975年 | 58篇 |
1973年 | 47篇 |
排序方式: 共有9486条查询结果,搜索用时 390 毫秒
141.
Bo Fan Lei Xie Shan Yang Lijuan Wang Frank K. Soong 《Multimedia Tools and Applications》2016,75(9):5287-5309
This paper proposes a deep bidirectional long short-term memory approach in modeling the long contextual, nonlinear mapping between audio and visual streams for video-realistic talking head. In training stage, an audio-visual stereo database is firstly recorded as a subject talking to a camera. The audio streams are converted into acoustic feature, i.e. Mel-Frequency Cepstrum Coefficients (MFCCs), and their textual labels are also extracted. The visual streams, in particular, the lower face region, are compactly represented by active appearance model (AAM) parameters by which the shape and texture variations can be jointly modeled. Given pairs of the audio and visual parameter sequence, a DBLSTM model is trained to learn the sequence mapping from audio to visual space. For any unseen speech audio, whether it is original recorded or synthesized by text-to-speech (TTS), the trained DBLSTM model can predict a convincing AAM parameter trajectory for the lower face animation. To further improve the realism of the proposed talking head, the trajectory tiling method is adopted to use the DBLSTM predicted AAM trajectory as a guide to select a smooth real sample image sequence from the recorded database. We then stitch the selected lower face image sequence back to a background face video of the same subject, resulting in a video-realistic talking head. Experimental results show that the proposed DBLSTM approach outperforms the existing HMM-based approach in both objective and subjective evaluations. 相似文献
142.
The number R(4, 3, 3) is often presented as the unknown Ramsey number with the best chances of being found “soon”. Yet, its precise value has remained unknown for almost 50 years. This paper presents a methodology based on abstraction and symmetry breaking that applies to solve hard graph edge-coloring problems. The utility of this methodology is demonstrated by using it to compute the value R(4, 3, 3) = 30. Along the way it is required to first compute the previously unknown set \(\mathcal {R}(3,3,3;13)\) consisting of 78,892 Ramsey colorings. 相似文献
143.
Frank Bonnet Yuta Kato José Halloy Francesco Mondada 《Artificial Life and Robotics》2016,21(3):239-246
Robotic fish are nowadays developed for various types of research, such as bio-inspiredrobotics, biomimetics and animal behavior studies. In the context of our research on the social interactions of the zebrafish Danio Rerio, we developed a miniature robotic fish lure for direct underwater interaction with the living fish. This remotely controlled and waterproof device has a total length of 7.5 cm with the same size ratio as zebrafish and is able to beat its tail with different frequencies and amplitudes, while following the group of living animals using a mobile robot moving outside water that is coupled with the robotic lure using magnets. The robotic lure is also equipped with a rechargeable battery and can be used autonomously underwater for experiments of up to 1 h. We performed experiments with the robot moving inside an aquarium with living fish to analyze its impact on the zebrafish behavior. We found that the beating rate of the tail increased the attractiveness of the lure among the zebrafish shoal. We also demonstrated that the lure could influence a collective decision of the zebrafish shoal, the swimming direction, when moving with a constant linear speed inside a circular corridor. This new robotic fish design and the experimental results are promising for the field of fish–robot interaction. 相似文献
144.
Consensus of heterogeneous first‐ and second‐order multi‐agent systems with directed communication topologies
下载免费PDF全文
![点击此处可从《国际强度与非线性控制杂志<br>》网站下载免费的PDF全文](/ch/ext_images/free.gif)
In this paper, we consider the consensus problem for heterogeneous multi‐agent systems composed of some first‐order and some second‐order dynamic agents in directed communication graphs. Consensus protocols are proposed for the second‐ and first‐order dynamic agents, respectively. Under certain assumptions on the control parameters, for fixed communication topologies, necessary and sufficient conditions for consensus are given, and the consensus values of all agents are established. For switching topologies, sufficient conditions are given for all agents to reach consensus. Finally, simulation examples are presented to demonstrate the effectiveness of the proposed methods. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
145.
