首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   890篇
  免费   73篇
  国内免费   2篇
工业技术   965篇
  2023年   4篇
  2022年   6篇
  2021年   90篇
  2020年   33篇
  2019年   41篇
  2018年   47篇
  2017年   25篇
  2016年   51篇
  2015年   33篇
  2014年   51篇
  2013年   74篇
  2012年   55篇
  2011年   61篇
  2010年   37篇
  2009年   51篇
  2008年   40篇
  2007年   36篇
  2006年   29篇
  2005年   20篇
  2004年   21篇
  2003年   20篇
  2002年   20篇
  2001年   7篇
  2000年   6篇
  1999年   5篇
  1998年   8篇
  1997年   7篇
  1996年   5篇
  1995年   6篇
  1994年   5篇
  1993年   3篇
  1992年   4篇
  1991年   3篇
  1990年   4篇
  1989年   4篇
  1988年   4篇
  1987年   1篇
  1986年   2篇
  1985年   5篇
  1984年   8篇
  1983年   5篇
  1982年   4篇
  1981年   7篇
  1980年   5篇
  1979年   6篇
  1977年   2篇
  1976年   3篇
  1968年   1篇
排序方式: 共有965条查询结果,搜索用时 332 毫秒
31.
The article concludes a series of results on cut-rule axiomatizabilityof the Lambek calculus. It is proved that the non-associativeproduct-free Lambek calculus with the empty string (NL0) isnot finitely axiomatizable if the only rule of inference admittedis Lambek's cut rule. The proof makes use of the (infinitely)cut-rule axiomatized calculus NC designed by the author exactlyfor that purpose.  相似文献   
32.
This paper describes a segmentation method combining a texture based technique with a contour based method. The technique is designed to enable the study of cell behaviour over time by segmenting brightfield microscope image sequences. The technique was tested on artificial images, based on images of living cells and on real sequences acquired from microscope observations of neutrophils and lymphocytes as well as on a sequence of MRI images. The results of the segmentation are compared with the results of the watershed and snake segmentation methods. The results show that the method is both effective and practical.
Anna KorzynskaEmail:
  相似文献   
33.
We use automata-theoretic approach to analyze properties of Fibonacci words. The directed acyclic subword graph (dawg) is a useful deterministic automaton accepting all suffixes of the word. We show that dawg's of Fibonacci words have particularly simple structure. Our main result is a unifying framework for a large collection of relatively simple properties of Fibonacci words. The simple structure of dawgs of Fibonacci words gives in many cases simplified alternative proofs and new interpretation of several well-known properties of Fibonacci words. In particular, the structure of lengths of paths corresponds to a number-theoretic characterization of occurrences of any subword. Using the structural properties of dawg's it can be easily shown that for a string ww we can check if ww is a subword of a Fibonacci word in time O(|w|)O(|w|) and O(1)O(1) space. Compact dawg's of Fibonacci words show a very regular structure of their suffix trees and show how the suffix tree for the Fibonacci word grows (extending the leaves in a very simple way) into the suffix tree for the next Fibonacci word.  相似文献   
34.
In order to investigate the identity of water-containing haematite, a method of preparation has been elaborated which leads to samples of hydrohaematite which are structurally pure and free of amorphous iron hydroxide. Differential thermal analysis by a lack of endothermic effect at 423 to 473 K on the DTA-curves and by a steady fall of the TG curves up to 1150 K revealed that water in the preparations must be tightly held in the lattice of haematite. Measurements of intensities of X-ray reflections of the (1 0 4) and (0 2 4) planes in relation to the (1 1 3) plane confirmed Fe3+-deficiency in the haematite cationic sublattice brought about by the presence of OH ions in the anionic sublattice. The infrared spectrum of hydrohaematite, in addition to six bands from Fe-O variations, exhibits three bands from hydroxyl groups. The effect of silicates on the pattern of the infrared spectra of natural and synthetic hydrohaematites and the discrepancies in the infrared spectra of haematites published to date are discussed.  相似文献   
35.
A recent technique that forms virtual ray lights (VRLs) from path segments in media, reduces the artifacts common to VPL approaches in participating media, however, distracting singularities still remain. We present Virtual Beam Lights (VBLs), a progressive many‐lights algorithm for rendering complex indirect transport paths in, from, and to media. VBLs are efficient and can handle heterogeneous media, anisotropic scattering, and moderately glossy surfaces, while provably converging to ground truth. We inflate ray lights into beam lights with finite thicknesses to eliminate the remaining singularities. Furthermore, we devise several practical schemes for importance sampling the various transport contributions between camera rays, light rays, and surface points. VBLs produce artifact‐free images faster than VRLs, especially when glossy surfaces and/or anisotropic phase functions are present. Lastly, we employ a progressive thickness reduction scheme for VBLs in order to render results that converge to ground truth.  相似文献   
36.
Grid applications call for high performance networking support. One attractive solution is to deploy Grids over optical networks. However, resource management in optical domains is traditionally very rigid and cannot successfully meet the requirements of Grid applications, such as flexible provisioning and configuration. In this paper, we present a customizable resource management solution for optical networks where users can create lightpaths on demand and manage their own network resources. Thanks to a Grid-centric system architecture, lightpath resources can be shared among users and easily integrated with data and computation Grids.  相似文献   
37.
In this paper a new, abstract method for analysis and visualization of multidimensional data sets in pattern recognition problems is introduced. It can be used to determine the properties of an unknown, complex data set and to assist in finding the most appropriate recognition algorithm. Additionally, it can be employed to design layers of a feedforward artificial neural network or to visualize the higher-dimensional problems in 2-D and 3-D without losing relevant data set information. The method is derived from the convex set theory and works by considering convex subsets within the data and analyzing their respective positions in the original dimension. Its ability to describe certain set features that cannot be explicitly projected into lower dimensions sets it apart from many other visualization techniques. Two classical multidimensional problems are analyzed and the results show the usefulness of the presented method and underline its strengths and weaknesses.  相似文献   
38.
39.
A probabilistic approximation is a generalization of the standard idea of lower and upper approximations, defined for equivalence relations. Recently probabilistic approximations were additionally generalized to an arbitrary binary relation so that probabilistic approximations may be applied for incomplete data. We discuss two ways to induce rules from incomplete data using probabilistic approximations, by applying true MLEM2 algorithm and an emulated MLEM2 algorithm. In this paper we report novel research on a comparison of both approaches: new results of experiments on incomplete data with three interpretations of missing attribute values. Our results show that both approaches do not differ much.  相似文献   
40.
For various IT systems security is considered a key quality factor. In particular, it might be crucial for video surveillance systems, as their goal is to provide continuous protection of critical infrastructure and other facilities. Risk assessment is an important activity in security management; it aims at identifying assets, threats and vulnerabilities, analysis of implemented countermeasures and their effectiveness in mitigating risks. This paper discusses an application of a new risk assessment method, in which risk calculation is based on Fuzzy Cognitive Maps (FCMs) to a complex automated video surveillance system. FCMs are used to capture dependencies between assets and FCM based reasoning is applied to aggregate risks assigned to lower-level assets (e.g. cameras, hardware, software modules, communications, people) to such high level assets as services, maintained data and processes. Lessons learned indicate, that the proposed method is an efficient and low-cost approach, giving instantaneous feedback and enabling reasoning on effectiveness of security system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号