全文获取类型
收费全文 | 49304篇 |
免费 | 5091篇 |
国内免费 | 2715篇 |
专业分类
电工技术 | 3264篇 |
技术理论 | 3篇 |
综合类 | 3700篇 |
化学工业 | 7532篇 |
金属工艺 | 2879篇 |
机械仪表 | 3199篇 |
建筑科学 | 3698篇 |
矿业工程 | 1413篇 |
能源动力 | 1343篇 |
轻工业 | 3762篇 |
水利工程 | 1185篇 |
石油天然气 | 2647篇 |
武器工业 | 491篇 |
无线电 | 6124篇 |
一般工业技术 | 5377篇 |
冶金工业 | 2065篇 |
原子能技术 | 606篇 |
自动化技术 | 7822篇 |
出版年
2024年 | 247篇 |
2023年 | 931篇 |
2022年 | 1802篇 |
2021年 | 2526篇 |
2020年 | 1817篇 |
2019年 | 1347篇 |
2018年 | 1549篇 |
2017年 | 1673篇 |
2016年 | 1383篇 |
2015年 | 2046篇 |
2014年 | 2628篇 |
2013年 | 3070篇 |
2012年 | 3494篇 |
2011年 | 3771篇 |
2010年 | 3384篇 |
2009年 | 2936篇 |
2008年 | 3164篇 |
2007年 | 2932篇 |
2006年 | 2684篇 |
2005年 | 2330篇 |
2004年 | 1569篇 |
2003年 | 1224篇 |
2002年 | 1166篇 |
2001年 | 1066篇 |
2000年 | 1050篇 |
1999年 | 1050篇 |
1998年 | 785篇 |
1997年 | 625篇 |
1996年 | 575篇 |
1995年 | 479篇 |
1994年 | 401篇 |
1993年 | 272篇 |
1992年 | 244篇 |
1991年 | 193篇 |
1990年 | 133篇 |
1989年 | 104篇 |
1988年 | 89篇 |
1987年 | 53篇 |
1986年 | 53篇 |
1985年 | 38篇 |
1984年 | 31篇 |
1983年 | 30篇 |
1982年 | 23篇 |
1981年 | 24篇 |
1980年 | 23篇 |
1979年 | 12篇 |
1978年 | 13篇 |
1977年 | 11篇 |
1976年 | 8篇 |
1973年 | 12篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.
范利红 《计算机光盘软件与应用》2010,(10):188-188
高中信息技术新课程改革中对信息技术学科提出了新的要求,就是要以提升学生的信息素养为宗旨,培养高中生发展成为具有良好信息素养的公民。那么为着这样一个目标,我们该如何展开我们的教学呢? 相似文献
952.
樊黎 《计算机光盘软件与应用》2010,(12)
单片机技术的发展迅速,被广泛地应用到各个领域,现在一些中职已经陆续开设单片机课程了,我教了两年的单片机课程,该课程是在二年一期开设,刚开始都是给学生补习数学知识,占用了单片机的教学时间.如果我们能在数学教学和数学教材上面适当的做一些改动,就能为单片机的教学提供更好的支撑.我们学校为此做了相关的教学实践,并取得了一定的教学效果. 相似文献
953.
954.
The information-hiding capacity of a digital image is the maximum information that can be hidden in that image, while the lower limit of information hiding is the minimum detectable information capacity. This paper proposes a new method of information-hiding capacity bounds analysis that is based on the neural network theories of attractors and attraction basins. With this method, the processes for determining upper and lower limits of information hiding, are unified within a single theoretical framework. Results of research show that the theory of attraction basins of neural networks can be used to determine the upper limit of information hiding and the theory of attractors of neural networks can be used to determine the lower limit of information hiding. 相似文献
955.
In a recent paper presented by Lin et al., a block-based hierarchical watermarking algorithm for digital images is proposed. It adopts parity check and the intensity-relation check to conduct the experiment of image tamper detection. Their experimental results indicate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspections, respectively. The proposed attacks demonstrate that this watermarking algorithm is fundamentally flawed in that the attacker can tamper a watermarked image easily without being detected. In this paper, a four-scanning attack aimed to Lin et al.'s watermarking method is presented to create tampered images. Furthermore, in case they use encryption to protect their 3-tuple-watermark, we proposed a blind attack to tamper watermarked images without being detected. Experimental results are given to support and enhance our conclusions, and demonstrate that our attacks are successful in tampering watermarked images. 相似文献
956.
