全文获取类型
收费全文 | 17840篇 |
免费 | 329篇 |
国内免费 | 234篇 |
专业分类
电工技术 | 291篇 |
综合类 | 103篇 |
化学工业 | 1085篇 |
金属工艺 | 730篇 |
机械仪表 | 338篇 |
建筑科学 | 684篇 |
矿业工程 | 44篇 |
能源动力 | 223篇 |
轻工业 | 346篇 |
水利工程 | 82篇 |
石油天然气 | 71篇 |
武器工业 | 4篇 |
无线电 | 1895篇 |
一般工业技术 | 1222篇 |
冶金工业 | 1279篇 |
原子能技术 | 122篇 |
自动化技术 | 9884篇 |
出版年
2023年 | 37篇 |
2022年 | 40篇 |
2021年 | 88篇 |
2020年 | 60篇 |
2019年 | 84篇 |
2018年 | 113篇 |
2017年 | 84篇 |
2016年 | 144篇 |
2015年 | 118篇 |
2014年 | 359篇 |
2013年 | 567篇 |
2012年 | 1079篇 |
2011年 | 3420篇 |
2010年 | 1372篇 |
2009年 | 1300篇 |
2008年 | 992篇 |
2007年 | 896篇 |
2006年 | 761篇 |
2005年 | 852篇 |
2004年 | 851篇 |
2003年 | 911篇 |
2002年 | 514篇 |
2001年 | 487篇 |
2000年 | 405篇 |
1999年 | 261篇 |
1998年 | 592篇 |
1997年 | 337篇 |
1996年 | 233篇 |
1995年 | 243篇 |
1994年 | 156篇 |
1993年 | 138篇 |
1992年 | 83篇 |
1991年 | 67篇 |
1990年 | 65篇 |
1989年 | 77篇 |
1988年 | 56篇 |
1987年 | 49篇 |
1986年 | 50篇 |
1985年 | 67篇 |
1984年 | 52篇 |
1983年 | 38篇 |
1982年 | 42篇 |
1981年 | 40篇 |
1980年 | 28篇 |
1979年 | 26篇 |
1978年 | 18篇 |
1977年 | 22篇 |
1976年 | 47篇 |
1975年 | 17篇 |
1973年 | 19篇 |
排序方式: 共有10000条查询结果,搜索用时 359 毫秒
51.
Dong Sun Author Vitae 《Automatica》2003,39(6):997-1005
A new control approach to position synchronization of multiple motion axes is developed, by incorporating cross-coupling technology into adaptive control architecture. The control strategy is to stabilize position tracking of each axis while synchronizing its motion with other axes’ motions so that differential position errors amongst axes converge to zero. The proposed adaptive controller and parameter estimator employ coupling control by feeding back position errors and differential position errors, and have been realized to guarantee asymptotic convergence to zero of both position and synchronization errors. Simulations conducted on a multi-axis motion control system demonstrate the effectiveness of the method. 相似文献
52.
53.
A good understanding of environmental effects on structural modal properties is essential for reliable performance of vibration-based damage diagnosis methods. In this paper, a method of combining principal component analysis (PCA) and support vector regression (SVR) technique is proposed for modeling temperature-caused variability of modal frequencies for structures instrumented with long-term monitoring systems. PCA is first applied to extract principal components from the measured temperatures for dimensionality reduction. The predominant feature vectors in conjunction with the measured modal frequencies are then fed into a support vector algorithm to formulate regression models that may take into account thermal inertia effect. The research is focused on proper selection of the hyperparameters to obtain SVR models with good generalization performance. A grid search method with cross validation and a heuristic method are utilized for determining the optimal values of SVR hyperparameters. The proposed method is compared with the method directly using measurement data to train SVR models and the multivariate linear regression (MLR) method through the use of long-term measurement data from a cable-stayed bridge. It is shown that PCA-compressed features make the training and validation of SVR models more efficient in both model accuracy and computational costs, and the formulated SVR model performs much better than the MLR model in generalization performance. When continuously measured data is available, the SVR model formulated taking into account thermal inertia effect can achieve more accurate prediction than that without considering thermal inertia effect. 相似文献
54.
