首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11414篇
  免费   87篇
  国内免费   149篇
电工技术   141篇
综合类   5篇
化学工业   511篇
金属工艺   461篇
机械仪表   74篇
建筑科学   115篇
矿业工程   8篇
能源动力   69篇
轻工业   125篇
水利工程   35篇
石油天然气   20篇
武器工业   2篇
无线电   416篇
一般工业技术   313篇
冶金工业   271篇
原子能技术   94篇
自动化技术   8990篇
  2024年   2篇
  2023年   18篇
  2022年   36篇
  2021年   69篇
  2020年   52篇
  2019年   53篇
  2018年   75篇
  2017年   68篇
  2016年   73篇
  2015年   52篇
  2014年   273篇
  2013年   273篇
  2012年   839篇
  2011年   3155篇
  2010年   1192篇
  2009年   1058篇
  2008年   723篇
  2007年   631篇
  2006年   481篇
  2005年   613篇
  2004年   553篇
  2003年   605篇
  2002年   290篇
  2001年   16篇
  2000年   16篇
  1999年   40篇
  1998年   95篇
  1997年   41篇
  1996年   23篇
  1995年   14篇
  1994年   13篇
  1993年   10篇
  1992年   13篇
  1991年   10篇
  1990年   13篇
  1989年   12篇
  1988年   11篇
  1987年   10篇
  1986年   22篇
  1985年   15篇
  1984年   29篇
  1983年   16篇
  1982年   16篇
  1981年   10篇
  1980年   2篇
  1979年   4篇
  1976年   4篇
  1972年   4篇
  1963年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Presented in this paper is a topology reconstruction algorithm from a set of unorganized trimmed surfaces. Error-prone small geometric elements are handled to give proper topological information. It gives complete topology to topologically complete models, and it is also tolerant to incomplete models. The proposed algorithm is vertex-based in that clues for topological information are searched from the set of vertices first, not from that of edges.  相似文献   
992.
993.
994.
The rapid advancement of DNA chip (microarray) technology has revolutionalized genetic research in bioscience. However, the enormous amount of data produced from a microarray image makes automatic computer analysis indispensable. An important first step in analyzing microarray image is the accurate determination of the DNA spots in the image. We report here a novel spot segmentation method for DNA microarray images. The algorithm makes use of adaptive thresholding and statistical intensity modeling to: (i) generate the grid structure automatically, where each subregion in the grid contains only one spot, and (ii) to segment the spot, if any, within each subregion. The algorithm is fully automatic, robust, and can aid in the high throughput computer analysis of microarray data.  相似文献   
995.
In this paper, we describe a shape space based approach for invariant object representation and recognition. In this approach, an object and all its similarity transformed versions are identified with a single point in a high-dimensional manifold called the shape space. Object recognition is achieved by measuring the geodesic distance between an observed object and a model in the shape space. This approach produced promising results in 2D object recognition experiments: it is invariant to similarity transformations and is relatively insensitive to noise and occlusion. Potentially, it can also be used for 3D object recognition.  相似文献   
996.
A new method for the representation and comparison of irregular two-dimensional shapes is presented. This method uses a polar transformation of the contour points about the geometric centre of the object. The distinctive vertices of the shape are extracted and used as comparative parameters to minimize the difference of contour distance from the centre. Experiments are performed, more than 39 000 comparisons of database shapes, provided by Sebastian et al. (ICCV (2001) 755), are made and the results are compared to those obtained therein. In addition, 450 comparisons of leaf shape are made and leaves of very similar shape are accurately distinguished. The method is shown to be invariant to translation, rotation and scaling and highly accurate in shape distinction. The method shows more tolerance to scale variation than that of Sebastian et al. (ICCV (2001) 755) and is less computationally intense.  相似文献   
997.
In many data analysis problems, it is useful to consider the data as generated from a set of unknown (latent) generators or sources. The observations we make of a system are then taken to be related to these sources through some unknown function. Furthermore, the (unknown) number of underlying latent sources may be less than the number of observations. Recent developments in independent component analysis (ICA) have shown that, in the case where the unknown function linking sources to observations is linear, such data decomposition may be achieved in a mathematically elegant manner. In this paper, we extend the general ICA paradigm to include a very flexible source model, prior constraints and conditioning on sets of intermediate variables so that ICA forms one part of a hierarchical system. We show that such an approach allows for efficient discovery of hidden representation in data and for unsupervised data partitioning.  相似文献   
998.
Generally, a reduction operation (e.g., thinning and shrinking) on 3D binary images can be represented as a set of reduction templates where every object voxel of the image satisfying any template is turned to a background voxel. Generally, it is rather difficult, error-prone and time-consuming for verifying the topological soundness of a 3D parallel reduction operation. This paper proposes sufficient conditions of time complexity O(n) for verifying the topological soundness of 3D parallel 6-subiteration reduction operations of n templates where such a kind of 3D reduction operations is performed alternatively from the six orthogonal directions to turn object voxels to background voxels. By such sufficient conditions, the topology soundness of a 3D 6-subiteration parallel reduction operation can be verified by checking each and every of its templates.  相似文献   
999.
Two efficient authenticated encryption schemes with message linkages are proposed. One is a basic scheme, that it has the better performance in comparison with the all previously proposed schemes in terms of the communication and the computation costs. However, it has a property as same as the previously proposed schemes, that the message blocks can be recovered only after the entire signature blocks have been received. Therefore, the basic scheme is applicable to encrypt all-or-nothing flow. Thus, we improve the basic scheme and also propose a generalized scheme, which allows the receiver to recover the partial message blocks before receiving the entire signature blocks. That is, the receiver may perform the receiving and the recovering processes simultaneously. Therefore, the generalized scheme is applicable to message flows. The generalized scheme requires smaller bandwidth and computational time as compared to the previously proposed authenticated encryption schemes with message linkages for message flows.  相似文献   
1000.
In this article, I examine to what extent Computers and Composition: An International Journal for Teachers of Writing is international. My analysis of several aspects of the journal indicates limited international scope. I also discuss two issues important when considering the potential international scope of computers and writing research and practices: the differing uses of computers for writing by different language users and the differing concepts of identity and self in different cultures in relation to writing. I conclude with concrete suggestions for broadening our perspectives on computers and writing and making this journal truly international.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号