Abdolhossein Sarrafzadeh Samuel Alexander Farhad Dadgostar Chao Fan Abbas Bigdeli 《Computers in human behavior》2008,24(4):1342-1363
Many software systems would significantly improve performance if they could adapt to the emotional state of the user, for example if Intelligent Tutoring Systems (ITSs), ATM’s, ticketing machines could recognise when users were confused, frustrated or angry they could guide the user back to remedial help systems so improving the service. Many researchers now feel strongly that ITSs would be significantly enhanced if computers could adapt to the emotions of students. This idea has spawned the developing field of affective tutoring systems (ATSs): ATSs are ITSs that are able to adapt to the affective state of students. The term “affective tutoring system” can be traced back as far as Rosalind Picard’s book Affective Computing in 1997.This paper presents research leading to the development of Easy with Eve, an ATS for primary school mathematics. The system utilises a network of computer systems, mainly embedded devices to detect student emotion and other significant bio-signals. It will then adapt to students and displays emotion via a lifelike agent called Eve. Eve’s tutoring adaptations are guided by a case-based method for adapting to student states; this method uses data that was generated by an observational study of human tutors. This paper presents the observational study, the case-based method, the ATS itself and its implementation on a distributed computer systems for real-time performance, and finally the implications of the findings for Human Computer Interaction in general and e-learning in particular. Web-based applications of the technology developed in this research are discussed throughout the paper. 相似文献
957.
Kobus Barnard Quanfu Fan Ranjini Swaminathan Anthony Hoogs Roderic Collins Pascale Rondot John Kaufhold 《International Journal of Computer Vision》2008,77(1-3):199-217
We present a new data set of 1014 images with manual segmentations and semantic labels for each segment, together with a methodology
for using this kind of data for recognition evaluation. The images and segmentations are from the UCB segmentation benchmark
database (Martin et al., in International conference on computer vision, vol. II, pp. 416–421, 2001). The database is extended by manually labeling each segment with its most specific semantic concept in WordNet (Miller et al.,
in Int. J. Lexicogr. 3(4):235–244, 1990). The evaluation methodology establishes protocols for mapping algorithm specific localization (e.g., segmentations) to our
data, handling synonyms, scoring matches at different levels of specificity, dealing with vocabularies with sense ambiguity
(the usual case), and handling ground truth regions with multiple labels. Given these protocols, we develop two evaluation
approaches. The first measures the range of semantics that an algorithm can recognize, and the second measures the frequency
that an algorithm recognizes semantics correctly. The data, the image labeling tool, and programs implementing our evaluation
strategy are all available on-line (kobus.ca//research/data/IJCV_2007).
We apply this infrastructure to evaluate four algorithms which learn to label image regions from weakly labeled data. The
algorithms tested include two variants of multiple instance learning (MIL), and two generative multi-modal mixture models.
These experiments are on a significantly larger scale than previously reported, especially in the case of MIL methods. More
specifically, we used training data sets up to 37,000 images and training vocabularies of up to 650 words.
We found that one of the mixture models performed best on image annotation and the frequency correct measure, and that variants
of MIL gave the best semantic range performance. We were able to substantively improve the performance of MIL methods on the
other tasks (image annotation and frequency correct region labeling) by providing an appropriate prior. 相似文献
958.
Michael M. Li Brijesh Verma Xiaolong Fan Kevin Tickle 《Neural computing & applications》2008,17(4):391-397
This paper investigates a new method to solve the inverse problem of Rutherford backscattering (RBS) data. The inverse problem
is to determine the sample structure information from measured spectra, which can be defined as a function approximation problem.
We propose using radial basis function (RBF) neural networks to approximate an inverse function. Each RBS spectrum, which
may contain up to 128 data points, is compressed by the principal component analysis, so that the dimensionality of input
data and complexity of the network are reduced significantly. Our theoretical consideration is tested by numerical experiments
with the example of the SiGe thin film sample and corresponding backscattering spectra. A comparison of the RBF method with
multilayer perceptrons reveals that the former has better performance in extracting structural information from spectra. Furthermore,
the proposed method can handle redundancies properly, which are caused by the constraint of output variables. This study is
the first method based on RBF to deal with the inverse RBS data analysis problem. 相似文献
959.
960.