全文获取类型
收费全文 | 1249篇 |
免费 | 77篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 14篇 |
综合类 | 1篇 |
化学工业 | 296篇 |
金属工艺 | 23篇 |
机械仪表 | 24篇 |
建筑科学 | 44篇 |
矿业工程 | 1篇 |
能源动力 | 57篇 |
轻工业 | 86篇 |
水利工程 | 8篇 |
石油天然气 | 2篇 |
无线电 | 118篇 |
一般工业技术 | 256篇 |
冶金工业 | 135篇 |
原子能技术 | 12篇 |
自动化技术 | 250篇 |
出版年
2024年 | 3篇 |
2023年 | 18篇 |
2022年 | 35篇 |
2021年 | 50篇 |
2020年 | 26篇 |
2019年 | 47篇 |
2018年 | 44篇 |
2017年 | 34篇 |
2016年 | 48篇 |
2015年 | 44篇 |
2014年 | 59篇 |
2013年 | 91篇 |
2012年 | 87篇 |
2011年 | 132篇 |
2010年 | 77篇 |
2009年 | 72篇 |
2008年 | 86篇 |
2007年 | 54篇 |
2006年 | 59篇 |
2005年 | 39篇 |
2004年 | 25篇 |
2003年 | 26篇 |
2002年 | 17篇 |
2001年 | 3篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 17篇 |
1997年 | 15篇 |
1996年 | 15篇 |
1995年 | 10篇 |
1994年 | 8篇 |
1993年 | 8篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1977年 | 4篇 |
1976年 | 2篇 |
1958年 | 2篇 |
1954年 | 3篇 |
1948年 | 2篇 |
1947年 | 2篇 |
1946年 | 2篇 |
排序方式: 共有1327条查询结果,搜索用时 15 毫秒
21.
Partial 3D Shape Retrieval by Reeb Pattern Unfolding 总被引:2,自引:0,他引:2
This paper presents a novel approach for fast and efficient partial shape retrieval on a collection of 3D shapes. Each shape is represented by a Reeb graph associated with geometrical signatures. Partial similarity between two shapes is evaluated by computing a variant of their maximum common sub-graph.
By investigating Reeb graph theory, we take advantage of its intrinsic properties at two levels. First, we show that the segmentation of a shape by a Reeb graph provides charts with disk or annulus topology only. This topology control enables the computation of concise and efficient sub-part geometrical signatures based on parameterisation techniques. Secondly, we introduce the notion of Reeb pattern on a Reeb graph along with its structural signature. We show this information discards Reeb graph structural distortion and still depicts the topology of the related sub-parts. The number of combinations to evaluate in the matching process is then dramatically reduced by only considering the combinations of topology equivalent Reeb patterns.
The proposed framework is invariant against rigid transformations and robust against non-rigid transformations and surface noise. It queries the collection in interactive time (from 4 to 30 seconds for the largest queries). It outperforms the competing methods of the SHREC 2007 contest in term of NDCG vector and provides, respectively, a gain of 14.1% and 40.9% on the approaches by Biasotti et al. [ BMSF06 ] and Cornea et al. [ CDS*05 ].
As an application, we present an intelligent modelling-by-example system which enables a novice user to rapidly create new 3D shapes by composing shapes of a collection having similar sub-parts. 相似文献
By investigating Reeb graph theory, we take advantage of its intrinsic properties at two levels. First, we show that the segmentation of a shape by a Reeb graph provides charts with disk or annulus topology only. This topology control enables the computation of concise and efficient sub-part geometrical signatures based on parameterisation techniques. Secondly, we introduce the notion of Reeb pattern on a Reeb graph along with its structural signature. We show this information discards Reeb graph structural distortion and still depicts the topology of the related sub-parts. The number of combinations to evaluate in the matching process is then dramatically reduced by only considering the combinations of topology equivalent Reeb patterns.
The proposed framework is invariant against rigid transformations and robust against non-rigid transformations and surface noise. It queries the collection in interactive time (from 4 to 30 seconds for the largest queries). It outperforms the competing methods of the SHREC 2007 contest in term of NDCG vector and provides, respectively, a gain of 14.1% and 40.9% on the approaches by Biasotti et al. [ BMSF06 ] and Cornea et al. [ CDS*05 ].
