首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33634篇
  免费   4812篇
  国内免费   4984篇
电工技术   456篇
技术理论   1篇
综合类   2335篇
化学工业   705篇
金属工艺   272篇
机械仪表   630篇
建筑科学   232篇
矿业工程   133篇
能源动力   802篇
轻工业   213篇
水利工程   42篇
石油天然气   80篇
武器工业   65篇
无线电   5280篇
一般工业技术   1536篇
冶金工业   75篇
原子能技术   66篇
自动化技术   30507篇
  2024年   74篇
  2023年   822篇
  2022年   1498篇
  2021年   1739篇
  2020年   1565篇
  2019年   1236篇
  2018年   1407篇
  2017年   2209篇
  2016年   2269篇
  2015年   2056篇
  2014年   3020篇
  2013年   2641篇
  2012年   3209篇
  2011年   3448篇
  2010年   2805篇
  2009年   2931篇
  2008年   2484篇
  2007年   2222篇
  2006年   1959篇
  2005年   927篇
  2004年   360篇
  2003年   316篇
  2002年   358篇
  2001年   369篇
  2000年   245篇
  1999年   264篇
  1998年   147篇
  1997年   69篇
  1996年   75篇
  1995年   75篇
  1994年   54篇
  1993年   67篇
  1992年   56篇
  1991年   36篇
  1990年   38篇
  1989年   35篇
  1988年   33篇
  1987年   14篇
  1986年   11篇
  1985年   32篇
  1984年   31篇
  1983年   41篇
  1982年   40篇
  1981年   28篇
  1980年   21篇
  1979年   20篇
  1978年   22篇
  1977年   15篇
  1976年   14篇
  1974年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
This paper proposes an efficient adaptive hierarchical artificial immune system (AHAIS) for complex global optimization problems. In the proposed AHAIS optimization, a hierarchy with top-bottom levels is used to construct the antibody population, where some antibodies with higher affinity become the top-level elitist antibodies and the other antibodies with lower affinity become the bottom-level common antibodies. The elitist antibodies experience different evolutionary operators from those common antibodies, and a well-designed dynamic updating strategy is used to guide the evolution and retrogradation of antibodies between two levels. In detail, the elitist antibodies focus on self-learning and local searching while the common antibodies emphasize elitist-learning and global searching. In addition, an adaptive searching step length adjustment mechanism is proposed to capture more accurate solutions. The suppression operator introduces an upper limit of the similarity-based threshold by considering the concentration of the candidate antibodies. To evaluate the effectiveness and the efficiency of algorithms, a series of comparative numerical simulations are arranged among the proposed AHAIS, DE, PSO, opt-aiNet and IA-AIS, where eight benchmark functions are selected as testbeds. The simulation results prove that the proposed AHAIS is an efficient method and outperforms DE, PSO, opt-aiNet and IA-AIS in convergence speed and solution accuracy. Moreover, an industrial application in RFID reader collision avoidance also demonstrates the searching capability and practical value of the proposed AHAIS optimization.  相似文献   
992.
In this paper, a color difference based fuzzy filter is presented for fix and random-valued impulse noise. Noise detection scheme of two stages was applied to detect noise efficiently whereas for noise removal an improved Histogram based Fuzzy Color Filter (HFC) is presented. Pixels detected as noisy by the noise detection scheme are deliberated as candidate for the removal of noise. Candidate noisy pixels are then processed using a modified Histogram based Fuzzy Color Filter to estimate their non-noisy values. The idea of using multiple fuzzy membership functions is presented, so that best suitable membership function for local image statistics can be used automatically. In the proposed technique we have used three different types of fuzzy membership functions (bell-shaped, trapezoidal-shaped, and triangular-shaped) and their fuzzy number construction algorithms are proposed. Experimentation is also performed with three, five, and seven membership functions. Type and number of suitable fuzzy membership functions are then identified to remove noise. Comparison with the existing filtering techniques is established on the basis of objective quantitative measures including structural similarity index measure (SSIM) and peak-signal-to-noise-ratio (PSNR). Simulations show that this filter is superior to that of the existing state-of-the-art filtering techniques in removing fix and random-valued impulse noise whereas retaining the details of the image contents.  相似文献   
993.
Swarm intelligence, a nature inspired computing applies an algorithm situated within the context of agent based models that mimics the behavior of ants to detect sinkhole attacks in wireless sensor networks. An Ant Colony Optimization Attack Detection (ACO-AD) algorithm is proposed to identify the sinkhole attacks based on the nodeids defined in the ruleset. The nodes generating an alert on identifying a sinkhole attack are grouped together. A voting method is proposed to identify the intruder. An Ant Colony Optimization Boolean Expression Evolver Sign Generation (ABXES) algorithm is proposed to distribute the keys to the alerted nodes in the group for signing the suspect list to agree on the intruder. It is shown that the proposed method identifies the anomalous connections without generating false positives and minimizes the storage in the sensor nodes in comparison to LIDeA architecture for sinkhole attack detection. Experimental results demonstrating the Ant Colony Optimization approach of detecting a sinkhole attack are presented.  相似文献   
994.
