首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8127篇
  免费   599篇
  国内免费   236篇
电工技术   440篇
技术理论   1篇
综合类   541篇
化学工业   1359篇
金属工艺   326篇
机械仪表   435篇
建筑科学   539篇
矿业工程   217篇
能源动力   216篇
轻工业   726篇
水利工程   141篇
石油天然气   494篇
武器工业   73篇
无线电   722篇
一般工业技术   953篇
冶金工业   746篇
原子能技术   57篇
自动化技术   976篇
  2024年   29篇
  2023年   116篇
  2022年   198篇
  2021年   296篇
  2020年   216篇
  2019年   195篇
  2018年   248篇
  2017年   264篇
  2016年   242篇
  2015年   294篇
  2014年   398篇
  2013年   506篇
  2012年   503篇
  2011年   558篇
  2010年   456篇
  2009年   420篇
  2008年   434篇
  2007年   412篇
  2006年   447篇
  2005年   320篇
  2004年   238篇
  2003年   224篇
  2002年   201篇
  2001年   214篇
  2000年   183篇
  1999年   201篇
  1998年   273篇
  1997年   202篇
  1996年   137篇
  1995年   116篇
  1994年   102篇
  1993年   78篇
  1992年   45篇
  1991年   35篇
  1990年   22篇
  1989年   23篇
  1988年   23篇
  1987年   12篇
  1986年   10篇
  1985年   7篇
  1984年   3篇
  1983年   10篇
  1982年   9篇
  1980年   3篇
  1979年   5篇
  1978年   3篇
  1977年   10篇
  1976年   11篇
  1975年   2篇
  1974年   3篇
排序方式: 共有8962条查询结果,搜索用时 15 毫秒
11.
Recently, a new peer-assisted architecture to build content delivery systems has been presented. This architecture is based on the use of the storage capacity of end-users’ set-top boxes (STBs), connected in a peer-to-peer (P2P) manner in order to help the content servers in the delivery process. In these systems, the contents are usually split into a set of smaller pieces, called sub-streams, which are randomly injected at the STBs. The present paper is focused on Video on Demand (VoD) streaming and it is assumed that the STB-based content delivery system is deployed over the global Internet, where the clients are distributed over different ISP networks. In this scenario, three different strategies are studied for increasing the percentage of data uploaded by peers, in order to offload the content servers as much as possible. First of all, a new mechanism is presented which determines which sub-stream has to be placed at which STB by a Non-Linear Programming (NLP) formulation. A different strategy for reducing the content server load is to take advantage of the available bandwidth in the different ISP networks. In this sense, two new mechanisms for forwarding the VoD requests to different ISP networks are presented. Finally, the present paper also shows that in some situations the available uplink bandwidth is associated with STBs that do not have the required sub-streams. Regarding this concern, a new mechanism has been designed that dynamically re-allocates some streams, which are being transmitted from specific STBs, to different STBs, in order to find the necessary resources to start new streaming sessions.  相似文献   
12.
基于ICA的非线性自适应特征融合的人耳识别   总被引:3,自引:0,他引:3  
针对单一特征的人耳识别对旋转角度鲁棒性差的问题,提出一种非线性自适应特征融合的方法.首先提取人耳的2种具有互补性质的独立成分特征,然后将它们加权串联形成高维融合特征;最后通过核主元分析方法实现非线性降维.实验结果表明,当人耳有姿态旋转时,融合特征较单一特征的识别率有显著提升,且文中方法比传统的串联融合的识别结果更好.  相似文献   
13.
创意素描教学,就是要培养学生创造性思维能力,掌握创意设计的理念和方法,通过对学生创造性思维的培养,从具象到抽象、从写实到意象的训练,学生无限的创造力一定会大大激发出来。  相似文献   
14.
15.
16.
MVB (Multifunction Vehicle Bus), defined in IEC 61375, has been broadly adopted as the communication standard between embedded control systems on-board modern trains. In this work a new method to take advantage of the full bandwidth of the channel using an OFDM technique is described. With this new method it is possible to share the physical medium between standard MVB traffic and new OFDM traffic. A 90 Mbps theoretical bitrate can be achieved. The results of this work have been validated in a test bench including standard MVB nodes transmitting on a line similar to a real vehicle bus.  相似文献   
17.
A new solution to the Simultaneous Localization and Modelling problem is presented in this paper. The algorithm is based on the stochastic search for solutions in the state space to the global localization problem by means of a differential evolution algorithm. This non linear evolutive filter, called Evolutive Localization Filter (ELF), searches stochastically along the state space for the best robot pose estimate. The set of pose solutions (the population) focuses on the most likely areas according to the perception and up to date motion information. The population evolves using the log-likelihood of each candidate pose according to the observation and the motion errors derived from the comparison between observed and predicted data obtained from the probabilistic perception and motion model.The proposed SLAM algorithm operates in two steps: in the first step the ELF filter is used at local level to re-localize the robot based on the robot odometry, the laser scan at a given position and a local map where only a low number of the last scans have been integrated. In the second step, the aligned laser measures and the corrected robot poses are used to detect whether the robot is revisiting a previously crossed area (i.e., a cycle in the robot trajectory exists). Once a cycle is detected, the Evolutive Localization Filter is used again to estimate the accumulated residual drift in the detected loop and then to re-estimate the robot poses in order to integrate the sensor measures in the global map of the environment.The algorithm has been tested in different environments to demonstrate the effectiveness, robustness and computational efficiency of the proposed approach.  相似文献   
18.
Physical activity monitoring for youth is an area of increasing scientific and public health interest due to the high prevalence of obesity and downward trend in physical activity. However, accurate assessment of such activity remains a challenging problem because of the complex nature in which certain activities are performed. In this study, we formulated the issue as a machine learning problem—using a diverse set of 19 physical activities commonly performed by youth—via two approaches: activity recognition and intensity estimation. With the aid of training data, we implemented a distance metric learning method called DML-KNN that utilizes time-frequency features and is capable of effectively classifying both continuous and intermittent movement in youth subjects. Four different time-frequency feature extraction methods were then systematically evaluated. Our results show that the DML-KNN method performed competitively, especially when using features extracted by the Tamura method for intensity estimation, and by the Square Coefficient method for activity recognition.  相似文献   
19.
The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentiation in groups, can be pre-computed in the offline phase without knowing the message to be encrypted and/or recipient’s identity. The online phase only requires light computation, such as modular multiplication. In this paper, we propose two novel identity-based online/offline schemes: a full secure identity-based online/offline encryption scheme and an identity-based online/offline signcryption scheme. Compared to the other schemes in the literature, our schemes achieve the shortest ciphertext size in both offline and online phases and demonstrate the best performance in offline computation. Our schemes are applicable to devices with limited computation power. They are proven secure in the random oracle model.  相似文献   
20.
介绍ADSL传输技术使用情况及与ISDN等的比较。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号