全文获取类型
收费全文 | 1705篇 |
免费 | 329篇 |
国内免费 | 202篇 |
专业分类
电工技术 | 103篇 |
综合类 | 233篇 |
化学工业 | 10篇 |
金属工艺 | 9篇 |
机械仪表 | 50篇 |
建筑科学 | 15篇 |
矿业工程 | 7篇 |
能源动力 | 4篇 |
轻工业 | 14篇 |
水利工程 | 5篇 |
石油天然气 | 14篇 |
武器工业 | 12篇 |
无线电 | 682篇 |
一般工业技术 | 87篇 |
冶金工业 | 6篇 |
原子能技术 | 1篇 |
自动化技术 | 984篇 |
出版年
2024年 | 11篇 |
2023年 | 32篇 |
2022年 | 48篇 |
2021年 | 40篇 |
2020年 | 60篇 |
2019年 | 42篇 |
2018年 | 36篇 |
2017年 | 43篇 |
2016年 | 55篇 |
2015年 | 66篇 |
2014年 | 107篇 |
2013年 | 88篇 |
2012年 | 97篇 |
2011年 | 129篇 |
2010年 | 113篇 |
2009年 | 121篇 |
2008年 | 122篇 |
2007年 | 146篇 |
2006年 | 118篇 |
2005年 | 106篇 |
2004年 | 92篇 |
2003年 | 73篇 |
2002年 | 83篇 |
2001年 | 62篇 |
2000年 | 76篇 |
1999年 | 46篇 |
1998年 | 42篇 |
1997年 | 44篇 |
1996年 | 27篇 |
1995年 | 28篇 |
1994年 | 26篇 |
1993年 | 12篇 |
1992年 | 12篇 |
1991年 | 6篇 |
1990年 | 9篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
排序方式: 共有2236条查询结果,搜索用时 31 毫秒
31.
在网络化控制系统(Networked Control Systems,简记为NCSs)中,由于网络的介入使控制系统的规模和复杂性显著增加,且产生了各种新问题,为了使控制更加容易,需要设计合理的估计策略.主要从控制和通信2个角度出发,集中考虑了在量化影响、时延与丢包、不确定性等通信受限因素下状态估计策略的研究与进展.一直以来,状态估计都是诸如过程监控、故障诊断等控制领域中不可缺少的重要部分,当前已成为网络化控制系统研究的热点和准点,为抵消网络环境不确定性对闭环系统性能的影响,设计最优的状态估计策略必将成为不可缺少的因素之一. 相似文献
32.
This paper is concerned with the heading tracking control problem for a network-based unmanned surface vessel (USV) under wave-induced disturbances. Considering the characteristics of the wave-induced disturbances, the unknown-but-bounded (UBB) noise model is adopted. Meanwhile, signal quantization is taken into account due to the limited capacity of the communication channel. Based on these considerations, a novel set-membership based control scheme is proposed, which consists of a set-membership filter (SMF) and a set-membership controller (SMC). In the proposed control scheme, the SMF is designed for providing an ellipsoidal estimation set for the USV at each sampling step, and then the SMC uses the estimation set for producing control input for the USV in order to track the reference. Sufficient conditions are derived for the considered USV system to be asymptotically stable and satisfy the modified set-membership performance constraint. Simulation results verifies the effectiveness of the proposed control scheme. 相似文献
33.
GUO YuQian GUI WeiHua & YANG ChunHua School of Information Science Engineering Central South University Changsha China 《中国科学:信息科学(英文版)》2011,(4):824-835
This paper considers the design of compensators for systems with quantized inputs in order to reduce the influence of quantization.For systems with (vector) relative degrees,we propose a kind of compensators which can compensate for the accumulated output deviation completely caused by quantization.The proposed compensators are capable of keeping the differences of the input-output responses between the systems with quantized inputs and the original systems without considering quantization within certain sm... 相似文献
34.
Jun Wang Bormin Huang Jiaji Wu Jong‐Wha Chong 《Journal of the Society for Information Display》2011,19(8):551-560
Abstract— Overdrive is commonly used to reduce the liquid‐crystal response time and motion blur in liquid‐crystal displays (LCDs). However, overdrive requires a large frame memory in order to store the previous frame for reference. In this paper, a lapped transform‐based codec (LTC) is proposed to reduce the frame memory needed for LCD overdrive. In the latest literature, a directional prediction‐based codec (DPC) employs eight directional predictions, which takes up a large percentage of the computational complexity of the codec and does not consider the de‐correlation of the inter‐blocks. Therefore, the LTC first uses the lapped transform to decompose the correlation of the inter‐blocks in the YUV color space. A hadamard transform is then used for energy compaction. The reordered coefficients are pre‐quantized and encoded using the proposed adaptive bit‐plane coding (ABPC) method for a simple hardware implementation. The simulation results show that the proposed LTC significantly improves the DPC in both subjective and objective performance and outperforms the block truncation coding (BTC) and adaptive multi‐level BTC (AM‐BTC), which have been described in the literature. 相似文献
35.
