全文获取类型
收费全文 | 15600篇 |
免费 | 358篇 |
国内免费 | 149篇 |
专业分类
电工技术 | 234篇 |
综合类 | 10篇 |
化学工业 | 1802篇 |
金属工艺 | 504篇 |
机械仪表 | 212篇 |
建筑科学 | 262篇 |
矿业工程 | 5篇 |
能源动力 | 219篇 |
轻工业 | 553篇 |
水利工程 | 59篇 |
石油天然气 | 31篇 |
无线电 | 752篇 |
一般工业技术 | 1019篇 |
冶金工业 | 312篇 |
原子能技术 | 119篇 |
自动化技术 | 10014篇 |
出版年
2024年 | 6篇 |
2023年 | 86篇 |
2022年 | 248篇 |
2021年 | 322篇 |
2020年 | 174篇 |
2019年 | 213篇 |
2018年 | 212篇 |
2017年 | 207篇 |
2016年 | 250篇 |
2015年 | 213篇 |
2014年 | 477篇 |
2013年 | 613篇 |
2012年 | 1149篇 |
2011年 | 3490篇 |
2010年 | 1452篇 |
2009年 | 1323篇 |
2008年 | 950篇 |
2007年 | 822篇 |
2006年 | 651篇 |
2005年 | 716篇 |
2004年 | 641篇 |
2003年 | 662篇 |
2002年 | 355篇 |
2001年 | 66篇 |
2000年 | 58篇 |
1999年 | 77篇 |
1998年 | 162篇 |
1997年 | 86篇 |
1996年 | 65篇 |
1995年 | 28篇 |
1994年 | 39篇 |
1993年 | 31篇 |
1992年 | 19篇 |
1991年 | 16篇 |
1990年 | 21篇 |
1989年 | 16篇 |
1988年 | 14篇 |
1987年 | 17篇 |
1986年 | 13篇 |
1985年 | 18篇 |
1984年 | 31篇 |
1983年 | 27篇 |
1982年 | 13篇 |
1981年 | 10篇 |
1980年 | 8篇 |
1979年 | 9篇 |
1978年 | 6篇 |
1977年 | 10篇 |
1973年 | 3篇 |
1971年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Julián D. Arias-Londoño Author Vitae Juan I. Godino-Llorente Author Vitae Nicolás Sáenz-Lechón Author Vitae Author Vitae Germán Castellanos-Domínguez Author Vitae 《Pattern recognition》2010,43(9):3100-3112
This paper presents new a feature transformation technique applied to improve the screening accuracy for the automatic detection of pathological voices. The statistical transformation is based on Hidden Markov Models, obtaining a transformation and classification stage simultaneously and adjusting the parameters of the model with a criterion that minimizes the classification error. The original feature vectors are built up using classic short-term noise parameters and mel-frequency cepstral coefficients. With respect to conventional approaches found in the literature of automatic detection of pathological voices, the proposed feature space transformation technique demonstrates a significant improvement of the performance with no addition of new features to the original input space. In view of the results, it is expected that this technique could provide good results in other areas such as speaker verification and/or identification. 相似文献
32.
In this paper, we present a method for action categorization with a modified hidden conditional random field (HCRF). Specifically, effective silhouette-based action features are extracted using motion moments and spectrum of chain code. We formulate a modified HCRF (mHCRF) to have a guaranteed global optimum in the modelling of the temporal action dependencies after the HMM pathing stage. Experimental results on action categorization using this model are compared favorably against several existing model-based methods including GMM, SVM, Logistic Regression, HMM, CRF and HCRF. 相似文献
33.
