首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42087篇
  免费   3487篇
  国内免费   1881篇
电工技术   2129篇
技术理论   3篇
综合类   5166篇
化学工业   4934篇
金属工艺   1513篇
机械仪表   1564篇
建筑科学   7178篇
矿业工程   2484篇
能源动力   1220篇
轻工业   3264篇
水利工程   2342篇
石油天然气   2537篇
武器工业   181篇
无线电   2312篇
一般工业技术   3385篇
冶金工业   2699篇
原子能技术   373篇
自动化技术   4171篇
  2024年   110篇
  2023年   553篇
  2022年   845篇
  2021年   1206篇
  2020年   1059篇
  2019年   978篇
  2018年   875篇
  2017年   981篇
  2016年   1179篇
  2015年   1283篇
  2014年   2220篇
  2013年   2098篇
  2012年   2676篇
  2011年   2928篇
  2010年   2289篇
  2009年   2487篇
  2008年   2257篇
  2007年   2901篇
  2006年   2743篇
  2005年   2474篇
  2004年   2080篇
  2003年   1932篇
  2002年   1591篇
  2001年   1356篇
  2000年   1136篇
  1999年   936篇
  1998年   662篇
  1997年   557篇
  1996年   499篇
  1995年   457篇
  1994年   359篇
  1993年   302篇
  1992年   238篇
  1991年   153篇
  1990年   178篇
  1989年   148篇
  1988年   121篇
  1987年   100篇
  1986年   66篇
  1985年   63篇
  1984年   54篇
  1983年   27篇
  1982年   26篇
  1981年   39篇
  1980年   30篇
  1979年   31篇
  1977年   18篇
  1976年   20篇
  1975年   20篇
  1974年   17篇
排序方式: 共有10000条查询结果,搜索用时 546 毫秒
891.
多进制小波的遥感影像融合对比分析   总被引:2,自引:0,他引:2       下载免费PDF全文
提出了利用多进制小波进行融合的方案,目标是为了深度挖掘小波在遥感影像像素级融合方面的应用。采用多进制小波进行融合的优势是在减少能量损失的前提下使高频分量的分解方向更加细化,重构时频段组合更加灵活。首先从理论方面阐述了多进制小波和二进制小波(包)的异同,通过对比分析在像素级遥感影像融合实验结果,同时结合目视效果和多种评价指标,发现对于中分辨率——北京一号遥感影像,用多进制(M=4时)db5小波对全色和多光谱遥感影像进行融合的效果不亚于采用二进制小波(包)的融合效果。实验结果表明,小波融合的效果取决于小波基的选取、分解级数,也因处理对象而不同,但在采用相同的小波基的基础上,多进制小波比二进制小波(包)融合效果在目视效果和融合指标两方面都略胜一筹。其为小卫星数据在中国水资源、灾害、考古等领域的重点应用推广的数据处理方面打下基础,同时可为其他不同分辨率遥感影像的类似处理起到示范作用。  相似文献   
892.
利用CPU时间戳实现局域网时间同步的新机制   总被引:2,自引:1,他引:1  
谌华金  罗双喜  何佳洲 《计算机应用》2009,29(11):2920-2924
当前在网络应用中,经常需要多台计算机协同工作,因而要有一个统一时钟。提出一种利用CPU内部高精度时间戳实现局域网时钟同步的新机制,并用VC++语言编写了服务端与客户端软件,且在Windows XP 和Windows 2000环境的小型局域网进行测试。结果表明,该算法同步精度较高,且系统运行稳定。  相似文献   
893.
以我国某大型钢铁企业全厂仪表维修设施的设计方案为例,简要说明了仪修设施的设计原则、全厂仪表维修的一般解决方案,较详细地介绍了仪修设施专业划分、实验室及维修车间的设置和主要设备构成,为该类项目的设计和工程建设提供一定参考。  相似文献   
894.
基于全电子设计方案的区域计算机联锁系统   总被引:2,自引:0,他引:2  
介绍了基于全电子设计方案的区域性计算机联锁控制系统的技术方案和系统构成。详细阐述了系统中主控站和被控站设备的组成、功能和特点,给出了系统详细的结构框图。系统对于降低工程造价、充分发挥计算机性能、提高运输组织效率具有重要作用。  相似文献   
895.
