首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6905篇
  免费   425篇
  国内免费   10篇
电工技术   91篇
综合类   6篇
化学工业   1791篇
金属工艺   94篇
机械仪表   185篇
建筑科学   256篇
矿业工程   11篇
能源动力   289篇
轻工业   1238篇
水利工程   91篇
石油天然气   39篇
无线电   451篇
一般工业技术   1046篇
冶金工业   466篇
原子能技术   43篇
自动化技术   1243篇
  2024年   15篇
  2023年   69篇
  2022年   228篇
  2021年   298篇
  2020年   202篇
  2019年   239篇
  2018年   291篇
  2017年   249篇
  2016年   304篇
  2015年   231篇
  2014年   319篇
  2013年   549篇
  2012年   449篇
  2011年   528篇
  2010年   348篇
  2009年   383篇
  2008年   374篇
  2007年   304篇
  2006年   259篇
  2005年   220篇
  2004年   193篇
  2003年   142篇
  2002年   142篇
  2001年   77篇
  2000年   76篇
  1999年   79篇
  1998年   162篇
  1997年   101篇
  1996年   66篇
  1995年   65篇
  1994年   46篇
  1993年   44篇
  1992年   28篇
  1991年   34篇
  1990年   26篇
  1989年   20篇
  1988年   25篇
  1987年   20篇
  1986年   13篇
  1985年   15篇
  1984年   21篇
  1983年   13篇
  1982年   11篇
  1980年   12篇
  1979年   4篇
  1978年   5篇
  1977年   7篇
  1976年   15篇
  1975年   9篇
  1974年   5篇
排序方式: 共有7340条查询结果,搜索用时 0 毫秒
21.
A new solution to the Simultaneous Localization and Modelling problem is presented in this paper. The algorithm is based on the stochastic search for solutions in the state space to the global localization problem by means of a differential evolution algorithm. This non linear evolutive filter, called Evolutive Localization Filter (ELF), searches stochastically along the state space for the best robot pose estimate. The set of pose solutions (the population) focuses on the most likely areas according to the perception and up to date motion information. The population evolves using the log-likelihood of each candidate pose according to the observation and the motion errors derived from the comparison between observed and predicted data obtained from the probabilistic perception and motion model.The proposed SLAM algorithm operates in two steps: in the first step the ELF filter is used at local level to re-localize the robot based on the robot odometry, the laser scan at a given position and a local map where only a low number of the last scans have been integrated. In the second step, the aligned laser measures and the corrected robot poses are used to detect whether the robot is revisiting a previously crossed area (i.e., a cycle in the robot trajectory exists). Once a cycle is detected, the Evolutive Localization Filter is used again to estimate the accumulated residual drift in the detected loop and then to re-estimate the robot poses in order to integrate the sensor measures in the global map of the environment.The algorithm has been tested in different environments to demonstrate the effectiveness, robustness and computational efficiency of the proposed approach.  相似文献   
22.
In this letter, we analyze the security of an RFID authentication protocol proposed by Liu and Bailey [1], called privacy and authentication protocol (PAP). We present two traceability attacks and an impersonation attack.  相似文献   
23.
A Faà di Bruno type Hopf algebra is developed for a group of integral operators known as Fliess operators, where operator composition is the group product. Such operators are normally written in terms of generating series over a noncommutative alphabet. Using a general series expansion for the antipode, an explicit formula for the generating series of the compositional inverse operator is derived. The result is applied to analytic nonlinear feedback systems to produce an explicit formula for the feedback product, that is, the generating series for the Fliess operator representation of the closed-loop system written in terms of the generating series of the Fliess operator component systems. This formula is employed to provide a proof that local convergence is preserved under feedback.  相似文献   
24.
The software in modern systems has become too complex to make accurate predictions about their performance under different configurations. Real-time or even responsiveness requirements cannot be met because it is not possible to perform admission control for new or changing tasks if we cannot tell how their execution affects the other tasks already running. Previously, we proposed a resource-allocation middleware that manages the execution of tasks in a complex distributed system with real-time requirements. The middleware behavior can be modeled depending on the configuration of the tasks running, so that the performance of any given configuration can be calculated. This makes it possible to have admission control in such a system, but the model requires knowledge of run-time parameters. We propose the utilization of machine-learning algorithms to obtain the model parameters, and be able to predict the system performance under any configuration, so that we can provide a full admission control mechanism for complex software systems. In this paper, we present such an admission control mechanism, we measure its accuracy in estimating the parameters of the model, and we evaluate its performance to determine its suitability for a real-time or responsive system.  相似文献   
25.
This paper describes an active model with a robust texture model built on-line. The model uses one camera and it is able to operate without active illumination. The texture model is defined by a series of clusters, which are built in a video sequence using previously encountered samples. This model is used to search for the corresponding element in the following frames. An on-line clustering method, named leaderP is described and evaluated on an application of face tracking. A 20-point shape model is used. This model is built offline, and a robust fitting function is used to restrict the position of the points. Our proposal is to serve as one of the stages in a driver monitoring system. To test it, a new set of sequences of drivers recorded outdoors and in a realistic simulator has been compiled. Experimental results for typical outdoor driving scenarios, with frequent head movement, turns and occlusions are presented. Our approach is tested and compared with the Simultaneous Modeling and Tracking (SMAT) [1], and the recently presented Stacked Trimmed Active Shape Model (STASM) [2], and shows better results than SMAT and similar fitting error levels to STASM, with much faster execution times and improved robustness.  相似文献   
26.