T. Nguyen-Ky Author Vitae J. Leis Author Vitae Author Vitae 《Computers & Electrical Engineering》2010,36(4):664-675
In this paper, we propose an new error estimate algorithm (NEEA) for stereophonic acoustic echo cancellation (SAEC) that is based on the error estimation algorithm (EEA) in [Nguyen-Ky T, Leis J, Xiang W. An improved error estimate algorithm for stereophonic acoustic echo cancellation system. In: International conference on signal processing and communication systems, ICSPCS’2007, Australia; December 2007]. In the EEA and NEEA, with the minimum error signal fixed, we compute the filter lengths so that the error signal may approximate the minimum error signal. When the echo paths change, the adaptive filter automatically adjusts the filter lengths to the optimum values. We also investigate the difference between the adaptive filter lengths. In contrast with the conclusions in [Khong AWH, Naylor PA. Stereophonic acoustic echo cancellation employing selective-tap adaptive algorithms. IEEE Trans Audio, Speech, Lang Process 2006;14(3):785-96, Gansler T, Benesty J. Stereophonic acoustic echo cancellation and two channel adaptive filtering: an overview. Int J Adapt Control Signal Process 2000;4:565-86, Benesty J, Gansler T. A multichannel acoustic echo canceler double-talk detector based on a normalized cross-correlation matrix. Acoust Echo Noise Control 2002;13(2):95-101, Gansler T, Benesty J. A frequency-domain double-talk detector based on a normalized cross-correlation vector. Signal Process 2001;81:1783-7, Eneroth P, Gay SL, Gansler T, Benesty J. A real-time implementation of a stereophonic acoustic echo canceler. IEEE Trans. Speech Audio Process 2001;9(5):513-23, Gansler T, Benesty J. New insights into the stereophonic acoustic echo cancellation problem and an adaptive nonlinearity solution. IEEE Trans. Speech Audio Process 2002; 10(5):257-67, Benesty J, Gansler T, Morgan DR, Sondhi MM, Gay SL. Advances in network and acoustic echo cancellation. Berlin: Springer-Verlag; 2001], our simulation results have shown that the filter lengths can be different. Our simulation results also confirm that the NEEA is better than EEA and SM-NLMS algorithm in terms of echo return loss enhancement. 相似文献
34.
Gyrd Brændeland Author Vitae Atle Refsdal Author Vitae Author Vitae 《Journal of Systems and Software》2010,83(10):1995-2013
The risk analysis of critical infrastructures such as the electric power supply or telecommunications is complicated by the fact that such infrastructures are mutually dependent. We propose a modular approach to the modelling and analysis of risk scenarios with dependencies. Our approach may be used to deduce the risk level of an overall system from previous risk analyses of its constituent systems. A custom made assumption-guarantee style is put forward as a means to describe risk scenarios with external dependencies. We also define a set of deduction rules facilitating various kinds of reasoning, including the analysis of mutual dependencies between risk scenarios expressed in the assumption-guarantee style. 相似文献
35.
Roberto Confalonieri Gianni Bellocchi Stefano Tarantola Marco Acutis Marcello Donatelli Giampiero Genovese 《Environmental Modelling & Software》2010,25(4):479-488
Sensitivity analysis studies how the variation in model outputs can be due to different sources of variation. This issue is addressed, in this study, as an application of sensitivity analysis techniques to a crop model in the Mediterranean region. In particular, an application of Morris and Sobol' sensitivity analysis methods to the rice model WARM is presented. The output considered is aboveground biomass at maturity, simulated at five rice districts of different countries (France, Greece, Italy, Portugal, and Spain) for years characterized by low, intermediate, and high continentality. The total effect index of Sobol' (that accounts for the total contribution to the output variation due a given parameter) and two Morris indices (mean μ and standard deviation σ of the ratios output changes/parameter variations) were used as sensitivity metrics. Radiation use efficiency (RUE), optimum temperature (Topt), and leaf area index at emergence (LAIini) ranked in most of the combinations site × year as first, second and third most relevant parameters. Exceptions were observed, depending on the sensitivity method (e.g. LAIini resulted not relevant by the Morris method), or site-continentality pattern (e.g. with intermediate continentality in Spain, LAIini and Topt were second and third ranked; with low continentality in Portugal, RUE was outranked by Topt). Low σ values associated with the most relevant parameters indicated limited parameter interactions. The importance of sensitivity analyses by exploring site × climate combinations is discussed as pre-requisite to evaluate either novel crop-modelling approaches or the application of known modelling solutions to conditions not explored previously. The need of developing tools for sensitivity analysis within the modelling environment is also emphasized. 相似文献
36.
