首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21564篇
  免费   4409篇
  国内免费   3266篇
电工技术   3435篇
综合类   2948篇
化学工业   598篇
金属工艺   320篇
机械仪表   1666篇
建筑科学   638篇
矿业工程   253篇
能源动力   290篇
轻工业   291篇
水利工程   279篇
石油天然气   270篇
武器工业   442篇
无线电   5579篇
一般工业技术   1567篇
冶金工业   344篇
原子能技术   71篇
自动化技术   10248篇
  2024年   68篇
  2023年   488篇
  2022年   684篇
  2021年   750篇
  2020年   959篇
  2019年   906篇
  2018年   821篇
  2017年   973篇
  2016年   973篇
  2015年   1183篇
  2014年   1605篇
  2013年   1698篇
  2012年   1864篇
  2011年   2026篇
  2010年   1526篇
  2009年   1518篇
  2008年   1604篇
  2007年   1677篇
  2006年   1368篇
  2005年   1199篇
  2004年   945篇
  2003年   786篇
  2002年   599篇
  2001年   540篇
  2000年   421篇
  1999年   348篇
  1998年   271篇
  1997年   236篇
  1996年   214篇
  1995年   190篇
  1994年   143篇
  1993年   138篇
  1992年   115篇
  1991年   77篇
  1990年   71篇
  1989年   58篇
  1988年   42篇
  1987年   16篇
  1986年   12篇
  1985年   21篇
  1984年   31篇
  1983年   23篇
  1982年   11篇
  1981年   8篇
  1980年   6篇
  1979年   4篇
  1978年   4篇
  1977年   3篇
  1960年   3篇
  1959年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
The fuel cell/battery durability and hybrid system stability are major considerations for the power management of fuel cell hybrid electric bus (FCHEB) operating on complicated driving conditions. In this paper, a real time nonlinear adaptive control (NAC) with stability analyze is formulated for power management of FCHEB. Firstly, the mathematical model of hybrid power system is analyzed, which is established for control-oriented design. Furthermore, the NAC-based strategy with quadratic Lyapunov function is set up to guarantee the stability of closed-loop power system, and the power split between fuel cell and battery is controlled with the durability consideration. Finally, two real-time power management strategies, state machine control (SMC) and fuzzy logic control (FLC), are implemented to evaluate the performance of NAC-based strategy, and the simulation results suggest that the guaranteed stability of NAC-based strategy can efficiently prolong fuel cell/battery lifespan and provide better fuel consumption economy for FCHEB.  相似文献   
2.
诱导式卫星欺骗干扰可诱导航空器逐渐偏离预定航迹,难以被发现,因此及时有效地检测干扰是飞行安全的保障。在现有紧组合导航体制基础上,设计了一种基于误差估值累加开环校正的紧组合导航结构,并证明了其性能与传统闭环校正紧组合导航性能等效。在此结构中,将紧组合导航系统与自适应序贯概率比检测方法结合,提出了一种基于误差估值累加开环校正的诱导式欺骗检测方法,融合紧组合导航信息与其他不受欺骗影响的导航信息,构建欺骗检测统计量进行诱导式欺骗检测。仿真结果表明,开环校正结构可避免随时间累加的惯性导航系统误差所导致的组合导航滤波器发散问题,同时欺骗检测方法可进一步提高算法对“最坏”情形下微小诱导式欺骗的检测效果。  相似文献   
3.
