首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11360篇
  免费   959篇
  国内免费   106篇
电工技术   212篇
综合类   44篇
化学工业   3151篇
金属工艺   269篇
机械仪表   481篇
建筑科学   447篇
矿业工程   30篇
能源动力   751篇
轻工业   1048篇
水利工程   225篇
石油天然气   153篇
武器工业   5篇
无线电   1180篇
一般工业技术   1931篇
冶金工业   277篇
原子能技术   75篇
自动化技术   2146篇
  2024年   37篇
  2023年   221篇
  2022年   378篇
  2021年   743篇
  2020年   651篇
  2019年   819篇
  2018年   936篇
  2017年   885篇
  2016年   857篇
  2015年   514篇
  2014年   871篇
  2013年   1256篇
  2012年   792篇
  2011年   884篇
  2010年   595篇
  2009年   487篇
  2008年   301篇
  2007年   214篇
  2006年   183篇
  2005年   127篇
  2004年   116篇
  2003年   69篇
  2002年   64篇
  2001年   32篇
  2000年   33篇
  1999年   28篇
  1998年   34篇
  1997年   20篇
  1996年   30篇
  1995年   27篇
  1994年   13篇
  1993年   22篇
  1992年   14篇
  1991年   20篇
  1990年   20篇
  1989年   17篇
  1988年   7篇
  1987年   11篇
  1986年   10篇
  1985年   11篇
  1984年   17篇
  1983年   18篇
  1982年   6篇
  1981年   5篇
  1980年   4篇
  1979年   9篇
  1978年   5篇
  1976年   4篇
  1974年   2篇
  1973年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
The lumped parameter/complex plane analysis technique revealed several contributions to the terminal admittance of the ZnO—Bi2O3 based varistor grain-boundary ac response. The terminal capacitance has been elucidated via the multiple trapping phenomena, a barrier layer polarization, and a resonance effect in the frequency range 10−2≤ f ≤ 109 Hz. The characterization of the trapping relaxation behavior near ∼ 105 Hz (∼ 10−6 s) provided a better understanding of a previously reported loss-peak. The possible nonuniformity in this trapping activity associated with its conductance term observed via the depression angle of a semicircular relaxation in the complex capacitance ( C *) plane has been postulated.  相似文献   
102.
This paper presents a noncertainty equivalent adaptive motion control scheme for robot manipulators in the absence of link velocity measurements. A new output feedback adaptation algorithm, based on the attractive manifold design approach, is developed. A proportional-integral adaptation is selected for the adaptive parameter estimator to strengthen the passivity of the system. In order to relieve velocity measurements, an observer is designed to estimate the velocities. The controller guarantees semiglobal asymptotic motion tracking and velocity estimation, as well as L and L2 bounded parameter estimation error. The effectiveness of the proposed controller is verified by simulations for a two-link robot manipulator and a four-bar linkage. The results are further compared with the earlier certainty-equivalent adaptive partial and full state feedback controller to highlight potential closed-loop performance improvements.  相似文献   
103.
With the high availability of digital video contents on the internet, users need more assistance to access digital videos. Various researches have been done about video summarization and semantic video analysis to help to satisfy these needs. These works are developing condensed versions of a full length video stream through the identification of the most important and pertinent content within the stream. Most of the existing works in these areas are mainly focused on event mining. Event mining from video streams improves the accessibility and reusability of large media collections, and it has been an active area of research with notable recent progress. Event mining includes a wide range of multimedia domains such as surveillance, meetings, broadcast, news, sports, documentary, and films, as well as personal and online media collections. Due to the variety and plenty of Event mining techniques, in this paper we suggest an analytical framework to classify event mining techniques and to evaluate them based on important functional measures. This framework could lead to empirical and technical comparison of event mining methods and development of more efficient structures at future.  相似文献   
104.
Robot manufacturers will be required to demonstrate objectively that all reasonably foreseeable hazards have been identified in any robotic product design that is to be marketed commercially. This is problematic for autonomous mobile robots because conventional methods, which have been developed for automatic systems do not assist safety analysts in identifying non-mission interactions with environmental features that are not directly associated with the robot’s design mission, and which may comprise the majority of the required tasks of autonomous robots. In this paper we develop a new variant of preliminary hazard analysis that is explicitly aimed at identifying non-mission interactions by means of new sets of guidewords not normally found in existing variants. We develop the required features of the method and describe its application to several small trials conducted at Bristol Robotics Laboratory in the 2011–2012 period.  相似文献   
105.
