全文获取类型
收费全文 | 60752篇 |
免费 | 9861篇 |
国内免费 | 6306篇 |
专业分类
电工技术 | 5402篇 |
综合类 | 5965篇 |
化学工业 | 7822篇 |
金属工艺 | 1217篇 |
机械仪表 | 3574篇 |
建筑科学 | 1473篇 |
矿业工程 | 1917篇 |
能源动力 | 816篇 |
轻工业 | 11898篇 |
水利工程 | 578篇 |
石油天然气 | 1982篇 |
武器工业 | 538篇 |
无线电 | 6232篇 |
一般工业技术 | 2895篇 |
冶金工业 | 1917篇 |
原子能技术 | 562篇 |
自动化技术 | 22131篇 |
出版年
2024年 | 524篇 |
2023年 | 1254篇 |
2022年 | 2340篇 |
2021年 | 2612篇 |
2020年 | 2755篇 |
2019年 | 2351篇 |
2018年 | 2196篇 |
2017年 | 2456篇 |
2016年 | 2810篇 |
2015年 | 3104篇 |
2014年 | 4026篇 |
2013年 | 4256篇 |
2012年 | 5767篇 |
2011年 | 5424篇 |
2010年 | 4076篇 |
2009年 | 3953篇 |
2008年 | 3848篇 |
2007年 | 4497篇 |
2006年 | 3788篇 |
2005年 | 2970篇 |
2004年 | 2230篇 |
2003年 | 1867篇 |
2002年 | 1454篇 |
2001年 | 1149篇 |
2000年 | 1046篇 |
1999年 | 786篇 |
1998年 | 613篇 |
1997年 | 534篇 |
1996年 | 436篇 |
1995年 | 344篇 |
1994年 | 266篇 |
1993年 | 196篇 |
1992年 | 207篇 |
1991年 | 137篇 |
1990年 | 143篇 |
1989年 | 110篇 |
1988年 | 67篇 |
1987年 | 54篇 |
1986年 | 52篇 |
1985年 | 42篇 |
1984年 | 39篇 |
1983年 | 31篇 |
1982年 | 23篇 |
1981年 | 14篇 |
1980年 | 17篇 |
1979年 | 12篇 |
1978年 | 8篇 |
1977年 | 7篇 |
1959年 | 6篇 |
1951年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
111.
112.
113.
网页信息提取方法中的启发式规则,是识别网页标签信息、利用网页节点分析结果、针对网页不同内容、完成信息提取的重要手段。本研究在对现有启发式规则进行研究分析的基础上,提出了几种优化的启发式规则,实现对网页标题、发布时间、来源以及正文内容等元素信息的精准提取。本研究进一步提出了运用编辑距离算法实现正文内容提取准确率的判定,并提出阙值优化方法,克服了正文提取中噪声节点多、内容识别不完全的缺陷,大大提高了提取的准确度。 相似文献
114.
提出了一种基于Gabor小波和局域二值模式(Local binary pattern,LBP)直方图序列的人脸年龄估计方法。首先对人脸图像提取多方向与多尺度的Gabor幅值域图谱(Gabor magnitude maps,GMMs);然后采用基于局部特征的LBP算子对GMMs编码,并对之分块,由各子块的直方图序列来描述人脸;为进一步降低人脸特征维数,再对人脸直方图序列特征应用主成分分析(PCA);最后使用支持向量机回归(SVR)的LOPO策略对人脸年龄库进行训练和测试。实验结果表明,该方法可以较为快速有效地对人脸图像进行年龄估计。 相似文献
115.
根据信道冲激响应的稀疏特性,提出了一种频域的时延估计压缩感知模型,将时延估计问题转化为基于欠采样数据的稀疏向量估计问题.利用离散傅里叶变换(Discrete Fourier transform,DFT)矩阵的子矩阵所满足的受限等距性(Restricted isometry property,RIP)以及信道冲激响应的稀疏特性充分降低了时延估计所需数据量的要求.分析了本文模型具有码片内多径分辨能力以及良好抗噪性能的原因,并与多信号分类(Multiple signal classification,MUSIC)和旋转不变技术的信号参数估计(Estimation of signal parameters via rotational invariance technique,ESPRIT)算法的时延估计性能进行仿真比较.仿真结果表明,本文提出的方法不需要预知多径的条数,对码片内多径时延具有较高的估计精度,其时延估计性能在特定条件下优于MUSIC和ESPRIT算法. 相似文献
116.
