首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51208篇
  免费   4400篇
  国内免费   2033篇
电工技术   2585篇
技术理论   2篇
综合类   2510篇
化学工业   9301篇
金属工艺   2966篇
机械仪表   3418篇
建筑科学   3108篇
矿业工程   1296篇
能源动力   1526篇
轻工业   3448篇
水利工程   667篇
石油天然气   2480篇
武器工业   337篇
无线电   6664篇
一般工业技术   7484篇
冶金工业   2843篇
原子能技术   617篇
自动化技术   6389篇
  2024年   252篇
  2023年   957篇
  2022年   1628篇
  2021年   2368篇
  2020年   1740篇
  2019年   1656篇
  2018年   1757篇
  2017年   1775篇
  2016年   1737篇
  2015年   2077篇
  2014年   2615篇
  2013年   3202篇
  2012年   3264篇
  2011年   3738篇
  2010年   2885篇
  2009年   2900篇
  2008年   2831篇
  2007年   2477篇
  2006年   2591篇
  2005年   2095篇
  2004年   1560篇
  2003年   1422篇
  2002年   1290篇
  2001年   1143篇
  2000年   1083篇
  1999年   1122篇
  1998年   1011篇
  1997年   820篇
  1996年   714篇
  1995年   592篇
  1994年   469篇
  1993年   328篇
  1992年   261篇
  1991年   224篇
  1990年   195篇
  1989年   180篇
  1988年   121篇
  1987年   106篇
  1986年   75篇
  1985年   61篇
  1984年   54篇
  1983年   47篇
  1982年   31篇
  1981年   25篇
  1980年   32篇
  1979年   20篇
  1978年   18篇
  1976年   22篇
  1975年   13篇
  1973年   16篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
Localized multiple kernel learning (LMKL) is an attractive strategy for combining multiple heterogeneous features in terms of their discriminative power for each individual sample. However, models excessively fitting to a specific sample would obstacle the extension to unseen data, while a more general form is often insufficient for diverse locality characterization. Hence, both learning sample-specific local models for each training datum and extending the learned models to unseen test data should be equally addressed in designing LMKL algorithm. In this paper, for an integrative solution, we propose a probability confidence kernel (PCK), which measures per-sample similarity with respect to probabilistic-prediction-based class attribute: The class attribute similarity complements the spatial-similarity-based base kernels for more reasonable locality characterization, and the predefined form of involved class probability density function facilitates the extension to the whole input space and ensures its statistical meaning. Incorporating PCK into support-vectormachine-based LMKL framework, we propose a new PCK-LMKL with arbitrary l(p)-norm constraint implied in the definition of PCKs, where both the parameters in PCK and the final classifier can be efficiently optimized in a joint manner. Evaluations of PCK-LMKL on both benchmark machine learning data sets (ten University of California Irvine (UCI) data sets) and challenging computer vision data sets (15-scene data set and Caltech-101 data set) have shown to achieve state-of-the-art performances.  相似文献   
92.
In this paper, we study the problem of detecting sudden pedestrian crossings to assist drivers in avoiding accidents. This application has two major requirements: to detect crossing pedestrians as early as possible just as they enter the view of the car-mounted camera and to maintain a false alarm rate as low as possible for practical purposes. Although many current sliding-window-based approaches using various features and classification algorithms have been proposed for image-/video-based pedestrian detection, their performance in terms of accuracy and processing speed falls far short of practical application requirements. To address this problem, we propose a three-level coarse-to-fine video-based framework that detects partially visible pedestrians just as they enter the camera view, with low false alarm rate and high speed. The framework is tested on a new collection of high-resolution videos captured from a moving vehicle and yields a performance better than that of state-of-the-art pedestrian detection while running at a frame rate of 55 fps.  相似文献   
93.
In this paper, we propose an advanced partial encryption of watermarking and scrambling using the magnitude information of Modifed Discrete Cosine Transform (MDCT). In MPEG-1/Audio Layer III (MP3), the magnitude and phase information of modified discrete cosine transform (MDCT) coefficients is encrypted. The proposed method uses both watermarking and scrambling, and aims at protecting the contents against eavesdropping and moreover against illegal mass distribution after descrambled. Experimental results show that the proposed method can achieve higher security and less computational complexity by reusing the MDCT coefficients obtained in MP3.  相似文献   
94.
A set of elementary siphons plays a key role in the development of deadlock prevention policies for automated manufacturing systems. This paper addresses the computation problem for elementary siphons in a subclass of Petri nets which are basic systems of simple sequential processes with resources (BS3PR) and can model many automated manufacturing systems. An algorithm for enumerating elementary siphons is established by the one‐to‐one relationship between maximal perfect resource‐transition circuits (MPCs) and strict minimal siphons. A set of MPCs is first computed, followed by a set of elementary siphons in a BS3PR. The presented algorithm is proved to have polynomial‐time complexity. An example is used to illustrate the algorithm.  相似文献   
95.
