首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1268篇
  免费   28篇
  国内免费   2篇
电工技术   19篇
综合类   2篇
化学工业   222篇
金属工艺   39篇
机械仪表   100篇
建筑科学   20篇
能源动力   61篇
轻工业   123篇
水利工程   2篇
石油天然气   1篇
无线电   233篇
一般工业技术   256篇
冶金工业   65篇
原子能技术   10篇
自动化技术   145篇
  2024年   18篇
  2023年   26篇
  2022年   21篇
  2021年   39篇
  2020年   36篇
  2019年   44篇
  2018年   34篇
  2017年   31篇
  2016年   40篇
  2015年   43篇
  2014年   69篇
  2013年   97篇
  2012年   81篇
  2011年   92篇
  2010年   76篇
  2009年   82篇
  2008年   67篇
  2007年   48篇
  2006年   45篇
  2005年   41篇
  2004年   35篇
  2003年   31篇
  2002年   32篇
  2001年   28篇
  2000年   15篇
  1999年   15篇
  1998年   24篇
  1997年   9篇
  1996年   16篇
  1995年   14篇
  1994年   6篇
  1993年   4篇
  1992年   4篇
  1991年   4篇
  1990年   4篇
  1989年   2篇
  1988年   5篇
  1987年   6篇
  1986年   5篇
  1985年   2篇
  1982年   1篇
  1980年   3篇
  1978年   2篇
  1974年   1篇
排序方式: 共有1298条查询结果,搜索用时 15 毫秒
1.
Damping characteristics of a musical bell plays an important role in characterizing the musical sound. The total damping consists of acoustical damping and internal damping. Acoustical damping depends upon resonating frequencies and vibration patterns while internal damping is a material property. The acoustical damping of a vibrating structure is formulated via boundary element method and finite element method using eigenmode decomposition. The design sensitivity of acoustical damping is derived using an adjoint variable method of the eigenvalue problem. Design optimization of a musical bell is then performed in terms of acoustical parameters. The goal of the optimization problem is to design a harmonically tuned bell with given acoustical damping values. The proposed automated design process integrates finite element analysis, boundary element analysis, design sensitivity analysis, mode-tracking algorithm and optimization module, seamlessly. It is demonstrated by numerical examples to show practical applications.  相似文献   
2.
Face recognition using fuzzy Integral and wavelet decomposition method   总被引:2,自引:0,他引:2  
In this paper, we develop a method for recognizing face images by combining wavelet decomposition, Fisherface method, and fuzzy integral. The proposed approach is comprised of four main stages. The first stage uses the wavelet decomposition that helps extract intrinsic features of face images. As a result of this decomposition, we obtain four subimages (namely approximation, horizontal, vertical, and diagonal detailed images). The second stage of the approach concerns the application of the Fisherface method to these four decompositions. The choice of the Fisherface method in this setting is motivated by its insensitivity to large variation in light direction, face pose, and facial expression. The two last phases are concerned with the aggregation of the individual classifiers by means of the fuzzy integral. Both Sugeno and Choquet type of fuzzy integral are considered as the aggregation method. In the experiments we use n-fold cross-validation to assure high consistency of the produced classification outcomes. The experimental results obtained for the Chungbuk National University (CNU) and Yale University face databases reveal that the approach presented in this paper yields better classification performance in comparison to the results obtained by other classifiers.  相似文献   
3.
Robust control of robot manipulator by model-based disturbance attenuation   总被引:3,自引:0,他引:3  
In this letter, a model-based disturbance attenuator (MBDA) for robot manipulators is proposed and the stability of the MBDA in robot positioning problems is proved via Liapunov's direct method. This method does not require an accurate model of a robot manipulator and takes care of disturbances or modeling errors so that the plant output remains relatively unaffected by them. The output error due to the gravity or constant disturbance can be effectively eliminated by this method.  相似文献   
4.
In this paper, we investigate the effects of the spatial fading correlation on the performance of a multiple-input multiple-output (MIMO) adaptive antenna system with optimum combining (OC) in the presence of multiple cochannel interferers over a correlated Rayleigh fading channel. Based on the Khatri's distribution functions of quadratic forms in complex Gaussian random matrices, we develop a unified determinant representation of those joint eigenvalue distributions. Taking into account the spatial correlation among the antenna elements at the transmitter or receiver, we derive the closed-form formulas for the probability density function and outage probability of the maximum output signal-to-interference ratio (SIR) in an interference-limited MIMO-OC system. Furthermore, the average output SIR and error probability are also investigated. From numerical examples, we show that a new theoretical approach gives a simple and accurate way to assess the performance of the MIMO-OC system over arbitrarily correlated fading channels  相似文献   
5.
