全文获取类型
收费全文 | 2794篇 |
免费 | 61篇 |
国内免费 | 10篇 |
学科分类
工业技术 | 2865篇 |
出版年
2023年 | 26篇 |
2022年 | 57篇 |
2021年 | 55篇 |
2020年 | 49篇 |
2019年 | 52篇 |
2018年 | 64篇 |
2017年 | 56篇 |
2016年 | 81篇 |
2015年 | 55篇 |
2014年 | 66篇 |
2013年 | 173篇 |
2012年 | 89篇 |
2011年 | 129篇 |
2010年 | 106篇 |
2009年 | 98篇 |
2008年 | 101篇 |
2007年 | 96篇 |
2006年 | 92篇 |
2005年 | 78篇 |
2004年 | 59篇 |
2003年 | 57篇 |
2002年 | 67篇 |
2001年 | 55篇 |
2000年 | 63篇 |
1999年 | 58篇 |
1998年 | 118篇 |
1997年 | 82篇 |
1996年 | 85篇 |
1995年 | 50篇 |
1994年 | 49篇 |
1993年 | 45篇 |
1992年 | 46篇 |
1991年 | 35篇 |
1990年 | 40篇 |
1989年 | 37篇 |
1988年 | 31篇 |
1987年 | 28篇 |
1986年 | 27篇 |
1985年 | 35篇 |
1984年 | 21篇 |
1983年 | 31篇 |
1982年 | 27篇 |
1981年 | 28篇 |
1980年 | 27篇 |
1979年 | 34篇 |
1978年 | 16篇 |
1977年 | 16篇 |
1976年 | 22篇 |
1975年 | 11篇 |
1972年 | 10篇 |
排序方式: 共有2865条查询结果,搜索用时 15 毫秒
61.
62.
This article addresses the issue of visual landmark recognition in autonomous robot navigation along known routes, by intuitively
exploiting the functions of the human visual system and its navigational ability. A feedforward–feedbackward architecture
has been developed for recognising visual landmarks in real time. It integrates the theoretical concepts from the pre-attentive
and attentive stages in the human visual system, the selective attention adaptive resonance theory neural network and its
derivatives, and computational approaches towards object recognition in computer vision. The architecture mimics the pre-attentive
and attentive stages in the context of object recognition, embedding neural network processing paradigm into a computational
template-matching approach in computer vision. The real-time landmark recognition capability is achieved by mimicking the
pre-attentive stage, where it models a selective attention mechanism for optimal computational resource allocation, focusing
only on the regions of interest to address the computational restrictive nature of current computer processing power. Similarly,
the recognition of visual landmarks in both clean and cluttered backgrounds is implemented in the attentive stage by developing
a memory feedback modulation (MFM) mechanism that enables knowledge from the memory to interact and enhance the efficiency
of earlier stages in the architecture. Furthermore, it also incorporates both top-down and bottom-up facilitatory and inhibition
pathways between the memory and the earlier stages to enable the architecture to recognise a 2D landmark, which is partially
occluded by adjacent features in the surroundings. The results show that the architecture is able to recognise objects in
cluttered backgrounds using real-images in both indoor and outdoor scenes. Furthermore, the architecture application in autonomous
robot navigation has been demonstrated through a number of real-time trials in both indoor and outdoor environments. 相似文献
63.
Clubfoot is a challenging structural foot abnormality in babies and generally occurs at birth or during childhood. Due to this the abnormal posturing of the foot causes the babies to turn the ankle inward and walk along the outside edges of the foot. In medical science it is known as “congenital talipes equino varus” (CTEV). Computer modeling of prosthesis and orthosis is a perspective method for optimal design and gait is a terminology related to walking patterns of human subject. 相似文献
64.
65.
We introduce the concert (or cafeteria) queueing problem: A finite but large number of customers arrive into a queueing system
that starts service at a specified opening time. Each customer is free to choose her arrival time (before or after opening
time), and is interested in early service completion with minimal wait. These goals are captured by a cost function which
is additive and linear in the waiting time and service completion time, with coefficients that may be class dependent. We
consider a fluid model of this system, which is motivated as the fluid-scale limit of the stochastic system. In the fluid
setting, we explicitly identify the unique Nash-equilibrium arrival profile for each class of customers. Our structural results
imply that, in equilibrium, the arrival rate is increasing up until the closing time where all customers are served. Furthermore,
the waiting queue is maximal at the opening time, and monotonically decreases thereafter. In the simple single class setting,
we show that the price of anarchy (PoA, the efficiency loss relative to the socially optimal solution) is exactly two, while
in the multi-class setting we develop tight upper and lower bounds on the PoA. In addition, we consider several mechanisms
that may be used to reduce the PoA. The proposed model may explain queueing phenomena in diverse settings that involve a pre-assigned
opening time. 相似文献
66.
Amit K. Awasthi Keerti Srivastava R.C. MittalAuthor vitae 《Computers & Electrical Engineering》2011,37(6):869-874
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme. 相似文献
67.
68.
In this paper we consider uncountable classes recognizable by ω-automata and investigate suitable learning paradigms for them. In particular, the counterparts of explanatory, vacillatory and behaviourally correct learning are introduced for this setting. Here the learner reads in parallel the data of a text for a language L from the class plus an ω-index α and outputs a sequence of ω-automata such that all but finitely many of these ω-automata accept the index α if and only if α is an index for L.It is shown that any class is behaviourally correct learnable if and only if it satisfies Angluin’s tell-tale condition. For explanatory learning, such a result needs that a suitable indexing of the class is chosen. On the one hand, every class satisfying Angluin’s tell-tale condition is vacillatorily learnable in every indexing; on the other hand, there is a fixed class such that the level of the class in the hierarchy of vacillatory learning depends on the indexing of the class chosen.We also consider a notion of blind learning. On the one hand, a class is blind explanatorily (vacillatorily) learnable if and only if it satisfies Angluin’s tell-tale condition and is countable; on the other hand, for behaviourally correct learning, there is no difference between the blind and non-blind version.This work establishes a bridge between the theory of ω-automata and inductive inference (learning theory). 相似文献
69.
Emergent semantics through interaction in image databases 总被引:9,自引:0,他引:9
Santini S. Gupta A. Jain R. 《Knowledge and Data Engineering, IEEE Transactions on》2001,13(3):337-351
In this paper, we briefly discuss some aspects of image semantics and the role that it plays for the design of image databases. We argue that images don't have an intrinsic meaning, but that they are endowed with a meaning by placing them in the context of other images and by the user interaction. From this observation, we conclude that, in an image, database users should be allowed to manipulate not only the individual images, but also the relation between them. We present an interface model based on the manipulation of configurations of images 相似文献
70.
Ansari N. Sakarindr P. Haghani E. Chao Zhang Jain A.K. Shi Y.Q. 《Security & Privacy, IEEE》2008,6(3):30-39
Despite their widespread deployment, questions about electronic voting systems' performance emerge following many elections. To encourage full public confidence in the electoral process, some researchers recommend equipping electronic voting machines with voter-verifiable audit trails that print out paper records that voters can read and verify. In this article, the authors report on their analysis and testing of one US state's criteria for direct-recording electronic (DRE) voting machines equipped with voter-verified paper-record (VVPR) systems. The criteria and analysis cover various categories, including privacy, security, verification, integrity, functionality, and examination. The authors describe their testing methodologies, discuss issues exhibited by different voting systems, and propose solutions to address those issues. 相似文献