首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9282篇
  免费   63篇
  国内免费   13篇
电工技术   162篇
综合类   19篇
化学工业   243篇
金属工艺   298篇
机械仪表   59篇
建筑科学   58篇
矿业工程   18篇
能源动力   36篇
轻工业   20篇
水利工程   5篇
石油天然气   17篇
武器工业   2篇
无线电   315篇
一般工业技术   101篇
冶金工业   45篇
原子能技术   85篇
自动化技术   7875篇
  2024年   10篇
  2023年   14篇
  2022年   24篇
  2021年   30篇
  2020年   28篇
  2019年   15篇
  2018年   23篇
  2017年   18篇
  2016年   13篇
  2015年   23篇
  2014年   227篇
  2013年   190篇
  2012年   771篇
  2011年   2273篇
  2010年   1109篇
  2009年   950篇
  2008年   667篇
  2007年   573篇
  2006年   452篇
  2005年   573篇
  2004年   513篇
  2003年   575篇
  2002年   274篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1996年   1篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
排序方式: 共有9358条查询结果,搜索用时 0 毫秒
61.
The paper studies a 3D fingerprint reconstruction technique based on multi-view touchless fingerprint images. This technique offers a solution for 3D fingerprint image generation and application when only multi-view 2D images are available. However, the difficulties and stresses of 3D fingerprint reconstruction are the establishment of feature correspondences based on 2D touchless fingerprint images and the estimation of the finger shape model. In this paper, several popular used features, such as scale invariant feature transformation (SIFT) feature, ridge feature and minutiae, are employed for correspondences establishment. To extract these fingerprint features accurately, an improved fingerprint enhancement method has been proposed by polishing orientation and ridge frequency maps according to the characteristics of 2D touchless fingerprint images. Therefore, correspondences can be established by adopting hierarchical fingerprint matching approaches. Through an analysis of 440 3D point cloud finger data (220 fingers, 2 pictures each) collected by a 3D scanning technique, i.e., the structured light illumination (SLI) method, the finger shape model is estimated. It is found that the binary quadratic function is more suitable for the finger shape model than the other mixed model tested in this paper. In our experiments, the reconstruction accuracy is illustrated by constructing a cylinder. Furthermore, results obtained from different fingerprint feature correspondences are analyzed and compared to show which features are more suitable for 3D fingerprint images generation.  相似文献   
62.
This paper presents a gravity optimised particle filter (GOPF) where the magnitude of the gravitational force for every particle is proportional to its weight. GOPF attracts nearby particles and replicates new particles as if moving the particles towards the peak of the likelihood distribution, improving the sampling efficiency. GOPF is incorporated into a technique for hand features tracking. A fast approach to hand features detection and labelling using convexity defects is also presented. Experimental results show that GOPF outperforms the standard particle filter and its variants, as well as state-of-the-art CamShift guided particle filter using a significantly reduced number of particles.  相似文献   
63.
Evolutionary trees are widely applied in various applications to show the inferred evolutionary relationships among species or entities. Neighbor-Joining is one solution for data-intensive and time-consuming evolutionary tree construction, with polynomial time complexity. However, its performance becomes poorer with the growth of massive datasets. Graphics Processing Units (GPUs) have brought about new opportunities for these time-consuming applications. Based on its high efficiency, a GPU-based parallel Neighbor-Joining method is proposed, and two efficient parallel mechanisms, data segmentation with asynchronous processing and the minimal chain model with bitonic sort, are put forward to speed up the processing. The experimental results show that an average speedup of 25.1 is achieved and even approximately 30 can be obtained with a sequence dataset ranging from 16,000 to 25,000. Moreover, the proposed parallel mechanisms can be effectively exploited in some other high performance applications.  相似文献   
64.
Robust passive autofocus system for mobile phone camera applications   总被引:1,自引:0,他引:1  
A robust autofocus system is a ubiquitous function in today’s mobile phone camera applications. However, due to the power consumption and size requirements, it is difficult for the autofocus function to be implemented into the design of mobile phone cameras. This paper presents a passive autofocus system with low computational complexity. This system uses a novel contrast measurement to determine degree of image sharpness, which can better reflect the information about image discontinuities. In order to gauge the performance of this measurement, a modified peak search strategy is used in the experiments. The experimental results from several typical image sequences validate the effectiveness of the proposed method.  相似文献   
65.
Non-Line-of-Sight propagation of wireless signal has an impact on measured distances in range-based localization and will bias the final localization results. A new localization algorithm is proposed in this paper to mitigate Non-Line-of-Sight errors when there are more than enough anchor nodes deployed around the node to be located. This algorithm utilizes multi-round clustering analysis to filter the pre-located estimators which derive from all possible subsets of measured distances. In each round, the method density-based spatial clustering of applications with noise is adopted. Simulations show that the proposed algorithm can effectively improve localization accuracy not only when the measured distances with Non-Line-of-Sight error are minor but also under the condition that all of them suffer random Non-Line-of-Sight error.  相似文献   
66.
In tiled Chip Multiprocessors (CMPs) last-level cache (LLC) banks are usually shared but distributed among the tiles. A static mapping of cache blocks to the LLC banks leads to poor efficiency since a block may be mapped away from the tiles actually accessing it. Dynamic policies either rely on the static mapping of blocks to a set of banks (D-NUCA) or rely on the OS to dynamically load pages to statically mapped addresses (first-touch).  相似文献   
67.
The HUB-CI model is investigated in a telerobotic system in a client/server network to manage the lifecycle of engineering design and prototyping. The purpose of this platform is to support collaborative engineering design and proof of concept to enhance distributed team collaboration and resource utilization. The suggested platform is exemplified in two collaboration support tools and a physical prototyping platform. Structured Co-Insight Management is developed to support innovative idea exchanges and the consensus decision-making during the design process. Conflict/error detection management helps preventing conflicts and errors during the lifecycle of design and development. Physical collaboration over the network occurs when a team controls the telerobot operation during prototyping and testing in design cycles. A pilot system is implemented with a group project for the design of an electronic circuit (including both hardware and software designs). The functional assessment method is used to compare this platform to other collaborative design tools. The system presented offers unique qualitative advantages as an integrated collaboration support system.  相似文献   
68.
69.
70.
An effective dual watermark scheme for image tamper detection and recovery is proposed in this paper. In our algorithm, each block in the image contains watermark of other two blocks. That is to say, there are two copies of watermark for each non-overlapping block in the image. Therefore, we maintain two copies of watermark of the whole image and provide second chance for block recovery in case one copy is destroyed. A secret key, which is transmitted along with the watermarked image, and a public chaotic mixing algorithm are used to extract the watermark for tamper recovery. By using our algorithm, a 90% tampered image can be recovered to a dim yet still recognizable condition (PSNR ). Experimental results demonstrate that our algorithm is superior to the compared techniques, especially when the tampered area is large.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号