全文获取类型
收费全文 | 24017篇 |
免费 | 2247篇 |
国内免费 | 867篇 |
专业分类
电工技术 | 903篇 |
技术理论 | 2篇 |
综合类 | 1802篇 |
化学工业 | 3401篇 |
金属工艺 | 1687篇 |
机械仪表 | 581篇 |
建筑科学 | 3969篇 |
矿业工程 | 2110篇 |
能源动力 | 756篇 |
轻工业 | 1536篇 |
水利工程 | 1497篇 |
石油天然气 | 3848篇 |
武器工业 | 48篇 |
无线电 | 468篇 |
一般工业技术 | 1539篇 |
冶金工业 | 1389篇 |
原子能技术 | 200篇 |
自动化技术 | 1395篇 |
出版年
2025年 | 50篇 |
2024年 | 340篇 |
2023年 | 335篇 |
2022年 | 582篇 |
2021年 | 674篇 |
2020年 | 754篇 |
2019年 | 509篇 |
2018年 | 461篇 |
2017年 | 523篇 |
2016年 | 623篇 |
2015年 | 665篇 |
2014年 | 1399篇 |
2013年 | 1261篇 |
2012年 | 1632篇 |
2011年 | 1726篇 |
2010年 | 1410篇 |
2009年 | 1540篇 |
2008年 | 1307篇 |
2007年 | 1564篇 |
2006年 | 1512篇 |
2005年 | 1277篇 |
2004年 | 1171篇 |
2003年 | 1152篇 |
2002年 | 948篇 |
2001年 | 753篇 |
2000年 | 578篇 |
1999年 | 521篇 |
1998年 | 365篇 |
1997年 | 341篇 |
1996年 | 258篇 |
1995年 | 180篇 |
1994年 | 156篇 |
1993年 | 120篇 |
1992年 | 86篇 |
1991年 | 74篇 |
1990年 | 72篇 |
1989年 | 53篇 |
1988年 | 35篇 |
1987年 | 25篇 |
1986年 | 14篇 |
1985年 | 18篇 |
1984年 | 9篇 |
1983年 | 11篇 |
1982年 | 6篇 |
1981年 | 4篇 |
1980年 | 12篇 |
1979年 | 3篇 |
1975年 | 3篇 |
1974年 | 5篇 |
1973年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
从理论层面分析了生态城区产生的固体废弃物的特点以及现行的固体废弃物管理中各方面的问题所在,生态城区对固体废弃物在源头减量和生态资源化有更加严格的要求,人的生态环保意识的提升,废弃物再生资源化全面实行清洁生产,建立循环经济体系和完善的废品收购业等可以作为生态城区中达到固体废弃物源头减量化和资源化的手段。 相似文献
992.
基于示例学习的特征空间变换方法 总被引:1,自引:0,他引:1
特征空间是人工智能领域中经常用的基本概念之一,人工智能领域中的许多问题可以可以通过特征空间变换的方法化简和求解。文中提出了一种基于示例学习的特征空间变换方法。 相似文献
993.
朱玉 《网络安全技术与应用》2014,(11):221-221
近年来,随着我国科学技术的日益发展进步,计算机的应用越来越普及,在人们日常生活和工作中发挥着重要作用,影响着人们的生活质量和社会的发展。而且计算机的使用人群很广泛,不论是教师、公务员、医生或者农民、工人等等,都在逐渐接触它,无疑将是人类生存的重要助手。但正是如此,在使用计算机的过程中暴露了许许多多的问题,给人类带来了伤害,我们应该主动去防范,本文正是对此进行研究。 相似文献
994.
Berthilsson Rikard Åström Kalle Heyden Anders 《International Journal of Computer Vision》2001,41(3):171-182
In this paper, we extend the notion of affine shape, introduced by Sparr, from finite point sets to curves. The extension makes it possible to reconstruct 3D-curves up to projective transformations, from a number of their 2D-projections. We also extend the bundle adjustment technique from point features to curves.The first step of the curve reconstruction algorithm is based on affine shape. It is independent of choice of coordinates, is robust, does not rely on any preselected parameters and works for an arbitrary number of images. In particular this means that, except for a small set of curves (e.g. a moving line), a solution is given to the aperture problem of finding point correspondences between curves. The second step takes advantage of any knowledge of measurement errors in the images. This is possible by extending the bundle adjustment technique to curves.Finally, experiments are performed on both synthetic and real data to show the performance and applicability of the algorithm. 相似文献
995.
企业网站会经常受到黑客的攻击,主要讨论常见的脚本漏洞、旁注、缓冲区溢出、分布式拒绝服务、解码攻击等五种攻击方式及其应对策略。 相似文献
996.
