首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   44281篇
  免费   3925篇
  国内免费   2017篇
电工技术   2485篇
技术理论   2篇
综合类   2505篇
化学工业   7706篇
金属工艺   2611篇
机械仪表   2935篇
建筑科学   3036篇
矿业工程   1304篇
能源动力   1276篇
轻工业   2874篇
水利工程   647篇
石油天然气   2484篇
武器工业   339篇
无线电   5402篇
一般工业技术   5984篇
冶金工业   2478篇
原子能技术   498篇
自动化技术   5657篇
  2024年   247篇
  2023年   877篇
  2022年   1519篇
  2021年   2178篇
  2020年   1583篇
  2019年   1464篇
  2018年   1518篇
  2017年   1553篇
  2016年   1453篇
  2015年   1903篇
  2014年   2262篇
  2013年   2699篇
  2012年   2787篇
  2011年   3162篇
  2010年   2482篇
  2009年   2450篇
  2008年   2463篇
  2007年   2187篇
  2006年   2297篇
  2005年   1837篇
  2004年   1335篇
  2003年   1200篇
  2002年   1126篇
  2001年   983篇
  2000年   948篇
  1999年   1000篇
  1998年   836篇
  1997年   713篇
  1996年   631篇
  1995年   527篇
  1994年   409篇
  1993年   277篇
  1992年   228篇
  1991年   205篇
  1990年   169篇
  1989年   155篇
  1988年   101篇
  1987年   88篇
  1986年   57篇
  1985年   51篇
  1984年   37篇
  1983年   37篇
  1982年   29篇
  1981年   23篇
  1980年   26篇
  1979年   17篇
  1978年   15篇
  1976年   18篇
  1975年   10篇
  1973年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
In this article, the influence of base resistance on extracting thermal resistance for SiGe heterojunction bipolar transistors is studied and an improved approach for determining the junction temperature and thermal resistance is presented. The proposed method for extracting thermal resistance is based on the temperature sensitivity of the base–emitter (B–E) voltage when the device is biased with a fixed emitter current density. This approach not only takes into account the self‐heating during the different ambient temperature measurement but also revises the empirical equation of B–E voltage due to the influence of base resistance during the power dissipation increment measurement. Results are obtained for devices with different emitter lengths and fingers. Compared with the conventional method, the thermal resistance is about up to 15% improvement for the device with 0.3 × 1.9 μm2 emitter area and 13.8% for the device with 0.3 × 13.9 μm2 emitter area. The accurate thermal resistance implemented in HICUM model has resulted in better fit for transistor output characteristics. © 2012 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2012.  相似文献   
72.
Localized multiple kernel learning (LMKL) is an attractive strategy for combining multiple heterogeneous features in terms of their discriminative power for each individual sample. However, models excessively fitting to a specific sample would obstacle the extension to unseen data, while a more general form is often insufficient for diverse locality characterization. Hence, both learning sample-specific local models for each training datum and extending the learned models to unseen test data should be equally addressed in designing LMKL algorithm. In this paper, for an integrative solution, we propose a probability confidence kernel (PCK), which measures per-sample similarity with respect to probabilistic-prediction-based class attribute: The class attribute similarity complements the spatial-similarity-based base kernels for more reasonable locality characterization, and the predefined form of involved class probability density function facilitates the extension to the whole input space and ensures its statistical meaning. Incorporating PCK into support-vectormachine-based LMKL framework, we propose a new PCK-LMKL with arbitrary l(p)-norm constraint implied in the definition of PCKs, where both the parameters in PCK and the final classifier can be efficiently optimized in a joint manner. Evaluations of PCK-LMKL on both benchmark machine learning data sets (ten University of California Irvine (UCI) data sets) and challenging computer vision data sets (15-scene data set and Caltech-101 data set) have shown to achieve state-of-the-art performances.  相似文献   
73.
In this paper, we study the problem of detecting sudden pedestrian crossings to assist drivers in avoiding accidents. This application has two major requirements: to detect crossing pedestrians as early as possible just as they enter the view of the car-mounted camera and to maintain a false alarm rate as low as possible for practical purposes. Although many current sliding-window-based approaches using various features and classification algorithms have been proposed for image-/video-based pedestrian detection, their performance in terms of accuracy and processing speed falls far short of practical application requirements. To address this problem, we propose a three-level coarse-to-fine video-based framework that detects partially visible pedestrians just as they enter the camera view, with low false alarm rate and high speed. The framework is tested on a new collection of high-resolution videos captured from a moving vehicle and yields a performance better than that of state-of-the-art pedestrian detection while running at a frame rate of 55 fps.  相似文献   
74.
