全文获取类型
收费全文 | 5542篇 |
免费 | 198篇 |
国内免费 | 272篇 |
专业分类
电工技术 | 59篇 |
综合类 | 230篇 |
化学工业 | 71篇 |
金属工艺 | 90篇 |
机械仪表 | 429篇 |
建筑科学 | 195篇 |
矿业工程 | 52篇 |
能源动力 | 40篇 |
轻工业 | 37篇 |
水利工程 | 15篇 |
石油天然气 | 47篇 |
武器工业 | 21篇 |
无线电 | 293篇 |
一般工业技术 | 217篇 |
冶金工业 | 36篇 |
原子能技术 | 9篇 |
自动化技术 | 4171篇 |
出版年
2024年 | 14篇 |
2023年 | 90篇 |
2022年 | 138篇 |
2021年 | 168篇 |
2020年 | 94篇 |
2019年 | 71篇 |
2018年 | 83篇 |
2017年 | 91篇 |
2016年 | 129篇 |
2015年 | 149篇 |
2014年 | 286篇 |
2013年 | 262篇 |
2012年 | 240篇 |
2011年 | 365篇 |
2010年 | 237篇 |
2009年 | 307篇 |
2008年 | 350篇 |
2007年 | 338篇 |
2006年 | 374篇 |
2005年 | 265篇 |
2004年 | 273篇 |
2003年 | 261篇 |
2002年 | 252篇 |
2001年 | 177篇 |
2000年 | 154篇 |
1999年 | 183篇 |
1998年 | 108篇 |
1997年 | 91篇 |
1996年 | 70篇 |
1995年 | 67篇 |
1994年 | 62篇 |
1993年 | 60篇 |
1992年 | 44篇 |
1991年 | 27篇 |
1990年 | 25篇 |
1989年 | 19篇 |
1988年 | 13篇 |
1987年 | 12篇 |
1986年 | 3篇 |
1985年 | 15篇 |
1984年 | 6篇 |
1983年 | 6篇 |
1982年 | 5篇 |
1981年 | 6篇 |
1980年 | 3篇 |
1979年 | 5篇 |
1978年 | 5篇 |
1976年 | 3篇 |
1974年 | 2篇 |
1956年 | 1篇 |
排序方式: 共有6012条查询结果,搜索用时 593 毫秒
71.
Multiset canonical correlation analysis (MCCA) is a powerful technique for analyzing linear correlations among multiple representation data. However, it usually fails to discover the intrinsic geometrical and discriminating structure of multiple data spaces in real-world applications. In this paper, we thus propose a novel algorithm, called graph regularized multiset canonical correlations (GrMCCs), which explicitly considers both discriminative and intrinsic geometrical structure in multiple representation data. GrMCC not only maximizes between-set cumulative correlations, but also minimizes local intraclass scatter and simultaneously maximizes local interclass separability by using the nearest neighbor graphs on within-set data. Thus, it can leverage the power of both MCCA and discriminative graph Laplacian regularization. Extensive experimental results on the AR, CMU PIE, Yale-B, AT&T, and ETH-80 datasets show that GrMCC has more discriminating power and can provide encouraging recognition results in contrast with the state-of-the-art algorithms. 相似文献
72.
73.
A hierarchical scheme for elastic graph matching applied to hand gesture recognition is proposed. The proposed algorithm exploits the relative discriminatory capabilities of visual features scattered on the images, assigning the corresponding weights to each feature. A boosting algorithm is used to determine the structure of the hierarchy of a given graph. The graph is expressed by annotating the nodes of interest over the target object to form a bunch graph. Three annotation techniques, manual, semi-automatic, and automatic annotation are used to determine the position of the nodes. The scheme and the annotation approaches are applied to explore the hand gesture recognition performance. A number of filter banks are applied to hand gestures images to investigate the effect of using different feature representation approaches. Experimental results show that the hierarchical elastic graph matching (HEGM) approach classified the hand posture with a gesture recognition accuracy of 99.85% when visual features were extracted by utilizing the Histogram of Oriented Gradient (HOG) representation. The results also provide the performance measures from the aspect of recognition accuracy to matching benefits, node positions correlation and consistency on three annotation approaches, showing that the semi-automatic annotation method is more efficient and accurate than the other two methods. 相似文献
74.
The prototyping of complex sheet metal parts using single point incremental forming (SPIF) requires the generation of optimal tool paths and/or tool path sequences that ensure that the formed part is within geometric design specifications. The presence of a multitude of features on complex parts leads to multiple inaccuracy inducing phenomena occurring simultaneously due to interactions between the features. This paper proposes a network analysis methodology using topological conceptual graphs to capture the effects of different phenomena on the final accuracy of a sheet metal part manufactured by SPIF. Using this framework optimized tool paths can be generated that compensate for the inaccuracy inducing behavior. Tool path generation algorithms to create partial tool paths that account for the accuracy of specific features in the part based on the proposed framework are also presented. Finally, the creation of integrated tool paths maintaining complementarity between tool paths and desired continuity behavior using non-uniform cubic B-splines is illustrated. A number of case studies demonstrating the applicability of the integrated framework are discussed, where the maximum deviations in the part are significantly reduced and the average absolute deviations for the complete part are brought down to less than 0.5 mm. 相似文献
75.
76.
77.
《Advanced Engineering Informatics》2014,28(4):381-394
The dangers of the construction industry due to the risk of fatal hazards, such as falling from extreme heights, being struck by heavy equipment or materials, and the possibility of electrocution, are well known. The concept of Job Hazard Analysis is commonly used to mitigate and control these occupational hazards. This technique analyzes the major tasks in a construction activity, identifies all potential task-related hazards, and suggests safe approaches to reduce or avoid each of these hazards. In this paper, the authors explore the possibility of leveraging existing construction safety resources to assist JHA, aiming to reduce the level of human effort required. Specifically, the authors apply ontology-based text classification (TC) to match safe approaches identified in existing resources with unsafe scenarios. These safe approaches can serve as initial references and enrich the solution space when performing JHA. Various document modification strategies are applied to existing resources in order to achieve superior TC effectiveness. The end result of this research is a construction safety domain ontology and its underlying knowledge base. A user scenario is also discussed to demonstrate how the ontology supports JHA in practice. 相似文献
78.
79.
在分析入侵检测方法的基础上,将粗糙集理论引入入侵检测方法,提出一种改进的基于粗糙集的自适应网络入侵检测方法。通过对入侵数据权值离散化预处理,属性知识约简,规则提取与过滤,提高网络入侵数据的检测率。与基于BP-神经网络的方法,基于专家系统的(ES)的方法,以及普通的基础粗糙集的入侵检测方法进行实验对比,通过实验数据,证明该方法的有效性。 相似文献
80.