全文获取类型
收费全文 | 11414篇 |
免费 | 87篇 |
国内免费 | 149篇 |
专业分类
电工技术 | 141篇 |
综合类 | 5篇 |
化学工业 | 511篇 |
金属工艺 | 461篇 |
机械仪表 | 74篇 |
建筑科学 | 115篇 |
矿业工程 | 8篇 |
能源动力 | 69篇 |
轻工业 | 125篇 |
水利工程 | 35篇 |
石油天然气 | 20篇 |
武器工业 | 2篇 |
无线电 | 416篇 |
一般工业技术 | 313篇 |
冶金工业 | 271篇 |
原子能技术 | 94篇 |
自动化技术 | 8990篇 |
出版年
2024年 | 2篇 |
2023年 | 18篇 |
2022年 | 36篇 |
2021年 | 69篇 |
2020年 | 52篇 |
2019年 | 53篇 |
2018年 | 75篇 |
2017年 | 68篇 |
2016年 | 73篇 |
2015年 | 52篇 |
2014年 | 273篇 |
2013年 | 273篇 |
2012年 | 839篇 |
2011年 | 3155篇 |
2010年 | 1192篇 |
2009年 | 1058篇 |
2008年 | 723篇 |
2007年 | 631篇 |
2006年 | 481篇 |
2005年 | 613篇 |
2004年 | 553篇 |
2003年 | 605篇 |
2002年 | 290篇 |
2001年 | 16篇 |
2000年 | 16篇 |
1999年 | 40篇 |
1998年 | 95篇 |
1997年 | 41篇 |
1996年 | 23篇 |
1995年 | 14篇 |
1994年 | 13篇 |
1993年 | 10篇 |
1992年 | 13篇 |
1991年 | 10篇 |
1990年 | 13篇 |
1989年 | 12篇 |
1988年 | 11篇 |
1987年 | 10篇 |
1986年 | 22篇 |
1985年 | 15篇 |
1984年 | 29篇 |
1983年 | 16篇 |
1982年 | 16篇 |
1981年 | 10篇 |
1980年 | 2篇 |
1979年 | 4篇 |
1976年 | 4篇 |
1972年 | 4篇 |
1963年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Joon C. Park Author Vitae Author Vitae 《Computer aided design》2003,35(9):807-812
Presented in this paper is a topology reconstruction algorithm from a set of unorganized trimmed surfaces. Error-prone small geometric elements are handled to give proper topological information. It gives complete topology to topologically complete models, and it is also tolerant to incomplete models. The proposed algorithm is vertex-based in that clues for topological information are searched from the set of vertices first, not from that of edges. 相似文献
992.
993.
994.
The rapid advancement of DNA chip (microarray) technology has revolutionalized genetic research in bioscience. However, the enormous amount of data produced from a microarray image makes automatic computer analysis indispensable. An important first step in analyzing microarray image is the accurate determination of the DNA spots in the image. We report here a novel spot segmentation method for DNA microarray images. The algorithm makes use of adaptive thresholding and statistical intensity modeling to: (i) generate the grid structure automatically, where each subregion in the grid contains only one spot, and (ii) to segment the spot, if any, within each subregion. The algorithm is fully automatic, robust, and can aid in the high throughput computer analysis of microarray data. 相似文献
995.
J. ZhangAuthor Vitae X. ZhangAuthor VitaeH. KrimAuthor Vitae G.G. WalterAuthor Vitae 《Pattern recognition》2003,36(5):1143-1154
In this paper, we describe a shape space based approach for invariant object representation and recognition. In this approach, an object and all its similarity transformed versions are identified with a single point in a high-dimensional manifold called the shape space. Object recognition is achieved by measuring the geodesic distance between an observed object and a model in the shape space. This approach produced promising results in 2D object recognition experiments: it is invariant to similarity transformations and is relatively insensitive to noise and occlusion. Potentially, it can also be used for 3D object recognition. 相似文献
996.
