首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1145篇
  免费   37篇
  国内免费   2篇
电工技术   10篇
综合类   2篇
化学工业   283篇
金属工艺   32篇
机械仪表   26篇
建筑科学   32篇
矿业工程   2篇
能源动力   66篇
轻工业   89篇
水利工程   2篇
石油天然气   16篇
无线电   88篇
一般工业技术   282篇
冶金工业   59篇
原子能技术   15篇
自动化技术   180篇
  2024年   3篇
  2023年   17篇
  2022年   55篇
  2021年   61篇
  2020年   45篇
  2019年   37篇
  2018年   59篇
  2017年   54篇
  2016年   42篇
  2015年   27篇
  2014年   46篇
  2013年   99篇
  2012年   47篇
  2011年   76篇
  2010年   63篇
  2009年   61篇
  2008年   57篇
  2007年   51篇
  2006年   41篇
  2005年   38篇
  2004年   31篇
  2003年   19篇
  2002年   14篇
  2001年   15篇
  2000年   4篇
  1999年   9篇
  1998年   9篇
  1997年   10篇
  1996年   5篇
  1995年   9篇
  1994年   4篇
  1993年   13篇
  1992年   5篇
  1991年   6篇
  1990年   3篇
  1989年   9篇
  1988年   4篇
  1987年   5篇
  1986年   4篇
  1985年   6篇
  1984年   6篇
  1982年   4篇
  1980年   3篇
  1979年   4篇
  1978年   3篇
  1975年   1篇
排序方式: 共有1184条查询结果,搜索用时 15 毫秒
81.
Multimedia Tools and Applications - A new cryptographic model is proposed incorporating intertwining logistic map based confusion process and two dimensional Brownian Motion based diffusion...  相似文献   
82.

Image Completion plays a vital role in compressed sensing, machine learning, and computer vision applications. The Rank Minimization algorithms are used to perform the image completion. The major problem with rank minimization algorithms is the loss of information in the recovered image at high corruption ratios. To overcome this problem Lifting wavelet transform based Rank Minimization (LwRM), and Discrete wavelet transform based Rank Minimization (DwRM) methods are proposed, which can recover the image, if the corrupted observations are more than 80%. The evaluation of the proposed methods are accomplished by Full Reference Image Quality Assessment (FRIQA) and No Reference Image Quality Assessment (NR-IQA) metrics. The simulation results of proposed methods are superior to state-of-the-art methods.

  相似文献   
83.
The idea of allowing query users to relax their correctness requirements in order to improve performance of a data stream management system (e.g., location-based services and sensor networks) has been recently studied. By exploiting the maximum error (or tolerance) allowed in query answers, algorithms for reducing the use of system resources have been developed. In most of these works, however, query tolerance is expressed as a numerical value, which may be difficult to specify. We observe that in many situations, users may not be concerned with the actual value of an answer, but rather which object satisfies a query (e.g., "who is my nearest neighbor?”). In particular, an entity-based query returns only the names of objects that satisfy the query. For these queries, it is possible to specify a tolerance that is "nonvalue-based.” In this paper, we study fraction-based tolerance, a type of nonvalue-based tolerance, where a user specifies the maximum fractions of a query answer that can be false positives and false negatives. We develop fraction-based tolerance for two major classes of entity-based queries: 1) nonrank-based query (e.g., range queries) and 2) rank-based query (e.g., k-nearest-neighbor queries). These definitions provide users with an alternative to specify the maximum tolerance allowed in their answers. We further investigate how these definitions can be exploited in a distributed stream environment. We design adaptive filter algorithms that allow updates be dropped conditionally at the data stream sources without affecting the overall query correctness. Extensive experimental results show that our protocols reduce the use of network and energy resources significantly.  相似文献   
84.
This paper presents an extension of previously published theory and algorithms for fuzzy-connected image segmentation. In this approach, a strength of connectedness is assigned to every pair of image elements. This is done by finding the strongest among all possible connecting paths between the two elements in each pair. The strength assigned to a particular path is defined as the weakest affinity between successive pairs of elements along the path. Affinity specifies the degree to which elements hang together locally in the image. A scale is determined at every element in the image that indicates the size of the largest homogeneous hyperball region centered at the element. In determining affinity between any two elements, all elements within their scale regions are considered. This method has been effectively utilized in several medical applications. In this paper, we generalize this method from scalar images to vectorial images. In a vectorial image, scale is defined as the radius of the largest hyperball contained in the same homogeneous region under a predefined condition of homogeneity of the image vector field. Two different components of affinity, namely homogeneity-based affinity and object-feature-based affinity, are devised in a fully vectorial manner. The original relative fuzzy connectedness algorithm is utilized to delineate a specified object via a competing strategy among multiple objects. We have presented several studies to evaluate the performance of this method based on simulated MR images, 20 clinical MR images, and 250 mathematical phantom images. These studies indicate that the fully vectorial fuzzy connectedness formulation has generally overall better accuracy than the method using some intermediate ad hoc steps to fit the vectorial image to a scalar fuzzy connectedness formulation, and precision and efficiency are similar for these two methods.  相似文献   
85.
