全文获取类型
收费全文 | 3637篇 |
免费 | 350篇 |
国内免费 | 315篇 |
专业分类
电工技术 | 356篇 |
综合类 | 186篇 |
化学工业 | 483篇 |
金属工艺 | 183篇 |
机械仪表 | 159篇 |
建筑科学 | 273篇 |
矿业工程 | 31篇 |
能源动力 | 191篇 |
轻工业 | 28篇 |
水利工程 | 64篇 |
石油天然气 | 11篇 |
武器工业 | 6篇 |
无线电 | 678篇 |
一般工业技术 | 608篇 |
冶金工业 | 43篇 |
原子能技术 | 23篇 |
自动化技术 | 979篇 |
出版年
2024年 | 11篇 |
2023年 | 139篇 |
2022年 | 102篇 |
2021年 | 151篇 |
2020年 | 121篇 |
2019年 | 98篇 |
2018年 | 111篇 |
2017年 | 242篇 |
2016年 | 202篇 |
2015年 | 235篇 |
2014年 | 282篇 |
2013年 | 314篇 |
2012年 | 399篇 |
2011年 | 338篇 |
2010年 | 264篇 |
2009年 | 285篇 |
2008年 | 133篇 |
2007年 | 239篇 |
2006年 | 210篇 |
2005年 | 74篇 |
2004年 | 30篇 |
2003年 | 36篇 |
2002年 | 33篇 |
2001年 | 46篇 |
2000年 | 18篇 |
1999年 | 23篇 |
1998年 | 11篇 |
1997年 | 8篇 |
1996年 | 6篇 |
1995年 | 8篇 |
1994年 | 7篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1990年 | 3篇 |
1989年 | 8篇 |
1988年 | 11篇 |
1987年 | 26篇 |
1986年 | 26篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 6篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1980年 | 1篇 |
1979年 | 4篇 |
1978年 | 2篇 |
1976年 | 3篇 |
排序方式: 共有4302条查询结果,搜索用时 0 毫秒
71.
The kernel method suffers from the following problem: the computational efficiency of the feature extraction procedure is inversely proportional to the size of the training sample set. In this paper, from a novel viewpoint, we propose a very simple and mathematically tractable method to produce the computationally efficient kernel-method-based feature extraction procedure. We first address the issue that how to make the feature extraction result of the reformulated kernel method well approximate that of the naïve kernel method. We identify these training samples that statistically contribute much to the feature extraction results and exploit them to reformulate the kernel method to produce the computationally efficient kernel-method-based feature extraction procedure. Indeed, the proposed method has the following basic idea: when one training sample has little effect on the feature extraction result and statistically has the high correlation with regard to all the training samples, the feature extraction term associated with this training sample can be removed from the feature extraction procedure. The proposed method has the following advantages: First, it proposes, for the first time, to improve the kernel method through formal and reasonable evaluation on the feature extraction term. Second, the proposed method improves the kernel method at a low extra cost and thus has a much more computationally efficient training phase than most of the previous improvements to the kernel method. The experimental comparison shows that the proposed method performs well in classification problems. This paper also intuitively shows the geometrical relation between the identified training samples and other training samples. 相似文献
72.
异步消息驱动安全通信模块的设计与实现 总被引:1,自引:0,他引:1
为了保障多参数监护数据汇总系统的数据传输安全,设计并实现了一个高性能的安全通信模块.通过WSAAsyncSelect I/O模型构建了异步套接字事件多路分解及调度框架,运用安全套接字层协议保证数据传输的安全可靠,并通过多态技术提高了模块的可扩展性.最后在Win32平台上实现了一个数据汇总通信系统作为示例,测试验证了安全... 相似文献
73.
为实现室性早搏的自动判别,提出一种基于多模板匹配的自适应识别算法。采用滤波提高数据信噪比,利用样本数据通过特定的自学习机制建立模板库,设计模板的压缩算法实现待测心搏与模板心搏宽度的对齐,采用模板队列匹配和模板库匹配相结合的匹配策略,设计自适应更新规则实时优化队列与库的结构,利用相关系数检测室早。使用MIT-BIH数据库进行测试,达到99.39%的灵敏度和98.79%的特异度。 相似文献
74.
