首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9491篇
  免费   732篇
  国内免费   89篇
电工技术   180篇
综合类   41篇
化学工业   2619篇
金属工艺   213篇
机械仪表   395篇
建筑科学   354篇
矿业工程   20篇
能源动力   615篇
轻工业   913篇
水利工程   190篇
石油天然气   140篇
武器工业   5篇
无线电   981篇
一般工业技术   1615篇
冶金工业   212篇
原子能技术   67篇
自动化技术   1752篇
  2024年   40篇
  2023年   192篇
  2022年   347篇
  2021年   615篇
  2020年   550篇
  2019年   680篇
  2018年   775篇
  2017年   733篇
  2016年   723篇
  2015年   430篇
  2014年   711篇
  2013年   1038篇
  2012年   653篇
  2011年   733篇
  2010年   471篇
  2009年   404篇
  2008年   245篇
  2007年   181篇
  2006年   148篇
  2005年   101篇
  2004年   101篇
  2003年   58篇
  2002年   57篇
  2001年   28篇
  2000年   23篇
  1999年   25篇
  1998年   23篇
  1997年   18篇
  1996年   23篇
  1995年   19篇
  1994年   10篇
  1993年   15篇
  1992年   11篇
  1991年   19篇
  1990年   16篇
  1989年   12篇
  1988年   7篇
  1987年   8篇
  1986年   8篇
  1985年   8篇
  1984年   14篇
  1983年   13篇
  1982年   4篇
  1981年   3篇
  1980年   2篇
  1979年   6篇
  1978年   4篇
  1977年   2篇
  1973年   2篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Multimedia Tools and Applications - Face detection by low-resolution image (LR) is one of the key aspects of Human-Computer Interaction(HCI). Due to the LR image, which has changes in pose,...  相似文献   
992.
Multimedia Tools and Applications - Auto understanding of human activities in video is an increasing necessity in some application realms. The existing methods for human’s activity...  相似文献   
993.
Multimedia Tools and Applications - This paper presents an area-efficient and multi-sized DCT architecture for HEVC application. We exploit the commonality in the arithmetic units to increase the...  相似文献   
994.
Neural Computing and Applications - This study introduces a neural network (NN) adaptive tracking controller-based reinforcement learning (RL) scheme for unknown nonlinear systems. First, an...  相似文献   
995.
Neural Computing and Applications - For the current paper, the technique of feed-forward neural network deep learning controller (FFNNDLC) for the nonlinear systems is proposed. The FFNNDLC...  相似文献   
996.
Pattern Analysis and Applications - Outlier or anomaly detection is an important branch of data analysis that becomes a crucial task in many application domains. Data objects which significantly...  相似文献   
997.

This paper offers a recurrent neural network to support vector machine (SVM) learning in stochastic support vector regression with probabilistic constraints. The SVM is first converted into an equivalent quadratic programming (QP) formulation in linear and nonlinear cases. An artificial neural network for SVM learning is then proposed. The presented neural network framework guarantees obtaining the optimal solution of the SVM problem. The existence and convergence of the trajectories of the network are studied. The Lyapunov stability for the considered neural network is also shown. The efficiency of the proposed method is shown by three illustrative examples.

  相似文献   
998.
A new variant of Differential Evolution (DE), called ADE-Grid, is presented in this paper which adapts the mutation strategy, crossover rate (CR) and scale factor (F) during the run. In ADE-Grid, learning automata (LA), which are powerful decision making machines, are used to determine the proper value of the parameters CR and F, and the suitable strategy for the construction of a mutant vector for each individual, adaptively. The proposed automata based DE is able to maintain the diversity among the individuals and encourage them to move toward several promising areas of the search space as well as the best found position. Numerical experiments are conducted on a set of twenty four well-known benchmark functions and one real-world engineering problem. The performance comparison between ADE-Grid and other state-of-the-art DE variants indicates that ADE-Grid is a viable approach for optimization. The results also show that the proposed ADE-Grid improves the performance of DE in terms of both convergence speed and quality of final solution.  相似文献   
999.
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms.  相似文献   
1000.
In this work, we investigate the structural behavior of a micro-electromechanical system arch microbeam actuated by electric fringing-fields where the electrodes are located at both side of the microbeam. In this particular configuration, the electrostatic actuating force is caused by the asymmetry of the fringing electric fields acting in a direction opposite to the relative deflection of the microbeam. A reduced-order model is derived for the considered system using the so-called Galerkin decomposition and assuming linear undamped mode shapes of a straight beam as basis functions in the decomposition process. A static analysis is performed to investigate the occurrence of any structural instability. The eigenvalue problem is then investigated to calculate the fundamental as well as higher natural frequencies variation of the microbeam with the applied DC load. A bifurcation analysis is then implemented to derive a criterion for whether symmetric or asymmetric bifurcation is occurring during the static structural instability. The results show elimination of the so-called pull-in instability in this kind of systems as compared to the regular case of parallel-plates electrostatic actuation. The bifurcation analysis shows that the arch goes for asymmetric bifurcation (symmetry breaking) with increase in initial elevation without the occurrence of symmetric bifurcation (snap-through) for any initial elevation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号