首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3956篇
  免费   229篇
  国内免费   67篇
电工技术   172篇
综合类   53篇
化学工业   815篇
金属工艺   110篇
机械仪表   152篇
建筑科学   92篇
矿业工程   19篇
能源动力   141篇
轻工业   202篇
水利工程   31篇
石油天然气   30篇
武器工业   8篇
无线电   813篇
一般工业技术   673篇
冶金工业   372篇
原子能技术   29篇
自动化技术   540篇
  2024年   9篇
  2023年   27篇
  2022年   90篇
  2021年   128篇
  2020年   77篇
  2019年   64篇
  2018年   87篇
  2017年   91篇
  2016年   95篇
  2015年   114篇
  2014年   176篇
  2013年   323篇
  2012年   262篇
  2011年   265篇
  2010年   215篇
  2009年   202篇
  2008年   205篇
  2007年   195篇
  2006年   186篇
  2005年   108篇
  2004年   106篇
  2003年   105篇
  2002年   81篇
  2001年   62篇
  2000年   65篇
  1999年   68篇
  1998年   152篇
  1997年   108篇
  1996年   83篇
  1995年   53篇
  1994年   69篇
  1993年   55篇
  1992年   49篇
  1991年   32篇
  1990年   36篇
  1989年   35篇
  1988年   21篇
  1987年   19篇
  1986年   13篇
  1985年   18篇
  1984年   17篇
  1983年   7篇
  1982年   8篇
  1981年   9篇
  1980年   6篇
  1978年   8篇
  1977年   7篇
  1976年   9篇
  1975年   7篇
  1973年   5篇
排序方式: 共有4252条查询结果,搜索用时 203 毫秒
111.
Feature extraction in carpal-bone analysis   总被引:4,自引:0,他引:4  
Hand-bone analysis with image processing techniques using a digital radiograph can be used to assess skeletal age. The analysis consists of two steps: phalangeal and carpal bone analysis. The carpal bone analysis is discussed. First, the carpal bone region of interest (CROI) is defined using a standard thresholding technique to separate the hand from the background. Then, a dynamic thresholding method with variable window sizes is used to differentiate between the bones and the soft tissue. Next, the radius, ulna, and metacarpals intersecting the borders of the CROI are removed by using mathematical morphology. Finally, all objects included in the corrected CROI are separated and described in terms of features. These features describe the size, shape, and location and include some gray-scale pixel value information. On the basis of this analysis, the separation of the noncarpal bone objects from the carpal bone is possible. The feature selection step removes features of low discriminant power and reduces the space dimension. The remaining carpal bone parameters are used for further analysis leading to skeletal age assessment.  相似文献   
112.
This paper presents a query processing strategy for the content-based video query language named CVQL. By CVQL, users can flexibly specify query predicates by the spatial and temporal relationships of the content objects. The query processing strategy evaluates the predicates and returns qualified videos or frames as results. Before the evaluation of the predicates, a preprocessing is performed to avoid unnecessary accessing of videos which are impossible to be the answers. The preprocessing checks the existence of the content objects specified in the predicates to eliminate unqualified videos. For the evaluation of the predicates, an M-index is designed based on the analysis of the behaviors of the content objects. The M-index is employed to avoid frame-by-frame evaluation of the predicates. Experimental results are presented to illustrate the performance of this approach  相似文献   
113.
视频监控中基于颜色特征的运动目标匹配研究   总被引:1,自引:1,他引:0  
提出了一种基于颜色特征的运动目标匹配方法。通过颜色直方图定义了运动目标的主颜色区域,并依据最大隶属度原则建立RGB三维彩色空间主颜色区域信息的模糊子集,最后采用模糊相似匹配原理对匹配目标与待匹配目标模糊集的模糊隶属度函数和贴近度函数进行比较,得出匹配结果。实验结果表明,该方法在解决视频监控中运动目标匹配问题时是可行且可靠的。  相似文献   
114.
Cuprous oxide that was prepared from Cu-containing waste liquid from a printed circuit board manufacturer was used to carry out Fenton-like and photo-Fenton-like oxidation reactions to decolorize a reactive dye (RB19). A microwave hydrothermal method was applied in the synthesis. The highest recovery rate of Cu from wastewater was 87% and was obtained when the synthesis was performed at a power of 200 W for 15 min. An RB19 decolorization efficiency of 99.9% was achieved when the Fenton-like reaction was conducted with 50 mmol/L H(2)O(2) and 0.9 g/L of Cu(2)O. The decolorization of RB19 was more effective when the system was irradiated with visible light than with UV light. Under irradiation, the decolorization rate was the highest when the decolorization was performed in the RB19 solution that contained 50 mmol/L H(2)O(2) and 0.9 g/L CuO(2) in the Fenton-like and the 365 nm-irradiated photo-Fenton-like reactions. In the case of irradiation under 410 nm visible light, the system was operated with lower H(2)O(2) (30 mmol/L) and Cu(2)O (0.5 g/L) to achieve a decolorization rate higher than 365 nm-irradiated photo-Fenton-like reactions.  相似文献   
115.