Traditionally, direct marketing companies have relied on pre-testing to select the best offers to send to their audience. Companies systematically dispatch the offers under consideration to a limited sample of potential buyers, rank them with respect to their performance and, based on this ranking, decide which offers to send to the wider population. Though this pre-testing process is simple and widely used, recently the industry has been under increased pressure to further optimize learning, in particular when facing severe time and learning space constraints. The main contribution of the present work is to demonstrate that direct marketing firms can exploit the information on visual content to optimize the learning phase. This paper proposes a two-phase learning strategy based on a cascade of regression methods that takes advantage of the visual and text features to improve and accelerate the learning process. Experiments in the domain of a commercial Multimedia Messaging Service (MMS) show the effectiveness of the proposed methods and a significant improvement over traditional learning techniques. The proposed approach can be used in any multimedia direct marketing domain in which offers comprise both a visual and text component.
Giuseppe TribulatoEmail:

Sebastiano Battiato   was born in Catania, Italy, in 1972. He received the degree in Computer Science (summa cum laude) in 1995 and his Ph.D in Computer Science and Applied Mathematics in 1999. From 1999 to 2003 he has lead the “Imaging” team c/o STMicroelectronics in Catania. Since 2004 he works as a Researcher at Department of Mathematics and Computer Science of the University of Catania. His research interests include image enhancement and processing, image coding and camera imaging technology. He published more than 90 papers in international journals, conference proceedings and book chapters. He is co-inventor of about 15 international patents. He is reviewer for several international journals and he has been regularly a member of numerous international conference committees. He has participated in many international and national research projects. He is an Associate Editor of the SPIE Journal of Electronic Imaging (Specialty: digital photography and image compression). He is director of ICVSS (International Computer Vision Summer School). He is a Senior Member of the IEEE. Giovanni Maria Farinella   is currently contract researcher at Dipartimento di Matematica e Informatica, University of Catania, Italy (IPLAB research group). He is also associate member of the Computer Vision and Robotics Research Group at University of Cambridge since 2006. His research interests lie in the fields of computer vision, pattern recognition and machine learning. In 2004 he received his degree in Computer Science (egregia cum laude) from University of Catania. He was awarded a Ph.D. (Computer Vision) from the University of Catania in 2008. He has co-authored several papers in international journals and conferences proceedings. He also serves as reviewer numerous international journals and conferences. He is currently the co-director of the International Summer School on Computer Vision (ICVSS). Giovanni Giuffrida   is an assistant professor at University of Catania, Italy. He received a degree in Computer Science from the University of Pisa, Italy in 1988 (summa cum laude), a Master of Science in Computer Science from the University of Houston, Texas, in 1992, and a Ph.D. in Computer Science, from the University of California in Los Angeles (UCLA) in 2001. He has an extensive experience in both the industrial and academic world. He served as CTO and CEO in the industry and served as consultant for various organizations. His research interest is on optimizing content delivery on new media such as Internet, mobile phones, and digital tv. He published several papers on data mining and its applications. He is a member of ACM and IEEE. Catarina Sismeiro   is a senior lecturer at Imperial College Business School, Imperial College London. She received her Ph.D. in Marketing from the University of California, Los Angeles, and her Licenciatura in Management from the University of Porto, Portugal. Before joining Imperial College Catarina had been and assistant professor at Marshall School of Business, University of Southern California. Her primary research interests include studying pharmaceutical markets, modeling consumer behavior in interactive environments, and modeling spatial dependencies. Other areas of interest are decision theory, econometric methods, and the use of image and text features to predict the effectiveness of marketing communications tools. Catarina’s work has appeared in innumerous marketing and management science conferences. Her research has also been published in the Journal of Marketing Research, Management Science, Marketing Letters, Journal of Interactive Marketing, and International Journal of Research in Marketing. She received the 2003 Paul Green Award and was the finalist of the 2007 and 2008 O’Dell Awards. Catarina was also a 2007 Marketing Science Institute Young Scholar, and she received the D. Antonia Adelaide Ferreira award and the ADMES/MARKTEST award for scientific excellence. Catarina is currently on the editorial boards of the Marketing Science journal and the International Journal of Research in Marketing. Giuseppe Tribulato   was born in Messina, Italy, in 1979. He received the degree in Computer Science (summa cum laude) in 2004 and his Ph.D in Computer Science in 2008. From 2005 he has lead the research team at Neodata Group. His research interests include data mining techniques, recommendation systems and customer targeting.   相似文献   
896.
