首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30359篇
  免费   889篇
  国内免费   281篇
电工技术   481篇
综合类   33篇
化学工业   4774篇
金属工艺   1063篇
机械仪表   708篇
建筑科学   448篇
矿业工程   48篇
能源动力   1497篇
轻工业   1213篇
水利工程   169篇
石油天然气   100篇
武器工业   1篇
无线电   2787篇
一般工业技术   4686篇
冶金工业   1672篇
原子能技术   276篇
自动化技术   11573篇
  2024年   103篇
  2023年   431篇
  2022年   1003篇
  2021年   1183篇
  2020年   928篇
  2019年   979篇
  2018年   1253篇
  2017年   996篇
  2016年   966篇
  2015年   628篇
  2014年   1080篇
  2013年   1768篇
  2012年   1695篇
  2011年   4180篇
  2010年   2036篇
  2009年   1875篇
  2008年   1434篇
  2007年   1191篇
  2006年   943篇
  2005年   955篇
  2004年   822篇
  2003年   830篇
  2002年   494篇
  2001年   199篇
  2000年   192篇
  1999年   211篇
  1998年   423篇
  1997年   287篇
  1996年   263篇
  1995年   199篇
  1994年   180篇
  1993年   169篇
  1992年   127篇
  1991年   158篇
  1990年   125篇
  1989年   113篇
  1988年   103篇
  1987年   109篇
  1986年   101篇
  1985年   102篇
  1984年   110篇
  1983年   93篇
  1982年   74篇
  1981年   81篇
  1980年   56篇
  1979年   46篇
  1978年   39篇
  1977年   36篇
  1976年   45篇
  1975年   19篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
This paper proposes an alternative criterion derived from the Bayesian risk classification error for image segmentation. The proposed model introduces a region-based force determined through the difference of the posterior image densities for the different classes, a term based on the prior probability derived from Kullback-Leibler information number, and a regularity term adopted to avoid the generation of excessively irregular and small segmented regions. Compared with other level set methods, the proposed approach relies on the optimum decision of pixel classification and the estimates of prior probabilities; thus the approach has more reliability in theory and practice. Experiments show that the proposed approach is able to extract the complicated shapes of targets and robust for various types of medical images. Moreover, the algorithm can be easily extendable for multiphase segmentation.  相似文献   
82.
This paper presents new a feature transformation technique applied to improve the screening accuracy for the automatic detection of pathological voices. The statistical transformation is based on Hidden Markov Models, obtaining a transformation and classification stage simultaneously and adjusting the parameters of the model with a criterion that minimizes the classification error. The original feature vectors are built up using classic short-term noise parameters and mel-frequency cepstral coefficients. With respect to conventional approaches found in the literature of automatic detection of pathological voices, the proposed feature space transformation technique demonstrates a significant improvement of the performance with no addition of new features to the original input space. In view of the results, it is expected that this technique could provide good results in other areas such as speaker verification and/or identification.  相似文献   
83.
In this paper, we present a method for action categorization with a modified hidden conditional random field (HCRF). Specifically, effective silhouette-based action features are extracted using motion moments and spectrum of chain code. We formulate a modified HCRF (mHCRF) to have a guaranteed global optimum in the modelling of the temporal action dependencies after the HMM pathing stage. Experimental results on action categorization using this model are compared favorably against several existing model-based methods including GMM, SVM, Logistic Regression, HMM, CRF and HCRF.  相似文献   
84.
85.