An intelligent control for a stand‐alone doubly‐fed induction generator (DFIG) system using a proportional‐integral‐derivative neural network (PIDNN) is proposed in this study. This system can be applied as a stand‐alone power supply system or as the emergency power system when the electricity grid fails for all sub‐synchronous, synchronous, and super‐synchronous conditions. The rotor side converter is controlled using field‐oriented control to produce 3‐phase stator voltages with constant magnitude and frequency at different rotor speeds. Moreover, the grid side converter, which is also controlled using field‐oriented control, is primarily implemented to maintain the magnitude of the DC‐link voltage. Furthermore, the intelligent PIDNN controller is proposed for both the rotor and grid side converters to improve the transient and steady‐state responses of the DFIG system for different operating conditions. Both the network structure and online learning algorithm are introduced in detail. Finally, the feasibility of the proposed control scheme is verified through experimentation. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
96.
Pattern recognition techniques have been widely used in a variety of scientific disciplines including computer vision, artificial intelligence, biology, and so forth. Although many methods present satisfactory performances, they still have several weak points, thus leaving a lot of space for further improvements. In this paper, we propose two performance-driven subspace learning methods by extending the principal component analysis (PCA) and the kernel PCA (KPCA). Both methods adopt a common structure where genetic algorithms are employed to pursue optimal subspaces. Because the proposed feature extractors aim at achieving high classification accuracy, enhanced generalization ability can be expected. Extensive experiments are designed to evaluate the effectiveness of the proposed algorithms in real-world problems including object recognition and a number of machine learning tasks. Comparative studies with other state-of-the-art techniques show that the methods in this paper are capable of enhancing generalization ability for pattern recognition systems.  相似文献   
97.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
98.
A general optimization formulation for transition walking prediction using 3D skeletal model is presented. The formulation is based on a previously presented one-step walking formulation (Xiang et al., Int J Numer Methods Eng 79:667–695, 2009b). Two basic transitions are studied: walk-to-stand and slow-to-fast walk. The slow-to-fast transition is used to connect slow walk to fast walk by using a step-to-step transition formulation. In addition, the speed effects on the walk-to-stand motion are investigated. The joint torques and ground reaction forces (GRF) are recovered and analyzed from the simulation. For slow-to-fast walk transition, the predicted ground reaction forces in step transition is even larger than that of the fast walk. The model shows good correlation with the experimental data for the lower extremities except for the standing ankle profile. The optimal solution of transition simulation is obtained in a few minutes by using predictive dynamics method.  相似文献   
99.
The equilibrium Ca3P2(s) = 3[Ca] + 2[P] was studied at 1600 ° by equilibrating liquid iron, saturated with Ca3P2, and contained in a TiN crucible, with Ca vapor. The source of Ca was liquid Ca contained in an Mo crucible, and the vapor pressure of Ca was varied by varying the position of the Mo crucible in the temperature gradient of a vertical tube furnace. A least-squares analysis of the data gave and. The simultaneous equilibria CaO(s) = [Ca] + [O] and CaS(s) = [Ca] + [S] were studied at 1600 ° by equilibrating liquid iron, contained in a pressed and sintered CaO-CaS crucible with Ca vapor. The advantage of this technique is that two equilibrium constants,K cas andK cao, and two interaction coefficients, and can be determined from one set of experiments. It was determined that, at 1600 °,K cas = 5.9 × 10−8 K cao = 5.5 × 10−9,, and. Formerly Graduate Students  相似文献   
100.
红外弱小目标的匹配方法研究与仿真   总被引:1,自引:0,他引:1  
徐寒  夏森  徐健健 《计算机仿真》2012,29(2):233-236,256
研究红外图像中的目标匹配问题。针对传统的红外图像中目标匹配效果不理想,匹配不准确。当红外图像中是弱小目标时,背景灰度值与目标灰度值非常相近,灰度直方图均衡化无法实现目标与背景的完整分离,导致漏匹配率较高的问题。为提高目标的匹配精度,提出一种形态学预处理的红外目标匹配方法,通过形态学算法提取出图像中的形状信息,利用形状信息将红外图像中的目标与背景完整分离,避免了只依靠灰度图像信息造成的不能完整分离目标与背景带来的漏匹配问题。进行仿真的结果证明,采用的形态学与处理的匹配方法能够完整将目标与背景分离,成功完成目标匹配,取得了满意的结果。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号