全文获取类型
收费全文 | 101427篇 |
免费 | 17828篇 |
国内免费 | 11185篇 |
专业分类
电工技术 | 7034篇 |
技术理论 | 2篇 |
综合类 | 10743篇 |
化学工业 | 3259篇 |
金属工艺 | 2111篇 |
机械仪表 | 9174篇 |
建筑科学 | 3515篇 |
矿业工程 | 1758篇 |
能源动力 | 6676篇 |
轻工业 | 5158篇 |
水利工程 | 747篇 |
石油天然气 | 2256篇 |
武器工业 | 1879篇 |
无线电 | 21945篇 |
一般工业技术 | 7019篇 |
冶金工业 | 1232篇 |
原子能技术 | 819篇 |
自动化技术 | 45113篇 |
出版年
2024年 | 712篇 |
2023年 | 2278篇 |
2022年 | 3962篇 |
2021年 | 4429篇 |
2020年 | 4305篇 |
2019年 | 3367篇 |
2018年 | 3029篇 |
2017年 | 3938篇 |
2016年 | 4173篇 |
2015年 | 4935篇 |
2014年 | 7429篇 |
2013年 | 6568篇 |
2012年 | 8665篇 |
2011年 | 9180篇 |
2010年 | 7160篇 |
2009年 | 7081篇 |
2008年 | 7155篇 |
2007年 | 8021篇 |
2006年 | 6599篇 |
2005年 | 5613篇 |
2004年 | 4477篇 |
2003年 | 3590篇 |
2002年 | 2754篇 |
2001年 | 2179篇 |
2000年 | 1746篇 |
1999年 | 1334篇 |
1998年 | 1076篇 |
1997年 | 932篇 |
1996年 | 758篇 |
1995年 | 563篇 |
1994年 | 418篇 |
1993年 | 382篇 |
1992年 | 323篇 |
1991年 | 268篇 |
1990年 | 215篇 |
1989年 | 161篇 |
1988年 | 131篇 |
1987年 | 73篇 |
1986年 | 80篇 |
1985年 | 69篇 |
1984年 | 65篇 |
1983年 | 56篇 |
1982年 | 38篇 |
1981年 | 34篇 |
1980年 | 25篇 |
1979年 | 14篇 |
1978年 | 9篇 |
1975年 | 6篇 |
1965年 | 6篇 |
1959年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
911.
Handling occlusion is a very challenging problem in object detection. This paper presents a method of learning a hierarchical model for X-to-X occlusion-free object detection (e.g., car-to-car and person-to-person occlusions in our experiments). The proposed method is motivated by an intuitive coupling-and-decoupling strategy. In the learning stage, the pair of occluding X?s (e.g., car pairs or person pairs) is represented directly and jointly by a hierarchical And–Or directed acyclic graph (AOG) which accounts for the statistically significant co-occurrence (i.e., coupling). The structure and the parameters of the AOG are learned using the latent structural SVM (LSSVM) framework. In detection, a dynamic programming (DP) algorithm is utilized to find the best parse trees for all sliding windows with detection scores being greater than the learned threshold. Then, the two single X?s are decoupled from the declared detections of X-to-X occluding pairs together with some non-maximum suppression (NMS) post-processing. In experiments, our method is tested on both a roadside-car dataset collected by ourselves (which will be released with this paper) and two public person datasets, the MPII-2Person dataset and the TUD-Crossing dataset. Our method is compared with state-of-the-art deformable part-based methods, and obtains comparable or better detection performance. 相似文献
912.
In statistical modeling, parameter estimation is an essential and challengeable task. Estimation of the parameters in the Dirichlet mixture model (DMM) is analytically intractable, due to the integral expressions of the gamma function and its corresponding derivatives. We introduce a Bayesian estimation strategy to estimate the posterior distribution of the parameters in DMM. By assuming the gamma distribution as the prior to each parameter, we approximate both the prior and the posterior distribution of the parameters with a product of several mutually independent gamma distributions. The extended factorized approximation method is applied to introduce a single lower-bound to the variational objective function and an analytically tractable estimation solution is derived. Moreover, there is only one function that is maximized during iterations and, therefore, the convergence of the proposed algorithm is theoretically guaranteed. With synthesized data, the proposed method shows the advantages over the EM-based method and the previously proposed Bayesian estimation method. With two important multimedia signal processing applications, the good performance of the proposed Bayesian estimation method is demonstrated. 相似文献
913.
Sutharshan Rajasegarar Alexander Gluhak Muhammad Ali Imran Michele Nati Masud Moshtaghi Christopher Leckie Marimuthu Palaniswami 《Pattern recognition》2014
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes. 相似文献
914.
《Computers & Electrical Engineering》2014,40(7):2216-2226
In this paper, an effective strategy for fault detection of sludge volume index (SVI) sensor is proposed and tested on an experimental hardware setup in waste water treatment process (WWTP). The main objective of this fault detection strategy is to design a system which consists of the online sensors, the SVI predicting plant and fault diagnosis method. The SVI predicting plant is designed utilizing a fuzzy neural network (FNN), which is trained by a historical set of data collected during fault-free operation of WWTP. The fault diagnosis method, based on the difference between the measured concentration values and FNN predictions, allows a quick revealing of the faults. Then this proposed fault detection method is applied to a real WWTP and compared with other approaches. Experimental results show that the proposed fault detection strategy can obtain the fault signals of the SVI sensor online. 相似文献
915.
