首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31705篇
  免费   5424篇
  国内免费   3245篇
电工技术   3817篇
技术理论   2篇
综合类   3406篇
化学工业   1209篇
金属工艺   509篇
机械仪表   1826篇
建筑科学   362篇
矿业工程   351篇
能源动力   243篇
轻工业   427篇
水利工程   156篇
石油天然气   478篇
武器工业   467篇
无线电   9204篇
一般工业技术   1897篇
冶金工业   1024篇
原子能技术   87篇
自动化技术   14909篇
  2024年   129篇
  2023年   589篇
  2022年   1091篇
  2021年   1297篇
  2020年   1318篇
  2019年   986篇
  2018年   864篇
  2017年   1172篇
  2016年   1265篇
  2015年   1458篇
  2014年   2019篇
  2013年   1818篇
  2012年   2404篇
  2011年   2674篇
  2010年   2167篇
  2009年   2140篇
  2008年   2263篇
  2007年   2477篇
  2006年   2161篇
  2005年   1829篇
  2004年   1441篇
  2003年   1281篇
  2002年   1024篇
  2001年   743篇
  2000年   639篇
  1999年   532篇
  1998年   437篇
  1997年   366篇
  1996年   277篇
  1995年   257篇
  1994年   206篇
  1993年   182篇
  1992年   136篇
  1991年   87篇
  1990年   70篇
  1989年   83篇
  1988年   55篇
  1987年   35篇
  1986年   27篇
  1985年   37篇
  1984年   38篇
  1983年   43篇
  1982年   39篇
  1981年   34篇
  1980年   28篇
  1979年   22篇
  1978年   24篇
  1977年   28篇
  1976年   24篇
  1974年   10篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
现代战场中的无线通信设备日益增多,精准获取个体信息已成为研究热点,但也是难点。针对通信电台,提出了一种分选识别技术。该技术从电台物理层特性出发,对其辐射信号的细微特征进行K-means聚类以实现分选,分选的同时提取各个个体的特征属性值,未知信号通过与特征属性值相关运算实现个体识别。该技术无需先验知识,无需训练运算,通过实验验证,其可行、高效,易于工程实现。  相似文献   
2.
Manufacturing companies not only strive to deliver flawless products but also monitor product failures in the field to identify potential quality issues. When product failures occur, quality engineers must identify the root cause to improve any affected product and process. This root-cause analysis can be supported by feature selection methods that identify relevant product attributes, such as manufacturing dates with an increased number of product failures. In this paper, we present different methods for feature selection and evaluate their ability to identify relevant product attributes in a root-cause analysis. First, we compile a list of feature selection methods. Then, we summarize the properties of product attributes in warranty case data and discuss these properties regarding the challenges they pose for machine learning algorithms. Next, we simulate datasets of warranty cases, which emulate these product properties. Finally, we compare the feature selection methods based on these simulated datasets. In the end, the univariate filter information gain is determined to be a suitable method for a wide range of applications. The comparison based on simulated data provides a more general result than other publications, which only focus on a single use case. Due to the generic nature of the simulated datasets, the results can be applied to various root-cause analysis processes in different quality management applications and provide a guideline for readers who wish to explore machine learning methods for their analysis of quality data.  相似文献   
3.
文猛  张释如 《包装工程》2022,43(21):162-168
目的 为了解决目前三维数据隐藏算法不能兼顾无失真和盲提取的问题,提出一种新的完全无失真的三维网格模型数据隐藏盲算法。方法 首先使用混沌逻辑映射选择嵌入与提取模式,保证数据的安全性。然后利用面元素重排,完全不会造成三维模型失真的性质,通过不同嵌入模式规则对三角面元素进行重排,以嵌入秘密数据。接收端则可根据相应的提取模式规则提取秘密数据。结果 仿真结果与分析表明,该算法不会对三维模型造成任何失真,嵌入容量为每顶点2比特,且能抵抗仿射变换攻击、噪声攻击和平滑攻击等。结论 这种三维数据隐藏盲算法无失真,容量大、安全性高、鲁棒性强,适用于三维载体不容修改的情形,如军事、医学、秘密通信和版权保护等。  相似文献   
4.
The existing analytical average bit error rate (ABER) expression of conventional generalised spatial modulation (CGSM) does not agree well with the Monte Carlo simulation results in the low signal‐to‐noise ratio (SNR) region. Hence, the first contribution of this paper is to derive a new and easy way to evaluate analytical ABER expression that improves the validation of the simulation results at low SNRs. Secondly, a novel system termed CGSM with enhanced spectral efficiency (CGSM‐ESE) is presented. This system is realised by applying a rotation angle to one of the two active transmit antennas. As a result, the overall spectral efficiency is increased by 1 bit/s/Hz when compared with the equivalent CGSM system. In order to validate the simulation results of CGSM‐ESE, the third contribution is to derive an analytical ABER expression. Finally, to improve the ABER performance of CGSM‐ESE, three link adaptation algorithms are developed. By assuming full knowledge of the channel at the receiver, the proposed algorithms select a subset of channel gain vector (CGV) pairs based on the Euclidean distance between all CGV pairs, CGV splitting, CGV amplitudes, or a combination of these.  相似文献   
5.
