首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12856篇
  免费   685篇
  国内免费   42篇
电工技术   172篇
综合类   15篇
化学工业   2693篇
金属工艺   454篇
机械仪表   946篇
建筑科学   231篇
矿业工程   3篇
能源动力   438篇
轻工业   1105篇
水利工程   83篇
石油天然气   13篇
无线电   2352篇
一般工业技术   2756篇
冶金工业   707篇
原子能技术   168篇
自动化技术   1447篇
  2024年   13篇
  2023年   163篇
  2022年   231篇
  2021年   441篇
  2020年   283篇
  2019年   327篇
  2018年   368篇
  2017年   420篇
  2016年   457篇
  2015年   379篇
  2014年   556篇
  2013年   831篇
  2012年   838篇
  2011年   1021篇
  2010年   740篇
  2009年   785篇
  2008年   723篇
  2007年   573篇
  2006年   497篇
  2005年   449篇
  2004年   413篇
  2003年   370篇
  2002年   386篇
  2001年   295篇
  2000年   262篇
  1999年   244篇
  1998年   363篇
  1997年   237篇
  1996年   180篇
  1995年   124篇
  1994年   111篇
  1993年   91篇
  1992年   65篇
  1991年   56篇
  1990年   50篇
  1989年   57篇
  1988年   30篇
  1987年   39篇
  1986年   18篇
  1985年   30篇
  1984年   16篇
  1983年   7篇
  1982年   8篇
  1981年   10篇
  1980年   3篇
  1979年   2篇
  1978年   4篇
  1977年   3篇
  1976年   5篇
  1973年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
The present study has been undertaken to better understand the solidification behavior of Al−Si−Fe alloys containing 7wt.% Si and 0.9wt.% Fe, with particular regard to the formation of phase during controlled solidification and influence of growth rates on intermetallic phase selection. The alloys studied were Al-7Si-0.9Fe alloys, which were produced by a modified Bridgman solidification arrangement. These alloys were solidified unidirectionally with different growth rates (1–30mm/min). The solidified microstructure of these alloys consists of the growth of primary aluminum and multiple second phase reactions.  相似文献   
22.

Visual tracking is one of the most important problems considered in computer vision. To improve the performance of the visual tracking, a part-based approach will be a good solution. In this paper, a novel method of visual tracking algorithm named part-based mean-shift (PBMS) algorithm is presented. In the proposed PBMS, unlike the standard mean-shift (MS), the target object is divided into multiple parts and the target is tracked by tracking each individual part and combining the results. For the part-based visual tracking, the objective function in the MS is modified such that the target object is represented as a combination of the parts and iterative optimization solution is presented. Further, the proposed PBMS provides a systematic and analytic way to determine the scale of the bounding box for the target from the perspective of the objective function optimization. Simulation is conducted with several benchmark problems and the result shows that the proposed PBMS outperforms the standard MS.

  相似文献   
23.
A noteworthy thing in desktop PCs is that they can provide a great opportunity to increase the performance of processing multimedia data by exploiting task- and data-parallelism with multi-core CPU and many-core GPU. This paper presents a high performance parallel implementation of 2D DCT on this heterogeneous computing environment. For this purpose, Intel TBB (threading building blocks) and OpenCL (Open Compute Language) are utilized for task- and data-parallelism, respectively. The simulation result shows that the parallel DCT implementations far the serial ones in processing speed. Especially, OpenCL implementation shows a linear speedup, a typical SIMD characteristic as the increase of 2D data sets.  相似文献   
24.
Registration of range scans is commonly required in many localization and mapping algorithms. In this paper, we introduce a novel approach called Polar-Cartesian Hybrid Transforms for pair-wise registration of range scans. The proposed algorithm iteratively establishes correspondences by searching the points with closest polar angles in the polar coordinate frame. An angular look-up table is constructed based on the properties of the laser range finder to accelerate the searching procedure. In order to speed up the convergence, we compute the difference of polar range of every matched point pair to select the most contributing correspondences. After the correspondences are determined, the transformation is computed in Cartesian coordinate frame using a point-to-line metric. Combining the advantages of the polar and Cartesian coordinate frames, both robustness and efficiency are greatly improved compared with an up-to-date ICP algorithm.  相似文献   
25.
