首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1258篇
  免费   86篇
  国内免费   60篇
电工技术   34篇
综合类   38篇
化学工业   163篇
金属工艺   49篇
机械仪表   36篇
建筑科学   61篇
矿业工程   16篇
能源动力   133篇
轻工业   5篇
水利工程   3篇
石油天然气   4篇
武器工业   3篇
无线电   308篇
一般工业技术   193篇
冶金工业   27篇
原子能技术   4篇
自动化技术   327篇
  2024年   5篇
  2023年   59篇
  2022年   24篇
  2021年   56篇
  2020年   101篇
  2019年   62篇
  2018年   21篇
  2017年   116篇
  2016年   89篇
  2015年   71篇
  2014年   126篇
  2013年   81篇
  2012年   83篇
  2011年   46篇
  2010年   60篇
  2009年   62篇
  2008年   55篇
  2007年   69篇
  2006年   63篇
  2005年   25篇
  2004年   16篇
  2003年   17篇
  2002年   13篇
  2001年   17篇
  2000年   6篇
  1999年   11篇
  1998年   2篇
  1997年   4篇
  1996年   2篇
  1995年   2篇
  1994年   2篇
  1993年   4篇
  1992年   4篇
  1991年   3篇
  1990年   4篇
  1989年   1篇
  1988年   8篇
  1987年   14篇
排序方式: 共有1404条查询结果,搜索用时 15 毫秒
1.
By leveraging the secret data coding using the remainder storage based exploiting modification direction (RSBEMD), and the pixel change operation recording based on multi-segment left and right histogram shifting, a novel reversible data hiding (RHD) scheme is proposed in this paper. The secret data are first encoded by some specific pixel change operations to the pixels in groups. After that, multi-segment left and right histogram shifting based on threshold manipulation is implemented for recording the pixel change operations. Furthermore, a multiple embedding policy based on chess board prediction (CBP) and threshold manipulation is put forward, and the threshold can be adjusted to achieve adaptive data hiding. Experimental results and analysis show that it is reversible and can achieve good performance in capacity and imperceptibility compared with the existing methods.  相似文献   
2.
The need for feature selection and dimension reduction is felt as a fundamental step in security assessment of large power systems in which the number of features representing the state of power grids dramatically increases. These large amounts of attributes are not proper to be used for computational intelligence (CI) techniques as inputs, because it may lead to a time consuming procedure with insufficient results and they are not suitable for on-line purposes and updates.This paper proposes a combined method for an online voltage security assessment in which the dimension of the token data from phasor measurement units (PMUs) is reduced by principal component analysis (PCA). Then, the features with different stability indices are put into several categories and feature selection is done by correlation analysis in each category. These selected features are then given to decision trees (DTs) for classification and security assessment of power systems.The method is applied to 39-bus test system and a part of Iran power grid. It is seen from the results that the DTs with reduced data have simpler splitting rules, better performance in saving time, reasonable DT error and they are more suitable for constant updates.  相似文献   
3.
When a lump-sum public construction project is implemented, disputes often arise concerning issues around the accuracy of contracted quantities, the acceptability of unit prices of cost items, and whether an “equal (or equivalent)” for a product (equipment or material) can be used. In Taiwan, contracted quantities and unit prices are primarily based on owner's estimations, and the trademarks of a product specified in a tendering documentation are only for reference. A contractor has to struggle for profit when the amount of work completed differs from the contracted amount, when change orders are priced according to the owner's estimates, and when inexpensive equals may be used. This work comprehensively elaborates the background of the current practice, and presents experience of applying an electronically facilitated bidding model to evaluating the bidder's submitted quantities, unit prices and equals in several practical projects in Taiwan. Results of this study indicate that the aforementioned construction disputes can be prevented or at least mitigated.  相似文献   
4.
Firstly, the compress experiment is undertaken to investigate the efficiency of repaired panels in this paper, and then modeling of the mechanical behavior of the repaired composite panel under compressive static load is conducted by using of the finite element method. The effect of geometric non-linearity on the stress–strain response is considered in the numeric analysis. Fatherly, the user material subroutine (UMAT) is integrated with the ABAQUS package with the geometric non-linearity effect for studying the damage initiation and its progression in the composite structure, and quadrilateral, linear, thick shell elements (S8R) are adopted. Finally, the predicted strain distribution, damage evolution and strength of the laminate are compared with the test results.  相似文献   
5.
6.
The time dependence of magnetization is usually expressed as M(t)=M0-SInt [see Proc. Phys. Soc. 62, 562 (1949)] for magnetic viscosity experiments. Considering magnetic interaction during the thermal activation process, a form as M(t)=M0-SIn(t+t0) is deduced. The dipolar interaction and exchange coupling in a magnet can lead to positive and nonpositive t0, respectively. In the experiments of the magnetic viscosity for nanocrystalline Pr2Fe14B ribbons, the existence of positive t0 is confirmed.  相似文献   
7.
In the past few decades several supply chain management initiatives such as Vendor Managed Inventory, Continuous Replenishment and Collaborative Planning Forecasting and Replenishment (CPFR) have been proposed in literature to improve the performance of supply chains. But, identifying the benefits of collaboration is still a big challenge for many supply chains. Confusion around the optimum number of partners, investment in collaboration and duration of partnership are some of the barriers of healthy collaborative arrangements. To evolve competitive supply chain collaboration (SCC), all SC processes need to be assessed from time to time for evaluating the performance. In a growing field, performance measurement is highly indispensable in order to make continuous improvement; in a new field, it is equally important to check the performance to test conduciveness of SCC. In this research, collaborative performance measurement will act as a testing tool to identify conducive environment to collaborate, by the way of pinpointing areas requiring improvements before initializing collaboration. We use actual industrial data and simulation to help managerial decision-making on the number of collaborating partners, the level of investments and the involvement in supply chain processes. This approach will help the supply chains to obtain maximum benefit of collaborative relationships. The use of simulation for understanding the performance of SCC is relatively a new approach and this can be used by companies that are interested in collaboration without having to invest a huge sum of money in establishing the actual collaboration.  相似文献   
8.
9.
Face recognition demonstrates the significant progress in the research field of biometric and computer vision. The fact is due to the current systems perform well under relatively control environments but tend to suffer when the present of variation in pose, illumination, and facial expression. In this work, a novel approach for face recognition called Symmetric Local Graph Structure (SLGS) is presented based on the Local Graph Structure (LGS). Each pixel is represented with a graph structure of its neighbours’ pixels. The histograms of the SLGS were used for recognition by using the nearest neighbour classifiers that include Euclidean distance, correlation coefficient and chi-square distance measures. AT&T and Yale face databases were used to be experimented with the proposed method. Extensive experiments on the face database clearly showed the superiority of the proposed approach over Local Binary Pattern (LBP) and LGS. The proposed SLGS is robust to variation in term of facial expressions, facial details, and illumination. Due to good performance of SLGS, it is expected that SLGS has a potential for application implementation in computer vision.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号