首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10026篇
  免费   20篇
  国内免费   138篇
工业技术   10184篇
  2020年   1篇
  2019年   13篇
  2018年   6篇
  2017年   1篇
  2015年   1篇
  2014年   207篇
  2013年   167篇
  2012年   757篇
  2011年   3055篇
  2010年   1126篇
  2009年   997篇
  2008年   661篇
  2007年   574篇
  2006年   439篇
  2005年   565篇
  2004年   518篇
  2003年   574篇
  2002年   269篇
  2001年   3篇
  2000年   2篇
  1999年   20篇
  1998年   83篇
  1997年   22篇
  1996年   13篇
  1995年   2篇
  1994年   3篇
  1993年   2篇
  1992年   7篇
  1991年   5篇
  1990年   9篇
  1989年   6篇
  1988年   8篇
  1987年   6篇
  1986年   11篇
  1985年   6篇
  1984年   23篇
  1983年   11篇
  1982年   5篇
  1981年   6篇
排序方式: 共有10000条查询结果,搜索用时 187 毫秒
121.
The two standard models used for communication in concurrent programs, shared memory and message passing, have been the focus of much debate for a long time. Still, we believe the main issue at stake should not be the choice between these models, but rather how to ensure that communication is structured, i.e., it occurs only in syntactically restricted code regions. In this survey, we explore concurrency control models and evaluate how their characteristics contribute positively or negatively to the support for structured communication. We focus the evaluation on three properties: reasonability, which is the main property we are interested in and determines how easily programmers can reason about a concurrent program’s execution; performance, which determines whether there are any distinct features which can prevent or facilitate efficient implementations; and composability, which determines whether a model offers constructs that can be used as building blocks for coarser-grained, or higher-level, concurrency abstractions.  相似文献   
122.
Ionizing radiation, such as γ, ultraviolet, microwave and X-ray radiation, has long been used in polymer chemistry as a means of initiating polymerization, crosslinking gels and decomposing particular polymer components. More recently, ionizing radiation has found application in tandem with living radical polymerization to form novel polymeric materials with defined molecular weight and narrow molecular weight distribution. In particular, γ-rays and ultraviolet light both have shown promise as sources of initiation in reversible addition-fragmentation chain transfer (RAFT) polymerization. The ability to apply these sources of initiation at low temperatures is useful in applications where elevated temperature is likely to be detrimental to the system, for instance, in preparing protein-polymer conjugates. Similarly, the use of these initiating sources at low temperature is particularly suitable for some monomers, such as allyl compounds, which have not been synthesized using any other living radical approach. The current review examines the development of ionizing radiation as a tool in RAFT polymerization, with particular reference to the elucidation of the polymerization mechanism, the synthesis of high functionality polymers and probing the kinetic parameters of the RAFT process.  相似文献   
123.
Multispectral palmprint is considered as an effective biometric modality to accurately recognize a subject with high confidence. This paper presents a novel multispectral palmprint recognition system consisting of three functional blocks namely: (1) novel technique to extract Region of Interest (ROI) from the hand images acquired using a contact less sensor (2) novel image fusion scheme based on dependency measure (3) new scheme for feature extraction and classification. The proposed ROI extraction scheme is based on locating the valley regions between fingers irrespective of the hand pose. We then propose a novel image fusion scheme that combines information from different spectral bands using a Wavelet transform from various sub-bands. We then perform the statistical dependency analysis between these sub-bands to perform fusion either by selection or by weighted fusion. To effectively process the information from the fused image, we perform feature extraction using Log-Gabor transform whose feature dimension is reduced using Kernel Discriminant Analysis (KDA) before performing the classification by employing a Sparse Representation Classifier (SRC). Extensive experiments are carried out on a CASIA multispectral palmprint database that shows the strong superiority of our proposed fusion scheme when benchmarked with contemporary state-of-the-art image fusion schemes.  相似文献   
124.
Detecting and recognizing text in natural images are quite challenging and have received much attention from the computer vision community in recent years. In this paper, we propose a robust end-to-end scene text recognition method, which utilizes tree-structured character models and normalized pictorial structured word models. For each category of characters, we build a part-based tree-structured model (TSM) so as to make use of the character-specific structure information as well as the local appearance information. The TSM could detect each part of the character and recognize the unique structure as well, seamlessly combining character detection and recognition together. As the TSMs could accurately detect characters from complex background, for text localization, we apply TSMs for all the characters on the coarse text detection regions to eliminate the false positives and search the possible missing characters as well. While for word recognition, we propose a normalized pictorial structure (PS) framework to deal with the bias caused by words of different lengths. Experimental results on a range of challenging public datasets (ICDAR 2003, ICDAR 2011, SVT) demonstrate that the proposed method outperforms state-of-the-art methods both for text localization and word recognition.  相似文献   
125.
