首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   61715篇
  免费   10689篇
  国内免费   6461篇
电工技术   6688篇
技术理论   2篇
综合类   6267篇
化学工业   1994篇
金属工艺   1176篇
机械仪表   4727篇
建筑科学   2154篇
矿业工程   1333篇
能源动力   656篇
轻工业   4470篇
水利工程   757篇
石油天然气   1595篇
武器工业   990篇
无线电   13868篇
一般工业技术   4252篇
冶金工业   800篇
原子能技术   524篇
自动化技术   26612篇
  2024年   589篇
  2023年   1597篇
  2022年   2614篇
  2021年   2845篇
  2020年   2837篇
  2019年   2213篇
  2018年   1911篇
  2017年   2529篇
  2016年   2720篇
  2015年   3125篇
  2014年   4632篇
  2013年   4101篇
  2012年   5196篇
  2011年   5521篇
  2010年   4298篇
  2009年   4285篇
  2008年   4445篇
  2007年   4929篇
  2006年   4049篇
  2005年   3388篇
  2004年   2517篇
  2003年   2051篇
  2002年   1481篇
  2001年   1109篇
  2000年   913篇
  1999年   654篇
  1998年   516篇
  1997年   387篇
  1996年   327篇
  1995年   214篇
  1994年   143篇
  1993年   127篇
  1992年   112篇
  1991年   95篇
  1990年   79篇
  1989年   39篇
  1988年   46篇
  1987年   24篇
  1986年   32篇
  1985年   26篇
  1984年   25篇
  1983年   23篇
  1982年   17篇
  1981年   20篇
  1980年   17篇
  1979年   8篇
  1978年   6篇
  1976年   4篇
  1975年   4篇
  1951年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
宋佳  孙长库  王鹏 《传感技术学报》2012,25(8):1166-1171
根据锡膏激光扫描三维测量系统在测量PCB电路板时底板和锡膏对激光光强的散射效果不同,设计并研制了一套光强自适应调节光源。该光源以程控电源为基础,分析光条中心提取效果与激光光强的关系,应用小波分解与频带能量比相结合的光强自适应调节算法实现测量系统光强自适应调节功能。进行了相关实验,实验结果表明该光源能够很好地实现锡膏激光扫描三维测量系统的激光光强自适应调节,并能选出最适合测量的激光光强,具有很好的适用性。  相似文献   
22.
This paper extends the algorithms which were developed in Part I to cases in which there is no affine schedule, i.e. to problems whose parallel complexity is polynomial but not linear. The natural generalization is to multidimensional schedules with lexicographic ordering as temporal succession. Multidimensional affine schedules, are, in a sense, equivalent to polynomial schedules, and are much easier to handle automatically. Furthermore, there is a strong connection between multidimensional schedules and loop nests, which allows one to prove that a static control program always has a multidimensional schedule. Roughly, a larger dimension indicates less parallelism. In the algorithm which is presented here, this dimension is computed dynamically, and is just sufficient for scheduling the source program. The algorithm lends itself to a divide and conquer strategy. The paper gives some experimental evidence for the applicability, performances and limitations of the algorithm.  相似文献   
23.
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQLIA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQLIA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods.  相似文献   
24.
Behavioral cues to deception are instrumental in detecting deception. As one of the primary sources of deception behavior, text has been analyzed at the level of sub-sentence or message but not the discourse of interaction. Additionally, empirical studies on cues to deception in the case of multiple receivers remain nonexistent. To fill these voids, we propose a discourse framework and six hypotheses about deception behaviors in a multi-receiver environment. The deception behaviors are operationalized by discourse features based on an analysis of real-world data. The results of statistical analysis validate the efficacy of discourse features in discriminating deceivers from truth-tellers.  相似文献   
25.
We propose a face detection method based on skin color likelihood via a boosting algorithm which emphasizes skin color information while deemphasizing non-skin color information. A stochastic model is adapted to compute the similarity between a color region and the skin color. Both Haar-like features and Local Binary Pattern (LBP) features are utilized to build a cascaded classifier. The boosted classifier is implemented based on skin color emphasis to localize the face region from a color image. Based on our experiments, the proposed method shows good tolerance to face pose variation and complex background with significant improvements over classical boosting-based classifiers in terms of total error rate performance.  相似文献   
26.
27.
28.
姜新其 《山东化工》2004,33(2):33-36
详细描述了用分光光度计测定饱和盐水中的微量铝、硅、铁、碘等杂质的分析方法,利用该方法对饱和盐水进行测定,证明该检测方法简便、快速、实用,能够满足生产需要。  相似文献   
29.
刘洋  李一波 《计算机科学》2014,41(10):300-305
线性动态系统模型结合稀疏编码实现异常事件检测。线性动态系统可有效地捕捉动态纹理在时间和空间的转移信息,描述视频的时空小块。然而,线性动态系统属于非欧氏空间,无法直接用传统的稀疏编码进行异常检测。基于约束凸优化公式,将相似性变换与稀疏编码结合,可实现线性动态系统稀疏编码的优化求解。实验表明,所提出的方法具有更好的性能。  相似文献   
30.
This essay concentrates on two key procedures of image mosaic--image registration and imagefusion.Becauseof the character of geometric transformation invariance of edge points, wecalculate the angle difference of the direction vector ofedge points in different images anddraw an angle difference histogramto adjust the rotationproblem. Through this way, algorithm based on gray information is expandedandcan be used in images withdisplacementand rotation. Inthe term of image fusion, wavelet multi-scale analysis is used to fuse spliced images. In order to choose the best method of imagefusion,weevaluate the results of different methods of image fusion by cross entropy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号