Onkar  G.V.V.  Manoj  Anurag   《Computer Networks》2009,53(16):2855-2869
The network scenario is that of an infrastructure IEEE 802.11 WLAN with a single AP with which several stations (STAs) are associated. The AP has a finite size buffer for storing packets. In this scenario, we consider TCP-controlled upload and download file transfers between the STAs and a server on the wireline LAN (e.g., 100 Mbps Ethernet) to which the AP is connected. In such a situation, it is well known that because of packet losses due to finite buffers at the AP, upload file transfers obtain larger throughputs than download transfers. We provide an analytical model for estimating the upload and download throughputs as a function of the buffer size at the AP. We provide models for the undelayed and delayed ACK cases for a TCP that performs loss recovery only by timeout, and also for TCP Reno. The models are validated in comparison with NS2 simulations.  相似文献   
897.
Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately traced. Because the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. An intrusion detection system (IDS) is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current IDS depends on the system operators in working out the tuning solution and in integrating it into the detection model. Furthermore, an extensive effort is required to tackle the newly evolving attacks and a deep study is necessary to categorize it into the respective classes. To reduce this dependence, an automatically evolving anomaly IDS using neuro-genetic algorithm is presented. The proposed system automatically tunes the detection model on the fly according to the feedback provided by the system operator when false predictions are encountered. The system has been evaluated using the Knowledge Discovery in Databases Conference (KDD 2009) intrusion detection dataset. Genetic paradigm is employed to choose the predominant features, which reveal the occurrence of intrusions. The neuro-genetic IDS (NGIDS) involves calculation of weightage value for each of the categorical attributes so that data of uniform representation can be processed by the neuro-genetic algorithm. In this system unauthorized invasion of a user are identified and newer types of attacks are sensed and classified respectively by the neuro-genetic algorithm. The experimental results obtained in this work show that the system achieves improvement in terms of misclassification cost when compared with conventional IDS. The results of the experiments show that this system can be deployed based on a real network or database environment for effective prediction of both normal attacks and new attacks.  相似文献   
898.
Knowledge grid is a kind of knowledge sharing environment based on the World Wide Web, and its essence is the synergy and sharing of internet knowledge resource and knowledge service. KM (knowledge management) in education based on KG (knowledge grid) makes use of the grid technology and integrates the methods and tools of KM in Education to support the whole cycle of knowledge application. Based on the advantages of KM in Education, in this paper, we construct a service-oriented model of KM in Education in order to achieve more effective knowledge sharing and knowledge service in education.  相似文献   
899.
The exchange of cargo capacities is a well established approach in logistics. However, only few logistics marketplaces are able to take into consideration synergies that can be generated by combining different transportation routes of different logistics carrierps. In order to exploit these synergies, we designed and implemented the combinatorial exchange mechanism ComEx for the intra-enterprise exchange of delivery orders in a logistics company organized in a profit center structure. Each profit center is able to release delivery orders to an adjacent profit center if the geographic locations of the customers allow for a reduced-cost delivery by the adjacent profit center. We demonstrate that by using the ComEx mechanism, the total cost of transportation of our logistics company can be reduced by up to 14%. Since our iterative auction mechanism is very complex and therefore resource-intensive, we reduce the complexity by applying a convex hull approach combined with a distance-based cost estimator.
Jens VykoukalEmail:
  相似文献   
900.
人工智能实验教学探讨   总被引:4,自引:3,他引:1  
本文一方面简单介绍人工智能的基本理论及知识体系结构,另一方面则结合笔者的理论实践与实验教学经验,总结出目前在整个教学过程所存在的一些问题,目的在于不断总结经验,力争能更好地完成人工智能的整个教学工作,从而提高人才培养的质量,同时也可以为其他高校提供参考。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号