Gradient vector flow (GVF) is a feature-preserving spatial diffusion of image gradients. It was introduced to overcome the limited capture range in traditional active contour segmentation. However, the original iterative solver for GVF, using Euler’s method, converges very slowly. Thus, many iterations are needed to achieve the desired capture range. Several groups have investigated the use of graphic processing units (GPUs) to accelerate the GVF computation. Still, this does not reduce the number of iterations needed. Multigrid methods, on the other hand, have been shown to provide a much better capture range using considerable less iterations. However, non-GPU implementations of the multigrid method are not as fast as the Euler method when executed on the GPU. In this paper, a novel GPU implementation of a multigrid solver for GVF written in OpenCL is presented. The results show that this implementation converges and provides a better capture range about 2–5 times faster than the conventional iterative GVF solver on the GPU. 相似文献
146.
Difficulties in integrating technical, economic and institutional factors present a major gap in analytical capacity to guide water policy. This article presents an integrated framework to support water policy and guide water management choices, with application to Israel. That framework rests on the theory of economic policy originally developed by Tinbergen. It sees national water challenges as consisting of external factors, constraints, policy instruments and targets. The need for a modern implementation of the theory of economic policy is motivated by emerging environmental requirements, scarce water, growing demands for domestic use, and ongoing needs to implement existing and potential peace agreements. 相似文献
147.
Carlos Rodríguez Daniel Schleicher Florian Daniel Fabio Casati Frank Leymann Sebastian Wagner 《Service Oriented Computing and Applications》2013,7(4):275-292
Facilitating compliance management, that is, assisting a company’s management in conforming to laws, regulations, standards, contracts, and policies, is a hot but non-trivial task. The service-oriented architecture (SOA) has evolved traditional, manual business practices into modern, service-based IT practices that ease part of the problem: the systematic definition and execution of business processes. This, in turn, facilitates the online monitoring of system behaviors and the enforcement of allowed behaviors—all ingredients that can be used to assist compliance management on the fly during process execution. In this paper, instead of focusing on monitoring and runtime enforcement of rules or constraints, we strive for an alternative approach to compliance management in SOAs that aims at assessing and improving compliance. We propose two ingredients: (i) a model and tool to design compliant service-based processes and to instrument them in order to generate evidence of how they are executed and (ii) a reporting and analysis suite to create awareness of a company’s compliance state and to enable understanding why and where compliance violations have occurred. Together, these ingredients result in an approach that is close to how the real stakeholders—compliance experts and auditors—actually assess the state of compliance in practice and that is less intrusive than enforcing compliance. 相似文献
148.
Olaf Mersmann Bernd Bischl Heike Trautmann Markus Wagner Jakob Bossek Frank Neumann 《Annals of Mathematics and Artificial Intelligence》2013,69(2):151-182
Meta-heuristics are frequently used to tackle NP-hard combinatorial optimization problems. With this paper we contribute to the understanding of the success of 2-opt based local search algorithms for solving the traveling salesperson problem (TSP). Although 2-opt is widely used in practice, it is hard to understand its success from a theoretical perspective. We take a statistical approach and examine the features of TSP instances that make the problem either hard or easy to solve. As a measure of problem difficulty for 2-opt we use the approximation ratio that it achieves on a given instance. Our investigations point out important features that make TSP instances hard or easy to be approximated by 2-opt. 相似文献
149.
In this note, we correct a mistake which was made in the paper “Minimizing Total Tardiness on Parallel Machines with Preemptions” (see J Schedul 15:193–200, 2012). 相似文献
150.
Location-based applications such as Facebook Places, Foursquare, or Loopt typically use location services to manage mobile object positions. However, exposing precise user positions raises user privacy concerns, especially if location service providers are not fully trusted. To enable the secure management of private user positions in non-trusted systems, we present two novel position sharing approaches based on the concept of multi-secret sharing. We improve existing geometric position sharing approaches by Dürr et al. [2] and Skvortsov et al. [3] by considering continuous position updates and by increasing the robustness against various attacks. Furthermore, we present the first position sharing approach for symbolic location models. 相似文献