Zhishou Zhang Qibin Sun Wai-Choong Wong John Apostolopoulos Susie Wee 《Multimedia, IEEE Transactions on》2007,9(2):320-331
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required 相似文献
55.
Multichannel security protocols transmit messages over multiple communication channels, taking into account each channel's security properties. Our first intentional use of these protocols goes back to a 1999 article that proposed physical contact for imprinting as opposed to the wireless channel used in subsequent operations. Only later did we understand three key points. First, explicit use of multiple channels in the same protocol can offer significant advantages for both security and usability. Second, explicitly stating the properties of the channel on which each protocol message is transmitted is useful for understanding one's own protocol in greater depth and therefore for addressing subtle vulnerabilities early on. Third, multichannel protocols existed long before we recognized them as such - think of the courier handcuffed to the briefcase carrying the code book that will later protect postal or telegraphic traffic. The paper presents a security protocol that exploit additional transmissions over lower-capacity channels, typically found in ubicomp environments, that offer a different combination of security properties. 相似文献
56.
Nonlinear model predictive control with polytopic invariant sets 总被引:1,自引:0,他引:1
Ellipsoidal invariant sets have been widely used as target sets in model predictive control (MPC). These sets can be computed by constructing appropriate linear difference inclusions together with additional constraints to ensure that the ellipsoid lies within a given inclusion polytope. The choice of inclusion polytope has a significant effect on the size of the target ellipsoid, but the optimal inclusion polytope cannot in general be computed systematically. This paper shows that use of polytopic invariant sets overcomes this difficulty, allowing larger stabilizable sets without loss of performance. In the interests of online efficiency, consideration is focused on interpolation-based MPC. 相似文献
57.
Qing-Chang Zhong Author Vitae 《Automatica》2003,39(3):499-508
This paper generalizes the frequency-domain results on the delay-type Nehari problem in the stable case to the unstable case. The solvability condition of the delay-type Nehari problem is formulated in terms of the nonsingularity of three matrices. The optimal value γopt is the maximal γ∈(0,∞) such that one of the three matrices becomes singular. All sub-optimal compensators are parameterized in a transparent structure incorporating a modified Smith predictor. 相似文献
58.
Gilles Celeux Author VitaeFlorence ForbesAuthor Vitae Nathalie Peyrard Author Vitae 《Pattern recognition》2003,36(1):131-144
Image segmentation using Markov random fields involves parameter estimation in hidden Markov models for which the EM algorithm is widely used. In practice, difficulties arise due to the dependence structure in the models and approximations are required. Using ideas from the mean field approximation principle, we propose a class of EM-like algorithms in which the computation reduces to dealing with systems of independent variables. Within this class, the simulated field algorithm is a new stochastic algorithm which appears to be the most promising for its good performance and speed, on synthetic and real image experiments. 相似文献
59.
Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners
Fingerprints are the oldest and most widely used biometrics for personal identification. Unfortunately, it is usually possible to deceive automatic fingerprint identification systems by presenting a well-duplicated synthetic or dismembered finger. This paper introduces one method to provide fingerprint vitality authentication in order to solve this problem. Detection of a perspiration pattern over the fingertip skin identifies the vitality of a fingerprint. Mapping the two-dimensional fingerprint images into one-dimensional signals, two ensembles of measures, namely static and dynamic measures, are derived for classification. Static patterns as well as temporal changes in dielectric mosaic structure of the skin, caused by perspiration, demonstrate themselves in these signals. Using these measures, this algorithm quantifies the sweating pattern and makes a final decision about vitality of the fingerprint by a neural network trained by examples. 相似文献
60.