首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   90400篇
  免费   15886篇
  国内免费   202篇
电工技术   1561篇
综合类   92篇
化学工业   26678篇
金属工艺   2412篇
机械仪表   3828篇
建筑科学   2840篇
矿业工程   52篇
能源动力   2959篇
轻工业   10623篇
水利工程   527篇
石油天然气   253篇
武器工业   1篇
无线电   15599篇
一般工业技术   21112篇
冶金工业   6360篇
原子能技术   655篇
自动化技术   10936篇
  2023年   520篇
  2022年   667篇
  2021年   1628篇
  2020年   2275篇
  2019年   3859篇
  2018年   4154篇
  2017年   4411篇
  2016年   5116篇
  2015年   4823篇
  2014年   5516篇
  2013年   7995篇
  2012年   5659篇
  2011年   6093篇
  2010年   5371篇
  2009年   5468篇
  2008年   4810篇
  2007年   4217篇
  2006年   3791篇
  2005年   3188篇
  2004年   3080篇
  2003年   2893篇
  2002年   2802篇
  2001年   2299篇
  2000年   2194篇
  1999年   1594篇
  1998年   2241篇
  1997年   1478篇
  1996年   1223篇
  1995年   976篇
  1994年   738篇
  1993年   696篇
  1992年   501篇
  1991年   505篇
  1990年   426篇
  1989年   406篇
  1988年   322篇
  1987年   281篇
  1986年   260篇
  1985年   233篇
  1984年   201篇
  1983年   153篇
  1982年   152篇
  1981年   131篇
  1980年   130篇
  1979年   102篇
  1978年   95篇
  1977年   124篇
  1976年   158篇
  1975年   80篇
  1974年   74篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In places where mobile users can access multiple wireless networks simultaneously, a multipath scheduling algorithm can benefit the performance of wireless networks and improve the experience of mobile users. However, existing literature shows that it may not be the case, especially for TCP flows. According to early investigations, there are mainly two reasons that result in bad performance of TCP flows in wireless networks. One is the occurrence of out-of-order packets due to different delays in multiple paths. The other is the packet loss which is resulted from the limited bandwidth of wireless networks. To better exploit multipath scheduling for TCP flows, this paper presents a new scheduling algorithm named Adaptive Load Balancing Algorithm (ALBAM) to split traffic across multiple wireless links within the ISP infrastructure. Targeting at solving the two adverse impacts on TCP flows, ALBAM develops two techniques. Firstly, ALBAM takes advantage of the bursty nature of TCP flows and performs scheduling at the flowlet granularity where the packet interval is large enough to compensate for the different path delays. Secondly, ALBAM develops a Packet Number Estimation Algorithm (PNEA) to predict the buffer usage in each path. With PNEA, ALBAM can prevent buffer overflow and schedule the TCP flow to a less congested path before it suffers packet loss. Simulations show that ALBAM can provide better performance to TCP connections than its other counterparts.  相似文献   
992.
In this paper, we present an efficient way of implementing OpenGL ES 1.1 3D graphics API library for the environments with hardware-supported OpenGL facility, typically as desktop PCs. Although OpenGL ES was started from the existing OpenGL features, it rapidly became the standard 3D graphics library customized for embedded systems through introducing fixed-point arithmetic operations, buffer management with fixed-point data type supports, completely new texture mapping functions and others. Currently, it is the official 3D graphics API for Google Android, Apple iPhone, Sony PlayStation3, etc. In this paper, we achieved improvements on the arithmetic operations for the fixed-point number representation, which is the most characteristic data type for OpenGL ES 1.1. For the conversion of fixed-point data types to the floating-point number representations for the underlying OpenGL, we show the way of efficient conversion processes even with satisfying OpenGL ES standard requirements. We also introduced a specialized memory management scheme to manage the converted data from the buffer containing fixed-point numbers. In the case of texture processing, the requirements in both standards are quite different, and thus we used completely new software-implementations. Our final implementation of OpenGL ES library provides all of more than 200 functions in the standard specification and passed its conformance test, to show its compliance with the standard. From the efficiency point of view, we measured its execution times for several OpenGL ES-specific application programs and achieved remarkable improvements.  相似文献   
993.
Due to the advancement of wireless internet and mobile positioning technology, the application of location-based services (LBSs) has become popular for mobile users. Since users have to send their exact locations to obtain the service, it may lead to several privacy threats. To solve this problem, a cloaking method has been proposed to blur users’ exact locations into a cloaked spatial region with a required privacy threshold (k). With the cloaked region, an LBS server can carry out a k-nearest neighbor (k-NN) search algorithm. Some recent studies have proposed methods to search k-nearest POIs while protecting a user’s privacy. However, they have at least one major problem, such as inefficiency on query processing or low precision of retrieved result. To resolve these problems, in this paper, we propose a novel k-NN query processing algorithm for a cloaking region to satisfy both requirements of fast query processing time and high precision of the retrieved result. To achieve fast query processing time, we propose a new pruning technique based on a 2D-coodinate scheme. In addition, we make use of a Voronoi diagram for retrieving the nearest POIs efficiently. To satisfy the requirement of high precision of the retrieved result, we guarantee that our k-NN query processing algorithm always contains the exact set of k nearest neighbors. Our performance analysis shows that our algorithm achieves better performance in terms of query processing time and the number of candidate POIs compared with other algorithms.  相似文献   
994.
