首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5814篇
  免费   319篇
  国内免费   46篇
电工技术   74篇
综合类   20篇
化学工业   1644篇
金属工艺   125篇
机械仪表   220篇
建筑科学   154篇
矿业工程   4篇
能源动力   375篇
轻工业   558篇
水利工程   84篇
石油天然气   36篇
无线电   551篇
一般工业技术   1066篇
冶金工业   277篇
原子能技术   83篇
自动化技术   908篇
  2024年   23篇
  2023年   113篇
  2022年   324篇
  2021年   399篇
  2020年   300篇
  2019年   328篇
  2018年   359篇
  2017年   297篇
  2016年   325篇
  2015年   194篇
  2014年   326篇
  2013年   533篇
  2012年   306篇
  2011年   312篇
  2010年   277篇
  2009年   247篇
  2008年   166篇
  2007年   145篇
  2006年   133篇
  2005年   95篇
  2004年   75篇
  2003年   71篇
  2002年   57篇
  2001年   42篇
  2000年   36篇
  1999年   37篇
  1998年   69篇
  1997年   59篇
  1996年   42篇
  1995年   53篇
  1994年   24篇
  1993年   34篇
  1992年   30篇
  1991年   25篇
  1990年   24篇
  1989年   22篇
  1988年   15篇
  1987年   30篇
  1986年   30篇
  1985年   22篇
  1984年   30篇
  1983年   26篇
  1982年   16篇
  1981年   8篇
  1980年   14篇
  1979年   13篇
  1978年   12篇
  1977年   11篇
  1976年   14篇
  1975年   8篇
排序方式: 共有6179条查询结果,搜索用时 15 毫秒
101.
This paper deals with the leader-follower consensus problem of Lipschitz nonlinear systems under fixed directed communication networks. Both state and output feedback control are proposed based on state and output measurements of neighbouring agents, respectively. Laplacian matrix features are explored for the stability analysis, and the sufficient conditions are derived to solve the consensus problem. Finally, simulation results are included to demonstrate the effectiveness of the output-based consensus controller.  相似文献   
102.
Digital image processing systems are complex, being usually composed of different computer vision libraries. Algorithm implementations cannot be directly used in conjunction with algorithms developed using other computer vision libraries. This paper formulates a software solution by proposing a processor with the capability of handling different types of image processing algorithms, which allow the end users to install new image processing algorithms from any library. This approach has other functionalities like capability to process one or more images, manage multiple processing jobs simultaneously and maintain the manner in which an image was processed for later use. It is a computational efficient and promising technique to handle variety of image processing algorithms. To promote the reusability and adaptation of the package for new types of analysis, a feature of sustainability is established. The framework is integrated and tested on a medical imaging application, and the software is made freely available for the reader. Future work involves introducing the capability to connect to another instance of processing service with better performance. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
103.
In this article, a hybrid technique for user activities outliers detection is introduced. The hybrid technique consists of a two‐stage integration of principal component analysis and fuzzy rule‐based systems. In the first stage, the Hamming distance is used to measure the differences between different activities. Principal component analysis is then applied to the distance measures to find two indices of Hotelling's T2 and squared prediction error. In the second stage of the process, the calculated indices are provided as inputs to the fuzzy rule‐based systems to model them heuristically. The model is used to identify the outliers and classify them. The proposed system is tested in real home environments, equipped with appropriate sensory devices, to identify outliers in the activities of daily living of the user. Three case studies are reported to demonstrate the effectiveness of the proposed system. The proposed system successfully identifies the outliers in activities distinguishing between the normal and abnormal behavioral patterns.  相似文献   
104.
105.
In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency.  相似文献   
106.
Until now the virtual assistants (like Siri, Google Now and Cortana) have primarily been confined to voice input and output only. Is there a justification for voice only confinement or can we enhance the user experience by adding a visual output? We hypothesized that providing a higher level of visual/auditory immersion would enhance the quality of user experience. In order to test this hypothesis, we first developed 4 variants of virtual assistant, each with a different audio/visual level of immersion. Developed virtual assistant systems were the following; audio only, audio and 2D visual display, audio and 3D visual display and audio and immersive 3D visual display. We developed a plan for usability testing of all 4 variants. The usability testing was conducted with 30 subjects against eight (8) dependent variables included presence, involvement, attention, reliability, dependency, easiness, satisfaction and expectations. Each subject rated these dependent variables based on a scale of 1–5, 5 being the highest value. The raw data collected from usability testing was then analyzed through several tools in order to determine the factors contributing towards the quality of experience for each of the 4 variants. The significant factors were then used develop a model that measures the quality of user experience. It was found that each variant had a different set of significant variables. Hence, in order to rate each system there is a need to develop a scale that is dependent upon the unique set of variables for the respective variant. Furthermore, it was found that variant 4 scored the highest rate for Quality of Experience (QoE). Lastly several other qualitative conclusions were also drawn from this research that will guide future work in the field of virtual assistants.  相似文献   
107.
Vertical handover gain significant importance due to the enhancements in mobility models by the Fourth Generation (4G) technologies. However, these enhancements are limited to specific scenarios and hence do not provide support for generic mobility. Similarly, various schemes are proposed based on these mobility models but most of them are suffered from the high packet loss, frequent handovers, too early and late handovers, inappropriate network selection, etc. To address these challenges, a generic vertical handover management scheme for heterogeneous wireless networks is proposed in this article. The proposed scheme works in three phases. In the first phase, a handover triggering approach is designed to identify the appropriate place for initiating handover based on the estimated coverage area of a WLAN access point or cellular base station. In the second phase, fuzzy rule based system is designed to eliminate the inappropriate networks before deciding an optimal network for handover. In the third phase, a network selection scheme is developed based on the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) decision mechanism. Various parameters such as delay, jitter, Bit Error Rate (BER), packet loss, communication cost, response time, and network load are considered for selecting an optimal network. The proposed scheme is tested in a mobility scenario with different speeds of a mobile node ranging from very low to very high. The simulation results are compared with the existing decision models used for network selection and handover triggering approaches. The proposed scheme outperforms these schemes in terms of energy consumption, handover delay and time, packet loss, good put, etc.  相似文献   
108.
109.

In the present study, Multi-objective optimization of composite cylindrical shell under external hydrostatic pressure was investigated. Parameters of mass, cost and buckling pressure as fitness functions and failure criteria as optimization criterion were considered. The objective function of buckling has been used by performing the analytical energy equations and Tsai-Wu and Hashin failure criteria have been considered. Multi-objective optimization was performed by improving the evolutionary algorithm of NSGA-II. Also the kind of material, quantity of layers and fiber orientations have been considered as design variables. After optimizing, Pareto front and corresponding points to Pareto front are presented. Trade of points which have optimized mass and cost were selected by determining the specified pressure as design criteria. Finally, an optimized model of composite cylindrical shell with the optimum pattern of fiber orientations having appropriate cost and mass is presented which can tolerate the maximum external hydrostatic pressure.

  相似文献   
110.
Almost all subspace clustering algorithms proposed so far are designed for numeric datasets. In this paper, we present a k-means type clustering algorithm that finds clusters in data subspaces in mixed numeric and categorical datasets. In this method, we compute attributes contribution to different clusters. We propose a new cost function for a k-means type algorithm. One of the advantages of this algorithm is its complexity which is linear with respect to the number of the data points. This algorithm is also useful in describing the cluster formation in terms of attributes contribution to different clusters. The algorithm is tested on various synthetic and real datasets to show its effectiveness. The clustering results are explained by using attributes weights in the clusters. The clustering results are also compared with published results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号