In this paper, we propose an new error estimate algorithm (NEEA) for stereophonic acoustic echo cancellation (SAEC) that is based on the error estimation algorithm (EEA) in [Nguyen-Ky T, Leis J, Xiang W. An improved error estimate algorithm for stereophonic acoustic echo cancellation system. In: International conference on signal processing and communication systems, ICSPCS’2007, Australia; December 2007]. In the EEA and NEEA, with the minimum error signal fixed, we compute the filter lengths so that the error signal may approximate the minimum error signal. When the echo paths change, the adaptive filter automatically adjusts the filter lengths to the optimum values. We also investigate the difference between the adaptive filter lengths. In contrast with the conclusions in [Khong AWH, Naylor PA. Stereophonic acoustic echo cancellation employing selective-tap adaptive algorithms. IEEE Trans Audio, Speech, Lang Process 2006;14(3):785-96, Gansler T, Benesty J. Stereophonic acoustic echo cancellation and two channel adaptive filtering: an overview. Int J Adapt Control Signal Process 2000;4:565-86, Benesty J, Gansler T. A multichannel acoustic echo canceler double-talk detector based on a normalized cross-correlation matrix. Acoust Echo Noise Control 2002;13(2):95-101, Gansler T, Benesty J. A frequency-domain double-talk detector based on a normalized cross-correlation vector. Signal Process 2001;81:1783-7, Eneroth P, Gay SL, Gansler T, Benesty J. A real-time implementation of a stereophonic acoustic echo canceler. IEEE Trans. Speech Audio Process 2001;9(5):513-23, Gansler T, Benesty J. New insights into the stereophonic acoustic echo cancellation problem and an adaptive nonlinearity solution. IEEE Trans. Speech Audio Process 2002; 10(5):257-67, Benesty J, Gansler T, Morgan DR, Sondhi MM, Gay SL. Advances in network and acoustic echo cancellation. Berlin: Springer-Verlag; 2001], our simulation results have shown that the filter lengths can be different. Our simulation results also confirm that the NEEA is better than EEA and SM-NLMS algorithm in terms of echo return loss enhancement.  相似文献   
86.
The risk analysis of critical infrastructures such as the electric power supply or telecommunications is complicated by the fact that such infrastructures are mutually dependent. We propose a modular approach to the modelling and analysis of risk scenarios with dependencies. Our approach may be used to deduce the risk level of an overall system from previous risk analyses of its constituent systems. A custom made assumption-guarantee style is put forward as a means to describe risk scenarios with external dependencies. We also define a set of deduction rules facilitating various kinds of reasoning, including the analysis of mutual dependencies between risk scenarios expressed in the assumption-guarantee style.  相似文献   
87.
The amendment of patent law of India in 2005 to fulfill her international obligation under the TRIPS Agreement (World Trade Organization Agreement on Trade Related Intellectual Property Rights) was an outcome of an attempt to balance the competing interests of several stakeholders, including indigenous pharmaceutical companies, multi-national pharmaceutical companies, non-governmental organizations and civil society groups concerned with access to affordable drugs. The adverse consequence of this delicate balancing is introduction of some provisions in the Act whose compatibility with the TRIPS Agreement is questionable, and which therefore are prone to litigations. Section 107A(b) of the amended patent law dealing with parallel imports is one such provision, which, if interpreted word for word could have significant connotations for the rights of a patent owner. This article aims to examine the inconsistencies intrinsic in Section 107A(b) and discusses the divergences in the Indian patent law associated with the doctrine of exhaustion and parallel imports. This article also proposes legal amendments with a view to eliminate inconsistencies intrinsic in the section and enlarge the ambit of the exhaustion principle conceptualized therein, while concurrently remaining compliant with the TRIPS Agreement.  相似文献   
88.
This paper considers an economic lot sizing model with constant capacity, non-increasing setup cost, and convex inventory cost function. Algorithms with computational time of O(N×TDN)have been developed for solving the model, where N is the number of planning periods and TDN is the total demand. This study partially characterizes the optimal planning structure of the model. A new efficient algorithm with computational time of O(N log N) has also been developed based on the partial optimal structure. Moreover, computational study demonstrates that the new algorithm is efficient.  相似文献   
89.
All the various data hiding methods can be simply divided into two types: (1) the extracted important data are lossy, (2) the extracted important data are lossless. The proposed method belongs to the second type. In this paper, a module-based substitution method with lossless secret data compression function is used for concealing smoother area of secret image by modifying fewer pixels in the generated stego-image. Compared with the previous data hiding methods that extract lossless data, the generated stego-image by the proposed method is always with better quality, unless the hidden image is with very strong randomness.  相似文献   
90.
This work explores MEMS (Micro-Electro-Mechanical Systems) potentialities to fabricate AC voltage references through mechanical-electrical transduction that could be used for high precision electrical metrology and for applications in miniaturized instrumentation. AC voltage reference ranging from 5 V to 90 V have been designed and fabricated using the same Epitaxial Silicon On Insulator (SOI) surface micromachining process allowing an accurate control of both dimensions and material properties. The measured MEMS AC voltage reference values have been found in a good agreement with CoventorWare calculations. These tests structures have also been used to develop the read-out electronics to drive the MEMS.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号