Dominant features for the content-based image retrieval usually have high-dimensionality. So far, many researches have been done to index such values to support fast retrieval. Still, many existing indexing schemes are suffering from performance degradation due to the curse of dimensionality problem. As an alternative, heuristic algorithms have been proposed to calculate the answer with ??high probability?? at the cost of accuracy. In this paper, we propose a new hash tree-based indexing structure called tertiary hash tree for indexing high-dimensional feature data. Tertiary hash tree provides several advantages compared to the traditional extendible hash structure in terms of resource usage and search performance. Through extensive experiments, we show that our proposed index structure achieves outstanding performance.  相似文献   
995.
Recently, watermarking based data transmission techniques using terrestrial digital TV signal have been proposed since they are also cost-free and can overcome the limitations of GPS. However, in the previous watermarking based methods, the detection accuracy is low and additional data rate is too low. Thus, we propose the throughput enhancement method by employing the TZCD-MBOK watermarking technique in T-DMB system. By applying the proposed scheme to T-DMB, it allows additional data transmission for disaster broadcasting and improves efficiency of data transmission in shadow region and indoor to mobile environment through watermarking spread code. From the simulation results, we confirm the proposed watermarking scheme affected on the existing T-DMB signal. Moreover, it was also confirmed that the system capacity increases as the power of additional watermarking signal rose. The results of the paper can be applied to wireless multimedia digital broadcasting systems.  相似文献   
996.
This paper presents a 2D to 3D conversion scheme to generate a 3D human model using a single depth image with several color images. In building a complete 3D model, no prior knowledge such as a pre-computed scene structure and photometric and geometric calibrations is required since the depth camera can directly acquire the calibrated geometric and color information in real time. The proposed method deals with a self-occlusion problem which often occurs in images captured by a monocular camera. When an image is obtained from a fixed view, it may not have data for a certain part of an object due to occlusion. The proposed method consists of following steps to resolve this problem. First, the noise in a depth image is reduced by using a series of image processing techniques. Second, a 3D mesh surface is constructed using the proposed depth image-based modeling method. Third, the occlusion problem is resolved by removing the unwanted triangles in the occlusion region and filling the corresponding hole. Finally, textures are extracted and mapped to the 3D surface of the model to provide photo-realistic appearance. Comparison results with the related work demonstrate the efficiency of our method in terms of visual quality and computation time. It can be utilized in creating 3D human models in many 3D applications.  相似文献   
997.
Functional data learning is an extension of traditional data learning, that is, learning the data chosen from the Euclidean space ${\mathbb{R}^{n}}$ to a metric space. This paper focuses on the functional data learning with generalized single-hidden layer feedforward neural networks (GSLFNs) acting on some metric spaces. In addition, three learning algorithms, named Hilbert parallel overrelaxation backpropagation (H-PORBP) algorithm, ν-generalized support vector regression (ν-GSVR) and generalized extreme learning machine (G-ELM) are proposed to train the GSLFNs acting on some metric spaces. The experimental results on some metric spaces indicate that GELM with additive/RBF hidden-nodes has a faster learning speed, a better accuracy, and a better stability than HPORBP algorithm and ν-GSVR for training the functional data. The idea of GELM can be used to extend those improved extreme learning machines (ELMs) that act on the Euclidean space ${\mathbb{R}^{n}, }$ such as online sequential ELM, incremental ELM, pruning ELM and so on, to some metric spaces.  相似文献   
998.
The analysis method of optimal tracking performance is proposed for multiple‐input multiple‐output (MIMO) linear time‐invariant (LTI) systems under disturbance rejection. An H2 criterion of the error signal between the output of the plant and the reference signal is used as a measure for the tracking performance. Spectral factorization is applied to obtain the optimal solution of the system tracking error. The explicit expressions are derived for this minimal tracking error with respect to random reference signals under disturbance rejection. It is shown that the nonminimum phase zeros, the zero direction, the unstable poles, the pole direction of a given plant, statistical characteristics of the reference input signal, and disturbance signal have a negative effect on a feedback system's ability to reduce the system error with disturbance rejection. The results show that the optimal tracking performance will further be damaged because of disturbance rejection. Some typical examples are given to illustrate the theoretical results.  相似文献   
999.
This paper addresses the problem of designing robust tracking control for a class of uncertain wheeled mobile robots actuated by brushed direct current motors. This class of electrically‐driven mechanical systems consists of the robot kinematics, the robot dynamics, and the wheel actuator dynamics. Via the backstepping technique, an intelligent robust tracking control scheme that integrates a kinematic controller and an adaptive neural network‐based (or fuzzy‐based) controller is developed such that all of the states and signals of the closed‐loop system are bounded and the tracking error can be made as small as possible. Two adaptive approximation systems are constructed to learn the behaviors of unknown mechanical and electrical dynamics. The effects of both the approximation errors and the unmodeled time‐varying perturbations in the input and virtual‐input weighting matrices are counteracted by suitably tuning the control gains. Consequently, the robust control scheme developed here can be employed to handle a broader class of electrically‐driven wheeled mobile robots in the presence of high‐degree time‐varying uncertainties. Finally, a simulation example is given to demonstrate the effectiveness of the developed control scheme.  相似文献   
1000.
This paper studies the robustness problem of the min–max model predictive control (MPC) scheme for constrained nonlinear time‐varying delay systems subject to bounded disturbances. The notion of the input‐to‐state stability (ISS) of nonlinear time‐delay systems is introduced. Then by using the Lyapunov–Krasovskii method, a delay‐dependent sufficient condition is derived to guarantee input‐to‐state practical stability (ISpS) of the closed‐loop system by way of nonlinear matrix inequalities (NLMI). In order to lessen the online computational demand, the non‐convex min‐max optimization problem is then converted to a minimization problem with linear matrix inequality (LMI) constraints and a suboptimal MPC algorithm is provided. Finally, an example of a truck‐trailer is used to illustrate the effectiveness of the proposed results. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号