The 3D Morphable Model (3DMM) and the Structure from Motion (SfM) methods are widely used for 3D facial reconstruction from 2D single-view or multiple-view images. However, model-based methods suffer from disadvantages such as high computational costs and vulnerability to local minima and head pose variations. The SfM-based methods require multiple facial images in various poses. To overcome these disadvantages, we propose a single-view-based 3D facial reconstruction method that is person-specific and robust to pose variations. Our proposed method combines the simplified 3DMM and the SfM methods. First, 2D initial frontal Facial Feature Points (FFPs) are estimated from a preliminary 3D facial image that is reconstructed by the simplified 3DMM. Second, a bilateral symmetric facial image and its corresponding FFPs are obtained from the original side-view image and corresponding FFPs by using the mirroring technique. Finally, a more accurate the 3D facial shape is reconstructed by the SfM using the frontal, original, and bilateral symmetric FFPs. We evaluated the proposed method using facial images in 35 different poses. The reconstructed facial images and the ground-truth 3D facial shapes obtained from the scanner were compared. The proposed method proved more robust to pose variations than 3DMM. The average 3D Root Mean Square Error (RMSE) between the reconstructed and ground-truth 3D faces was less than 2.6 mm when 2D FFPs were manually annotated, and less than 3.5 mm when automatically annotated. 相似文献
997.
Risk management is becoming increasingly important for railway companies in order to safeguard their passengers and employees while improving safety and reducing maintenance costs. However, in many circumstances, the application of probabilistic risk analysis tools may not give satisfactory results because the risk data are incomplete or there is a high level of uncertainty involved in the risk data. This article presents the development of a risk management system for railway risk analysis using fuzzy reasoning approach and fuzzy analytical hierarchy decision making process. In the system, fuzzy reasoning approach (FRA) is employed to estimate the risk level of each hazardous event in terms of failure frequency, consequence severity and consequence probability. This allows imprecision or approximate information in the risk analysis process. Fuzzy analytical hierarchy process (fuzzy-AHP) technique is then incorporated into the risk model to use its advantage in determining the relative importance of the risk contributions so that the risk assessment can be progressed from hazardous event level to hazard group level and finally to railway system level. This risk assessment system can evaluate both qualitative and quantitative risk data and information associated with a railway system effectively and efficiently, which will provide railway risk analysts, managers and engineers with a method and tool to improve their safety management of railway systems and set safety standards. A case study on risk assessment of shunting at Hammersmith depot is used to illustrate the application of the proposed risk assessment system. 相似文献
998.
Seong-O Shim Author Vitae Author Vitae 《Pattern recognition》2010,43(10):3338-3347
Shape from focus (SFF) is a technique to estimate the depth and 3D shape of an object from a sequence of images obtained at different focus settings. In this paper, the SFF is presented as a combinatorial optimization problem. The proposed algorithm tries to find the combination of pixel frames which produces maximum focus measure computed over pixels lying on those frames. To reduce the high computational complexity, a local search method is proposed. After the estimate of the initial depth map solution of an object, the neighborhood is defined, and an intermediate image volume is generated from the neighborhood. The updated depth map solution is found from the intermediate image volume. This update process of the depth map solution continues until the amount of improvement is negligible. The results of the proposed SFF algorithm have shown significant improvements in both the accuracy of the depth map estimation and the computational complexity, with respect to the existing SFF methods. 相似文献
999.
Minimum-cost network hardening using attack graphs 总被引:3,自引:0,他引:3
In defending one’s network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemingly well-guarded network through a multi-step intrusion, in which each step prepares for the next. Attack graphs can reveal the threat by enumerating possible sequences of exploits that can be followed to compromise given critical resources. However, attack graphs do not directly provide a solution to remove the threat. Finding a solution by hand is error-prone and tedious, particularly for larger and less secure networks whose attack graphs are overly complicated. In this paper, we propose a solution to automate the task of hardening a network against multi-step intrusions. Unlike existing approaches whose solutions require removing exploits, our solution is comprised of initially satisfied conditions only. Our solution is thus more enforceable, because the initial conditions can be independently disabled, whereas exploits are usually consequences of other exploits and hence cannot be disabled without removing the causes. More specifically, we first represent given critical resources as a logic proposition of initial conditions. We then simplify the proposition to make hardening options explicit. Among the options we finally choose solutions with the minimum cost. The key improvements over the preliminary version of this paper include a formal framework of the minimum network hardening problem, and an improved one-pass algorithm in deriving the logic proposition while avoiding logic loops. 相似文献
1000.
Pattern matching is one of the most performance-critical components for the content inspection based applications of network
security, such as network intrusion detection and prevention. To keep up with the increasing speed network, this component
needs to be accelerated by well designed custom coprocessor. This paper presents a parameterized multilevel pattern matching
architecture (MPM) which is used on FPGAs. To achieve less chip area, the architecture is designed based on the idea of selected
character decoding (SCD) and multilevel method which are analyzed in detail. This paper also proposes an MPM generator that
can generate RTL-level codes of MPM by giving a pattern set and predefined parameters. With the generator, the efficient MPM
architecture can be generated and embedded to a total hardware solution. The third contribution is a mathematical model and
formula to estimate the chip area for each MPM before it is generated, which is useful for choosing the proper type of FPGAs.
One example MPM architecture is implemented by giving 1785 patterns of Snort on Xilinx Virtex 2 Pro FPGA. The results show
that this MPM can achieve 4.3 Gbps throughput with 5 stages of pipelines and 0.22 slices per character, about one half chip
area of the most area-efficient architecture in literature. Other results are given to show that MPM is also efficient for
general random pattern sets. The performance of MPM can be scalable near linearly, potential for more than 100 Gbps throughput.
Supported by the National Natural Science Foundation of China (Grant No. 60803002), and the Excellent Young Scholars Research
Fund of Beijing Institute of Technology 相似文献