This correspondence shows that learning automata techniques, which have been useful in developing weak estimators, can be applied to data compression applications in which the data distributions are nonstationary. The adaptive coding scheme utilizes stochastic learning-based weak estimation techniques to adaptively update the probabilities of the source symbols, and this is done without resorting to either maximum likelihood, Bayesian, or sliding-window methods. The authors have incorporated the estimator in the adaptive Fano coding scheme and in an adaptive entropy-based scheme that "resembles" the well-known arithmetic coding. The empirical results obtained for both of these adaptive methods are obtained on real-life files that possess a fair degree of nonstationarity. From these results, it can be seen that the proposed schemes compress nearly 10% more than their respective adaptive methods that use maximum-likelihood estimator-based estimates.  相似文献   
27.
In this paper, we compare linear integer programming directed formulations for the capacitated minimal spanning tree (CMST) problem. This problem is directly related to network design and consists of finding the cheapest way to link a set of terminals at different locations with a central node (a computer site, for instance). The present work focuses on a single commodity flow formulation presented in [3,4]. This formulation includes two sets of variables and, hence, it also must include coupling constraints between the two sets of variables. These coupling constraints can be defined in several ways. The main result of this work establishes that when the strongest form of the coupling constraints is used in the flow formulation (as in [4]), the equivalent formulation using only theX ij variables satisfies the so-called multistar constraints. These constraints are shown to be stronger than the weakest form of the generalized subtour breaking constraints and, hence, our result improves on the characterization given in [5] for the flow formulation presented in [4]. For certain parameters, the multistar constraints induce facets of the non-directed CMST polytope (see [2]). We also show that it is not possible to compare the linear relaxations of a formulation that involves the multistar constraints with one that involves the generalized subtour breaking constraints.  相似文献   
28.
Mortar mixes with different water-cement ratios and consistency were impregnated with methyl-methacrylate monomer and polymerized thermally under water using the free radical initiator, -azobis (isobutyronitrile). Results on drying, impregnation and polymerization are presented. It is shown that a considerable amount of polymer remained strongly adhered or chemically inserted in the inorganic matrix. The molecular weight of the inserted polymer is higher than that obtained in the solvent extracted polymer and this is also higher than the polymer molecular weight obtained by bulk polymerization under the same conditions. The compressive and flexural strength of the impregnated mortar were found to be a function of the amount of polymer in the composites. Fracture behaviour under load, and polymer distribution inside the composites were examined by scanning electron microscopic techniques (SEM). It was observed that the polymer acts in two ways, first as a filler of porous and microcrack voids, secondly forming an anisotropic irregular network improving the bond characteristic of the interface between aggregate and matrix. Furthermore, due to the the adhesion of the polymer to both phases, it acts as a reinforcement and improves the mechanical properties, in particular the flexural strength.  相似文献   
29.
Looking for more active and motivating methodological alternatives from the students’ perspective, which promote analysis and investigation abilities that make the student a more participative agent and some learning processes are facilitated, a practical study was conducted in the University of La Sabana (Chía, Colombia), in Computing Engineering (INF) and Agroindustrial Production Engineering (IPA) academic programs under the guiding question: Is Second Life an attractive tool for students, does it increment motivation, promote participation and facilitate learning processes in electronic related subjects in Engineering degrees?Second Life (SL) platform was then used as a traditional on-site class complement in electronic related subjects. A follow up was conducted with several groups during a year and a half, some students followed the subject with the traditional on-site methodology and others did it following a mixed methodology that combined traditional on-site lessons with virtual sessions trough SL, making a comparison and applying a quantitative as well as a qualitative methodology for the information analysis and recollection.After the specified study period it was found that using SL as part of the methodology, increments motivation toward electronic related subjects, and promotes participation and investigation, due to the fact that this tool makes learning possible in a funnier, more interactive and deeper way than if it had been taught in a master class. Having real-time access from a virtual classroom to all types of audiovisual information, helps more senses get involved in the learning process, making it more effective; nevertheless a weakness was detected related to the attention and concentration: students tend to get distracted, because their classroom is the computer and from there they have access not only to the many worlds of SL but to all the social networks and the Internet in general.  相似文献   
30.
Two key aspects of the Knowledge Society are the interconnection between the actors involved in the decision making processes and the importance of the human factor, particularly the citizen’s continuous learning and education. This paper presents a new module devoted to knowledge extraction and diffusion that has been incorporated into a previously developed decision making tool concerning the Internet and related with the multicriteria selection of a discrete number of alternatives (PRIOR-Web). Quantitative and qualitative procedures using data and text mining methods have been employed in the extraction of knowledge. Graphical visualisation tools have been incorporated in the diffusion stage of the methodological approach suggested when dealing with decision making in the Knowledge Society. The resulting collaborative platform is being used as the methodological support for the cognitive democracy known as e-cognocracy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号