A set of elementary siphons plays a key role in the development of deadlock prevention policies for automated manufacturing systems. This paper addresses the computation problem for elementary siphons in a subclass of Petri nets which are basic systems of simple sequential processes with resources (BS3PR) and can model many automated manufacturing systems. An algorithm for enumerating elementary siphons is established by the one‐to‐one relationship between maximal perfect resource‐transition circuits (MPCs) and strict minimal siphons. A set of MPCs is first computed, followed by a set of elementary siphons in a BS3PR. The presented algorithm is proved to have polynomial‐time complexity. An example is used to illustrate the algorithm.  相似文献   
75.
An intelligent control for a stand‐alone doubly‐fed induction generator (DFIG) system using a proportional‐integral‐derivative neural network (PIDNN) is proposed in this study. This system can be applied as a stand‐alone power supply system or as the emergency power system when the electricity grid fails for all sub‐synchronous, synchronous, and super‐synchronous conditions. The rotor side converter is controlled using field‐oriented control to produce 3‐phase stator voltages with constant magnitude and frequency at different rotor speeds. Moreover, the grid side converter, which is also controlled using field‐oriented control, is primarily implemented to maintain the magnitude of the DC‐link voltage. Furthermore, the intelligent PIDNN controller is proposed for both the rotor and grid side converters to improve the transient and steady‐state responses of the DFIG system for different operating conditions. Both the network structure and online learning algorithm are introduced in detail. Finally, the feasibility of the proposed control scheme is verified through experimentation. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
76.
Pattern recognition techniques have been widely used in a variety of scientific disciplines including computer vision, artificial intelligence, biology, and so forth. Although many methods present satisfactory performances, they still have several weak points, thus leaving a lot of space for further improvements. In this paper, we propose two performance-driven subspace learning methods by extending the principal component analysis (PCA) and the kernel PCA (KPCA). Both methods adopt a common structure where genetic algorithms are employed to pursue optimal subspaces. Because the proposed feature extractors aim at achieving high classification accuracy, enhanced generalization ability can be expected. Extensive experiments are designed to evaluate the effectiveness of the proposed algorithms in real-world problems including object recognition and a number of machine learning tasks. Comparative studies with other state-of-the-art techniques show that the methods in this paper are capable of enhancing generalization ability for pattern recognition systems.  相似文献   
77.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
78.
The equilibrium Ca3P2(s) = 3[Ca] + 2[P] was studied at 1600 ° by equilibrating liquid iron, saturated with Ca3P2, and contained in a TiN crucible, with Ca vapor. The source of Ca was liquid Ca contained in an Mo crucible, and the vapor pressure of Ca was varied by varying the position of the Mo crucible in the temperature gradient of a vertical tube furnace. A least-squares analysis of the data gave and. The simultaneous equilibria CaO(s) = [Ca] + [O] and CaS(s) = [Ca] + [S] were studied at 1600 ° by equilibrating liquid iron, contained in a pressed and sintered CaO-CaS crucible with Ca vapor. The advantage of this technique is that two equilibrium constants,K cas andK cao, and two interaction coefficients, and can be determined from one set of experiments. It was determined that, at 1600 °,K cas = 5.9 × 10−8 K cao = 5.5 × 10−9,, and. Formerly Graduate Students  相似文献   
79.
红外弱小目标的匹配方法研究与仿真   总被引:1,自引:0,他引:1  
徐寒  夏森  徐健健 《计算机仿真》2012,29(2):233-236,256
研究红外图像中的目标匹配问题。针对传统的红外图像中目标匹配效果不理想,匹配不准确。当红外图像中是弱小目标时,背景灰度值与目标灰度值非常相近,灰度直方图均衡化无法实现目标与背景的完整分离,导致漏匹配率较高的问题。为提高目标的匹配精度,提出一种形态学预处理的红外目标匹配方法,通过形态学算法提取出图像中的形状信息,利用形状信息将红外图像中的目标与背景完整分离,避免了只依靠灰度图像信息造成的不能完整分离目标与背景带来的漏匹配问题。进行仿真的结果证明,采用的形态学与处理的匹配方法能够完整将目标与背景分离,成功完成目标匹配,取得了满意的结果。  相似文献   
80.
信息安全防范是进行全面的安全漏洞检测和分析,依据其结果制定防范措施和解决方案;正确配置防火墙、网络防病毒软件、入侵检测系统、建立安全认证系统等安全系统;完善安全管理规范和机制,切实落实安全管理制度。以增强安全防范意识,确保网络信息系统安全运转。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号