Protons in aqueous electrolytes can perform as an additional type of charge carrier for insertion/extraction in addition to the primary carrier cations in aqueous rechargeable batteries. Despite many diverse claims regarding the effect of protons, mutually conflicting experimental results and their interpretations without direct evidence have been reported over the last decade. Systematic examinations and analyses are thus imperative to clarify the conditions of proton insertion in aqueous rechargeable batteries. Utilizing V2O5 as a model cathode and beaker-type cells with a sufficient amount of ZnSO4 aqueous electrolytes in this work, it is demonstrated that protons are inserted into the cathode prior to Zn-ions in low-pH conditions (pH ≤ 3.0). In stark contrast, the influence of protons on the discharge voltage and capacity is insignificant, when either the pH becomes higher (pH ≥ 4.0) or the electrolyte volume is considerably low in coin-type cells. Similar behavior of pH-dependent proton insertion is also verified in Na–, Mg–, and Al-ion electrolytes. Providing a resolution to the controversy regarding proton insertion, the present study emphasizes that the influence of protons substantially varies depending on the pH and relative volume of electrolytes in aqueous batteries.  相似文献   
26.
The texture of two depleted uranium (DU) samples, labelled DUWR and DUWR2, were studied by neutron diffraction. DUWR was prepared by warm rolling of a cast ingot, and DUWR2 was prepared by adding 20% tensile strain to the warm-rolled DUWR. Complete three-dimensional orientation distribution functions were determined using four neutron pole figures for the DUWR, and using six neutron pole figures for the DUWR2 sample, by the WIMV method of the program popLA. The textures of the two samples were essentially identical to each other. They could be described by a twisted helical density tube spiralling continuously along the -axis of the Euler space. The projection of the backbone of the density tube along the -axis cast a linear shadow running parallel to the diagonal of the - plane, which could be defined by a =+90° (and =+270°) relation. The helical tube was confined within narrow -angle limits, from 14° to 30° with the peak orientation at (103) 0 10. The diffraction patterns of the DUWR2 sample were measured from the normal direction to the rolling surface of the sample, up to the scattering angle of 108° using a 0.15 nm neutron beam. The Rietveld profile refinement using the textured diffraction pattern was quite satisfactory when the texture effect to the entire diffraction profile was corrected for by the corresponding pole density from the inverse pole figure.  相似文献   
27.
The odometry information used in mobile robot localization can contain a significant number of errors when robot experiences slippage. To offset the presence of these errors, the use of a low-cost gyroscope in conjunction with Kalman filtering methods has been considered by many researchers. However, results from conventional Kalman filtering methods that use a gyroscope with odometry can unfeasible because the parameters are estimated regardless of the physical constraints of the robot. In this paper, a novel constrained Kalman filtering method is proposed that estimates the parameters under the physical constraints using a general constrained optimization technique. The state observability is improved by additional state variables and the accuracy is also improved through the use of a nonapproximated Kalman filter design. Experimental results show that the proposed method effectively offsets the localization error while yielding feasible parameter estimation.  相似文献   
28.
This paper presents a study on improving the traversability of a quadruped walking robot in 3D rough terrains. The key idea is to exploit body movement of the robot. The position and orientation of the robot are systematically adjusted and the possibility of finding a valid foothold for the next swing is maximized, which makes the robot have more chances to overcome the rough terrains. In addition, a foothold search algorithm that provides the valid foothold while maintaining a high traversability of the robot, is investigated and a gait selection algorithm is developed to help the robot avoid deadlock situations. To explain the algorithms, new concepts such as reachable area, stable area, potential search direction, and complementary kinematic margin are introduced, and the effectiveness of the algorithms is validated via simulations and experiments.  相似文献   
29.
This paper presents a method of autonomous topological modeling and localization in a home environment using only low-cost sonar sensors. The topological model is extracted from a grid map using cell decomposition and normalized graph cut. The autonomous topological modeling involves the incremental extraction of a subregion without predefining the number of subregions. A method of topological localization based on this topological model is proposed wherein a current local grid map is compared with the original grid map. The localization is accomplished by obtaining a node probability from a relative motion model and rotational invariant grid-map matching. The proposed method extracts a well-structured topological model of the environment, and the localization provides reliable node probability even when presented with sparse and uncertain sonar data. Experimental results demonstrate the performance of the proposed topological modeling and localization in a real home environment.  相似文献   
30.
We present a secure routing protocol that is immune to Sybil attacks and that can tolerate collusion of Byzantine routers. It can tolerate either initial collusion of Byzantine routers or runtime collusion of non-adjacent Byzantine routers, both in the absence of runtime collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also simultaneously tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, it guarantees a bound on the difference between the calculated distance and the actual shortest distance. The bound depends on the number of Byzantine routers on a path. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号