A printed compact dipole antenna for dual ISM band (2.44 and 5 GHz) is presented. The proposed antenna fed by using a 50 /spl Omega/ coaxial line occupies a volume of 15/spl times/40/spl times/1 mm/sup 3/ (FR-4, permittivity 4.6). The impedance bandwidth for 10 dB return loss is about 400 MHz (from 2170 to 2570 MHz) at 2.4 GHz band and over 2300 MHz (from 4690 to beyond 7000 MHz) at 5 GHz band. The measured radiation gains range from 1.20 to 1.41 dBi at 2.4 GHz band and from 2.25 to 3.44 dBi at 5 GHz band, respectively.  相似文献   
6.
Real-time computer systems are often used in harsh environments, such as aerospace, and in industry. Such systems are subject to many transient faults while in operation. Checkpointing enables a reduction in the recovery time from a transient fault by saving intermediate states of a task in a reliable storage facility, and then, on detection of a fault, restoring from a previously stored state. The interval between checkpoints affects the execution time of the task. Whereas inserting more checkpoints and reducing the interval between them reduces the reprocessing time after faults, checkpoints have associated execution costs, and inserting extra checkpoints increases the overall task execution time. Thus, a trade-off between the reprocessing time and the checkpointing overhead leads to an optimal checkpoint placement strategy that optimizes certain performance measures. Real-time control systems are characterized by a timely, and correct, execution of iterative tasks within deadlines. The reliability is the probability that a system functions according to its specification over a period of time. This paper reports on the reliability of a checkpointed real-time control system, where any errors are detected at the checkpointing time. The reliability is used as a performance measure to find the optimal checkpointing strategy. For a single-task control system, the reliability equation over a mission time is derived using the Markov model. Detecting errors at the checkpointing time makes reliability jitter with the number of checkpoints. This forces the need to apply other search algorithms to find the optimal number of checkpoints. By considering the properties of the reliability jittering, a simple algorithm is provided to find the optimal checkpoints effectively. Finally, the reliability model is extended to include multiple tasks by a task allocation algorithm  相似文献   
7.
This paper presents general radix one- and two-dimensional (1-D and 2-D) constant geometry fast cosine transform algorithms and architectures suitable for VLSI, owing to their regular structures. A constant geometry algorithm is obtained by shuffling the rows and columns of each decomposed DCT matrix that corresponds to a butterfly stage. The 1-D algorithm is derived, and then, it is extended to the 2-D case. Based on the derived algorithms, the architectures with a flexible degree of parallelism are discussed  相似文献   
8.
We investigate the inherent scalability problem of ad hoc networks originated from the nature of multihop networks. First, the expected packet traffic at the center of a network is analyzed. The result shows that the expected packet traffic at the center of a network is linearly related with the network size, that is, the expected packet traffic at the center of a network is O(k), where k is the radius of a network. From the result, the upper bound of the diameter of a network D=2k, that guarantees the network is scalable, is obtained. The upper bound is given by C/r-1, where C is the channel capacity available to each node and r is the packet arrival rate at each node.  相似文献   
9.
In this letter, we propose a cognitive ultra‐wideband radio scheme which is based on a modified chirp waveform. Therefore, it requires only time domain processing in the cognitive radio systems and reduces system complexity and power consumption.  相似文献   
10.
As technology evolves into the deep submicron level, synchronous circuit designs based on a single global clock have incurred problems in such areas as timing closure and power consumption. An asynchronous circuit design methodology is one of the strong candidates to solve such problems. To verify the feasibility and efficiency of a large‐scale asynchronous circuit, we design a fully clockless 32‐bit processor. We model the processor using an asynchronous HDL and synthesize it using a tool specialized for asynchronous circuits with a top‐down design approach. In this paper, two microarchitectures, basic and enhanced, are explored. The results from a pre‐layout simulation utilizing 0.13‐μm CMOS technology show that the performance and power consumption of the enhanced microarchitecture are respectively improved by 109% and 30% with respect to the basic architecture. Furthermore, the measured power efficiency is about 238 μW/MHz and is comparable to that of a synchronous counterpart.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号