In a wireless sensor network (WSN), random occurrences of faulty nodes degrade the quality of service of the network. In this paper, we propose an efficient fault detection and routing (EFDR) scheme to manage a large size WSN. The faulty nodes are detected by neighbour node’s temporal and spatial correlation of sensing information and heart beat message passed by the cluster head. In EFDR scheme, three linear cellular automata (CA) are used to manage transmitter circuit/ battery condition/microcontroller fault, receiver circuit fault and sensor circuit fault representation. On the other hand, L-system rules based data routing scheme is proposed to determine optimal routing path between cluster head and base station. The proposed EFDR technique is capable of detecting and managing the faulty nodes in an efficient manner. The simulation results show 86% improvement in the rate of energy loss compared to an existing algorithm.  相似文献   
126.
In this paper, a rapid and automatic color image segmentation method for the serialized slices of the Visible Human is proposed. The main strategy is based on region growing and pixel color difference. A rapid color similarity computing method is improved and applied for classifying different pixels. An algorithm based on corrosion from four directions is proposed to automatically extract the seed points for the serialized slices. Utilizing this method, the color slice images of the Visible Human body can be segmented in series automatically. Also, the multithreading frame of parallel computing is introduced in the entire segmentation process. This method is simple but rapid and automatic. The primary organs of the Visible Human can be segmented clearly and accurately. The 3D models of these organs after 3D reconstruction are satisfactory. This novel method can provide support to the Visible Human research.  相似文献   
127.
Cloud computing poses many challenges on integrity and privacy of users’ data though it brings an easy, cost-effective and reliable way of data management. Hence, secure and efficient methods are needed to ensure integrity and privacy of data stored at the cloud. Wang et al. proposed a privacy-preserving public auditing protocol in 2010 but it is seriously insecure. Their scheme is vulnerable to attacks from malicious cloud server and outside attackers regarding to storage correctness. So they proposed a scheme in 2011 with an improved security guarantee but it is not efficient. Thus, in this paper, we proposed a scheme which is secure and with better efficiency. It is a public auditing scheme with third party auditor (TPA), who performs data auditing on behalf of user(s). With detail security analysis, our scheme is proved secure in the random oracle model and our performance analysis shows the scheme is efficient.  相似文献   
128.
A hierarchical scheme for elastic graph matching applied to hand gesture recognition is proposed. The proposed algorithm exploits the relative discriminatory capabilities of visual features scattered on the images, assigning the corresponding weights to each feature. A boosting algorithm is used to determine the structure of the hierarchy of a given graph. The graph is expressed by annotating the nodes of interest over the target object to form a bunch graph. Three annotation techniques, manual, semi-automatic, and automatic annotation are used to determine the position of the nodes. The scheme and the annotation approaches are applied to explore the hand gesture recognition performance. A number of filter banks are applied to hand gestures images to investigate the effect of using different feature representation approaches. Experimental results show that the hierarchical elastic graph matching (HEGM) approach classified the hand posture with a gesture recognition accuracy of 99.85% when visual features were extracted by utilizing the Histogram of Oriented Gradient (HOG) representation. The results also provide the performance measures from the aspect of recognition accuracy to matching benefits, node positions correlation and consistency on three annotation approaches, showing that the semi-automatic annotation method is more efficient and accurate than the other two methods.  相似文献   
129.
The paper studies a 3D fingerprint reconstruction technique based on multi-view touchless fingerprint images. This technique offers a solution for 3D fingerprint image generation and application when only multi-view 2D images are available. However, the difficulties and stresses of 3D fingerprint reconstruction are the establishment of feature correspondences based on 2D touchless fingerprint images and the estimation of the finger shape model. In this paper, several popular used features, such as scale invariant feature transformation (SIFT) feature, ridge feature and minutiae, are employed for correspondences establishment. To extract these fingerprint features accurately, an improved fingerprint enhancement method has been proposed by polishing orientation and ridge frequency maps according to the characteristics of 2D touchless fingerprint images. Therefore, correspondences can be established by adopting hierarchical fingerprint matching approaches. Through an analysis of 440 3D point cloud finger data (220 fingers, 2 pictures each) collected by a 3D scanning technique, i.e., the structured light illumination (SLI) method, the finger shape model is estimated. It is found that the binary quadratic function is more suitable for the finger shape model than the other mixed model tested in this paper. In our experiments, the reconstruction accuracy is illustrated by constructing a cylinder. Furthermore, results obtained from different fingerprint feature correspondences are analyzed and compared to show which features are more suitable for 3D fingerprint images generation.  相似文献   
130.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号