In a recent study, we have introduced the problem of identifying cell-phones using recorded speech and shown that speech signals convey information about the source device, making it possible to identify the source with some accuracy. In this paper, we consider recognizing source cell-phone microphones using non-speech segments of recorded speech. Taking an information-theoretic approach, we use Gaussian Mixture Model (GMM) trained with maximum mutual information (MMI) to represent device-specific features. Experimental results using Mel-frequency and linear frequency cepstral coefficients (MFCC and LFCC) show that features extracted from the non-speech segments of speech contain higher mutual information and yield higher recognition rates than those from speech portions or the whole utterance. Identification rate improves from 96.42% to 98.39% and equal error rate (EER) reduces from 1.20% to 0.47% when non-speech parts are used to extract features. Recognition results are provided with classical GMM trained both with maximum likelihood (ML) and maximum mutual information (MMI) criteria, as well as support vector machines (SVMs). Identification under additive noise case is also considered and it is shown that identification rates reduces dramatically in case of additive noise.  相似文献   
995.
The present paper focuses on the fusion, based on imprecise and uncertain information, between a Geographic Information System (GIS) and a Speed Limit Sign Recognition System (SLSRS), performed on camera images. This study is dedicated to the development of a Speed Limit Assistant (SLA) in the context of vehicle driving aid. The proposed SLA is developed within the Evidence Theory framework. The information from the sources is interpreted as belief functions using a non-antagonistic basic belief assignment (bba) in the Transferable Belief Model (TBM) semantics. This bba ensures that the conflict which could appear after the global fusion is exclusively due to source discordances. The present paper proposes a way to manage these discordances by formalizing a conflict-related constraint decision rule. As far as the application is concerned, a two-level (decentralized) fusion architecture is developed. The sensor relevancy is estimated in a first step, followed by the GIS intra-sensor fusion with a maximum of Credibility decision which determines the context-compliant speed candidate considering the road information given by the digital map. This allows the detection of possible errors of the GIS. The multi-sensor fusion then combines the GIS and SLSRS information considering that the sensors are independent and specialized in one speed, each. For the decision, two strategies are adopted. The first one considers the conflict as a threshold for the final speed selection, and so allows the SLA to stay undecided in case of highly conflicting situations. The second strategy employs the 5th version of the Proportional Conflict Redistribution operator. The SLA has been tested in simulation and in real-time experiments by qualitative and quantitative performance evaluations.  相似文献   
996.
In the previous work, a detector generation algorithm, named as the EvoSeedRNSA, is proposed. A genetic algorithm is adopted in the EvoSeedRNSA to evolve the random seeds to generate an approximately optimal detector set. This paper proposes an improved EvoSeedRNSA, named as the EvoSeedRNSAII, to generate a more efficient detector set. A multi-group random seed encoding scheme is designed to represent the individuals and different detector generation sequences are discussed. The experiments demonstrate that the EvoSeedRNSAII has a better performance than the EvoSeedRNSA.  相似文献   
997.
Reinforcement learning (RL) for solving large and complex problems faces the curse of dimensions problem. To overcome this problem, frameworks based on the temporal abstraction have been presented; each having their advantages and disadvantages. This paper proposes a new method like the strategies introduced in the hierarchical abstract machines (HAMs) to create a high-level controller layer of reinforcement learning which uses options. The proposed framework considers a non-deterministic automata as a controller to make a more effective use of temporally extended actions and state space clustering. This method can be viewed as a bridge between option and HAM frameworks, which tries to suggest a new framework to decrease the disadvantage of both by creating connection structures between them and at the same time takes advantages of them. Experimental results on different test environments show significant efficiency of the proposed method.  相似文献   
998.
This paper explores the significance of stereo-based stochastic feature compensation (SFC) methods for robust speaker verification (SV) in mismatched training and test environments. Gaussian Mixture Model (GMM)-based SFC methods developed in past has been solely restricted for speech recognition tasks. Application of these algorithms in a SV framework for background noise compensation is proposed in this paper. A priori knowledge about the test environment and availability of stereo training data is assumed. During the training phase, Mel frequency cepstral coefficient (MFCC) features extracted from a speaker's noisy and clean speech utterance (stereo data) are used to build front end GMMs. During the evaluation phase, noisy test utterances are transformed on the basis of a minimum mean squared error (MMSE) or maximum likelihood (MLE) estimate, using the target speaker GMMs. Experiments conducted on the NIST-2003-SRE database with clean speech utterances artificially degraded with different types of additive noises reveal that the proposed SV systems strictly outperform baseline SV systems in mismatched conditions across all noisy background environments.  相似文献   
999.
We address the problem of locating multiple nodes in a wireless sensor network with the use of received signal strength (RSS) measurements. In RSS based positioning, transmit power and path-loss factor are two environment dependent parameters which may be uncertain or unknown. For unknown transmit powers, we devise two-step weighted least squares (WLS) and maximum likelihood (ML) algorithms for node localization. The mean square error of the former is analyzed in the presence of zero-mean white Gaussian disturbances. When both transmit powers and path-loss factors are unavailable, two nonlinear least squares estimators, namely, the direct ML approach and combination of linear least squares and ML algorithm, are developed. Numerical examples are also included to evaluate the localization accuracy of the proposed estimators by comparing with two existing node positioning methods and the Cramér–Rao lower bound.  相似文献   
1000.
The Podhale geothermal system, located in the southern, mountainous part of Poland, is the most valuable reservoir of geothermal waters discovered in the country to date and the one with the highest capacities in Central and Eastern Europe. Over 20 years of continuous operation has proved its stable operating parameters – a small drop in pressure and an unnoticeable temperature change. Production of over 500 m3/h of geothermal water with an 86 °C wellhead temperature is current practise, while drilling a new production well and reconstruction of an injection well allows for production that may significantly exceed 600 m3/h. To utilize these vast resources, a binary power cycle for electricity and heat production is considered by group of researchers. The results of numerical modelling of heat extraction from the Podhale reservoir are presented in the article as a preliminary step to the detailed analysis of combined heat and power production through a binary power cycle.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号