首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10118篇
  免费   799篇
  国内免费   212篇
电工技术   451篇
技术理论   1篇
综合类   492篇
化学工业   2015篇
金属工艺   342篇
机械仪表   514篇
建筑科学   606篇
矿业工程   216篇
能源动力   309篇
轻工业   1141篇
水利工程   142篇
石油天然气   457篇
武器工业   52篇
无线电   842篇
一般工业技术   1261篇
冶金工业   711篇
原子能技术   60篇
自动化技术   1517篇
  2024年   34篇
  2023年   138篇
  2022年   232篇
  2021年   418篇
  2020年   301篇
  2019年   310篇
  2018年   338篇
  2017年   358篇
  2016年   349篇
  2015年   364篇
  2014年   510篇
  2013年   715篇
  2012年   651篇
  2011年   733篇
  2010年   600篇
  2009年   554篇
  2008年   526篇
  2007年   507篇
  2006年   510篇
  2005年   377篇
  2004年   285篇
  2003年   257篇
  2002年   235篇
  2001年   231篇
  2000年   196篇
  1999年   199篇
  1998年   270篇
  1997年   199篇
  1996年   143篇
  1995年   118篇
  1994年   97篇
  1993年   77篇
  1992年   37篇
  1991年   31篇
  1990年   23篇
  1989年   24篇
  1988年   26篇
  1987年   15篇
  1986年   17篇
  1985年   13篇
  1984年   12篇
  1983年   22篇
  1982年   14篇
  1981年   5篇
  1979年   5篇
  1978年   8篇
  1977年   13篇
  1976年   13篇
  1975年   5篇
  1974年   4篇
排序方式: 共有10000条查询结果,搜索用时 187 毫秒
81.
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier.  相似文献   
82.
The Journal of Supercomputing - In this paper, we propose a parallel source separation system designed to extract heart and lung sounds from single-channel mixtures. The proposed system is based on...  相似文献   
83.
Mu  Dongdong  Wang  Guofeng  Fan  Yunsheng 《Neural computing & applications》2021,33(19):12777-12789
Neural Computing and Applications - In this paper, one concerns with the problem of trajectory tracking control for an underactuated unmanned surface vehicle subject to uncertain dynamics and input...  相似文献   
84.
The explosive growth of Chinese electronic market has made it possible for companies to better understand consumers?? opinion towards their products in a timely fashion through their online reviews. This study proposes a framework for extracting knowledge from online reviews through text mining and econometric analysis. Specifically, we extract product features, detect topics, and identify determinants of customer satisfaction. An experiment on the online reviews from a Chinese leading B2C (Business-to-Customer) website demonstrated the feasibility of the proposed method. We also present some findings about the characteristics of Chinese reviewers.  相似文献   
85.
In this paper, we verify how far electric disturbance signals can be compressed without compromising the analysis of encoded fault records. A recently proposed compression algorithm, referred to as Damped Sinusoidal Matching Pursuit (DSMP) has the remarkable feature of obtaining both compact and physically interpretable representations. However, for fault analysis applications, one is primarily interested in how accurate can be the analysis performed on compressed signals, instead of evaluating mean-squared error figures. Unlike previous works in digital fault records compression, the performance of the DSMP compression method is evaluated using a protocol based on fault analysis procedures commonly performed by expert engineers. This protocol is applied for comparing the results obtained in the analysis of both uncompressed records and their compressed versions at different compression ratios. The results show that the DSMP is a reliable compression system since it achieves high compression ratios (6.4:1) without causing fault analysis misinterpretation.  相似文献   
86.
