首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12807篇
  免费   393篇
  国内免费   58篇
电工技术   260篇
综合类   16篇
化学工业   2274篇
金属工艺   367篇
机械仪表   361篇
建筑科学   219篇
矿业工程   73篇
能源动力   703篇
轻工业   1171篇
水利工程   190篇
石油天然气   82篇
无线电   1623篇
一般工业技术   2771篇
冶金工业   1544篇
原子能技术   198篇
自动化技术   1406篇
  2024年   39篇
  2023年   177篇
  2022年   505篇
  2021年   504篇
  2020年   409篇
  2019年   407篇
  2018年   553篇
  2017年   512篇
  2016年   483篇
  2015年   280篇
  2014年   446篇
  2013年   886篇
  2012年   518篇
  2011年   676篇
  2010年   540篇
  2009年   531篇
  2008年   476篇
  2007年   389篇
  2006年   331篇
  2005年   263篇
  2004年   244篇
  2003年   219篇
  2002年   180篇
  2001年   143篇
  2000年   147篇
  1999年   156篇
  1998年   355篇
  1997年   231篇
  1996年   251篇
  1995年   219篇
  1994年   182篇
  1993年   171篇
  1992年   143篇
  1991年   151篇
  1990年   114篇
  1989年   108篇
  1988年   130篇
  1987年   109篇
  1986年   89篇
  1985年   115篇
  1984年   94篇
  1983年   107篇
  1982年   99篇
  1981年   88篇
  1980年   78篇
  1979年   54篇
  1978年   46篇
  1977年   56篇
  1976年   76篇
  1975年   32篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In this article, a circularly polarized antenna for ultra‐high frequency radio frequency identification (RFID) tag is presented. The circular polarization is realized by two orthogonal, unequal length linearly tapered meander line cross dipoles. The meander structure with capacitive tip loading is used for size miniaturization of the antenna. A modified T‐match network is employed to feed the cross dipole structure. The measured 10‐dB return loss bandwidth of the cross dipole antenna is 17 MHz (908‐923 MHz) and the corresponding 3‐dB axial ratio bandwidth is 6 MHz (912‐918 MHz). The overall size of the proposed antenna is 0.17λ0 × 0.17λ0 at 915 MHz. The maximum read range between the reader and the tag with the proposed antenna is 4.7 m larger than the analogous linearly polarized tag antenna due to the reduction in polarization loss between the tag and reader antennas. Thus, a maximum read range of 15.66 m with the gain of 1.28 dBic is achieved at 915 MHz.  相似文献   
992.

Person re-identification which aims at matching people across disjoint cameras has received increasing attention due to the widespread use of video surveillance applications. Existing methods concentrate either on robust feature extraction or view-invariant feature transformation. However, the extracted features suffer from various limitations such as color inconsistency and scale variations. Besides, during matching, a probe is compared against each gallery instance which represents only the pairwise relationship and ignores the high order relationship among them. To address these issues, we propose a multi-shot person re-identification framework that first performs a preprocessing task on images to address illumination variations for maintaining the color consistency. Subsequently, we formulate an approach to handle scale variations in the pedestrian appearances for keeping them with relatively a fixed scale ratio. Overlapped visual patches representing appearance cues are then extracted from the processed images. A structured multi-class feature selection approach is employed to select a set of relevant patches that simultaneously discriminates all distinct persons. These selected patches use a hypergraph to represent the visual association among a probe and gallery images. Finally, for matching, we formulate a hypergraph-based learning scheme, which considers both the pairwise and high-order association among the probe and gallery images. The hypergraph structure is then optimized to yield an improved similarity score for a probe against each gallery instance. The effectiveness of our proposed framework is validated on three public datasets and comparison with state-of-the-art methods shows the superior performance of our framework.

  相似文献   
993.
994.
Developing, maintaining, and disseminating trust in open, dynamic environments is crucial. We propose self-organizing referral networks as a means for establishing trust in such environments. A referral network consists of autonomous agents that model others in terms of their trustworthiness and disseminate information on others' trustworthiness. An agent may request a service from another; a requested agent may provide the requested service or give a referral to someone else. Possibly with its user's help, each agent can judge the quality of service obtained. Importantly, the agents autonomously and adaptively decide with whom to interact and choose what referrals to issue, if any. The choices of the agents lead to the evolution of the referral network, whereby the agents move closer to those that they trust. This paper studies the guidelines for engineering self-organizing referral networks. To do so, it investigates properties of referral networks via simulation. By controlling the actions of the agents appropriately, different referral networks can be generated. This paper first shows how the exchange of referrals affects service selection. It identifies interesting network topologies and shows under which conditions these topologies emerge. Based on the link structure of the network, some agents can be identified as authorities. Finally, the paper shows how and when such authorities emerge. The observations of these simulations are then formulated into design recommendations that can be used to develop robust, self-organizing referral networks.  相似文献   
995.
