全文获取类型
收费全文 | 55611篇 |
免费 | 4506篇 |
国内免费 | 2203篇 |
专业分类
电工技术 | 3046篇 |
技术理论 | 5篇 |
综合类 | 3142篇 |
化学工业 | 9758篇 |
金属工艺 | 3382篇 |
机械仪表 | 3397篇 |
建筑科学 | 3889篇 |
矿业工程 | 1817篇 |
能源动力 | 1757篇 |
轻工业 | 3877篇 |
水利工程 | 934篇 |
石油天然气 | 3904篇 |
武器工业 | 434篇 |
无线电 | 5955篇 |
一般工业技术 | 6608篇 |
冶金工业 | 3070篇 |
原子能技术 | 779篇 |
自动化技术 | 6566篇 |
出版年
2024年 | 204篇 |
2023年 | 890篇 |
2022年 | 1681篇 |
2021年 | 2422篇 |
2020年 | 1779篇 |
2019年 | 1498篇 |
2018年 | 1720篇 |
2017年 | 1849篇 |
2016年 | 1676篇 |
2015年 | 2219篇 |
2014年 | 2837篇 |
2013年 | 3283篇 |
2012年 | 3470篇 |
2011年 | 3769篇 |
2010年 | 3330篇 |
2009年 | 2985篇 |
2008年 | 2956篇 |
2007年 | 2878篇 |
2006年 | 2989篇 |
2005年 | 2547篇 |
2004年 | 1604篇 |
2003年 | 1401篇 |
2002年 | 1320篇 |
2001年 | 1059篇 |
2000年 | 1259篇 |
1999年 | 1535篇 |
1998年 | 1215篇 |
1997年 | 1037篇 |
1996年 | 1043篇 |
1995年 | 893篇 |
1994年 | 720篇 |
1993年 | 467篇 |
1992年 | 380篇 |
1991年 | 296篇 |
1990年 | 241篇 |
1989年 | 201篇 |
1988年 | 174篇 |
1987年 | 106篇 |
1986年 | 91篇 |
1985年 | 61篇 |
1984年 | 53篇 |
1983年 | 36篇 |
1982年 | 32篇 |
1981年 | 30篇 |
1980年 | 17篇 |
1979年 | 7篇 |
1978年 | 7篇 |
1977年 | 10篇 |
1976年 | 14篇 |
1959年 | 11篇 |
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
991.
There is a wish to be able to enter text into mobile computing devices at the speed of speech. Only handwritten shorthand schemes can achieve this data recording rate. A new, overall solution to the segmentation and recognition of phonetic features in Pitman shorthand is proposed in this paper. Approaches to the recognition of consonant outlines, vowel and diphthong symbols and shortforms, which are different components of Pitman shorthand, are presented. A new rule is introduced to solve the issue of smooth junctions in the consonant outlines which was normally the bottleneck for recognition. Experiments with a set of 1127 consonant outlines, 2039 vowels and diphthongs and 841 shortforms from three shorthand writers have demonstrated that the proposed solution is quite promising. The recognition accuracies for consonant outlines, vowels and diphthongs, and shortforms achieved 75.33%, 96.86% and 91.86%, respectively. From the evaluation of 461 outlines with smooth junction, the introduction of the new rule has a great positive effect on the performance of the solution. The recognition accuracy of smooth junction improves from 37.53% to 93.41% given a writing time increase of 14.42%. 相似文献
992.
Barbara Yersin Jonathan Maïm Fiorenzo Morini Daniel Thalmann 《The Visual computer》2008,24(10):859-870
Real-time crowd motion planning requires fast, realistic methods for path planning as well as obstacle avoidance. In a previous
work (Morini et al. in Cyberworlds International Conference, pp. 144–151, 2007), we introduced a hybrid architecture to handle real-time motion planning of thousands of pedestrians. In this article, we
present an extended version of our architecture, introducing two new features: an improved short-term collision avoidance
algorithm, and simple efficient group behavior for crowds. Our approach allows the use of several motion planning algorithms
of different precision for regions of varied interest. Pedestrian motion continuity is ensured when switching between such
algorithms. To assess our architecture, several performance tests have been conducted, as well as a subjective test demonstrating
the impact of using groups. Our results show that the architecture can plan motion in real time for several thousands of characters.
相似文献
Daniel ThalmannEmail: |
993.
We consider the Sequential Monte Carlo (SMC) method for Bayesian inference applied to the problem of information-theoretic
distributed sensor collaboration in complex environments. The robot kinematics and sensor observation under consideration
are described by nonlinear models. The exact solution to this problem is prohibitively complex due to the nonlinear nature
of the system. The SMC method is, therefore, employed to track the probabilistic kinematics of the robot and to make the corresponding
Bayesian estimates and predictions. To meet the specific requirements inherent in distributed sensors, such as low-communication
consumption and collaborative information processing, we propose a novel SMC solution that makes use of the particle filter
technique for data fusion, and the density tree representation of the a posterior distribution for information exchange between
sensor nodes. Meanwhile, an efficient numerical method is proposed for approximating the information utility in sensor selection.