6.
Quadrature spatial modulation (QSM) utilizes the in‐phase and quadrature spatial dimensions to transmit the real and imaginary parts of a single signal symbol, respectively. The improved QSM (IQSM) transmits two signal symbols per channel use through a combination of two antennas for each of the real and imaginary parts. The main contributions of this study can be summarized as follows. First, we derive an upper bound for the error performance of the IQSM. We then design constellation sets that minimize the error performance of the IQSM for several system configurations. Second, we propose a double QSM (DQSM) that transmits the real and imaginary parts of two signal symbols through any available transmit antennas. Finally, we propose a parallel IQSM (PIQSM) that splits the antenna set into equal subsets and performs IQSM within each subset using the same two signal symbols. Simulation results demonstrate that the proposed constellations significantly outperform conventional constellations. Additionally, DQSM and PIQSM provide a performance similar to that of IQSM while requiring a smaller number of transmit antennas and outperform IQSM with the same number of transmit antennas.  相似文献   
7.
This study proposes that a novel integrated circuit (IC) and system design for renewable energy inverters can harvest renewable energy to power direct current (DC) and alternating current (AC) loads. In addition, an intelligent synthesis and management tool is developed to design the proposed system and to judge the system’s operational maintenance decisions. Finally, a renewable energy inverter’s information is posted to an online system. Users can obtain the proposed system’s information at any time and place. The accurate and superior performance of the proposed IC and system is confirmed by computer simulations and experimental results.  相似文献   
8.
Although greedy algorithms possess high efficiency, they often receive suboptimal solutions of the ensemble pruning problem, since their exploration areas are limited in large extent. And another marked defect of almost all the currently existing ensemble pruning algorithms, including greedy ones, consists in: they simply abandon all of the classifiers which fail in the competition of ensemble selection, causing a considerable waste of useful resources and information. Inspired by these observations, an interesting greedy Reverse Reduce-Error (RRE) pruning algorithm incorporated with the operation of subtraction is proposed in this work. The RRE algorithm makes the best of the defeated candidate networks in a way that, the Worst Single Model (WSM) is chosen, and then, its votes are subtracted from the votes made by those selected components within the pruned ensemble. The reason is because, for most cases, the WSM might make mistakes in its estimation for the test samples. And, different from the classical RE, the near-optimal solution is produced based on the pruned error of all the available sequential subensembles. Besides, the backfitting step of RE algorithm is replaced with the selection step of a WSM in RRE. Moreover, the problem of ties might be solved more naturally with RRE. Finally, soft voting approach is employed in the testing to RRE algorithm. The performances of RE and RRE algorithms, and two baseline methods, i.e., the method which selects the Best Single Model (BSM) in the initial ensemble, and the method which retains all member networks of the initial ensemble (ALL), are evaluated on seven benchmark classification tasks under different initial ensemble setups. The results of the empirical investigation show the superiority of RRE over the other three ensemble pruning algorithms.  相似文献   
9.
王传旭  薛豪 《电子学报》2020,48(8):1465-1471
提出一种以"关键人物"为核心,使用门控融合单元(GFU,Gated Fusion Unit)进行特征融合的组群行为识别框架,旨在解决两个问题:①组群行为信息冗余,重点关注关键人物行为特征,忽略无关人员对组群行为的影响;②组群内部交互行为复杂,使用GFU有效融合以关键人物为核心的交互特征,再通过LSTM时序建模成为表征能力更强的组群特征.最终,通过softmax分类器进行组群行为类别分类.该算法在排球数据集上取得了86.7%的平均识别率.  相似文献   
10.
Bile acids have been reported as important cofactors promoting human and murine norovirus (NoV) infections in cell culture. The underlying mechanisms are not resolved. Through the use of chemical shift perturbation (CSP) NMR experiments, we identified a low-affinity bile acid binding site of a human GII.4 NoV strain. Long-timescale MD simulations reveal the formation of a ligand-accessible binding pocket of flexible shape, allowing the formation of stable viral coat protein–bile acid complexes in agreement with experimental CSP data. CSP NMR experiments also show that this mode of bile acid binding has a minor influence on the binding of histo-blood group antigens and vice versa. STD NMR experiments probing the binding of bile acids to virus-like particles of seven different strains suggest that low-affinity bile acid binding is a common feature of human NoV and should therefore be important for understanding the role of bile acids as cofactors in NoV infection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号