分布式视频编码虚拟依赖信道模型研究 总被引:4,自引:1,他引:3
视频信息固有的非平稳特性,如冲突区域等,使时域预测技术变得非常复杂.在分布式视频编码(DVC)中,由于解码端不能获取当前编码帧的信息,精确地对时域相关噪声进行建模变得更为困难.文中以虚拟依赖信道模型为切入点对如何降低时域相关噪声进行了研究.首先对DVC虚拟依赖信道进行了建模,并对影响边信息的主要因素进行了分析,分析结果表明在变换域中不同的频率子带对时域相关噪声的敏感度不同.在此基础上提出了一种新的基于小波变换域的虚拟依赖信道模型VCMDWT,基于分类编码的思想对较为平稳的LL子带进行Wyner-Ziv编码,对非平稳的高频子带进行SPIHT帧内编码.实验结果表明,与基于像素域的方法相比,所提出的VCMDWT模型能够得到更稳定的虚拟信道,提高DVC系统的率失真性能达到2.6dBs以上. 相似文献
75.
Zhe-Ming Lu Author Vitae Jun-Xiang Wang Author Vitae Bei-Bei Liu Author Vitae 《Journal of Systems and Software》2009,82(6):1016-1024
Copyright protection and information security have become serious problems due to the ever growing amount of digital data over the Internet. Reversible data hiding is a special type of data hiding technique that guarantees not only the secret data but also the cover media can be reconstructed without any distortion. Traditional schemes are based on spatial, discrete cosine transformation (DCT) and discrete wavelet transformation (DWT) domains. Recently, some vector quantization (VQ) based reversible data hiding schemes have been proposed. This paper proposes an improved reversible data hiding scheme based on VQ-index residual value coding. Experimental results show that our scheme outperforms two recently proposed schemes, namely side-match vector quantization (SMVQ)-based data hiding and modified fast correlation vector quantization (MFCVQ)-based data hiding. 相似文献
76.
Xin-Yu Shao Xue-Zheng Chu Hao-Bo Qiu Liang Gao Jun Yan 《Expert systems with applications》2009,36(2):3223-3233
More and more complicated conceptual design of ship’s engine room (CDSER) heavily depends on designers’ engineering knowledge and existing ship data. To achieve intelligent design at the initial ship design stage, many researchers have made much significant progress in this field, however, most of them only focused on how to find the similar constructed ships. At present, how to utilize these existing data remains an untouched topic. In order to make good use of the existing data and reduce the dependence on designers’ experience, a novel system named Expert System for Aided Conceptual Design of Ship’s Engine Room Automation (ESACD), is elaborated in this study. With the support of the constructed Ship Data Warehouse System, two core subsystems Configuration Selection Assistant (CSA) and Design Scheme Decision Assistant (DSDA) are included in ESACD. A promising approach integrating Fuzzy c-means algorithm (FCM) and Rough Sets Theory (RST) to extract configuration rules from the stored data is adopted in CSA. According to engineers’ proposals, RST is utilized to reason knowledge in incomplete scheme information systems for getting design scheme rules in DSDA, which are useful suggestions for engineers to get better schemes at this stage. Finally, the validity and necessity of this interactive expert system are demonstrated through the CDSER of a new 50,000 DWT Handymax bulk carrier. It is proved that ESACD can efficiently facilitate rapid and intelligent design in CDSER, and reduce the cost of a new ship design. 相似文献
77.
78.
79.
It is well-known that critical infrastructures would be targets for cyber attacks. In this paper, we focus on the power systems (i.e. smart grids) in ubiquitous cities, where every meter is linked to an information network through wireless networking. In a smart grid system, information from smart meters would be used to perform a state estimation in real time to maintain the stability of the system. A wrong estimation may lead to disastrous consequences (e.g. suspension of electricity supply or a big financial loss). Unfortunately, quite a number of recent results showed that attacks on this estimation process are feasible by manipulating readings of only a few meters. In this paper, we focus on nonlinear state estimation which is a more realistic model and widely employed in a real power grid environment. We category cyber attacks against nonlinear state estimation, and review the mechanisms behind. State-of-the-art security measures to detect these attacks are discussed via sensor protection. Hope that the community would be able to come up with a secure system architecture for ubiquitous cities. 相似文献
80.