Fractional advection–dispersion equation (FADE) is a generalization of the classical ADE in which the first order time derivative and first and second order space derivatives are replaced by Caputo derivatives of orders 0<α?1, 0<β?1 and 1<γ?2, respectively. We use Caputo definition to avoid (i) mass balance error, (ii) hyper-singular improper integral, (iii) non-zero derivative of constant, and (iv) fractional derivative involved in the initial condition which is often ill-defined. We present an analytic algorithm to solve FADE based on homotopy analysis method (HAM) which has the advantage of controlling the region and rate of convergence of the solution series via the auxiliary parameter ? over the variational iteration method (VIM) and homotopy perturbation method (HPM). We find that the proposed method converges to the numerical/exact solution of the ADE as the fractional orders α, β, γ tend to their integral values. Numerical examples are given to illustrate the proposed algorithm. Example 5 describes the intermediate process between advection and dispersion via Caputo fractional derivative.  相似文献   
996.
997.
Design and learning of networks best suited for a particular application is a never-ending process. But this process is restricted due to problems like stability, plasticity, computation and memory consumption. In this paper, we try to overcome these problems by proposing two interval networks (INs), based on a simple feed-forward neural network (NN) and Choquet integral (CI). They have simple structures that reduce the problems of computation and memory consumption. The use of Lyapunov stability (LS) in combination with fuzzy difference (FD) based learning algorithm evolve the converging and diverging process which in turn assures the stability. FD gives a range of variation of parameters having the lower and the upper bounds within which the system is stable thus defining the plasticity. Effectiveness and applicability of the NN and CI based network models are investigated on several benchmark problems dealing with both identification and control.  相似文献   
998.
Near-Optimal Reinforcement Learning in Polynomial Time   总被引:1,自引:0,他引:1  
Kearns  Michael  Singh  Satinder 《Machine Learning》2002,49(2-3):209-232
We present new algorithms for reinforcement learning and prove that they have polynomial bounds on the resources required to achieve near-optimal return in general Markov decision processes. After observing that the number of actions required to approach the optimal return is lower bounded by the mixing time T of the optimal policy (in the undiscounted case) or by the horizon time T (in the discounted case), we then give algorithms requiring a number of actions and total computation time that are only polynomial in T and the number of states and actions, for both the undiscounted and discounted cases. An interesting aspect of our algorithms is their explicit handling of the Exploration-Exploitation trade-off.  相似文献   
999.
This study addresses the issues concerning the design of adverse condition warning systems (ACWS). ACWS are designed to sense adverse road and weather conditions as well as system states that can negatively impact driving performance leading to skids or accidents, and alert drivers to these conditions. In this case, an ACWS was designed to sense when a car was likely to skid. A virtual-driving environment was used to test two levels of alarm sensitivity (low and high) and two types of auditory alarm signal (Binary ON/OFF and Graded) along with a no-alarm control group. Dependent measures reflected driver performance, response to the alarm signal and trust in the alerting system. Results indicated that participants had fewer skids in the low sensitivity and graded alarm signal condition compared to some other alerting system configurations. Participants in the graded alarm signal condition also had a greater degree of lateral control over the vehicle. Additionally, trust was found to be lower for the high vs. low sensitivity alarm condition, indicating a reduction in trust when the alerting system activated more often, perhaps because participants did not feel the system was accurately reflecting a dangerous condition. This simulator-based research emphasizes the fact that while ACWS may provide an advantage in terms of vehicle control, characteristics of both the alerting signal and system configuration should be considered.  相似文献   
1000.
From geological and planetary exploration perspectives, automated sub-pixel classification of hyperspectral data is the most difficult task as it involves blind unmixing with library spectra of minerals. In this study, we demonstrate a procedure involving spectral transformation and linear unmixing to achieve the above task. For this purpose, infrared spectra of rocks from the spectral library, field, and remotely sensed hyperspectral image cube were used. Potential spectra of minerals for unmixing rock spectra were drawn from the library based on similarity of absorption features measured using Pearson correlation coefficient. Eight transformation techniques namely, first derivative, fast Fourier transform, discrete wavelet transform, Hilbert–Huang transform, crude low pass filter, S-transform, binary encoding, spectral effective peak matching, and two sparsity-based techniques (orthogonal matching pursuit, sparse unmixing via variable splitting, and augmented Lagrangian) were evaluated. Subsequently, minerals identified by above techniques were unmixed by linear mixture model (LMM) to decipher mineralogical composition and abundance. Results of LMM achieved using fully constrained least-square-estimation-based quadratic programming optimization approach were evaluated by conventional procedures such as X-ray diffraction and microscopy. In the case of image cube, endmembers derived using minimum noise fraction and pixel purity index were subjected to above procedure. It is evident that the discrete-wavelet-transformation-based approach produced excellent and meaningful results due to its flexibility in scaling the data and capability to handle noisy spectra. It is interesting to note that the adopted procedure could perform sub-pixel classification of image cube automatically and identify predominance of dolomite in limestone and sodium in alunite based on subtle differences in absorption positions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号