For hyperspectral target detection, it is usually the case that only part of the targets pixels can be used as target signatures, so can we use them to construct the most proper background subspace for detecting all the probable targets? In this paper, a dynamic subspace detection (DSD) method which establishes a multiple detection framework is proposed. In each detection procedure, blocks of pixels are calculated by the random selection and the succeeding detection performance distribution analysis. Manifold analysis is further used to eliminate the probable anomalous pixels and purify the subspace datasets, and the remaining pixels construct the subspace for each detection procedure. The final detection results are then enhanced by the fusion of target occurrence frequencies in all the detection procedures. Experiments with both synthetic and real hyperspectral images (HSI) evaluate the validation of our proposed DSD method by using several different state-of-the-art methods as the basic detectors. With several other single detectors and multiple detection methods as comparable methods, improved receiver operating characteristic curves and better separability between targets and backgrounds by the DSD methods are illustrated. The DSD methods also perform well with the covariance-based detectors, showing their efficiency in selecting covariance information for detection. 相似文献
916.
Kataeva IA Uversky VN Brewer JM Schubot F Rose JP Wang BC Ljungdahl LG 《Protein engineering, design & selection : PEDS》2004,17(11):759-769
Cellobiohydrolase CbhA from Clostridium thermocellum cellulosome is a multi-modular protein composed starting from the N-terminus of a carbohydrate-binding module (CBM) of family 4, an immunoglobulin(Ig)-like module, a catalytic module of family 9 glycoside hydrolases (GH9), X1(1) and X1(2) modules, a CBM of family 3 and a dockerin module. Deletion of the Ig-like module from the Ig-GH9 construct results in complete inactivation of the GH9 module. The crystal structure of the Ig-GH9 module pair reveals the existence of an extensive module interface composed of over 40 amino acid residues of both modules and maintained through a large number of hydrophilic and hydrophobic interactions. To investigate the importance of these interactions between the two modules, we compared the secondary and tertiary structures and thermostabilities of the individual Ig-like and GH9 modules and the Ig-GH9 module pair using both circular dichroism (CD) spectroscopy and differential scanning calorimetry (DSC). Thr230, Asp262 and Asp264 of the Ig-like module are located in the module interface of the Ig-GH9 module pair and are suggested to be important in 'communication' between the modules. These residues were mutated to alanyl residues. The structure, stability and catalytic properties of the native Ig-GH9 and its D264A and T230A/D262A mutants were compared. The results indicate that despite being able to fold relatively independently, the Ig-like and GH9 modules interact and these interactions affect the final fold and stability of each module. Mutations of one or two amino acid residues lead to destabilization and change of the mechanism of thermal unfolding of the polypeptides. The enzymatic properties of native Ig-GH9, D264A and T230A/D262A mutants are similar. The results indicate that inactivation of the GH9 module occurs as a result of multiple structural disturbances finally affecting the topology of the catalytic center. 相似文献
917.
Morten Hertzum Rolf Molich Niels Ebbe Jacobsen 《Behaviour & Information Technology》2014,33(2):144-162
Usability evaluation is essential to user-centred design; yet, evaluators who analyse the same usability test sessions have been found to identify substantially different sets of usability problems. We revisit this evaluator effect by having 19 experienced usability professionals analyse video-recorded test sessions with five users. Nine participants analysed moderated sessions; 10 participants analysed unmoderated sessions. For the moderated sessions, participants reported an average of 33% of the problems reported by all nine of these participants and 50% of the subset of problems reported as critical or serious by at least one participant. For the unmoderated sessions, the percentages were 32% and 40%. Thus, the evaluator effect was similar for moderated and unmoderated sessions, and it was substantial for the full set of problems and still present for the most severe problems. In addition, participants disagreed in their severity ratings. As much as 24% (moderated) and 30% (unmoderated) of the problems reported by multiple participants were rated as critical by one participant and minor by another. The majority of the participants perceived an evaluator effect when merging their individual findings into group evaluations. We discuss reasons for the evaluator effect and recommend ways of managing it. 相似文献
918.
919.
In this paper, we propose a new continuous self‐collision detection (CSCD) method for a deformable surface that interacts with a simple solid model. The method is developed based on the radial‐view‐based culling method. Our method is suitable for the deformable surface that has large contact region with the solid model. The deformable surface may consist of small round‐shaped holes. At the pre‐processing stage, the holes of the deformable surface are filled with ghost triangles so as to make the mesh of the deformable surface watertight. An observer primitive (i.e. a point or a line segment) is computed so that it lies inside the solid model. At the runtime stage, the orientations of triangles with respect to the observer primitive are evaluated. The collision status of the deformable surface is then determined. We evaluated our method for several animations including virtual garments. Experimental results show that our method improves the process of CSCD. 相似文献
920.
《Computer Aided Geometric Design》2014,31(7-8):521-530
Splines are useful tools to represent, modify and analyze curves and they play an important role in various practical applications. We present a multiresolution approach to spline curves with arbitrary knots that provides good feature detection and localization properties for non-equally distributed geometric data. In addition, we show how equidistributed data and knot sequences can be efficiently handled using signal processing techniques. 相似文献