In sports and board games, when an opponent cheats, the other players typically greet it with disdain, anger, and disengagement. However, work has yet to fully address the role of the computer cheating in video games. In this study, participants played either a cheating or a non-cheating version of a modified open-source tower-defense game. Results indicate that when a computer competitor cheats, players perceive the opponent as being more human. Cheating also increases player aggravation and presence, but does not affect enjoyment of the experience. Additionally, players that firmly believed that their opponent was controlled by the computer exhibited significantly less state hostility compared to players that were less certain of the nature of their competitor. Game designers can integrate subtle levels of cheating into computer opponents without any real negative responses from the players. The results indicate that minor levels of cheating might also increase player engagement with video games.  相似文献   
116.
Adaptive random testing is an enhancement of random testing. Previous studies on adaptive random testing assumed that once a failure is detected, testing is terminated and debugging is conducted immediately. It has been shown that adaptive random testing normally uses fewer test cases than random testing for detecting the first software failure. However, under many practical situations, testing should not be withheld after the detection of a failure. Thus, it is important to investigate the effectiveness with respect to the detection of multiple failures. In this paper, we compare adaptive random testing and random testing under various scenarios and examine whether adaptive random testing is still able to use fewer test cases than random testing to detect multiple software failures. Our study delivers some interesting results and highlights a number of promising research projects. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
117.
Behavior‐based detection and signature‐based detection are two popular approaches to malware (malicious software) analysis. The security industry, such as the sector selling antivirus tools, has been using signature and heuristic‐based technologies for years. However, this approach has been proven to be inefficient in identifying unknown malware strains. On the other hand, the behavior‐based malware detection approach has a greater potential in identifying previously unknown instances of malicious software. The accuracy of this approach relies on techniques to profile and recognize accurate behavior models. Unfortunately, with the increasing complexity of malicious software and limitations of existing automatic tools, the current behavior‐based approach cannot discover many newer forms of malware either. In this paper, we implement ‘holography platform’, a behavior‐based profiler on top of a virtual machine emulator that intercepts the system processes and analyzes the CPU instructions, CPU registers, and memory. The captured information is stored in a relational database, and data mining techniques are used to extract information. We demonstrate the breadth of the ‘holography platform’ by conducting two experiments: a packed binary behavior analysis and a malvertising (malicious advertising) incident tracing. Both tasks are known to be very difficult to do efficiently using existing methods and tools. We demonstrate how the precise behavior information can be easily obtained using the ‘holography platform’ tool. With these two experiments, we show that the ‘holography platform’ can provide security researchers and automatic malware detection systems with an efficient malicious software behavior analysis solution. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
118.
This paper develops techniques to extract conceptual graphs from a patent claim using syntactic information (POS, and dependency tree) and semantic information (background ontology). Due to plenteous technical domain terms and lengthy sentences prevailing in patent claims, it is difficult to apply a NLP Parser directly to parse the plain texts in the patent claim. This paper combines techniques such as finite state machines, Part-Of-Speech tags, conceptual graphs, domain ontology and dependency tree to convert a patent claim into a formally defined conceptual graph. The method of a finite state machine splits a lengthy patent claim sentence into a set of shortened sub-sentences so that the NLP Parser can parse them one by one effectively. The Part-Of-Speech and dependency tree of a patent claim are used to build the conceptual graph based on the pre-established domain ontology. The result shows that 99% sub-sentences split from 1700 patent claims can be efficiently parsed by the NLP Parser. There are two types of nodes in a conceptual graph, the concept and the relation nodes. Each concept or relation can be extracted directly from a patent claim and each relation can link with a fixed number of concepts in a conceptual graph. From 100 patent claims, the average precision and recall of a concept class mapping from the patent claim to domain ontology are 96% and 89%, respectively, and the average precision and recall for Real relation class mapping are 97% and 98%, respectively. For the concept linking of a relation, the average precision is 79%. Based on the extracted conceptual graphs from patents, it would facilitate automated comparison and summarization among patents for judgment of patent infringement.  相似文献   
119.
Benzoxazine was synthesized through the Mannich condensation of phenol, formaldehyde, and primary amines through ring-opening polymerization. Polybenzoxazines are phenolic-like materials that possess dimensional and thermal stability, and they release no toxic byproducts during their polymerization. To further improve the thermal stability of polybenzoxazines, a hydrosilane-functionalized polyhedral oligomeric silsesquioxane (H-POSS) was incorporated into the vinyl-terminated benzoxazine monomer (VB-a) which we then subjected to ring-opening polymerization. In addition, we also prepared hybrids from a non-reactive POSS (IB-POSS) and VB-a. The glass transition temperature (Tg) of a regular polymerized VB-a (i.e. PVB-a) is 307 °C, while the hybrid containing 5 wt% of H-POSS is 333 °C. The IB-POSS modified PVB-a hybrids, in general, results in lower Tg than the pure PVB-a due to poor missibility.  相似文献   
120.
Basic information on modeling and digital computer simulation of variable-reluctance (VR) step motors is provided. The nonlinear equations of the system are derived, and a method for implementing them on a digital computer is presented. As an example, a typical printer with a step motor is designed with this approach. The problem is defined by giving the desired system performance criteria and the step motor parameters and characteristics. The specification of the control schemes determined the design. Computer simulation runs are made to determine the optimal control parameters of the system. The case study demonstrates the advantages of the computer-aided design, before the physical construction of the experimental system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号