首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24017篇
  免费   2247篇
  国内免费   867篇
电工技术   903篇
技术理论   2篇
综合类   1802篇
化学工业   3401篇
金属工艺   1687篇
机械仪表   581篇
建筑科学   3969篇
矿业工程   2110篇
能源动力   756篇
轻工业   1536篇
水利工程   1497篇
石油天然气   3848篇
武器工业   48篇
无线电   468篇
一般工业技术   1539篇
冶金工业   1389篇
原子能技术   200篇
自动化技术   1395篇
  2025年   50篇
  2024年   340篇
  2023年   335篇
  2022年   582篇
  2021年   674篇
  2020年   754篇
  2019年   509篇
  2018年   461篇
  2017年   523篇
  2016年   623篇
  2015年   665篇
  2014年   1399篇
  2013年   1261篇
  2012年   1632篇
  2011年   1726篇
  2010年   1410篇
  2009年   1540篇
  2008年   1307篇
  2007年   1564篇
  2006年   1512篇
  2005年   1277篇
  2004年   1171篇
  2003年   1152篇
  2002年   948篇
  2001年   753篇
  2000年   578篇
  1999年   521篇
  1998年   365篇
  1997年   341篇
  1996年   258篇
  1995年   180篇
  1994年   156篇
  1993年   120篇
  1992年   86篇
  1991年   74篇
  1990年   72篇
  1989年   53篇
  1988年   35篇
  1987年   25篇
  1986年   14篇
  1985年   18篇
  1984年   9篇
  1983年   11篇
  1982年   6篇
  1981年   4篇
  1980年   12篇
  1979年   3篇
  1975年   3篇
  1974年   5篇
  1973年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
从理论层面分析了生态城区产生的固体废弃物的特点以及现行的固体废弃物管理中各方面的问题所在,生态城区对固体废弃物在源头减量和生态资源化有更加严格的要求,人的生态环保意识的提升,废弃物再生资源化全面实行清洁生产,建立循环经济体系和完善的废品收购业等可以作为生态城区中达到固体废弃物源头减量化和资源化的手段。  相似文献   
992.
基于示例学习的特征空间变换方法   总被引:1,自引:0,他引:1  
特征空间是人工智能领域中经常用的基本概念之一,人工智能领域中的许多问题可以可以通过特征空间变换的方法化简和求解。文中提出了一种基于示例学习的特征空间变换方法。  相似文献   
993.
近年来,随着我国科学技术的日益发展进步,计算机的应用越来越普及,在人们日常生活和工作中发挥着重要作用,影响着人们的生活质量和社会的发展。而且计算机的使用人群很广泛,不论是教师、公务员、医生或者农民、工人等等,都在逐渐接触它,无疑将是人类生存的重要助手。但正是如此,在使用计算机的过程中暴露了许许多多的问题,给人类带来了伤害,我们应该主动去防范,本文正是对此进行研究。  相似文献   
994.
Reconstruction of General Curves,Using Factorization and Bundle Adjustment   总被引:1,自引:0,他引:1  
In this paper, we extend the notion of affine shape, introduced by Sparr, from finite point sets to curves. The extension makes it possible to reconstruct 3D-curves up to projective transformations, from a number of their 2D-projections. We also extend the bundle adjustment technique from point features to curves.The first step of the curve reconstruction algorithm is based on affine shape. It is independent of choice of coordinates, is robust, does not rely on any preselected parameters and works for an arbitrary number of images. In particular this means that, except for a small set of curves (e.g. a moving line), a solution is given to the aperture problem of finding point correspondences between curves. The second step takes advantage of any knowledge of measurement errors in the images. This is possible by extending the bundle adjustment technique to curves.Finally, experiments are performed on both synthetic and real data to show the performance and applicability of the algorithm.  相似文献   
995.
企业网站会经常受到黑客的攻击,主要讨论常见的脚本漏洞、旁注、缓冲区溢出、分布式拒绝服务、解码攻击等五种攻击方式及其应对策略。  相似文献   
996.
The 3D Morphable Model (3DMM) and the Structure from Motion (SfM) methods are widely used for 3D facial reconstruction from 2D single-view or multiple-view images. However, model-based methods suffer from disadvantages such as high computational costs and vulnerability to local minima and head pose variations. The SfM-based methods require multiple facial images in various poses. To overcome these disadvantages, we propose a single-view-based 3D facial reconstruction method that is person-specific and robust to pose variations. Our proposed method combines the simplified 3DMM and the SfM methods. First, 2D initial frontal Facial Feature Points (FFPs) are estimated from a preliminary 3D facial image that is reconstructed by the simplified 3DMM. Second, a bilateral symmetric facial image and its corresponding FFPs are obtained from the original side-view image and corresponding FFPs by using the mirroring technique. Finally, a more accurate the 3D facial shape is reconstructed by the SfM using the frontal, original, and bilateral symmetric FFPs. We evaluated the proposed method using facial images in 35 different poses. The reconstructed facial images and the ground-truth 3D facial shapes obtained from the scanner were compared. The proposed method proved more robust to pose variations than 3DMM. The average 3D Root Mean Square Error (RMSE) between the reconstructed and ground-truth 3D faces was less than 2.6 mm when 2D FFPs were manually annotated, and less than 3.5 mm when automatically annotated.  相似文献   
997.