Dynamic Modeling and Simulation of Impact in Tether Net/Gripper systems   总被引:3,自引:0,他引:3  
The objective of this paper is to study the dynamic modeling andsimulation of a tether-net/gripper system during an impact, while it isbeing deployed or retrieved by a winch on a satellite orbiting aroundearth. We stick to Tether-Net system but the analysis is applicable toTether-Gripper systems too. We assume that the net is deployed from thesatellite in orbit and the motion is restricted to the orbital plane.This net captures a second satellite and tows it. The motion of atether-net system can be broken down into the following phases: (i)Phase 1: Net is shot out from the satellite with the tether completelyslack, (ii) Phase 2: Net comes to a location where the tether is tautwhile the drum on the orbiter is locked, (iii) Phase 3: Drum is unlockedand the net moves with the tether, (iv) Phase 4: Net captures a body.The continua (tether) is modeled using mode functions and coordinates.The theory of impulse and momentum can be used to model Phases 1, 2, and4 of motion of the tether-net system. The dynamics of the motion of thesystem in phase 3 is characterized by differential and algebraicequations (DAEs). Matlab ODE solvers were used to solve these DAEs.  相似文献   
86.
The investigations on optimization of composite composition of nickel–zirconia for the functionally graded layered thermal barrier coating for the lowest but uniform stress field under thermal loading is presented. The procedure for obtaining temperature- and composition-dependent thermal and mechanical properties of various coating compositions is discussed. These material parameters were used in thermo-mechanical finite element stress analyses of a nickel substrate with the coating. The results showed that the Von-Mises stresses in the substrate and the interfaces were the lowest with the coating profile that followed a concave power law relationship with the index n  2.65.  相似文献   
87.
Multimedia Tools and Applications - Image encryption mechanisms provide confidentiality and concealment of information (image) in transmission over the alleyway, susceptible to prevalent invasions....  相似文献   
88.
We study the barrier coverage problem using relocatable sensor nodes. We assume each sensor can sense an intruder or event inside its sensing range. Sensors are initially located at arbitrary positions on the barrier and can move along the barrier. The goal is to find final positions for sensors so that the entire barrier is covered. In recent years, the problem has been studied extensively in the centralized setting. In this paper, we study a barrier coverage problem in the distributed and discrete setting. We assume that we have n identical sensors located at grid positions on the barrier, and that each sensor repeatedly executes a Look-Compute-Move cycle: based on what it sees in its vicinity, it makes a decision on where to move, and moves to its next position. We make two strong but realistic restrictions on the capabilities of sensors: they have a constant visibility range and can move only a constant distance in every cycle. In this model, we give the first two distributed algorithms that achieve barrier coverage for a line segment barrier when there are enough nodes in the network to cover the entire barrier. Our algorithms are synchronous, and local in the sense that sensors make their decisions independently based only on what they see within their constant visibility range. One of our algorithms is oblivious whereas the other uses two bits of memory at each sensor to store the type of move made in the previous step. We show that our oblivious algorithm terminates within \(\varTheta (n^2)\) steps with the barrier fully covered, while the constant-memory algorithm is shown to take \(\varTheta (n)\) steps to terminate in the worst case. Since any algorithm in which a sensor can only move a constant distance in one step requires \(\varOmega (n)\) steps on some inputs, our second algorithm is asymptotically optimal.  相似文献   
89.
Temporally uncertain data widely exist in many real-world applications. Temporal uncertainty can be caused by various reasons such as conflicting or missing event timestamps, network latency, granularity mismatch, synchronization problems, device precision limitations, data aggregation. In this paper, we propose an efficient algorithm to mine sequential patterns from data with temporal uncertainty. We propose an uncertain model in which timestamps are modeled by random variables and then design a new approach to manage temporal uncertainty. We integrate it into the pattern-growth sequential pattern mining algorithm to discover probabilistic frequent sequential patterns. Extensive experiments on both synthetic and real datasets prove that the proposed algorithm is both efficient and scalable.  相似文献   
90.
Some of the classical connectivity concepts in Graph theory are generalized in this article. Strong and strongest strong cycles are introduced. Partial blocks are characterized using strongest paths. Some necessary and sufficient conditions for a weighted graph to be a partial block are also presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号