首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7052篇
  免费   380篇
  国内免费   52篇
电工技术   133篇
综合类   26篇
化学工业   1770篇
金属工艺   118篇
机械仪表   211篇
建筑科学   278篇
矿业工程   6篇
能源动力   463篇
轻工业   729篇
水利工程   76篇
石油天然气   119篇
无线电   658篇
一般工业技术   1153篇
冶金工业   342篇
原子能技术   84篇
自动化技术   1318篇
  2024年   20篇
  2023年   144篇
  2022年   291篇
  2021年   406篇
  2020年   295篇
  2019年   337篇
  2018年   416篇
  2017年   357篇
  2016年   356篇
  2015年   237篇
  2014年   321篇
  2013年   649篇
  2012年   358篇
  2011年   508篇
  2010年   356篇
  2009年   329篇
  2008年   289篇
  2007年   218篇
  2006年   205篇
  2005年   143篇
  2004年   111篇
  2003年   120篇
  2002年   91篇
  2001年   64篇
  2000年   73篇
  1999年   50篇
  1998年   78篇
  1997年   41篇
  1996年   50篇
  1995年   40篇
  1994年   36篇
  1993年   45篇
  1992年   36篇
  1991年   32篇
  1990年   30篇
  1989年   20篇
  1988年   36篇
  1987年   30篇
  1986年   20篇
  1985年   15篇
  1984年   27篇
  1983年   22篇
  1982年   22篇
  1981年   18篇
  1980年   21篇
  1979年   16篇
  1978年   18篇
  1976年   18篇
  1975年   19篇
  1974年   12篇
排序方式: 共有7484条查询结果,搜索用时 703 毫秒
131.
This paper deals with state estimation problem for uncertain continuous‐time systems. A numerical treatment is proposed for designing interval observers that ensures guaranteed upper and lower bounds on the estimated states. In order to take into account possible perturbations on the system and its outputs, a new type of interval observers is introduced. Such interval observers consist of two coupled general Luenberger‐type observers that involve dilatation functions. In addition, we provide an optimality criterion in order to find optimal interval observers that lead to tight interval error estimation. The proposed existence and optimality conditions are expressed in terms of linear programming. Also, some illustrative examples are given. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
132.
This study focuses on the behavior of a cylindrical metal halide discharge lamp powered by frequency‐controlled electronic ballast. Half‐bridge electronic ballast was designed and achieved.  相似文献   
133.
This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication.  相似文献   
134.
Many recent software engineering papers have examined duplicate issue reports. Thus far, duplicate reports have been considered a hindrance to developers and a drain on their resources. As a result, prior research in this area focuses on proposing automated approaches to accurately identify duplicate reports. However, there exists no studies that attempt to quantify the actual effort that is spent on identifying duplicate issue reports. In this paper, we empirically examine the effort that is needed for manually identifying duplicate reports in four open source projects, i.e., Firefox, SeaMonkey, Bugzilla and Eclipse-Platform. Our results show that: (i) More than 50 % of the duplicate reports are identified within half a day. Most of the duplicate reports are identified without any discussion and with the involvement of very few people; (ii) A classification model built using a set of factors that are extracted from duplicate issue reports classifies duplicates according to the effort that is needed to identify them with a precision of 0.60 to 0.77, a recall of 0.23 to 0.96, and an ROC area of 0.68 to 0.80; and (iii) Factors that capture the developer awareness of the duplicate issue’s peers (i.e., other duplicates of that issue) and textual similarity of a new report to prior reports are the most influential factors in our models. Our findings highlight the need for effort-aware evaluation of approaches that identify duplicate issue reports, since the identification of a considerable amount of duplicate reports (over 50 %) appear to be a relatively trivial task for developers. To better assist developers, research on identifying duplicate issue reports should put greater emphasis on assisting developers in identifying effort-consuming duplicate issues.  相似文献   
135.
This paper describes the design and implementation of a computational model for Arabic natural language semantics, a semantic parser for capturing the deep semantic representation of Arabic text. The parser represents a major part of an Interlingua-based machine translation system for translating Arabic text into Sign Language. The parser follows a frame-based analysis to capture the overall meaning of Arabic text into a formal representation suitable for NLP applications that need for deep semantics representation, such as language generation and machine translation. We will show the representational power of this theory for the semantic analysis of texts in Arabic, a language which differs substantially from English in several ways. We will also show that the integration of WordNet and FrameNet in a single unified knowledge resource can improve disambiguation accuracy. Furthermore, we will propose a rule based algorithm to generate an equivalent Arabic FrameNet, using a lexical resource alignment of FrameNet1.3 LUs and WordNet3.0 synsets for English Language. A pilot study of motion and location verbs was carried out in order to test our system. Our corpus is made up of more than 2000 Arabic sentences in the domain of motion events collected from Algerian first level educational Arabic books and other relevant Arabic corpora.  相似文献   
136.
