首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2561篇
  免费   156篇
  国内免费   3篇
电工技术   30篇
综合类   5篇
化学工业   692篇
金属工艺   37篇
机械仪表   43篇
建筑科学   114篇
矿业工程   10篇
能源动力   105篇
轻工业   187篇
水利工程   28篇
石油天然气   5篇
无线电   229篇
一般工业技术   466篇
冶金工业   152篇
原子能技术   9篇
自动化技术   608篇
  2024年   4篇
  2023年   43篇
  2022年   140篇
  2021年   133篇
  2020年   80篇
  2019年   83篇
  2018年   100篇
  2017年   84篇
  2016年   103篇
  2015年   88篇
  2014年   116篇
  2013年   189篇
  2012年   142篇
  2011年   225篇
  2010年   141篇
  2009年   136篇
  2008年   172篇
  2007年   118篇
  2006年   107篇
  2005年   71篇
  2004年   49篇
  2003年   56篇
  2002年   37篇
  2001年   28篇
  2000年   31篇
  1999年   23篇
  1998年   50篇
  1997年   45篇
  1996年   28篇
  1995年   18篇
  1994年   16篇
  1993年   11篇
  1992年   6篇
  1991年   3篇
  1990年   4篇
  1989年   5篇
  1988年   8篇
  1987年   2篇
  1986年   1篇
  1985年   3篇
  1983年   1篇
  1982年   5篇
  1981年   2篇
  1980年   4篇
  1978年   3篇
  1977年   3篇
  1976年   1篇
  1975年   2篇
排序方式: 共有2720条查询结果,搜索用时 15 毫秒
31.
32.
In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks, where the unlicensed Secondary Users (SUs) access the frequency channels partially occupied by the licensed Primary Users (PUs). Each channel is characterized by an availability probability unknown to the SUs. We apply population game theory to model the spectrum access problem and develop distributed spectrum access policies based on imitation, a behavior rule widely applied in human societies consisting of imitating successful behaviors. We develop two imitation-based spectrum access policies based on the basic Proportional Imitation (PI) rule and the more advanced Double Imitation (DI) rule given that a SU can only imitate the other SUs operating on the same channel. A systematic theoretical analysis is presented for both policies on the induced imitation dynamics and the convergence properties of the proposed policies to the Nash equilibrium. Simple and natural, the proposed imitation-based spectrum access policies can be implemented distributedly based on solely local interactions and thus is especially suited in decentralized adaptive learning environments as cognitive radio networks.  相似文献   
33.
Defocus can be modeled as a diffusion process and represented mathematically using the heat equation, where image blur corresponds to the diffusion of heat. This analogy can be extended to non-planar scenes by allowing a space-varying diffusion coefficient. The inverse problem of reconstructing 3-D structure from blurred images corresponds to an "inverse diffusion" that is notoriously ill-posed. We show how to bypass this problem by using the notion of relative blur. Given two images, within each neighborhood, the amount of diffusion necessary to transform the sharper image into the blurrier one depends on the depth of the scene. This can be used to devise a global algorithm to estimate the depth profile of the scene without recovering the deblurred image, using only forward diffusion.  相似文献   
34.
35.
In this paper we focus on the aggregation of IDS alerts, an important component of the alert fusion process. We exploit fuzzy measures and fuzzy sets to design simple and robust alert aggregation algorithms. Exploiting fuzzy sets, we are able to robustly state whether or not two alerts are “close in time”, dealing with noisy and delayed detections. A performance metric for the evaluation of fusion systems is also proposed. Finally, we evaluate the fusion method with alert streams from anomaly-based IDS.  相似文献   
36.
Anti-reflective (AR) boundary conditions (BC) have been introduced recently in connection with fast deblurring algorithms, both in the case of signals and images. Here we extend such BCs to d dimensions (d ≥ 1) and we study in detail the algebra induced by the AR-BCs, with strongly symmetric point spread functions (PSF), both from a structural and computational point of view. The use of the re-blurring idea and the computational features of the AR-algebra allow us to apply Tikhonov-like techniques within O(n d log(n)) arithmetic operations, where n d is the number of pixels of the reconstructed object. Extensive numerical experimentation concerning 2D images and strongly symmetric PSFs confirms the effectiveness of our proposal.   相似文献   
37.
Journal of Electronic Testing -  相似文献   
38.

The joint estimation of the location vector and the shape matrix of a set of independent and identically Complex Elliptically Symmetric (CES) distributed observations is investigated from both the theoretical and computational viewpoints. This joint estimation problem is framed in the original context of semiparametric models allowing us to handle the (generally unknown) density generator as an infinite-dimensional nuisance parameter. In the first part of the paper, a computationally efficient and memory saving implementation of the robust and semiparmaetric efficient R-estimator for shape matrices is derived. Building upon this result, in the second part, a joint estimator, relying on the Tyler’s M-estimator of location and on the R-estimator of shape matrix, is proposed and its Mean Squared Error (MSE) performance compared with the Semiparametric Cramér-Rao Bound (SCRB).

  相似文献   
39.
40.
Nano Research - The engineering of self-organized plasmonic metasurfaces is demonstrated using a maskless technique with defocused ion-beam sputtering and kinetically controlled deposition. The...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号