A further experiment, obtained with a real robot in an indoor environment, illustrates that under the SMC framework, the optimal
sensor selection and collaboration can be implemented naturally, and significant improvement in localization accuracy is achieved
when compared to conventional methods using all sensors. 相似文献
994.
Kui Liu Wei-zheng Yuan Jin-jun Deng Bing-he Ma Cheng-yu Jiang 《Microsystem Technologies》2008,14(1):1-6
Microelectromechanical systems plays an important role for studying gaseous or liquid fluid flows experimentally due to the
dimensions of the device on the μm-scale. For aerodynamic applications, the detection of the location of the separation point
of the boundary layer is very important, which is used for active flow control and smart skin adaptive control system. This
paper presents the design and integration methods of a flexible polymide substrate micro thermal sensor array, sensor array
driver circuit, dynamic data acquisition circuit, and criterion algorithm of the boundary layer separation point. The above
algorithms were used to analyze the NACA0012 wind tunnel test data at flow conditions of the velocity 40 m/s and AOA 16°.
The result demonstrated the above system can fulfill the dynamic and real-time of the adaptive control system. 相似文献
995.
996.
在并行计算中,网络分割的质量会极大地影响并行计算的效率,然而在网络分割时并没有一个统一的质量评价指标,因此网络分割评价指标的定义以及最佳网络分割方法的构造,成为大规模网络中并行计算的一个核心问题.根据对影响并行计算效率的各种因素的分析,给出了一个网络分割评价指数的定义,并利用并行最短路径的计算验证了该评价指数的定义的正确性;并且基于社区分析,给出了一个全新的网络分割方法,理论分析表明:该网络分割方法是最优的. 相似文献
997.
一种内网端点安全系统的设计 总被引:1,自引:0,他引:1
当前很多企业部署了内部网络,并将内网作为信息发布和共享的平台,确保内网安全和端点安全的要求与日俱增,随着攻击工具和手段的日趋复杂多样,传统的防范手段已不能保证内网安全和端点安全。文章针对端点安全,研究了对非安全网络端点的识别和隔离方法,提出了一种内网端点安全系统的设计方案,基于现有网络设备和标准协议,可实现入侵检测和访问控制的功能,成本较低、结构简单、管理方便。 相似文献
998.
介绍了增强图像质量的若干方法,包括图像平滑处理、图像锐化处理以及Windows API函数SetStretchBltMode的调用,阐述了其原理、算法及该原理在Windows平台上以C++ Builder为开发工具的具体程序实现. 相似文献
999.
ZhiMing Zheng ShiLong Ma Wei Li Wei Wei Xin Jiang ZhanLi Zhang BingHui Guo 《中国科学F辑(英文版)》2009,52(8):1328-1334
Developing trusted softwares has become an important trend and a natural choice in the development of software technology
and applications, and software trustworthiness modeling has become a prerequisite and necessary means. To discuss and explain
the basic scientific problems in software trustworthiness and to establish theoretical foundations for software trustworthiness
measurement, combining the ideas of dynamical system study, this paper studies evolutionary laws of software trustworthiness
and the dynamical mechanism under the effect of various internal and external factors, and proposes dynamical models for software
trustworthiness, thus, software trustworthiness can be considered as the statistical characteristics of behaviors of software
systems in the dynamical and open environment. By analyzing two simple examples, the paper explains the relationship between
the limit evolutionary behaviors of software trustworthiness attributes and dynamical system characteristics, and interprets
the dynamical characteristics of software trustworthiness and their evolutionary complexity.
Supported partially by the National Basic Research Program of China (Grant No. 2005CB321900) and the National Natural Science
Foundation of China (Grant No. 60473091) 相似文献
1000.
Classification of network traffic is the essential step for many network researches. However,with the rapid evolution of Internet applications the effectiveness of the port-based or payload-based identifi-cation approaches has been greatly diminished in recent years. And many researchers begin to turn their attentions to an alternative machine learning based method. This paper presents a novel machine learning-based classification model,which combines ensemble learning paradigm with co-training tech-niques. Compared to previous approaches,most of which only employed single classifier,multiple clas-sifiers and semi-supervised learning are applied in our method and it mainly helps to overcome three shortcomings:limited flow accuracy rate,weak adaptability and huge demand of labeled training set. In this paper,statistical characteristics of IP flows are extracted from the packet level traces to establish the feature set,then the classification model is created and tested and the empirical results prove its feasibility and effectiveness. 相似文献