首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3709篇
  免费   275篇
  国内免费   5篇
电工技术   48篇
综合类   3篇
化学工业   1183篇
金属工艺   47篇
机械仪表   87篇
建筑科学   130篇
矿业工程   3篇
能源动力   127篇
轻工业   414篇
水利工程   18篇
无线电   331篇
一般工业技术   675篇
冶金工业   171篇
原子能技术   46篇
自动化技术   706篇
  2024年   8篇
  2023年   45篇
  2022年   254篇
  2021年   275篇
  2020年   114篇
  2019年   108篇
  2018年   132篇
  2017年   129篇
  2016年   162篇
  2015年   150篇
  2014年   154篇
  2013年   249篇
  2012年   240篇
  2011年   281篇
  2010年   208篇
  2009年   202篇
  2008年   176篇
  2007年   147篇
  2006年   144篇
  2005年   108篇
  2004年   96篇
  2003年   72篇
  2002年   57篇
  2001年   45篇
  2000年   32篇
  1999年   38篇
  1998年   57篇
  1997年   47篇
  1996年   41篇
  1995年   21篇
  1994年   27篇
  1993年   18篇
  1992年   10篇
  1991年   6篇
  1989年   11篇
  1988年   3篇
  1987年   5篇
  1986年   7篇
  1985年   14篇
  1984年   9篇
  1983年   18篇
  1982年   9篇
  1981年   9篇
  1980年   14篇
  1979年   7篇
  1978年   4篇
  1977年   10篇
  1976年   4篇
  1975年   3篇
  1973年   4篇
排序方式: 共有3989条查询结果,搜索用时 22 毫秒
81.
Nano Research - The engineering of self-organized plasmonic metasurfaces is demonstrated using a maskless technique with defocused ion-beam sputtering and kinetically controlled deposition. The...  相似文献   
82.
83.
Third generation of mobile systems is now entering the operational phase; European Community ACTS (RACE follow-on) programme just aims at finalizing the plenty of solutions resulting from the European Community RACE programme as well as from several other studies and researches. European manufactures, also deeply involved in the ACTS programme, seem to show a preference for solutions which gradually upgrade the present pan-European GSM successful standard. The underlying concept is the one of asmooth migration from the GSM network to the third generation system, in order to reuse, at least in the first phases of the transition, most of the existing technologies and infrastructures already implemented for the GSM network. In this respect, this paper, by referring to radio interface aspects, proposes a two step evolution: in the first step, a Dynamic Channel Allocation (DCA) strategy with distributed control should be implemented for coping with the high variance of traffic entailed by the reduction of cell dimensions; in the second step, a gradual upgrading of the GSM Base Stations should allow a smooth transition towards the third generation Packet Reservation Multiple Access (PRMA) technique and the provision of broadband services. The paper is partly based upon the work performed by the author in the framework of the RACE project Satellite Integration in the Future Mobile Network (SAINT) and of the European Community ACTS Projects MEDIAN. The opinions herewith reported are not necessarily those of the European Community.  相似文献   
84.
Calculations are presented, based on a Density Functional approach, of the first excited states (l=1) of alkali metal atoms (Cs and Na) in liquid 4He. We find large departures from the spherical bubble in the liquid4He structure when the alkali atom is excited. The shifts from the free atom values of the excitation and emission transition lines are calculated and compared with the experimental results. According to our calculations, the so far unseen radiative deexcitation transition for light alkalis in4He may lie in an unexplored infrared region of the spectrum.  相似文献   
85.
In this paper we deal with some finite-time control problems for discrete-time, time-varying linear systems. First we provide necessary and sufficient conditions for finite-time stability; these conditions require either the computation of the state transition matrix of the system or the solution of a certain difference Lyapunov inequality. Then we address the design problem. The proposed conditions allow us to find output feedback controllers which stabilize the closed loop system in the finite-time sense; all these conditions can be expressed in terms of LMIs and therefore are numerically tractable, as shown in the example included in the paper.  相似文献   
86.
Nodes of wireless sensor networks (WSNs) are typically powered by batteries with a limited capacity. Thus, energy is a primary constraint in the design and deployment of WSNs. Since radio communication is in general the main cause of power consumption, the different techniques proposed in the literature to improve energy efficiency have mainly focused on limiting transmission/reception of data, for instance, by adopting data compression and/or aggregation. The limited resources available in a sensor node demand, however, the development of specifically designed algorithms. To this aim, we propose an approach to perform lossy compression on single node based on a differential pulse code modulation scheme with quantization of the differences between consecutive samples. Since different combinations of the quantization process parameters determine different trade-offs between compression performance and information loss, we exploit a multi-objective evolutionary algorithm to generate a set of combinations of these parameters corresponding to different optimal trade-offs. The user can therefore choose the combination with the most suitable trade-off for the specific application. We tested our lossy compression approach on three datasets collected by real WSNs. We show that our approach can achieve significant compression ratios despite negligible reconstruction errors. Further, we discuss how our approach outperforms LTC, a lossy compression algorithm purposely designed to be embedded in sensor nodes, in terms of compression rate and complexity.  相似文献   
87.
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. Thanks to its simplicity the concept of k-anonymity, introduced by Samarati and Sweeney [1], established itself as one fundamental principle for privacy preserving data publishing. According to the k-anonymity principle, each release of data must be such that each individual is indistinguishable from at least k−1 other individuals.  相似文献   
88.
89.
The JPEG algorithm is one of the most used tools for compressing images. The main factor affecting the performance of the JPEG compression is the quantization process, which exploits the values contained in two tables, called quantization tables. The compression ratio and the quality of the decoded images are determined by these values. Thus, the correct choice of the quantization tables is crucial to the performance of the JPEG algorithm. In this paper, a two-objective evolutionary algorithm is applied to generate a family of optimal quantization tables which produce different trade-offs between image compression and quality. Compression is measured in terms of difference in percentage between the sizes of the original and compressed images, whereas quality is computed as mean squared error between the reconstructed and the original images. We discuss the application of the proposed approach to well-known benchmark images and show how the quantization tables determined by our method improve the performance of the JPEG algorithm with respect to the default tables suggested in Annex K of the JPEG standard.  相似文献   
90.
Some applications require autonomous robots to search an initially unknown environment for static targets, without any a priori information about environment structure and target locations. Targets can be human victims in search and rescue or materials in foraging. In these scenarios, the environment is incrementally discovered by the robots exploiting exploration strategies to move around in an autonomous and effective way. Most of the strategies proposed in literature are based on the idea of evaluating a number of candidate locations on the frontier between the known and the unknown portions of the environment according to ad hoc utility functions that combine different criteria. In this paper, we show some of the advantages of using a more theoretically-grounded approach, based on Multi-Criteria Decision Making (MCDM), to define exploration strategies for robots employed in search and rescue applications. We implemented some MCDM-based exploration strategies within an existing robot controller and we evaluated their performance in a simulated environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号