首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5558篇
  免费   498篇
  国内免费   27篇
电工技术   111篇
综合类   15篇
化学工业   1464篇
金属工艺   139篇
机械仪表   119篇
建筑科学   208篇
矿业工程   18篇
能源动力   377篇
轻工业   521篇
水利工程   64篇
石油天然气   138篇
无线电   687篇
一般工业技术   1033篇
冶金工业   217篇
原子能技术   40篇
自动化技术   932篇
  2024年   18篇
  2023年   170篇
  2022年   314篇
  2021年   377篇
  2020年   282篇
  2019年   288篇
  2018年   361篇
  2017年   286篇
  2016年   327篇
  2015年   231篇
  2014年   282篇
  2013年   476篇
  2012年   286篇
  2011年   307篇
  2010年   230篇
  2009年   230篇
  2008年   183篇
  2007年   143篇
  2006年   132篇
  2005年   137篇
  2004年   107篇
  2003年   71篇
  2002年   65篇
  2001年   70篇
  2000年   60篇
  1999年   66篇
  1998年   76篇
  1997年   44篇
  1996年   47篇
  1995年   23篇
  1994年   29篇
  1993年   39篇
  1992年   27篇
  1991年   18篇
  1990年   24篇
  1989年   30篇
  1988年   22篇
  1987年   10篇
  1986年   18篇
  1985年   16篇
  1984年   16篇
  1983年   15篇
  1982年   13篇
  1981年   11篇
  1980年   12篇
  1979年   9篇
  1978年   14篇
  1977年   11篇
  1976年   18篇
  1974年   12篇
排序方式: 共有6083条查询结果,搜索用时 0 毫秒
21.
We propose a novel pose-invariant face recognition approach which we call Discriminant Multiple Coupled Latent Subspace framework. It finds the sets of projection directions for different poses such that the projected images of the same subject in different poses are maximally correlated in the latent space. Discriminant analysis with artificially simulated pose errors in the latent space makes it robust to small pose errors caused due to a subject’s incorrect pose estimation. We do a comparative analysis of three popular latent space learning approaches: Partial Least Squares (PLSs), Bilinear Model (BLM) and Canonical Correlational Analysis (CCA) in the proposed coupled latent subspace framework. We experimentally demonstrate that using more than two poses simultaneously with CCA results in better performance. We report state-of-the-art results for pose-invariant face recognition on CMU PIE and FERET and comparable results on MultiPIE when using only four fiducial points for alignment and intensity features.  相似文献   
22.
This paper proposes a method for designing robust H?? static output feedback stabilization of Takagi-Sugeno (T-S) fuzzy systems under actuator saturation. In this paper, the input saturation is represented by a polytopic model and the modeling error is assumed a norm-bounded uncertainty. A set invariance condition for robust H?? static output feedback system under actuator saturation is first established. Then, the estimation of the largest domain of attraction for the system is formulated and solved as a Linear Matrix Inequality (LMI) optimization problem. Two examples are used to demonstrate the effectiveness of the proposed design method.  相似文献   
23.
A laser-based light attenuation technique was successfully used to measure interfacial areas as high as 5832 m2/m3 and Sauter mean bubble diameter varying between 50 and 5600 μm. Good agreement between this approach and the photographic technique was obtained particularly at low gas holdups.  相似文献   
24.
Silhouette-based human action recognition using SAX-Shapes   总被引:1,自引:0,他引:1  
Human action recognition is an important problem in Computer Vision. Although most of the existing solutions provide good accuracy results, the methods are often overly complex and computationally expensive, hindering practical applications. In this regard, we introduce the combination of time-series representation for the silhouette and Symbolic Aggregate approXimation (SAX), which we refer to as SAX-Shapes, to address the problem of human action recognition. Given an action sequence, the extracted silhouettes of an actor from every frame are transformed into time series. Each of these time series is then efficiently converted into the symbolic vector: SAX. The set of all these SAX vectors (SAX-Shape) represents the action. We propose a rotation invariant distance function to be used by a random forest algorithm to perform the human action recognition. Requiring only silhouettes of actors, the proposed method is validated on two public datasets. It has an accuracy comparable to the related works and it performs well even in varying rotation.  相似文献   
25.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious.  相似文献   
26.
The development of a tensile testing methodology for ceramics which enables a stress vs strain-rate response to be measured at high temperature is described. The test involves a carefully controled stress relaxation test at constant total strain using an experimental procedure and phenomenological analysis previously developed for metallic materials. It is demonstrated here with preliminary tests on alumina at 1050° and 1150°C. This offers, with further development, the possibility of establishing design stresses associated with low strain-rate behavior for structural applications. The results demonstrate that data covering four decades of strain rate may be generated in tests lasting a few hours. The inelastic strain consists of substantial anelastic recoverable strain in addition to a permanent creep strain.  相似文献   
27.
A robust Fault Diagnosis (FD) scheme for a real quadrotor Unmanned Aerial Vehicle (UAV) is proposed in this paper. Firstly, a novel Adaptive Thau observer (ATO) is developed to estimate the quadrotor system states and build a set of offset residuals to indicate actuators’ faults. Based on these residuals, some rules of Fault Diagnosis (FD) are designed to detect and isolate the faults as well as estimate the fault offset parameters. Secondly, a synthetic robust optimization scheme is presented to improve Fault Estimation (FE) accuracies, three key issues include modeling uncertainties, and magnitude order unbalances as well as noises are addressed. Finally, a typical fault of rotors is simulated and injected into one of four rotors of the quadrotor, and experiments for the FD scheme have been carried out. Unlike former research works on the FD schemes for quadrotors, our proposed FD scheme based on the ATO can not only detect and isolate the failed actuators, but also estimate the fault severities. Regardless of roughness of the real flying data, the FD results still have sufficient FE accuracies.  相似文献   
28.
A heavy Iraqi residue was thermally cracked using a soaker visbreaking process at temperatures between 435 and 480 °C, with a range of residence times of 43–109 s in the coil and 151–379 s in the soaker. The pressure was kept constant at 7 bar. Visbroken products were characterized, evaluated and fractionated into light, middle and heavy cuts. The stability of the visbroken products was compared with that of the original feedstock. Also an activation energy was calculated for the visbreaking process and related to the severity of the process. The results obtained show that the conditions used were not severe and could be applied to obtain a required conversion depending on the uses of the products.  相似文献   
29.
30.
In this paper, we discuss the design of a new Medium Access Control (MAC) protocol, SRI-MAC (Synchronous Receiver Initiated MAC), for wireless sensor networks whose goal is to extend the lifetime of the network by avoiding major energy waste causes, such as collisions, overhearing and idle listening.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号