In this paper we propose a heuristic approach for the problem of packing equal rectangles within a convex region. The approach is based on an Iterated Local Search scheme, in which the key step is the perturbation move. Different perturbation moves, both combinatorial and continuous ones, are proposed and compared through extensive computational experiments on a set of test instances. The overall results are quite encouraging. 相似文献
37.
Shang-Kuan ChenAuthor Vitae 《Computer Standards & Interfaces》2011,33(4):367-371
All the various data hiding methods can be simply divided into two types: (1) the extracted important data are lossy, (2) the extracted important data are lossless. The proposed method belongs to the second type. In this paper, a module-based substitution method with lossless secret data compression function is used for concealing smoother area of secret image by modifying fewer pixels in the generated stego-image. Compared with the previous data hiding methods that extract lossless data, the generated stego-image by the proposed method is always with better quality, unless the hidden image is with very strong randomness. 相似文献
38.
A. BounouhAuthor Vitae H. CamonD. BélièresAuthor Vitae F. Blard F. ZiadéAuthor Vitae 《Computer Standards & Interfaces》2011,33(2):159-164
This work explores MEMS (Micro-Electro-Mechanical Systems) potentialities to fabricate AC voltage references through mechanical-electrical transduction that could be used for high precision electrical metrology and for applications in miniaturized instrumentation. AC voltage reference ranging from 5 V to 90 V have been designed and fabricated using the same Epitaxial Silicon On Insulator (SOI) surface micromachining process allowing an accurate control of both dimensions and material properties. The measured MEMS AC voltage reference values have been found in a good agreement with CoventorWare calculations. These tests structures have also been used to develop the read-out electronics to drive the MEMS. 相似文献
39.
Vo-Gia Loc Ig Mo Koo Duc Trong Tran Sangdoek Park Hyungpil Moon Hyouk Ryeol ChoiAuthor vitae 《Robotics and Autonomous Systems》2011,59(12):1036-1048
This paper presents a study on improving the traversability of a quadruped walking robot in 3D rough terrains. The key idea is to exploit body movement of the robot. The position and orientation of the robot are systematically adjusted and the possibility of finding a valid foothold for the next swing is maximized, which makes the robot have more chances to overcome the rough terrains. In addition, a foothold search algorithm that provides the valid foothold while maintaining a high traversability of the robot, is investigated and a gait selection algorithm is developed to help the robot avoid deadlock situations. To explain the algorithms, new concepts such as reachable area, stable area, potential search direction, and complementary kinematic margin are introduced, and the effectiveness of the algorithms is validated via simulations and experiments. 相似文献
40.
PIRF-Nav 2.0: Fast and online incremental appearance-based loop-closure detection in an indoor environment 总被引:1,自引:0,他引:1
Aram KawewongAuthor Vitae Noppharit TongprasitAuthor Vitae 《Robotics and Autonomous Systems》2011,59(10):727-739
This paper presents a fast and online incremental solution for an appearance-based loop-closure detection problem in a dynamic indoor environment. Closing the loop in a dynamic environment has been an important topic in robotics for decades. Recently, PIRF-Nav has been reported as being successful in achieving high recall rate at precision 1. However, PIRF-Nav has three main disadvantages: (i) the computational expense of PIRF-Nav is beyond real-time, (ii) it utilizes a large amount of memory in the redundant process of keeping signatures of places, and (iii) it is ill-suited to an indoor environment. These factors hinder the use of PIRF-Nav in a general environment for long-term, high-speed mobile robotic applications. Therefore, this paper proposes two techniques: (i) new modified PIRF extraction that makes the system more suitable for an indoor environment and (ii) new dictionary management that can eliminate redundant searching and conserve memory consumption. The results show that our proposed method can complete tasks up to 12 times faster than PIRF-Nav with only a slight percentage decline in recall. In addition, we collected additional data from a university canteen crowded during lunch time. Even in this crowded indoor environment, our proposed method has better real-time processing performance compared with other methods. 相似文献