As an application, we present an intelligent modelling-by-example system which enables a novice user to rapidly create new 3D shapes by composing shapes of a collection having similar sub-parts. 相似文献
22.
23.
Several studies have stressed that even expert operators who are aware of a machine's limits could adopt its proposals without questioning them (i.e., the complacency phenomenon). In production scheduling for manufacturing, this is a significant problem, as it is often suggested that the machine be allowed to build the production schedule, confining the human role to that of rescheduling. This article evaluates the characteristics of scheduling algorithms on human rescheduling performance, the quality of which was related to complacency. It is suggested that scheduling algorithms be characterized as having result comprehensibility (the result respects the scheduler's expectations in terms of the discourse rules of the information display) or algorithm comprehensibility (the complexity of the algorithm hides some important constraints). The findings stress, on the one hand, that result comprehensibility is necessary to achieve good production performance and to limit complacency. On the other hand, algorithm comprehensibility leads to poor performance due to the very high cost of understanding the algorithm. © 2008 Wiley Periodicals, Inc. 相似文献
24.
The paper describes a software method to extend ITK (Insight ToolKit, supported by the National Library of Medicine), leading to ITK++. This method, which is based on the extension of the iterator design pattern, allows the processing of regions of interest with arbitrary shapes, without modifying the existing ITK code. We experimentally evaluate this work by considering the practical case of the liver vessel segmentation from CT-scan images, where it is pertinent to constrain processings to the liver area. Experimental results clearly prove the interest of this work: for instance, the anisotropic filtering of this area is performed in only 16 s with our proposed solution, while it takes 52 s using the native ITK framework. A major advantage of this method is that only add-ons are performed: this facilitates the further evaluation of ITK++ while preserving the native ITK framework. 相似文献
25.
This work addresses the soundtrack indexing of multimedia documents. Our purpose is to detect and locate sound unity to structure the audio dataflow in program broadcasts (reports). We present two audio classification tools that we have developed. The first one, a speech music classification tool, is based on three original features: entropy modulation, stationary segment duration (with a Forward–Backward Divergence algorithm) and number of segments. They are merged with the classical 4 Hz modulation energy. It is divided into two classifications (speech/non-speech and music/non-music) and provides more than 90% of accuracy for speech detection and 89% for music detection. The other system, a jingle identification tool, uses an Euclidean distance in the spectral domain to index the audio data flow. Results show that is efficient: among 132 jingles to recognize, we have detected 130. Systems are tested on TV and radio corpora (more than 10 h). They are simple, robust and can be improved on every corpus without training or adaptation.
相似文献
Régine André-ObrechtEmail: |
26.
Raheel Hassan Syed Jasmina Pazardzievska Julien Bourgeois 《The Journal of supercomputing》2012,62(2):804-827
Due to the extensive growth of grid computing networks, security is becoming a challenge. Usual solutions are not enough to prevent sophisticated attacks fabricated by multiple users especially when the number of nodes connected to the network is changing over the time. Attackers can use multiple nodes to launch DDoS attacks which generate a large amount of security alerts. On the one hand, this large number of security alerts degrades the overall performance of the network and creates instability in the operation of the security management solutions. On the other hand, they can help in camouflaging other real attacks. To address these issues, a?correlation mechanism is proposed which reduces the security alerts and continue detecting attacks in grid computing networks. To obtain the more accurate results, a?major portion of the experiments are performed by launching DDoS and Brute Force (BF) attacks in real grid environment, i.e., the Grid??5000 (G5K) network. 相似文献
27.
Shear Stress in Smooth Rectangular Open-Channel Flows 总被引:1,自引:0,他引:1
The average bed and sidewall shear stresses in smooth rectangular open-channel flows are determined after solving the continuity and momentum equations. The analysis shows that the shear stresses are function of three components: (1) gravitational; (2) secondary flows; and (3) interfacial shear stress. An analytical solution in terms of series expansion is obtained for the case of constant eddy viscosity without secondary currents. In comparison with laboratory measurements, it slightly overestimates the average bed shear stress measurements but underestimates the average sidewall shear stress by 17% when the width–depth ratio becomes large. A second approximation is formulated after introducing two empirical correction factors. The second approximation agrees very well (R2>0.99 and average relative error less than 6%) with experimental measurements over a wide range of width–depth ratios. 相似文献
28.