36.
刘畅 《数码设计:surface》2010,(12):237-239
现代社会消费者对产品的评价指标是衡量产品质量优劣的标准,如何对消费者的需求进行科学的评估成为提升产品质量,推动企业进步的一项重要因素。文章结合QFD和TRIZ理论的研究方式,将顾客的感性需求进行量化分析,为产品质量评估提供了量化的理论与方法,并通过实例进行合理的分析论证。 相似文献
37.
基于奇偶量化的彩色图像盲水印算法 总被引:1,自引:0,他引:1
提出一种基于奇偶量化的彩色图像小波域的数字水印算法。首先对水印图像进行置乱处理,然后对图像进行翻转,最后利用混沌系统产生的混沌序列对水印进行加密。水印嵌入时,采用小波变换并利用奇偶量化规则将加密后的水印嵌入到载体图像蓝色分量最深层的四个子带中。水印提取时,不需要原始图像的参与,实现了盲提取。仿真实验和性能分析表明,该算法有很好的不可见性和鲁棒性,可以有效地抵抗JPEG压缩、噪声、剪切等攻击。 相似文献
38.
Rolling element bearing fault diagnosis using wavelet transform 总被引:2,自引:0,他引:2
P.K. Kankar Author VitaeSatish C. Sharma Author Vitae S.P. HarshaAuthor Vitae 《Neurocomputing》2011,74(10):1638-1645
This paper is focused on fault diagnosis of ball bearings having localized defects (spalls) on the various bearing components using wavelet-based feature extraction. The statistical features required for the training and testing of artificial intelligence techniques are calculated by the implementation of a wavelet based methodology developed using Minimum Shannon Entropy Criterion. Seven different base wavelets are considered for the study and Complex Morlet wavelet is selected based on minimum Shannon Entropy Criterion to extract statistical features from wavelet coefficients of raw vibration signals. In the methodology, firstly a wavelet theory based feature extraction methodology is developed that demonstrates the information of fault from the raw signals and then the potential of various artificial intelligence techniques to predict the type of defect in bearings is investigated. Three artificial intelligence techniques are used for faults classifications, out of which two are supervised machine learning techniques i.e. support vector machine, learning vector quantization and other one is an unsupervised machine learning technique i.e. self-organizing maps. The fault classification results show that the support vector machine identified the fault categories of rolling element bearing more accurately and has a better diagnosis performance as compared to the learning vector quantization and self-organizing maps. 相似文献
39.
The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a tampered image cannot be distinguished from a real one by visual examination. In this paper, we focus on JPEG images and propose detecting tampered images by examining the double quantization effect hidden among the discrete cosine transform (DCT) coefficients. To our knowledge, our approach is the only one to date that can automatically locate the tampered region, while it has several additional advantages: fine-grained detection at the scale of 8×8 DCT blocks, insensitivity to different kinds of forgery methods (such as alpha matting and inpainting, in addition to simple image cut/paste), the ability to work without fully decompressing the JPEG images, and the fast speed. Experimental results on JPEG images are promising. 相似文献
40.
Zhe-Ming Lu Author Vitae Jun-Xiang Wang Author Vitae Bei-Bei Liu Author Vitae 《Journal of Systems and Software》2009,82(6):1016-1024
Copyright protection and information security have become serious problems due to the ever growing amount of digital data over the Internet. Reversible data hiding is a special type of data hiding technique that guarantees not only the secret data but also the cover media can be reconstructed without any distortion. Traditional schemes are based on spatial, discrete cosine transformation (DCT) and discrete wavelet transformation (DWT) domains. Recently, some vector quantization (VQ) based reversible data hiding schemes have been proposed. This paper proposes an improved reversible data hiding scheme based on VQ-index residual value coding. Experimental results show that our scheme outperforms two recently proposed schemes, namely side-match vector quantization (SMVQ)-based data hiding and modified fast correlation vector quantization (MFCVQ)-based data hiding. 相似文献