全文获取类型
收费全文 | 8115篇 |
免费 | 1273篇 |
国内免费 | 681篇 |
专业分类
电工技术 | 358篇 |
技术理论 | 3篇 |
综合类 | 1033篇 |
化学工业 | 38篇 |
金属工艺 | 36篇 |
机械仪表 | 480篇 |
建筑科学 | 145篇 |
矿业工程 | 91篇 |
能源动力 | 64篇 |
轻工业 | 18篇 |
水利工程 | 426篇 |
石油天然气 | 66篇 |
武器工业 | 640篇 |
无线电 | 2980篇 |
一般工业技术 | 421篇 |
冶金工业 | 74篇 |
原子能技术 | 21篇 |
自动化技术 | 3175篇 |
出版年
2024年 | 40篇 |
2023年 | 160篇 |
2022年 | 249篇 |
2021年 | 306篇 |
2020年 | 327篇 |
2019年 | 279篇 |
2018年 | 271篇 |
2017年 | 327篇 |
2016年 | 364篇 |
2015年 | 448篇 |
2014年 | 610篇 |
2013年 | 508篇 |
2012年 | 653篇 |
2011年 | 673篇 |
2010年 | 527篇 |
2009年 | 483篇 |
2008年 | 528篇 |
2007年 | 619篇 |
2006年 | 509篇 |
2005年 | 364篇 |
2004年 | 303篇 |
2003年 | 295篇 |
2002年 | 201篇 |
2001年 | 179篇 |
2000年 | 148篇 |
1999年 | 119篇 |
1998年 | 102篇 |
1997年 | 98篇 |
1996年 | 99篇 |
1995年 | 85篇 |
1994年 | 62篇 |
1993年 | 22篇 |
1992年 | 22篇 |
1991年 | 17篇 |
1990年 | 14篇 |
1989年 | 19篇 |
1988年 | 6篇 |
1987年 | 1篇 |
1986年 | 7篇 |
1985年 | 2篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1980年 | 3篇 |
1978年 | 5篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1964年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
1.
诱导式卫星欺骗干扰可诱导航空器逐渐偏离预定航迹,难以被发现,因此及时有效地检测干扰是飞行安全的保障。在现有紧组合导航体制基础上,设计了一种基于误差估值累加开环校正的紧组合导航结构,并证明了其性能与传统闭环校正紧组合导航性能等效。在此结构中,将紧组合导航系统与自适应序贯概率比检测方法结合,提出了一种基于误差估值累加开环校正的诱导式欺骗检测方法,融合紧组合导航信息与其他不受欺骗影响的导航信息,构建欺骗检测统计量进行诱导式欺骗检测。仿真结果表明,开环校正结构可避免随时间累加的惯性导航系统误差所导致的组合导航滤波器发散问题,同时欺骗检测方法可进一步提高算法对“最坏”情形下微小诱导式欺骗的检测效果。 相似文献
2.
在干扰条件下,卫星导航抗干扰波束形成算法往往需要卫星信号波达方向(Direction-of-Arrival,DOA)的先验信息。但当存在低信噪比信号或主动干扰源时,常规的DOA估计算法性能急剧下降甚至失效。针对此问题,提出了一种被干扰信号压制的低信噪比“北斗”信号的DOA估计算法。该算法首先通过对接收信号进行子空间投影抑制干扰信号,然后对抑制干扰后的信号进行解扩重构处理,最后通过多重信号分类算法完成对“北斗”信号的DOA估计。仿真结果表明,在干扰信号干信比80 dB条件下,“北斗”信号DOA估计误差在5°以内,为下一步进行波束形成计算提供了高精度的入射角信息。 相似文献
3.
Ken Yoda 《Advanced Robotics》2019,33(3-4):108-117
ABSTRACTThis review summarizes the advances in bio-logging technology that enables us to monitor foraging behavior, movement, behavioral performance, physiological performance, and sociality in a wide range of bird species, as well as their habitat. Subsequently, navigation is discussed, using long-distance movements in streaked shearwaters as a case study. Moreover, challenges and future research directions in bio-logging science are presented, with focus on: multimodal recording, big data analysis, feedback logging, low-power consumption and power generation systems, logger effects, and capture–recapture methods. 相似文献
4.
Highly accurate real‐time localization is of fundamental importance for the safety and efficiency of planetary rovers exploring the surface of Mars. Mars rover operations rely on vision‐based systems to avoid hazards as well as plan safe routes. However, vision‐based systems operate on the assumption that sufficient visual texture is visible in the scene. This poses a challenge for vision‐based navigation on Mars where regions lacking visual texture are prevalent. To overcome this, we make use of the ability of the rover to actively steer the visual sensor to improve fault tolerance and maximize the perception performance. This paper answers the question of where and when to look by presenting a method for predicting the sensor trajectory that maximizes the localization performance of the rover. This is accomplished by an online assessment of possible trajectories using synthetic, future camera views created from previous observations of the scene. The proposed trajectories are quantified and chosen based on the expected localization performance. In this study, we validate the proposed method in field experiments at the Jet Propulsion Laboratory (JPL) Mars Yard. Furthermore, multiple performance metrics are identified and evaluated for reducing the overall runtime of the algorithm. We show how actively steering the perception system increases the localization accuracy compared with traditional fixed‐sensor configurations. 相似文献
5.
The present study investigates the impact of different key solutions of mobile phones on users' effectiveness and efficiency using the devices. In the first experiment, 36 children (9 - 14 years) and in the second experiment 45 young adults (19 - 33 years) completed four common phone tasks twice consecutively on three simulated phones that had identical menus, but different key solutions. An approach was undertaken to quantify the complexity of keys in three models, incorporating different factors contributing to the keys' complexity (number of key options, number of modes and number of modes with a semantically dissimilar meaning), in order to predict users' performance decrements. As a further main factor, the degree of the users' locus of control (LOC) was measured and interactions with performance outcomes were studied. As dependent measures, the number of inefficient keystrokes, the number of tasks solved and the processing time were determined. Results showed a significant effect of control key solutions on users' efficiency and effectiveness for both children and young adults. Moreover, children's LOC values significantly interacted with performance: children with low LOC values showed the lowest performance and no learnability, especially when using keys with a high complexity. From the three factors contributing to the complexity of keys, keys exerting different functions with semantically inconsistent meanings had the worst effect on performance. It is concluded that in mobile user interface design keys with semantically inconsistent meanings should be generally avoided. 相似文献
6.
7.
8.
9.
10.
Navid Ehsan Mingyan Liu Roderick J. Ragland 《International Journal of Communication Systems》2003,16(6):513-534
Performance enhancing proxies (PEPs) are widely used to improve the performance of TCP over high delay‐bandwidth product links and links with high error probability. In this paper we analyse the performance of using TCP connection splitting in combination with web caching via traces obtained from a commercial satellite system. We examine the resulting performance gain under different scenarios, including the effect of caching, congestion, random loss and file sizes. We show, via analysing our measurements, that the performance gain from using splitting is highly sensitive to random losses and the number of simultaneous connections, and that such sensitivity is alleviated by caching. On the other hand, the use of a splitting proxy enhances the value of web caching in that cache hits result in much more significant performance improvement over cache misses when TCP splitting is used. We also compare the performance of using different versions of HTTP in such a system. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献