Katie L. J. Cederberg Umaer Hanif Vicente Peris Sempere Julien Hdou Eileen B. Leary Logan D. Schneider Ling Lin Jing Zhang Anne M. Morse Adam Blackman Paula K. Schweitzer Suresh Kotagal Richard Bogan Clete A. Kushida Yo-El S. Ju Nayia Petousi Chris D. Turnbull Emmanuel Mignot The STAGES Cohort Investigator Group 《International journal of molecular sciences》2022,23(14)
Obstructive sleep apnea (OSA), a disease associated with excessive sleepiness and increased cardiovascular risk, affects an estimated 1 billion people worldwide. The present study examined proteomic biomarkers indicative of presence, severity, and treatment response in OSA. Participants (n = 1391) of the Stanford Technology Analytics and Genomics in Sleep study had blood collected and completed an overnight polysomnography for scoring the apnea–hypopnea index (AHI). A highly multiplexed aptamer-based array (SomaScan) was used to quantify 5000 proteins in all plasma samples. Two separate intervention-based cohorts with sleep apnea (n = 41) provided samples pre- and post-continuous/positive airway pressure (CPAP/PAP). Multivariate analyses identified 84 proteins (47 positively, 37 negatively) associated with AHI after correction for multiple testing. Of the top 15 features from a machine learning classifier for AHI ≥ 15 vs. AHI < 15 (Area Under the Curve (AUC) = 0.74), 8 were significant markers of both AHI and OSA from multivariate analyses. Exploration of pre- and post-intervention analysis identified 5 of the 84 proteins to be significantly decreased following CPAP/PAP treatment, with pathways involving endothelial function, blood coagulation, and inflammatory response. The present study identified PAI-1, tPA, and sE-Selectin as key biomarkers and suggests that endothelial dysfunction and increased coagulopathy are important consequences of OSA, which may explain the association with cardiovascular disease and stroke. 相似文献
29.
将虚拟人群与实拍视频场景融合实现虚拟人群对现实场景中动态目标的合理避让,是增强现实技术有待解决的一个新问题.文中首先对实拍视频流进行分析,获取真实动态目标在三维空间中的运动信息;然后将动态目标的运动转化为每个虚拟角色的约束条件,实时更新虚拟角色的运动决策,实现其对现实场景中动态目标的避让以及虚拟角色之间的避让.为了清晰地展示现实世界中多个目标的空间位置关系,还对视频画面中的目标体做了精确的实时分割,以产生正确的遮挡关系和目标定位.最后通过实验结果表明了该算法的有效性. 相似文献
30.
Kang Tan Duncan Bremner Julien Le Kernec Lei Zhang Muhammad Imran 《Digital Communications & Networks》2022,8(1):18-24
As vehicle complexity and road congestion increase, combined with the emergence of electric vehicles, the need for intelligent transportation systems to improve on-road safety and transportation efficiency using vehicular networks has become essential. The evolution of high mobility wireless networks will provide improved support for connected vehicles through highly dynamic heterogeneous networks. Particularly, 5G deployment introduces new features and technologies that enable operators to capitalize on emerging infrastructure capabilities. Machine Learning (ML), a powerful methodology for adaptive and predictive system development, has emerged in both vehicular and conventional wireless networks. Adopting data-centric methods enables ML to address highly dynamic vehicular network issues faced by conventional solutions, such as traditional control loop design and optimization techniques. This article provides a short survey of ML applications in vehicular networks from the networking aspect. Research topics covered in this article include network control containing handover management and routing decision making, resource management, and energy efficiency in vehicular networks. The findings of this paper suggest more attention should be paid to network forming/deforming decision making. ML applications in vehicular networks should focus on researching multi-agent cooperated oriented methods and overall complexity reduction while utilizing enabling technologies, such as mobile edge computing for real-world deployment. Research datasets, simulation environment standardization, and method interpretability also require more research attention. 相似文献