全文获取类型
收费全文 | 34624篇 |
免费 | 7206篇 |
国内免费 | 5315篇 |
专业分类
电工技术 | 2044篇 |
综合类 | 3971篇 |
化学工业 | 1367篇 |
金属工艺 | 779篇 |
机械仪表 | 2665篇 |
建筑科学 | 1009篇 |
矿业工程 | 579篇 |
能源动力 | 229篇 |
轻工业 | 662篇 |
水利工程 | 310篇 |
石油天然气 | 1238篇 |
武器工业 | 450篇 |
无线电 | 6319篇 |
一般工业技术 | 2173篇 |
冶金工业 | 1329篇 |
原子能技术 | 84篇 |
自动化技术 | 21937篇 |
出版年
2024年 | 434篇 |
2023年 | 971篇 |
2022年 | 1962篇 |
2021年 | 2001篇 |
2020年 | 2003篇 |
2019年 | 1515篇 |
2018年 | 1264篇 |
2017年 | 1403篇 |
2016年 | 1563篇 |
2015年 | 1669篇 |
2014年 | 2296篇 |
2013年 | 2071篇 |
2012年 | 2755篇 |
2011年 | 2819篇 |
2010年 | 2317篇 |
2009年 | 2305篇 |
2008年 | 2326篇 |
2007年 | 2527篇 |
2006年 | 2192篇 |
2005年 | 1889篇 |
2004年 | 1526篇 |
2003年 | 1379篇 |
2002年 | 1123篇 |
2001年 | 827篇 |
2000年 | 728篇 |
1999年 | 619篇 |
1998年 | 493篇 |
1997年 | 385篇 |
1996年 | 309篇 |
1995年 | 256篇 |
1994年 | 203篇 |
1993年 | 166篇 |
1992年 | 145篇 |
1991年 | 76篇 |
1990年 | 72篇 |
1989年 | 75篇 |
1988年 | 42篇 |
1987年 | 25篇 |
1986年 | 31篇 |
1985年 | 41篇 |
1984年 | 37篇 |
1983年 | 51篇 |
1982年 | 39篇 |
1981年 | 33篇 |
1980年 | 28篇 |
1979年 | 25篇 |
1978年 | 23篇 |
1977年 | 27篇 |
1976年 | 23篇 |
1974年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
本文介绍了英文标书文档处理系统VHTender的设计和实现过程,该系统能够从纸质标书的扫描图象中抽取文档信息,将其转换成电子标书,本文从功能实现的角度,介绍了该系统在一些关键性技术中所采用的方法和策略。 相似文献
992.
我们为建立自然图像中混叠的概率模型提供了一个数学框架。假设:(1)图像是由三维物体的二维投影轮廓组成.(2)在简化条件下.我们推导出自然图像的一种解析概率密度函数。已经证明.这种解析表达式可以很好地比配观测到的密度函数(直方图)。我们首先推导图像像素的边缘概率密度函数,然后推广到多维边缘概率密度函数,最后提出了几种改进措施。 相似文献
993.
This paper demonstrates how the EM algorithm can be used for learning and matching mixtures of point distribution models. We make two contributions. First, we show how shape-classes can be learned in an unsupervised manner. We present a fast procedure for training point distribution models using the EM algorithm. Rather than estimating the class means and covariance matrices needed to construct the PDM, the method iteratively refines the eigenvectors of the covariance matrix using a gradient ascent technique. Second, we show how recognition by alignment can be realised by fitting a mixture of linear shape deformations. We evaluate the method on the problem of learning the class-structure and recognising Arabic characters. 相似文献
994.