传统基于干扰噪声协方差矩阵(interference-plus-noise covariance matrix,INCM)重构的鲁棒自适应波束形成(robust adaptive beamformer,RAB)算法在多种样本数据协方差矩阵误差和信号导向向量误差的失配环境中具有较强的鲁棒性,但目前主流的INCM重构法都是对信号和干扰的导向向量通过建立凸优化模型来估计,这带来了很高的计算复杂度。为了解决这个问题,提出了一种低复杂度的基于INCM重构的RAB算法。该算法首先将干扰信号的导向向量分解为对应标称项和误差项的和,然后通过一种子空间方法估计得到误差项的单位向量。接下来对一个Capon空间谱功率最大问题进行求解,得到误差项的模值,以此得到重构的INCM。同时利用Capon空间谱中残差噪声的存在,使用交替投影法估计得到期望信号的导向向量,最后得到所提算法的权重向量。仿真实验表明所提算法在多种误差环境下具有较强鲁棒性的同时,还具有较低的计算复杂度。 相似文献
117.
《Displays》2021
As the demand for high-quality stereo images has grown in recent years, stereoscopic image quality assessment (SIQA) has become an important research area in modern image processing technology.In this paper, we propose a no-reference stereoscopic image quality assessment (NR-SIQA) model using heterogeneous ensemble learning ‘quality-aware’ features from luminance image, chrominance image, disparity and cyclopean images via quaternion wavelet transform (QWT). Firstly, luminance image and chrominance image are generated by CIELAB color space as monocular perception, and the novel disparity and cyclopean images are utilized to complement with monocular information. Then, a number of ‘quality-aware’ features in the quaternion wavelet domain are discovered, including entropy, texture features, energy features, energy differences features and MSCN coefficients of high frequency sub-band. Finally, a heterogeneous ensemble model via support vector regression (SVR) & extreme learning machine (ELM) & random forest (RF) is proposed to predict quality score, and bootstrap sampling and rotated feature space are used to increase the diversity of data distribution. Comparing with the state-of-the-art NR-SIQA models, experimental results on four public databases prove the accuracy and robustness of the proposed model. 相似文献
118.
Defect inspection of glass bottles in the beverage industrial is of significance to prevent unexpected losses caused by the damage of bottles during manufacturing and transporting. The commonly used manual methods suffer from inefficiency, excessive space consumption, and beverage wastes after filling. To replace the manual operations in the pre-filling detection with improved efficiency and reduced costs, this paper proposes a machine learning based Acoustic Defect Detection (LearningADD) system. Moreover, to realize scalable deployment on edge and cloud computing platforms, deployment strategies especially partitioning and allocation of functionalities need to be compared and optimized under realistic constraints such as latency, complexity, and capacity of the platforms. In particular, to distinguish the defects in glass bottles efficiently, the improved Hilbert-Huang transform (HHT) is employed to extend the extracted feature sets, and then Shuffled Frog Leaping Algorithm (SFLA) based feature selection is applied to optimize the feature sets. Five deployment strategies are quantitatively compared to optimize real-time performances based on the constraints measured from a real edge and cloud environment. The LearningADD algorithms are validated by the datasets from a real-life beverage factory, and the F-measure of the system reaches 98.48 %. The proposed deployment strategies are verified by experiments on private cloud platforms, which shows that the Distributed Heavy Edge deployment outperforms other strategies, benefited from the parallel computing and edge computing, where the Defect Detection Time for one bottle is less than 2.061 s in 99 % probability. 相似文献
119.
120.
?erif Bahtiyar Mehmet Ufuk Ça?layan 《Journal of Network and Computer Applications》2012,35(1):480-490
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments. 相似文献