The efficient application of current methods of shadow detection in video is hindered by the difficulty in defining their parameters or models and/or their application domain dependence. This paper presents a new shadow detection and removal method that aims to overcome these inefficiencies. It proposes a semi-supervised learning rule using a new variant of co-training technique for shadow detection and removal in uncontrolled scenes. The new variant both reduces the run-time through a periodical execution of a co-training process according to a novel temporal framework, and generates a more generic prediction model for an accurate classification. The efficiency of the proposed method is shown experimentally on a testbed of videos that were recorded by a static camera and that included several constraints, e.g., dynamic changes in the natural scene and various visual shadow features. The conducted experimental study produced quantitative and qualitative results that highlighted the robustness of our shadow detection method and its accuracy in removing cast shadows. In addition, the practical usefulness of the proposed method was evaluated by integrating it in a Highway Control and Management System software called RoadGuard.  相似文献   
137.
Use Case modeling is a popular technique for documenting functional requirements of software systems. Refactoring is the process of enhancing the structure of a software artifact without changing its intended behavior. Refactoring, which was first introduced for source code, has been extended for use case models. Antipatterns are low quality solutions to commonly occurring design problems. The presence of antipatterns in a use case model is likely to propagate defects to other software artifacts. Therefore, detection and refactoring of antipatterns in use case models is crucial for ensuring the overall quality of a software system. Model transformation can greatly ease several software development activities including model refactoring. In this paper, a model transformation approach is proposed for improving the quality of use case models. Model transformations which can detect antipattern instances in a given use case model, and refactor them appropriately are defined and implemented. The practicability of the approach is demonstrated by applying it on a case study that pertains to biodiversity database system. The results show that model transformations can efficiently improve quality of use case models by saving time and effort.  相似文献   
138.
We propose a new relational clustering approach, called Fuzzy clustering with Learnable Cluster-dependent Kernels (FLeCK), that learns the underlying cluster-dependent dissimilarity measure while seeking compact clusters. The learned dissimilarity is based on a Gaussian kernel function with cluster-dependent parameters. Each cluster’s parameter learned by FLeCK reflects the relative intra-cluster and inter-cluster characteristics. These parameters are learned by optimizing both the intra-cluster and the inter-cluster distances. This optimization is achieved iteratively by dynamically updating the partition and the local kernel. This makes the kernel learning task takes advantages of the available unlabeled data and reciprocally, the categorization task takes advantages of the learned local kernels. Another key advantage of FLeCK is that it is formulated to work on relational data. This makes it applicable to data where objects cannot be represented by vectors or when clusters of similar objects cannot be represented efficiently by a single prototype. Using synthetic and real data sets, we show that FLeCK learns meaningful parameters and outperforms several other algorithms. In particular, we show that when data include clusters with various inter- and intra-cluster distances, learning cluster-dependent parameters is crucial in obtaining a good partition.  相似文献   
139.
This paper presents a new technique to design fixed‐structure controllers for linear unknown systems using a set of measurements. In model‐based approaches, the measured data are used to identify a model of the plant for which a suitable controller can be designed. Due to the fact that real processes cannot be described perfectly by mathematical models, designing controllers using such models to guarantee some desired closed‐loop performance is a challenging task. Hence, a possible alternative to model‐based methods is to directly utilize the measured data in the design process. We propose an approach to designing structured controllers using a set of closed‐loop frequency‐domain data. The principle of such an approach is based on computing the parameters of a fixed‐order controller for which the closed‐loop frequency response fits a desired frequency response that describes some desired performance indices. This problem is formulated as an error minimization problem, which can be solved to find suitable values of the controller parameters. The main feature of the proposed control methodology is that it can be applied to stable and unstable plants. Additionally, the design process depends on a pre‐selected controller structure, which allows for the selection of low‐order controllers. An application of the proposed method to a DC servomotor system is presented to experimentally validate and demonstrate its efficacy.  相似文献   
140.
The topic of this paper is machine translation (MT) from French text into French sign language (LSF). After arguing in favour of a rule-based method, it presents the architecture of an original MT system, built on two distinct efforts: formalising LSF production rules and triggering them with text processing. The former is made without any concern for text or translation and involves corpus analysis to link LSF form features to linguistic functions. It produces a set of production rules which may constitute a full LSF production grammar. The latter is an information extraction task from text, broken down in as many subtasks as there are rules in the grammar. After discussing this architecture, comparing it to the traditional methods and presenting the methodology for each task, the paper present the set of production rules found to govern event precedence and duration in LSF and gives a progress report on the implementation of the rule triggering system. With this proposal, it is also hoped to show how MT can benefit today from sign language processing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号