首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   47790篇
  免费   4471篇
  国内免费   2238篇
电工技术   2982篇
技术理论   3篇
综合类   2780篇
化学工业   8195篇
金属工艺   2878篇
机械仪表   3257篇
建筑科学   3397篇
矿业工程   1368篇
能源动力   1394篇
轻工业   3097篇
水利工程   742篇
石油天然气   2694篇
武器工业   414篇
无线电   5746篇
一般工业技术   6377篇
冶金工业   2589篇
原子能技术   529篇
自动化技术   6057篇
  2024年   281篇
  2023年   975篇
  2022年   1705篇
  2021年   2422篇
  2020年   1738篇
  2019年   1596篇
  2018年   1676篇
  2017年   1705篇
  2016年   1611篇
  2015年   2108篇
  2014年   2516篇
  2013年   2936篇
  2012年   3029篇
  2011年   3440篇
  2010年   2697篇
  2009年   2636篇
  2008年   2647篇
  2007年   2335篇
  2006年   2432篇
  2005年   1966篇
  2004年   1413篇
  2003年   1269篇
  2002年   1196篇
  2001年   1046篇
  2000年   1002篇
  1999年   1070篇
  1998年   896篇
  1997年   772篇
  1996年   670篇
  1995年   565篇
  1994年   441篇
  1993年   308篇
  1992年   251篇
  1991年   216篇
  1990年   180篇
  1989年   170篇
  1988年   107篇
  1987年   93篇
  1986年   59篇
  1985年   53篇
  1984年   38篇
  1983年   39篇
  1982年   30篇
  1981年   23篇
  1980年   26篇
  1979年   19篇
  1978年   15篇
  1976年   18篇
  1975年   10篇
  1973年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
171.
Localized multiple kernel learning (LMKL) is an attractive strategy for combining multiple heterogeneous features in terms of their discriminative power for each individual sample. However, models excessively fitting to a specific sample would obstacle the extension to unseen data, while a more general form is often insufficient for diverse locality characterization. Hence, both learning sample-specific local models for each training datum and extending the learned models to unseen test data should be equally addressed in designing LMKL algorithm. In this paper, for an integrative solution, we propose a probability confidence kernel (PCK), which measures per-sample similarity with respect to probabilistic-prediction-based class attribute: The class attribute similarity complements the spatial-similarity-based base kernels for more reasonable locality characterization, and the predefined form of involved class probability density function facilitates the extension to the whole input space and ensures its statistical meaning. Incorporating PCK into support-vectormachine-based LMKL framework, we propose a new PCK-LMKL with arbitrary l(p)-norm constraint implied in the definition of PCKs, where both the parameters in PCK and the final classifier can be efficiently optimized in a joint manner. Evaluations of PCK-LMKL on both benchmark machine learning data sets (ten University of California Irvine (UCI) data sets) and challenging computer vision data sets (15-scene data set and Caltech-101 data set) have shown to achieve state-of-the-art performances.  相似文献   
172.
In this paper, we study the problem of detecting sudden pedestrian crossings to assist drivers in avoiding accidents. This application has two major requirements: to detect crossing pedestrians as early as possible just as they enter the view of the car-mounted camera and to maintain a false alarm rate as low as possible for practical purposes. Although many current sliding-window-based approaches using various features and classification algorithms have been proposed for image-/video-based pedestrian detection, their performance in terms of accuracy and processing speed falls far short of practical application requirements. To address this problem, we propose a three-level coarse-to-fine video-based framework that detects partially visible pedestrians just as they enter the camera view, with low false alarm rate and high speed. The framework is tested on a new collection of high-resolution videos captured from a moving vehicle and yields a performance better than that of state-of-the-art pedestrian detection while running at a frame rate of 55 fps.  相似文献   
173.
A set of elementary siphons plays a key role in the development of deadlock prevention policies for automated manufacturing systems. This paper addresses the computation problem for elementary siphons in a subclass of Petri nets which are basic systems of simple sequential processes with resources (BS3PR) and can model many automated manufacturing systems. An algorithm for enumerating elementary siphons is established by the one‐to‐one relationship between maximal perfect resource‐transition circuits (MPCs) and strict minimal siphons. A set of MPCs is first computed, followed by a set of elementary siphons in a BS3PR. The presented algorithm is proved to have polynomial‐time complexity. An example is used to illustrate the algorithm.  相似文献   
174.
An intelligent control for a stand‐alone doubly‐fed induction generator (DFIG) system using a proportional‐integral‐derivative neural network (PIDNN) is proposed in this study. This system can be applied as a stand‐alone power supply system or as the emergency power system when the electricity grid fails for all sub‐synchronous, synchronous, and super‐synchronous conditions. The rotor side converter is controlled using field‐oriented control to produce 3‐phase stator voltages with constant magnitude and frequency at different rotor speeds. Moreover, the grid side converter, which is also controlled using field‐oriented control, is primarily implemented to maintain the magnitude of the DC‐link voltage. Furthermore, the intelligent PIDNN controller is proposed for both the rotor and grid side converters to improve the transient and steady‐state responses of the DFIG system for different operating conditions. Both the network structure and online learning algorithm are introduced in detail. Finally, the feasibility of the proposed control scheme is verified through experimentation. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
175.