Thomas Bernier Author VitaeJacques-André LandryAuthor Vitae 《Pattern recognition》2003,36(8):1711-1723
A new method for the representation and comparison of irregular two-dimensional shapes is presented. This method uses a polar transformation of the contour points about the geometric centre of the object. The distinctive vertices of the shape are extracted and used as comparative parameters to minimize the difference of contour distance from the centre. Experiments are performed, more than 39 000 comparisons of database shapes, provided by Sebastian et al. (ICCV (2001) 755), are made and the results are compared to those obtained therein. In addition, 450 comparisons of leaf shape are made and leaves of very similar shape are accurately distinguished. The method is shown to be invariant to translation, rotation and scaling and highly accurate in shape distinction. The method shows more tolerance to scale variation than that of Sebastian et al. (ICCV (2001) 755) and is less computationally intense. 相似文献
997.
In many data analysis problems, it is useful to consider the data as generated from a set of unknown (latent) generators or sources. The observations we make of a system are then taken to be related to these sources through some unknown function. Furthermore, the (unknown) number of underlying latent sources may be less than the number of observations. Recent developments in independent component analysis (ICA) have shown that, in the case where the unknown function linking sources to observations is linear, such data decomposition may be achieved in a mathematically elegant manner. In this paper, we extend the general ICA paradigm to include a very flexible source model, prior constraints and conditioning on sets of intermediate variables so that ICA forms one part of a hierarchical system. We show that such an approach allows for efficient discovery of hidden representation in data and for unsupervised data partitioning. 相似文献
998.
Cherng-Min MaAuthor Vitae 《Pattern recognition》2003,36(8):1775-1782
Generally, a reduction operation (e.g., thinning and shrinking) on 3D binary images can be represented as a set of reduction templates where every object voxel of the image satisfying any template is turned to a background voxel. Generally, it is rather difficult, error-prone and time-consuming for verifying the topological soundness of a 3D parallel reduction operation. This paper proposes sufficient conditions of time complexity O(n) for verifying the topological soundness of 3D parallel 6-subiteration reduction operations of n templates where such a kind of 3D reduction operations is performed alternatively from the six orthogonal directions to turn object voxels to background voxels. By such sufficient conditions, the topology soundness of a 3D 6-subiteration parallel reduction operation can be verified by checking each and every of its templates. 相似文献
999.
Yuh-Min TsengAuthor Vitae Jinn-Ke JanAuthor VitaeHung-Yu ChienAuthor Vitae 《Computers & Electrical Engineering》2003,29(1):101-109
Two efficient authenticated encryption schemes with message linkages are proposed. One is a basic scheme, that it has the better performance in comparison with the all previously proposed schemes in terms of the communication and the computation costs. However, it has a property as same as the previously proposed schemes, that the message blocks can be recovered only after the entire signature blocks have been received. Therefore, the basic scheme is applicable to encrypt all-or-nothing flow. Thus, we improve the basic scheme and also propose a generalized scheme, which allows the receiver to recover the partial message blocks before receiving the entire signature blocks. That is, the receiver may perform the receiving and the recovering processes simultaneously. Therefore, the generalized scheme is applicable to message flows. The generalized scheme requires smaller bandwidth and computational time as compared to the previously proposed authenticated encryption schemes with message linkages for message flows. 相似文献
1000.
Taku Sugimoto Author Vitae 《Computers and Composition》2004,21(1):119-127
In this article, I examine to what extent Computers and Composition: An International Journal for Teachers of Writing is international. My analysis of several aspects of the journal indicates limited international scope. I also discuss two issues important when considering the potential international scope of computers and writing research and practices: the differing uses of computers for writing by different language users and the differing concepts of identity and self in different cultures in relation to writing. I conclude with concrete suggestions for broadening our perspectives on computers and writing and making this journal truly international. 相似文献