首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9463篇
  免费   452篇
  国内免费   71篇
电工技术   255篇
综合类   31篇
化学工业   2044篇
金属工艺   205篇
机械仪表   241篇
建筑科学   317篇
矿业工程   12篇
能源动力   617篇
轻工业   997篇
水利工程   123篇
石油天然气   208篇
武器工业   6篇
无线电   1125篇
一般工业技术   1644篇
冶金工业   561篇
原子能技术   82篇
自动化技术   1518篇
  2024年   18篇
  2023年   206篇
  2022年   493篇
  2021年   639篇
  2020年   481篇
  2019年   484篇
  2018年   612篇
  2017年   438篇
  2016年   502篇
  2015年   301篇
  2014年   456篇
  2013年   755篇
  2012年   518篇
  2011年   541篇
  2010年   365篇
  2009年   307篇
  2008年   270篇
  2007年   250篇
  2006年   207篇
  2005年   180篇
  2004年   144篇
  2003年   111篇
  2002年   128篇
  2001年   72篇
  2000年   79篇
  1999年   94篇
  1998年   164篇
  1997年   133篇
  1996年   83篇
  1995年   97篇
  1994年   62篇
  1993年   60篇
  1992年   46篇
  1991年   29篇
  1990年   33篇
  1989年   55篇
  1988年   54篇
  1987年   32篇
  1986年   34篇
  1985年   53篇
  1984年   51篇
  1983年   43篇
  1982年   32篇
  1981年   25篇
  1980年   33篇
  1979年   23篇
  1978年   20篇
  1977年   23篇
  1976年   34篇
  1973年   18篇
排序方式: 共有9986条查询结果,搜索用时 15 毫秒
121.
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University.  相似文献   
122.
Wide band mesh or star oriented networks have recently become a subject of greater interest. Providing wideband multimedia access for a variety of applications has led to the inception of mesh networks. Classic access techniques such as FDMA and TDMA have been the norm for such networks. CDMA maximum transmitter power is much less than TDMA and FDMA counter parts, which is an important asset for mobile operation. In this paper we introduce a code division multiple access/time division duplex technique CDMA/TDD for such networks. The CDMA approach is an almost play and plug technology for wireless access, making it amenable for implementation by the mesh network service station, SS. Further it inherently allows mesh network service stations to use a combination of turbo coding and dynamic parallel orthogonal transmission to improve network efficiency. We outline briefly the new transmitter and receiver structures then evaluate the efficiency, delay and delay jitter. By analysis we show the advantages over classic counter parts with respect to the total network efficiency achievable especially for larger number of hops.  相似文献   
123.
124.
In this paper, we develop an interactive analysis and visualization tool for probabilistic segmentation results in medical imaging. We provide a systematic approach to analyze, interact and highlight regions of segmentation uncertainty. We introduce a set of visual analysis widgets integrating different approaches to analyze multivariate probabilistic field data with direct volume rendering. We demonstrate the user's ability to identify suspicious regions (e.g. tumors) and correct the misclassification results using a novel uncertainty‐based segmentation editing technique. We evaluate our system and demonstrate its usefulness in the context of static and time‐varying medical imaging datasets.  相似文献   
125.
Context:How can quality of software systems be predicted before deployment? In attempting to answer this question, prediction models are advocated in several studies. The performance of such models drops dramatically, with very low accuracy, when they are used in new software development environments or in new circumstances.ObjectiveThe main objective of this work is to circumvent the model generalizability problem. We propose a new approach that substitutes traditional ways of building prediction models which use historical data and machine learning techniques.MethodIn this paper, existing models are decision trees built to predict module fault-proneness within the NASA Critical Mission Software. A genetic algorithm is developed to combine and adapt expertise extracted from existing models in order to derive a “composite” model that performs accurately in a given context of software development. Experimental evaluation of the approach is carried out in three different software development circumstances.ResultsThe results show that derived prediction models work more accurately not only for a particular state of a software organization but also for evolving and modified ones.ConclusionOur approach is considered suitable for software data nature and at the same time superior to model selection and data combination approaches. It is then concluded that learning from existing software models (i.e., software expertise) has two immediate advantages; circumventing model generalizability and alleviating the lack of data in software-engineering.  相似文献   
126.
This paper presents a hybrid technique for the classification of the magnetic resonance images (MRI). The proposed hybrid technique consists of three stages, namely, feature extraction, dimensionality reduction, and classification. In the first stage, we have obtained the features related to MRI images using discrete wavelet transformation (DWT). In the second stage, the features of magnetic resonance images have been reduced, using principal component analysis (PCA), to the more essential features. In the classification stage, two classifiers have been developed. The first classifier based on feed forward back-propagation artificial neural network (FP-ANN) and the second classifier is based on k-nearest neighbor (k-NN). The classifiers have been used to classify subjects as normal or abnormal MRI human images. A classification with a success of 97% and 98% has been obtained by FP-ANN and k-NN, respectively. This result shows that the proposed technique is robust and effective compared with other recent work.  相似文献   
127.
This paper presents a novel compensation method for the coupled fuselage-rotor mode of a Rotary wing Unmanned Aerial Vehicle (RUAV). The presence of stabilizer bar limits the performance of attitude control of an RUAV. In this paper, a Positive Position Feedback (PPF) is introduced to increase the stability margins and allow higher control bandwidth. The identified model is used to design a PPF controller to mitigate the presence of stabilizer bar. Parameters for the linear RUAV model are obtained by performing linear system identification about a few selected points. This identification process gives complete RUAV dynamics and is suitable for designing a Stability Augmentation System (SAS) of an RUAV. The identified parameters of an RUAV model are verified using experimental flight data and can be used to obtain the nonlinear model of an RUAV. The performance of the proposed algorithm is tested using a high-fidelity RUAV simulation model, which is validated through experimental flight data. The closed-loop response of the rotorcraft indicates that the desired attitude performance is achieved while ensuring that the coupled fuselage-rotor mode is effectively compensated without penalizing the phase response.  相似文献   
128.
This paper presents a method for multi-scale segmentation of surface data using scale-adaptive region growing. The proposed segmentation algorithm is initiated by an unsupervised learning of optimal seed positions through the surface attribute clustering with a two-criterion score function. The seeds are selected as consecutive local maxima of the clustering map, which is computed by an aggregation of the local isotropic contrast and local variance maps. The proposed method avoids typical segmentation errors caused by an inappropriate choice of seed points and thresholds used in the region-growing algorithm. The scale-adaptive threshold estimate is based on the image local statistics in the neighborhoods of seed points. The performance of this method was evaluated on LiDAR surface images.  相似文献   
129.
Perimeter discovery in wireless sensor networks   总被引:1,自引:0,他引:1  
In this paper, we focus on the perimeter detection problem using wireless sensor networks, as perimeter detection has a wide range of uses in several areas. We present a decentralized localized algorithm where sensor nodes determine if they are located along the perimeter of a wireless sensor network. Our proposed algorithm uses the location neighborhood information in conjunction with the Barycentric technique to determine if the sensor node enclosed by neighboring nodes, and consequently, if it is located within the interior of the wireless sensor network. We define performance metrics to analyze the performance of our approach and the simulation shows that the algorithm gives fairly accurate results.  相似文献   
130.
A quantum logic is one of possible mathematical models for non-compatible random events. In this paper, we introduce and study functions called QL-copula and QL-co-copula on a quantum logic and we compare them with the classical definition of copula and co-copula, respectively. Finally, we show several examples of these functions by means of an s-map.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号