Cloud computing techniques take the form of distributed computing by utilizing multiple computers to execute computing simultaneously on the service side. To process the increasing quantity of multimedia data, numerous large-scale multimedia data storage computing techniques in the cloud computing have been developed. Of all the techniques, Hadoop plays a key role in the cloud computing. Hadoop, a computing cluster formed by low-priced hardware, can conduct the parallel computing of petabytes of multimedia data. Hadoop features high-reliability, high-efficiency, and high-scalability. The numerous large-scale multimedia data computing techniques include not only the key core techniques, Hadoop and MapReduce, but also the data collection techniques, such as File Transfer Protocol and Flume. In addition, distributed system configuration allocation, automatic installation, and monitoring platform building and management techniques are all included. As a result, only with the integration of all the techniques, a reliable large-scale multimedia data platform can be offered. In this paper, we introduce how cloud computing can make a breakthrough by proposing a multimedia social network dataset on Hadoop platform and implementing a prototype version. Detailed specifications and design issues are discussed as well. An important finding of this article is that we can save more time if we conduct the multimedia social networking analysis using Cloud Hadoop Platform rather than using a single computer. The advantages of cloud computing over the traditional data processing practices are fully demonstrated in this article. The applicable framework designs and the tools available for the large-scale data processing are also proposed. We show the experimental multimedia data including data sizes and processing time.  相似文献   
106.
A new variant of Differential Evolution (DE), called ADE-Grid, is presented in this paper which adapts the mutation strategy, crossover rate (CR) and scale factor (F) during the run. In ADE-Grid, learning automata (LA), which are powerful decision making machines, are used to determine the proper value of the parameters CR and F, and the suitable strategy for the construction of a mutant vector for each individual, adaptively. The proposed automata based DE is able to maintain the diversity among the individuals and encourage them to move toward several promising areas of the search space as well as the best found position. Numerical experiments are conducted on a set of twenty four well-known benchmark functions and one real-world engineering problem. The performance comparison between ADE-Grid and other state-of-the-art DE variants indicates that ADE-Grid is a viable approach for optimization. The results also show that the proposed ADE-Grid improves the performance of DE in terms of both convergence speed and quality of final solution.  相似文献   
107.
A major requirement of many real-time embedded systems is to have time-predictable interaction with the environment. More specifically, they need fixed or small sampling and I/O delays, and they cannot cope with large delay jitters. Non-preemptive execution is a known method to reduce the latter delay; however, the corresponding scheduling problem is NP-Hard for periodic tasks. In this paper, we present Precautious-RM as a predictable linear-time online non-preemptive scheduling algorithm for harmonic tasks which can also deal with the former delay, namely sampling delay. We derive conditions of optimality of Precautious-RM and show that satisfying those conditions, tight bounds for best- and worst-case response times of the tasks can be calculated in polynomial-time. More importantly, response time jitter of the tasks is analyzed and it is proven that under specific conditions, each task has either one or two values for response time, which leads to improving the predictability of the system interaction with the environment. Simulation results demonstrate efficiency of Precautious-RM in increasing accuracy of control applications.  相似文献   
108.
With growing use of roadheaders in the world and its significant role in the successful accomplishment of a tunneling project, it is a necessity to accurately predict performance of this machine in different ground conditions. On the other hand, the existence of some shortcomings in the prediction models has made it necessary to perform more research on the development of the new models. This paper makes an attempt to model the rate of roadheader performance based on the geotechnical and geological site conditions. For achieving the aim, an artificial neural network (ANN), a powerful tool for modeling and recognizing the sophisticated structures involved in data, is employed to model the relationship between the roadheader performance and the parameters influencing the tunneling operations with a high correlation. The database used in modeling is compiled from laboratory studies conducted at Azad University at Science and Research Branch, Tehran, Iran. A model with architecture 4-10-1 trained by back-propagation algorithm is found to be optimum. A multiple variable regression (MVR) analysis is also applied to compare performance of the neural network. The results demonstrate that predictive capability of the ANN model is better than that of the MVR model. It is concluded that roadheader performance could be accurately predicted as a function of unconfined compressive strength, Brazilian tensile strength, rock quality designation, and alpha angle R 2 = 0.987. Sensitivity analysis reveals that the most effective parameter on roadheader performance is the unconfined compressive strength.  相似文献   
109.
In the present study, the Group method of data handling (GMDH) network was utilized to predict the scour depth below pipelines. GMDH network was developed using back propagation. Input parameters that were considered as effective parameters on the scour depth included those of sediment size, geometry of pipeline, and approaching flow characteristics. Training and testing performances of the GMDH networks have been carried out using nondimensional data sets that were collected from the literature. These data sets are related to the two main situations of pipelines scour experiments namely clear-water and live-bed conditions. The testing results of performances were compared with the support vector machines (SVM) and existing empirical equations. The GMDH network indicated that using of back propagation produced lower error of scour depth prediction than those obtained using the SVM and empirical equations. Also, the effects of many input parameters on the scour depth have been investigated.  相似文献   
110.
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号