首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   228673篇
  免费   17935篇
  国内免费   10174篇
电工技术   13616篇
技术理论   12篇
综合类   14147篇
化学工业   35929篇
金属工艺   13829篇
机械仪表   14107篇
建筑科学   14645篇
矿业工程   5805篇
能源动力   5292篇
轻工业   16469篇
水利工程   4703篇
石油天然气   12276篇
武器工业   1810篇
无线电   24322篇
一般工业技术   32588篇
冶金工业   13431篇
原子能技术   5527篇
自动化技术   28274篇
  2024年   1023篇
  2023年   3301篇
  2022年   6698篇
  2021年   8865篇
  2020年   6731篇
  2019年   5578篇
  2018年   6921篇
  2017年   7631篇
  2016年   7010篇
  2015年   8463篇
  2014年   10724篇
  2013年   12993篇
  2012年   14434篇
  2011年   15540篇
  2010年   13523篇
  2009年   13111篇
  2008年   13098篇
  2007年   12175篇
  2006年   11082篇
  2005年   9283篇
  2004年   6973篇
  2003年   6502篇
  2002年   6454篇
  2001年   5775篇
  2000年   4771篇
  1999年   4036篇
  1998年   3075篇
  1997年   2579篇
  1996年   2259篇
  1995年   1983篇
  1994年   1639篇
  1993年   1377篇
  1992年   1303篇
  1991年   1170篇
  1990年   1163篇
  1989年   1047篇
  1988年   919篇
  1987年   860篇
  1986年   781篇
  1985年   723篇
  1984年   710篇
  1981年   678篇
  1979年   741篇
  1978年   777篇
  1977年   741篇
  1976年   759篇
  1975年   715篇
  1974年   719篇
  1973年   726篇
  1972年   706篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
951.
μC/OS-Ⅱ是面向8/16位及低端32位单片机应用的RTOS,而新近推出的μC/OS-Ⅲ则面向高性能32位单片机,如ARMCortex等。以Cortex—M4为内核的Kinetis系列单片机,不仅用于全国大学生飞思卡尔杯智能车竞赛,也用于诸多大学的嵌入式系统教学,官方提供的开发环境是CodeWarrior。本文介绍如何利用CodeWarrior开发环境,将μC/OS-Ⅲ在Kinetis单片机上运行起来,以便将μC/OS-Ⅲ引入教学、科研与应用。  相似文献   
952.
为了有效地节省语音数据的传输带宽和存储系统的磁盘空间,需要在保证语音质量的前提下尽可能降低其编码比特率。本设计采用经过优化的G.729语音压缩编译码算法,以ARM处理器为载体,开发的嵌入式语音存储系统可实现语音信号的海量存储,而且处理速度快、可靠性好、扩展方便。通过严格的测试和评估,该系统能够实现对大量语音数据的压缩和记录,各项指标基本达到了预期的水平。  相似文献   
953.
In this paper, we study the design problem of PID controllers for networked control systems (NCSs) with polyhedral uncertainties. The load disturbance and measurement noise are both taken into account in the modeling to better reflect the practical scenario. By using a novel technique, the design problem of PID controllers is converted into a design problem of output feedback controllers. Our goal of this paper is two‐fold: (1) To design the robust PID tracking controllers for practical models; (2) To develop the robust ?? PID control such that load and reference disturbances can be attenuated with a prescribed level. Sufficient conditions are derived by employing advanced techniques for achieving delay dependence. The proposed controller can be readily designed based on iterative suboptimal algorithms. Finally, four examples are presented to show the effectiveness of the proposed methods. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
954.
The paper considers the properties of feasible and optimal scheduling of jobs on one machine under constraints on the terms of the beginning and completion of jobs and on partial sequences of job performance. The established properties and the lower-bound estimates of the length of the optimal schedule are used to develop methods for the exact and approximate solutions of the formulated problem by sequential optimization algorithms. The proposed algorithms are illustrated by numerical examples and can be successfully applied to solve these problems in the absence of constraints.  相似文献   
955.
A comparative evaluation of the most commonly used linear methods for edge detection in grayscale images are presented. Detectors based on the first and second derivatives of image brightness are considered. The method for automatic edge tracking in grayscale images is proposed. The model for assessing errors and artifacts caused by sampling during digitization of real input images is proposed. Investigation of edge detectors isotropy and errors caused by input images sampling is conducted. The advantage of the Isotropic operator for edge tracking is shown. The noise immunity of linear edge detection methods is assessed and the superiority of 3 × 3 gradient operators for noisy images is shown. Isotropic and Sobel operators are identified to be optimal on a basis of sampling errors, output noise level, and computational complexity.  相似文献   
956.
Results concerning the terminal guidance algorithm at the reentry of the descent module into the Earth atmosphere are presented. This algorithm simultaneously eliminates predicted deviations in the downrange and crossrange directions. The restriction on the tolerable load factor n ?? 3 is taken into account. Three reentry angles are analyzed: the medium angle ?1.5°, the steep angle ?1.9°, and the flat angle ?1.2°. The motion of the descent module is considered in the disturbed Earth atmosphere represented by the TsNIIMash model. This model includes variations of the atmosphere density and the wind field. It is demonstrated that, depending on the reentry angle, the proposed algorithm guarantees the downrange maneuver zone in the range 1240?C1890 km and the crossrange maneuver zone of 210?C220 km on one side. The maximum guidance error at the altitude of 1 km does not exceed 0.8 km, and the average error is 0.1 km. The algorithm uses up to three bank angle reversals and uses the numerical prediction of the remaining part of the trajectory when choosing the guidance parameters. The concept of the automatic adjustment of the bank angle reference function depending on the entry angle and the prescribed distance to the target point in the maneuver zone is formulated.  相似文献   
957.
958.
In this paper, we present a robust and accurate algorithm for interactive image segmentation. The level set method is clearly advantageous for image objects with a complex topology and fragmented appearance. Our method integrates discriminative classification models and distance transforms with the level set method to avoid local minima and better snap to true object boundaries. The level set function approximates a transformed version of pixelwise posterior probabilities of being part of a target object. The evolution of its zero level set is driven by three force terms, region force, edge field force, and curvature force. These forces are based on a probabilistic classifier and an unsigned distance transform of salient edges. We further propose a technique that improves the performance of both the probabilistic classifier and the level set method over multiple passes. It makes the final object segmentation less sensitive to user interactions. Experiments and comparisons demonstrate the effectiveness of our method.  相似文献   
959.
Given a directed graph, the problem of blackhole mining is to identify groups of nodes, called blackhole patterns, in a way such that the average in-weight of this group is significantly larger than the average out-weight of the same group. The problem of finding volcano patterns is a dual problem of mining blackhole patterns. Therefore, we focus on discovering the blackhole patterns. Indeed, in this article, we develop a generalized blackhole mining framework. Specifically, we first design two pruning schemes for reducing the computational cost by reducing both the number of candidate patterns and the average computation cost for each candidate pattern. The first pruning scheme is to exploit the concept of combination dominance to reduce the exponential growth search space. Based on this pruning approach, we develop the gBlackhole algorithm. Instead, the second pruning scheme is an approximate approach, named approxBlackhole, which can strike a balance between the efficiency and the completeness of blackhole mining. Finally, experimental results on real-world data show that the performance of approxBlackhole can be several orders of magnitude faster than gBlackhole, and both of them have huge computational advantages over the brute-force approach. Also, we show that the blackhole mining algorithm can be used to capture some suspicious financial fraud patterns.  相似文献   
960.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号