A fuzzy queue-aware routing approach for wireless mesh networks   总被引:1,自引:0,他引:1  
Recent advances in Wireless Mesh Networks (WMNs) have overcome the drawbacks of traditional wired and ad-hoc networks and now they are seen as a means of allowing last mile communications with quality level assurance in Future Multimedia Systems. However, new routing schemes are needed to provide end-to-end Quality of Service (QoS) and Quality of Experience (QoE) support for delay/loss/jitter-sensitive multimedia applications. The well-known OLSR (Optimized Link State Routing) protocol with ETX (Expected Transmission Count) metric brings many benefits to the path selection process, but has a drawback with regard to queue availability management, which reduces the system performance. This problem is caused when OLSR-EXT control messages are exchanged and the queues of mesh routers along the end-to-end communication path are overloaded. As a result, multimedia-related packets will suffer from loss/delay/jitter and the overall system performance will decrease. This paper proposes the Optimized Link State Routing-Fuzzy ETX Queue (OLSR-FEQ) protocol to overcome the limitations of OLSR-ETX regarding queue availability, QoS and QoE assurance. OLSR-FEQ optimizes network and user-based parameters by coordinating queue availability, QoS and fuzzy issues in the routing decision process as a way of allocating the best paths for multimedia applications. Performance evaluations were carried out with the Network Simulator (NS-2.34) to show the benefits of the proposed solution when compared with existing routing schemes, namely OLSR-ETX, OLSR-FLC, OLSR-MD and HWMP (IEEE 802.11s standard), regarding QoS (unsuccessful packet delivery and throughput) and QoE (PSNR, SSIM, VQM and MOS) parameters.  相似文献   
87.
This work presents a study of RTP multiplexing schemes, which are compared with the normal use of RTP, in terms of experienced quality. Bandwidth saving, latency and packet loss for different options are studied, and some tests of Voice over IP (VoIP) traffic are carried out in order to compare the quality obtained using different implementations of the router buffer. Voice quality is calculated using ITU R-factor, which is a widely accepted quality estimator. The tests show the bandwidth savings of multiplexing, and also the importance of packet size for certain buffers, as latency and packet loss may be affected. The customer’s experience improvement is measured, showing that the use of multiplexing can be interesting in some scenarios, like an enterprise with different offices connected via the Internet. The system is also tested using different numbers of samples per packet, and the distribution of the flows into different tunnels is found to be an important factor in order to achieve an optimal perceived quality for each kind of buffer. Grouping all the flows into a single tunnel will not always be the best solution, as the increase of the number of flows does not improve bandwidth efficiency indefinitely. If the buffer penalizes big packets, it will be better to group the flows into a number of tunnels. The router processing capacity has to be taken into account too, as the limit of packets per second it can manage must not be exceeded. The obtained results show that multiplexing is a good way to improve customer’s experience of VoIP in scenarios where many RTP flows share the same path.  相似文献   
88.
This paper presents an indirect adaptive controller combined with hysteresis compensation to achieve high accuracy positioning control of piezoceramic actuators and illustrates the results with an atomic force microscope (AFM) application. A dynamic model of a piezoceramic actuator system in AFM is derived and analyzed. A feedforward controller based on the Preisach model is proposed to compensate for the nonlinear hysteresis effects. Then an indirect adaptive controller is designed to achieve desired tracking performance as well as deal with the uncompensated nonlinearity from hysteresis and the system parameter variation due to creep. Experimental results indicate that the proposed controller can significantly improve the positioning control accuracy of the piezoceramic actuator as well as achieve high image quality of the AFM system. The maximum scanning error was reduced from 2µm to 0.3µm in comparison with a proportional‐integral‐derivative (PID) controller. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
89.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
90.
Joint radar and communication(JRC) technology is gradually becoming an essential approach to alleviating spectral congestion. Radar and communications systems were designed with common spectral and hardware resources to reduce size, improve performance, reduce cost, and decongest the spectrum. Various approaches have been proposed to achieve the coexistence of radar and communication systems. This paper mainly focuses on the research directions of radar communication coexistence(RCC) and dual-function radar communication systems(DFRC) in JRC technology. We summarize and analyze the existing research problems in the JRC era. According to the characteristics and advantages of JRC technology, we highlight several potentials in military and commercial applications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号