首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39934篇
  免费   5504篇
  国内免费   3538篇
电工技术   1524篇
综合类   2849篇
化学工业   3339篇
金属工艺   929篇
机械仪表   1354篇
建筑科学   459篇
矿业工程   347篇
能源动力   1593篇
轻工业   414篇
水利工程   158篇
石油天然气   112篇
武器工业   134篇
无线电   8971篇
一般工业技术   3282篇
冶金工业   427篇
原子能技术   139篇
自动化技术   22945篇
  2024年   243篇
  2023年   1845篇
  2022年   1961篇
  2021年   2267篇
  2020年   2355篇
  2019年   1972篇
  2018年   1836篇
  2017年   3263篇
  2016年   3236篇
  2015年   2780篇
  2014年   3712篇
  2013年   2894篇
  2012年   3360篇
  2011年   3108篇
  2010年   2314篇
  2009年   2542篇
  2008年   1177篇
  2007年   2052篇
  2006年   1645篇
  2005年   851篇
  2004年   332篇
  2003年   414篇
  2002年   407篇
  2001年   369篇
  2000年   256篇
  1999年   312篇
  1998年   119篇
  1997年   77篇
  1996年   91篇
  1995年   98篇
  1994年   59篇
  1993年   57篇
  1992年   57篇
  1991年   66篇
  1990年   47篇
  1989年   49篇
  1988年   150篇
  1987年   282篇
  1986年   251篇
  1985年   62篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1978年   1篇
  1977年   2篇
  1959年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
GSM网络优化中接通率的分析   总被引:2,自引:0,他引:2       下载免费PDF全文
接通率是衡量GSM网络运行质量重要的指标之一,本文根据GSM网络优化的基本理论,针对GSM网络中低接通率现象,对影响GSM网络优化中接通率的因素进行了细致的分析与研究,提出了一套有效可行的优化方法,逐个排除故障原因,从而达到了提高接通率、优化GSM网络的目的,并针对提高GSM网络接通率设计开发了GSM网络优化软件。最后,对实例安阳市区GSM网络中存在的低接通率等问题进行了分析及其优化,并证实了优化软件中提高接通率方法的可行性、实效性。  相似文献   
992.
自动化和智能化是未来粉末注射成形技术的重要发展方向,本文通过对注射模具温度基于滑动窗口技术的数据挖掘处理以及对注射坯CT切片密度分布的分析修正、阈值预处理后,采用基于神经网络数据融合的方式对多源数据进行融合,实现对注射坯密度分布的有效控制。  相似文献   
993.
巡检系统是对人员设备实施量化和动态管理的现代化手段,是促进企业及生产部门实行科学化和信息化管理的重要步骤,目前在石油行业管线和井位巡查管理、电力行业线路和设备巡查管理和通讯行业线路和设备巡查管理、铁路及安全设备巡查管理等领域都有广泛的应用。结合移动通信巡检工作的实际情况,本文提出了一种改进的基于最短路径的地图匹配(Map Matching)算法。在全球定位系统(GPS)数据的采样时间间隔较长的情况下能较准确地对定位点进行地图匹配,能够绘制出与电子地图道路信息相符的定位轨迹,并在长沙移动基站线路巡视巡检系统中得到实现。  相似文献   
994.
基础软件技术的发展趋势   总被引:1,自引:1,他引:0  
从分析基础软件的基本概念和特性出发,对基础软件的内容、需求、技术、产品等方面进行了系统论述。探讨了现有的主流开发技术及未来的发展趋势。通过分析现有部分国产软件系统在一些典型领域的应用,揭示我国基础软件发展的现状和难题,为现有国产基础软件产业的发展提供决策参考。  相似文献   
995.
Interest point detection has a wide range of applications, such as image retrieval and object recognition. Given an image, many previous interest point detectors first assign interest strength to each image point using a certain filtering technique, and then apply non-maximum suppression scheme to select a set of interest point candidates. However, we observe that non-maximum suppression tends to over-suppress good candidates for a weakly textured image such as a face image. We propose a new candidate selection scheme that chooses image points whose zero-/first-order intensities can be clustered into two imbalanced classes (in size), as candidates. Our tests of repeatability across image rotations and lighting conditions show the advantage of imbalance oriented selection. We further present a new face recognition application—facial identity representability evaluation—to show the value of imbalance oriented selection.  相似文献   
996.
A novel method based on fusion of texture and shape information is proposed for facial expression and Facial Action Unit (FAU) recognition from video sequences. Regarding facial expression recognition, a subspace method based on Discriminant Non-negative Matrix Factorization (DNMF) is applied to the images, thus extracting the texture information. In order to extract the shape information, the system firstly extracts the deformed Candide facial grid that corresponds to the facial expression depicted in the video sequence. A Support Vector Machine (SVM) system designed on an Euclidean space, defined over a novel metric between grids, is used for the classification of the shape information. Regarding FAU recognition, the texture extraction method (DNMF) is applied on the differences images of the video sequence, calculated taking under consideration the neutral and the expressive frame. An SVM system is used for FAU classification from the shape information. This time, the shape information consists of the grid node coordinate displacements between the neutral and the expressed facial expression frame. The fusion of texture and shape information is performed using various approaches, among which are SVMs and Median Radial Basis Functions (MRBFs), in order to detect the facial expression and the set of present FAUs. The accuracy achieved using the Cohn–Kanade database is 92.3% when recognizing the seven basic facial expressions (anger, disgust, fear, happiness, sadness, surprise and neutral), and 92.1% when recognizing the 17 FAUs that are responsible for facial expression development.  相似文献   
997.
This paper presents a methodology for separating handwritten foreground pixels, from background pixels, in carbon copied medical forms. Comparisons between prior and proposed techniques are illustrated. This study involves the analysis of the New York State (NYS) Department of Health (DoH) Pre-Hospital Care Report (PCR) [Western Regional Emergency Medical Services, Bureau of Emergency Medical Services, New York State (NYS) Department of Health (DoH), Prehospital Care Report v4.] which is a standard form used in New York by all Basic and Advanced Life Support pre-hospital health care professionals to document patient status in the emergency environment. The forms suffer from extreme carbon mesh noise, varying handwriting pressure sensitivity issues, and smudging which are further complicated by the writing environment. Extraction of handwriting from these medical forms is a vital step in automating emergency medical health surveillance systems.  相似文献   
998.
In this paper, we propose a novel scheme of automatic image authentication and recovery, in which the altered region of the image can be detected and recovered in a fully automated fashion. To achieve high-quality image recovery, we choose the region of importance (ROI) in the image and perform fractal encoding for the blocks of ROI. And then we insert the fractal codes of ROI and the watermark into the original image to obtain the watermarked image. By watermark extraction, we can determine whether the watermarked image has been tampered or not. If the watermarked image has been tampered, we can automatically localize the altered region, and apply either fractal decoding or image inpainting for image recovery. Finally, experimental results are given to show the effectiveness of the proposed scheme.  相似文献   
999.
1000.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号