Risk management is becoming increasingly important for railway companies in order to safeguard their passengers and employees while improving safety and reducing maintenance costs. However, in many circumstances, the application of probabilistic risk analysis tools may not give satisfactory results because the risk data are incomplete or there is a high level of uncertainty involved in the risk data. This article presents the development of a risk management system for railway risk analysis using fuzzy reasoning approach and fuzzy analytical hierarchy decision making process. In the system, fuzzy reasoning approach (FRA) is employed to estimate the risk level of each hazardous event in terms of failure frequency, consequence severity and consequence probability. This allows imprecision or approximate information in the risk analysis process. Fuzzy analytical hierarchy process (fuzzy-AHP) technique is then incorporated into the risk model to use its advantage in determining the relative importance of the risk contributions so that the risk assessment can be progressed from hazardous event level to hazard group level and finally to railway system level. This risk assessment system can evaluate both qualitative and quantitative risk data and information associated with a railway system effectively and efficiently, which will provide railway risk analysts, managers and engineers with a method and tool to improve their safety management of railway systems and set safety standards. A case study on risk assessment of shunting at Hammersmith depot is used to illustrate the application of the proposed risk assessment system.  相似文献   
998.
Shape from focus (SFF) is a technique to estimate the depth and 3D shape of an object from a sequence of images obtained at different focus settings. In this paper, the SFF is presented as a combinatorial optimization problem. The proposed algorithm tries to find the combination of pixel frames which produces maximum focus measure computed over pixels lying on those frames. To reduce the high computational complexity, a local search method is proposed. After the estimate of the initial depth map solution of an object, the neighborhood is defined, and an intermediate image volume is generated from the neighborhood. The updated depth map solution is found from the intermediate image volume. This update process of the depth map solution continues until the amount of improvement is negligible. The results of the proposed SFF algorithm have shown significant improvements in both the accuracy of the depth map estimation and the computational complexity, with respect to the existing SFF methods.  相似文献   
999.
Minimum-cost network hardening using attack graphs   总被引:3,自引:0,他引:3  
Lingyu  Steven  Sushil 《Computer Communications》2006,29(18):3812-3824
In defending one’s network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemingly well-guarded network through a multi-step intrusion, in which each step prepares for the next. Attack graphs can reveal the threat by enumerating possible sequences of exploits that can be followed to compromise given critical resources. However, attack graphs do not directly provide a solution to remove the threat. Finding a solution by hand is error-prone and tedious, particularly for larger and less secure networks whose attack graphs are overly complicated. In this paper, we propose a solution to automate the task of hardening a network against multi-step intrusions. Unlike existing approaches whose solutions require removing exploits, our solution is comprised of initially satisfied conditions only. Our solution is thus more enforceable, because the initial conditions can be independently disabled, whereas exploits are usually consequences of other exploits and hence cannot be disabled without removing the causes. More specifically, we first represent given critical resources as a logic proposition of initial conditions. We then simplify the proposition to make hardening options explicit. Among the options we finally choose solutions with the minimum cost. The key improvements over the preliminary version of this paper include a formal framework of the minimum network hardening problem, and an improved one-pass algorithm in deriving the logic proposition while avoiding logic loops.  相似文献   
1000.
Pattern matching is one of the most performance-critical components for the content inspection based applications of network security, such as network intrusion detection and prevention. To keep up with the increasing speed network, this component needs to be accelerated by well designed custom coprocessor. This paper presents a parameterized multilevel pattern matching architecture (MPM) which is used on FPGAs. To achieve less chip area, the architecture is designed based on the idea of selected character decoding (SCD) and multilevel method which are analyzed in detail. This paper also proposes an MPM generator that can generate RTL-level codes of MPM by giving a pattern set and predefined parameters. With the generator, the efficient MPM architecture can be generated and embedded to a total hardware solution. The third contribution is a mathematical model and formula to estimate the chip area for each MPM before it is generated, which is useful for choosing the proper type of FPGAs. One example MPM architecture is implemented by giving 1785 patterns of Snort on Xilinx Virtex 2 Pro FPGA. The results show that this MPM can achieve 4.3 Gbps throughput with 5 stages of pipelines and 0.22 slices per character, about one half chip area of the most area-efficient architecture in literature. Other results are given to show that MPM is also efficient for general random pattern sets. The performance of MPM can be scalable near linearly, potential for more than 100 Gbps throughput. Supported by the National Natural Science Foundation of China (Grant No. 60803002), and the Excellent Young Scholars Research Fund of Beijing Institute of Technology  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号