Pattern recognition techniques have been widely used in a variety of scientific disciplines including computer vision, artificial intelligence, biology, and so forth. Although many methods present satisfactory performances, they still have several weak points, thus leaving a lot of space for further improvements. In this paper, we propose two performance-driven subspace learning methods by extending the principal component analysis (PCA) and the kernel PCA (KPCA). Both methods adopt a common structure where genetic algorithms are employed to pursue optimal subspaces. Because the proposed feature extractors aim at achieving high classification accuracy, enhanced generalization ability can be expected. Extensive experiments are designed to evaluate the effectiveness of the proposed algorithms in real-world problems including object recognition and a number of machine learning tasks. Comparative studies with other state-of-the-art techniques show that the methods in this paper are capable of enhancing generalization ability for pattern recognition systems.  相似文献   
176.
Economic contribution rate of education (ECRE) is the key factor of education economics. This article selected China, South Korea, United States and other countries for a total of 15 samples, and put the data of the same period under the framework of soft computing, to simulate the production chain of “education–potential human capital–actual human capital–economic growth”. The basic idea is: Firstly, 15 countries are softly categorized according to the level of science and technology (S&T) progress. Secondly, potential human capital and actual human capital establish the internal correlation (fuzzy mapping) in the same classification, and we conceptualize actual human capital as one production factor, joined with the other two production factors, fixed asset and land, to set up the fuzzy mapping to economic growth., and then calculate economic contribution rate of education of China and foreign by two fuzzy mapping of them. Thirdly, this paper analyzes the present state and differences in the development of education between China and foreign according to different ECRE, and offers proposals for promoting the education in China.  相似文献   
177.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
178.
The equilibrium Ca3P2(s) = 3[Ca] + 2[P] was studied at 1600 ° by equilibrating liquid iron, saturated with Ca3P2, and contained in a TiN crucible, with Ca vapor. The source of Ca was liquid Ca contained in an Mo crucible, and the vapor pressure of Ca was varied by varying the position of the Mo crucible in the temperature gradient of a vertical tube furnace. A least-squares analysis of the data gave and. The simultaneous equilibria CaO(s) = [Ca] + [O] and CaS(s) = [Ca] + [S] were studied at 1600 ° by equilibrating liquid iron, contained in a pressed and sintered CaO-CaS crucible with Ca vapor. The advantage of this technique is that two equilibrium constants,K cas andK cao, and two interaction coefficients, and can be determined from one set of experiments. It was determined that, at 1600 °,K cas = 5.9 × 10−8 K cao = 5.5 × 10−9,, and. Formerly Graduate Students  相似文献   
179.
Simulation of stainless-steel weld metals was performed using a Gleeble-1500 thermomechanical simulator. Two classes of materials were investigated, including both fully austenitic and austenitic-ferritic stainless steels. The niobium content varied within each class. The simulation comprised heating to melting point, melting for a short time, and cooling to a number of temperatures, at which point the samples were fractured under a tensile load. The hot ductility, in terms of reduction of area, was measured. Metallographic examinations were performed using both optical and electron microscopy. The hot ductilities of the austenitic-ferritic weld metals investigated were superior to those of fully austenitic weld metals of corresponding niobium content. The beneficial effects of ferrite were found to decrease with increasing niobium content. The effect of niobium on hot ductility was detrimental, i.e. an increase in niobium content resulted in a decrease in hot ductility which was attributed to the formation of (FeCrNi)2Nb-, a low melting eutectic, along the austenitic grain boundaries. The criterion of hot ductility by simulation of the weld metals was also found to be reliable for evaluating susceptibility to solidification cracking.  相似文献   
180.
红外弱小目标的匹配方法研究与仿真   总被引:1,自引:0,他引:1  
徐寒  夏森  徐健健 《计算机仿真》2012,29(2):233-236,256
研究红外图像中的目标匹配问题。针对传统的红外图像中目标匹配效果不理想,匹配不准确。当红外图像中是弱小目标时,背景灰度值与目标灰度值非常相近,灰度直方图均衡化无法实现目标与背景的完整分离,导致漏匹配率较高的问题。为提高目标的匹配精度,提出一种形态学预处理的红外目标匹配方法,通过形态学算法提取出图像中的形状信息,利用形状信息将红外图像中的目标与背景完整分离,避免了只依靠灰度图像信息造成的不能完整分离目标与背景带来的漏匹配问题。进行仿真的结果证明,采用的形态学与处理的匹配方法能够完整将目标与背景分离,成功完成目标匹配,取得了满意的结果。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号