Recognition of occluded objects in synthetic aperture radar (SAR) images is a significant problem for automatic target recognition. Stochastic models provide some attractive features for pattern matching and recognition under partial occlusion and noise. In this paper, we present a hidden Markov modeling based approach for recognizing objects in SAR images. We identify the peculiar characteristics of SAR sensors and using these characteristics we develop feature based multiple models for a given SAR image of an object. The models exploiting the relative geometry of feature locations or the amplitude of SAR radar return are based on sequentialization of scattering centers extracted from SAR images. In order to improve performance we integrate these models synergistically using their probabilistic estimates for recognition of a particular target at a specific azimuth. Experimental results are presented using both synthetic and real SAR images. 相似文献
995.
D. V. Zhora 《Cybernetics and Systems Analysis》2003,39(3):379-393
A neural classifier with random thresholds is considered. Probabilistic analysis of functional characteristics depending on the classifier parameters is performed, and recommendations for their selection are made. The classifier structure optimization is proposed for input data distribution. 相似文献
996.
Jose M. Armingol Javier Otamendi Arturo de la Escalera Jose M. Pastor Francisco J. Rodriguez 《Journal of Intelligent and Robotic Systems》2003,37(3):321-336
Machine vision technology improves productivity and quality management and provides a competitive advantage to industries that employ this technology. In this article, visual inspection and quality control theory are combined to develop a robust inspection system with manufacturing applications. The inspection process might be defined as the one used to determine if a given product fulfills a priori specifications, which are the quality standard. In the case of visual inspection, these specifications include the absence of defects, such as lack (or excess) of material, homogeneous visual aspect, required color, predetermined texture, etc. The characterization of the visual aspect of metallic surfaces is studied using quality control chars, which are a graphical technique used to compare on-line capabilities of a product with respect to these specifications. Original algorithms are proposed for implementation in automated visual inspection applications with on-line execution requirements. The proposed artificial vision method is a hybrid between the two usual methods of pattern comparison and theoretical decision. It incorporates quality control theory to statistically model the pattern for defect-free products. Specifically, individual control charts with 6-sigma limits are set so the inspection error is minimized. Experimental studies with metallic surfaces help demonstrate the efficacy and robustness of the proposed methodology. 相似文献
997.
For small, portable devices, speech input has the advantages of low-cost and small hardware, can be used on the move or whilst
the eyes & hands are busy, and is natural and quick. Rather than rely on imperfect speech recognition we propose that information
entered as speech is kept as speech and suitable tools are provided to allow quick and easy access to the speech-as-data records.
This paper summarises our work on the technologies needed for these tools – for organising, browsing, searching and compressing
the stored speech. These technologies go a long way towards giving stored speech the characteristics of text without the associated
input problems.
Received: 5 March 2002 / Accepted: 1 September 2002
Nick Haddock Consultant
Acknowledgements The authors would like to thank the whole HP Labs Gryphon team for their valuable contributions to this work - Mike Collins
for the hierarchical chunking algorithm, Erik Geelhoed and David Frohlich for the users perspective, Richard Hull for starting
off the compression work, Steve Loughran for productisation, and Dave Reynolds for his consistent advice and support. We would
also like to thank our partners at Cambridge University, Steve Young and Tony Robinson, whose expertise and technology formed
the foundation for this work, as well as the efforts of Kate Knill on wordspotting, Carl Seymour on compression, James Christie
on recognition, and Robin Valenza whose brief excursion into the world of speech technology helped develop a simple and effective
summarisation technique. Finally we would like to thank the reviewers for their many helpful comments. 相似文献
998.
通过对计算机分布式系统安全问题的介绍 ,提出了生存性的概念 ,并对其进行了分析 ,给出了生存性的定义。生存性的着重点在于当系统受到攻击 ,甚至已被成功入侵的情况下保护关键性服务。 相似文献
999.
1000.
基于神经网络的入侵识别方法 总被引:3,自引:0,他引:3
分析了正常和异常的网络行为模式所带来的网络传核数据包的不同特征,提出了基于神经网络的入侵识别方法。采用带偏差单元的回归BP算法使神经网络收敛性能良好,并对端口扫描类型的攻击进行了仿真识别。 相似文献