Joint photographic experts group (JPEG) can provide good quality with small file size but also eliminate extensively the redundancies of images. Therefore, hiding data into JPEG images in terms of maintaining high visual quality at small file sizes has been a great challenge for researchers. In this paper, an adaptive reversible data hiding method for JPEG images containing multiple two-dimensional (2D) histograms is proposed. Adaptability is mainly reflected in three aspects. The first one is to preferentially select sharper histograms for data embedding after K histograms are established by constructing the kth (k{1,2,,K}) histogram using the kth non-zero alternating current (AC) coefficient of all the quantized discrete cosine transform blocks. On the other hand, to fully exploit the strong correlation between coefficients of one histogram, the smoothness of each coefficient is estimated by a block smoothness estimator so that a sharply-distributed 2D-histogram is constructed by combining two coefficients with similar smoothness into a pair. The pair corresponding to low complexity is selected priorly for data embedding, leading to high embedding performance while maintaining low file size. Besides, we design multiple embedding strategies to adaptively select the embedding strategy for each 2D histogram. Experimental results demonstrate that the proposed method can achieve higher rate–distortion performance which maintaining lower file storage space, compared with previous studies.  相似文献   
4.
分析了注射模生产的现状,针对其生产中智能化调控应用方面的不足,提出模内参数的自适应调节方案,还介绍了自适应工作的原理、可调参数种类、逻辑推理等,并实际验证了基于注塑设备联网集成工艺数据下注射模成型工艺自适应调节的可行性。  相似文献   
5.
Identification of feasible region of operations in multivariate processes is a problem of interest in several fields. This is particularly challenging when the process model is black-box in nature and/or is computationally expensive, as analytical solutions are not available and the number of possible model evaluations is limited. An efficient methodology is required to identify samples where the model is evaluated for developing a computationally efficient surrogate model. In this work, an artificial neural network based surrogate model is proposed which is integrated with a statistical-based approach (Jack-knifing) to estimate the variance of the surrogate model prediction. This allows implementation of an adaptive sampling approach where new samples are identified close to the feasible region boundary or in regions of high prediction uncertainty. The proposed approach performs better than a previously published kriging based method for different dimensionality case studies.  相似文献   
6.
Two adaptive discretization frameworks are tested for computerized tomography (CT) data reconstruction. Removal of inactive pixels is primary motivation. Efficient and user independent entropy optimized masking is employed for spatial filtering purposes. Density of nodes at high gradient of reconstructed physical property is used as adaptation criterion. An alternative option, independent from noisy projection data and nature of the physical properties, is also discussed. Sensitivity analysis between the uniform and nonuniform (evolved via adaptive route) reconstruction grid reveals the utility of nonuniform grids. Iterative and transform based reconstruction techniques are used. Outcomes are tested successfully on three real world projection data from two different compact CT setups and one commercial high-resolution micro-CT scanner.  相似文献   
7.
针对基于局部熵进行加密图像视觉安全性评估存在块效应的局限性,引入图像的边缘特征,通过共有边缘来衡量加密图像与原始图像的边缘相似度,消除了块效应。由于局部熵对加密等级低的图像不敏感,边缘相似度对加密等级高的图像不敏感,将两个评估方法进行自适应融合,提出[SLEES](Local Entropy and Edge Similarity,[SLEES])指标。通过改变图像像素位置和图像像素值的加密方式处理图像和视频帧进行测试,实验结果表明,[SLEES]指标相比传统评估指标有更好的鲁棒性,评估范围更广。  相似文献   
8.
5G standard uses millimeter wave band to realize communication. In order to cover more reasonable in 5G communication system, beamforming technology must be adopted. To speed up the convergence, a novel algorithm based on the SWO criterion is proposed which can be applied in millimeter wave communication. The simulation results show that compared with other beamform- ing algorithms, the proposed algorithm can achieve higher convergence speed and is more realizable.  相似文献   
9.
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings.  相似文献   
10.
卢喜东  段哲民  钱叶魁  周巍 《软件学报》2020,31(5):1454-1464
针对当前恶意代码静态分析方法精度不足的问题,将恶意代码映射为无压缩的灰度图像,然后根据图像变换方法将图像变换为恒定大小的图像,使用方向梯度直方图提取图像的特征,最后提出一种基于深度森林的恶意代码分类方法.实验中选择不同家族的多个恶意代码样本进行分类,验证了该方法的有效性,并且实验结果优于近期提出的SPAM-GIST方法.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号