首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   99784篇
  免费   10698篇
  国内免费   6344篇
电工技术   7820篇
技术理论   6篇
综合类   7820篇
化学工业   14613篇
金属工艺   5681篇
机械仪表   6757篇
建筑科学   8279篇
矿业工程   3443篇
能源动力   2918篇
轻工业   7766篇
水利工程   2336篇
石油天然气   5150篇
武器工业   1122篇
无线电   12088篇
一般工业技术   10147篇
冶金工业   4015篇
原子能技术   1330篇
自动化技术   15535篇
  2024年   604篇
  2023年   1879篇
  2022年   3766篇
  2021年   5237篇
  2020年   3865篇
  2019年   2981篇
  2018年   3324篇
  2017年   3733篇
  2016年   3249篇
  2015年   4839篇
  2014年   6130篇
  2013年   7109篇
  2012年   8194篇
  2011年   8678篇
  2010年   7646篇
  2009年   7143篇
  2008年   6859篇
  2007年   6109篇
  2006年   5353篇
  2005年   4432篇
  2004年   2919篇
  2003年   2072篇
  2002年   1892篇
  2001年   1519篇
  2000年   1366篇
  1999年   1257篇
  1998年   873篇
  1997年   783篇
  1996年   674篇
  1995年   555篇
  1994年   470篇
  1993年   316篇
  1992年   251篇
  1991年   181篇
  1990年   129篇
  1989年   87篇
  1988年   94篇
  1987年   55篇
  1986年   37篇
  1985年   16篇
  1984年   24篇
  1983年   11篇
  1982年   19篇
  1981年   18篇
  1980年   27篇
  1979年   18篇
  1978年   2篇
  1976年   2篇
  1959年   16篇
  1951年   11篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
遥感影像的精确配准和正射纠正是进行图像融合、变化检测、图像镶嵌、定量遥感建模、多时相和多传感器影像协同应用的基础和前提。以美国国家航空和航天管理局下设LEDAPS(Landsat Ecosystem Disturbance Adaptive Processing System)课题组开发的配准与正射纠正程序包AROP(Automated Registration and Orthorectification Package)为例,详细阐述了其配准的原理与程序设计流程,并对其配准的精度进行了分析和评价。试验表明:AROP程序包算法能够找出足够的控制点,且控制点分布较为均匀,配准误差小于0.5个像元。误差特征表现为:扫描误差明显大于航向误差,误差的结果与影像漂移、DEM、坡度存在一定的相关性,高程和坡度是影响配准精度的主要因素之一。该程序包目前能够用于对我国CBERS影像的正射校正以及波段不匹配处理,但是对HJ卫星CCD影像数据配准还有待于进一步研究。  相似文献   
82.
基于动态时间规整的手势加速度信号识别   总被引:1,自引:0,他引:1  
为了提高基于加速度传感器的动态手势识别算法的性能,本文采用了动态时间规整(DTW)识别算法。通过该算法计算测试模板和参考模板的相似度,从而得出识别结果。为了验证该方法,建立了一套手势加速度无线采集系统,并采集了41个志愿者的手势信息。实验结果表明,该方法手势平均识别率在97%以上。与HMM识别算法相比,DTW识别算法在识别的准确率上比HMM识别算法更具优势。  相似文献   
83.
张蕾  张堃  宋军 《传感技术学报》2012,25(5):673-677
针对移动无线传感器网络设计一种不依赖于节点地理位置的基于移动汇聚节点(Sink)的数据收集算法(Mobile Sink-based Data Gathering,MSDG)。该算法解决了无线传感器网络中多跳路由通信时出现能量空洞的"热点"问题。Sink沿途以最近的固定节点作为根节点动态构建路由树。簇内移动节点感知的数据经簇头进行数据融合计算,然后将融合后的数据沿路由树反向逐跳转发给Sink。仿真结果表明,MSDG在节点的平均能耗和网络生存时间等方面的性能远超过LEACH、ACE-L等数据收集协议。  相似文献   
84.
分析新形势下软件工程的发展,从技术交流、版本控制、构件复用、进度管理、质量保证等方面讨论它的优点;从安全问题、需求和开发之间的矛盾、逆向工程和再工程和体系结构等方面分析了需要注意的问题,得出的结论是任何事物都具有两面性,Internet不仅给软件工程带来了很多积极特性,同时也有很多负面问题。  相似文献   
85.
在长途通信网和市话通信网中光纤通信网代替电缆通信网已成为被世界所公认的事实。此时因为通信距离影响,导致利用率的不断下降,所以为光纤通信取得进一步发展,必须寻找新的途径,采用新的技术。本文首先简要概述光纤通信技术特点,然后阐明光纤通信新技术的实践应用,最后进行对光纤通信新技术的研究探讨。  相似文献   
86.
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier.  相似文献   
87.

As the global economy develops rapidly, traffic congestion has become a major problem for first-tier cities in various countries. In order to address the problem of failed real-time control of the traffic flow data by the traditional traffic light control as well as malicious attack and other security problems faced by the intelligent traffic light (ITL) control system, a multi-agent distributed ITL control method was proposed based on the fog computing platform and the Q learning algorithm used for the reinforcement learning in this study, and the simulation comparison was conducted by using the simulation platform jointly constructed based on the VISSIM-Excel VBA-MATLAB software. Subsequently, on the basis of puzzle difficulty of the computational Diffie–Helleman (CDH) and Hash Collision, the applicable security control scheme of ITL under the fog computing was proposed. The results reveal that the proposed intelligent control system prolongs the time of green light properly when the number of vehicles increases, thereby reducing the delay time and retention rate of vehicles; the security control scheme of ITL based on the puzzle of CDH is less efficient when the vehicle density increases, while that based on the puzzle of Hash collision is very friendly to the fog equipment. In conclusion, the proposed control method of ITL based on the fog computing and Q learning algorithm can alleviate the traffic congestion effectively, so the proposed method has high security.

  相似文献   
88.
International Journal of Computer Vision - Occlusion is probably the biggest challenge for human pose estimation in the wild. Typical solutions often rely on intrusive sensors such as IMUs to...  相似文献   
89.
Xia  Lei  Lv  Jiancheng  Xie  Chunzhi  Yin  Jing 《Applied Intelligence》2021,51(11):8334-8348

In the context of human-robot and robot-robot interactions, the better cooperation can be achieved by predicting the other party’s subsequent actions based on the current action of the other party. The time duration for adjustment is not sufficient provided by short term forecasting models to robots. A longer duration can by achieved by mid-term forecasting. But the mid-term forecasting models introduce the previous errors into the follow-up forecasting and amplified gradually, eventually invalidating the forecasting. A new mid-term forecasting with error suppression based on restricted Boltzmann machine(RBM) is proposed in this paper. The proposed model can suppress the error amplification by replacing the previous inputs with their features, which are retrieved by a deep belief network(DBN). Furthermore, a new mechanism is proposed to decide whether the forecasting result is accepted or not. The model is evaluated with several datasets. The reported experiments demonstrate the superior performance of the proposed model compared to the state-of-the-art approaches.

  相似文献   
90.
Tong  Ming  Yan  Kaibo  Jin  Lei  Yue  Xing  Li  Mingyang 《Neural computing & applications》2021,33(15):9375-9389
Neural Computing and Applications - Video-based human action recognition remains a challenging task. There are three main limitations: (1) Most works are only restricted to single temporal scale...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号