首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   660篇
  免费   14篇
  国内免费   3篇
电工技术   27篇
化学工业   64篇
金属工艺   7篇
机械仪表   11篇
建筑科学   33篇
能源动力   28篇
轻工业   36篇
水利工程   22篇
石油天然气   2篇
无线电   95篇
一般工业技术   70篇
冶金工业   118篇
原子能技术   1篇
自动化技术   163篇
  2022年   16篇
  2021年   17篇
  2020年   13篇
  2019年   16篇
  2018年   12篇
  2017年   13篇
  2016年   17篇
  2015年   4篇
  2014年   16篇
  2013年   64篇
  2012年   16篇
  2011年   29篇
  2010年   17篇
  2009年   17篇
  2008年   24篇
  2007年   13篇
  2006年   12篇
  2005年   16篇
  2004年   14篇
  2003年   8篇
  2002年   10篇
  2001年   10篇
  2000年   8篇
  1999年   11篇
  1998年   43篇
  1997年   47篇
  1996年   22篇
  1995年   26篇
  1994年   26篇
  1993年   17篇
  1992年   10篇
  1991年   6篇
  1990年   5篇
  1989年   9篇
  1988年   5篇
  1987年   7篇
  1986年   7篇
  1985年   3篇
  1984年   4篇
  1983年   4篇
  1982年   2篇
  1980年   3篇
  1979年   3篇
  1978年   4篇
  1977年   6篇
  1976年   7篇
  1974年   2篇
  1973年   5篇
  1971年   2篇
  1965年   1篇
排序方式: 共有677条查询结果,搜索用时 15 毫秒
11.
InP-based resonant tunneling hot electron transistors (RHET's) were studied systematically using chemical beam epitaxy (CBE) for the first time. All the RHET's studied have a highly strained AlAs/In0.75Ga0.25As/AlAs resonant tunneling double barrier as a hot electron injector, and an InP collector barrier with or without InGaAsP graded layers. The highest transport ratio (α) observed is 0.98, and the highest peak-to-valley current ratios (PVR's) measured are 20 and 200 in the collector current and base current, respectively, at 80 K. A self-consistent simulation is used as a reference to optimize the hot electron injector and to explain the ballistic transport. An energy spectrometer technique was applied to the RHET's for resolving the hot electron energy distribution which showed a full width at half maximum (FWHM) of around 58 meV, indicating ballistic transport of electrons. Finally, room temperature transistor action was also observed with a β of 4 and a cutoff frequency of 31 GHz  相似文献   
12.
Electrochemical treatment processes can significantly contribute to the protection of the environment through the minimization of waste and toxic materials in effluents. From a pharmaceutical point of view and due to the existing resemblance between the electrochemical and biological reactions, it can be assumed that the oxidation mechanisms on the electrode and in the body share similar principles. In this paper, the application of electrochemical studies in the design of an environmentally friendly method was delineated for the new hydrocaffeic acid (HCA, 3,4-dihydroxy hydrocinnamic acid) derivatives synthesis at carbon electrodes in an undivided cell. In this cell, the EC mechanism reaction was involved, comprising two steps alternatively; (1) electrochemical oxidation and (2) chemical reaction. In particular, the electro-organic reactions of HCA, an important biological molecule, were studied in a water–acetonitrile (90:10 v/v) mixture in the presence of benzenesulfinic acid (3) and p-toluenesulfinic acid (4). The research included the use of a variety of experimental techniques, such as cyclic voltammetry, controlled-potential electrolysis and product spectroscopic identification.  相似文献   
13.

Along with the exponential growth of online video creation platforms such as Tik Tok and Instagram, state of the art research involving quick and effective action/gesture recognition remains crucial. This work addresses the challenge of classifying short video clips, using a domain-specific feature design approach, capable of performing significantly well using as little as one training example per action. The method is based on Gunner Farneback’s dense optical flow (GF-OF) estimation strategy, Gaussian mixture models, and information divergence. We first aim to obtain accurate representations of the human movements/actions by clustering the results given by GF-OF using K-means method of vector quantization. We then proceed by representing the result of one instance of each action by a Gaussian mixture model. Furthermore, using Kullback-Leibler divergence (KL-divergence), we attempt to find similarities between the trained actions and the ones in the test videos. Classification is done by matching each test video to the trained action with the highest similarity (a.k.a lowest KL-divergence). We have performed experiments on the KTH and Weizmann Human Action datasets using One-Shot and K-Shot learning approaches, and the results reveal the discriminative nature of our proposed methodology in comparison with state-of-the-art techniques.

  相似文献   
14.

Security threats are crucial challenges that deter Mixed reality (MR) communication in medical telepresence. This research aims to improve the security by reducing the chances of types of various attacks occurring during the real-time data transmission in surgical telepresence as well as reduce the time of the cryptographic algorithm and keep the quality of the media used. The proposed model consists of an enhanced RC6 algorithm in combination. Dynamic keys are generated from the RC6 algorithm mixed with RC4 to create dynamic S-box and permutation table, preventing various known attacks during the real-time data transmission. For every next session, a new key is created, avoiding possible reuse of the same key from the attacker. The results obtained from our proposed system are showing better performance compared to the state of art. The resistance to the tested attacks is measured throughout the entropy, Pick to Signal Noise Ratio (PSNR) is decreased for the encrypted image than the state of art, structural similarity index (SSIM) closer to zero. The execution time of the algorithm is decreased for an average of 20%. The proposed system is focusing on preventing the brute force attack occurred during the surgical telepresence data transmission. The paper proposes a framework that enhances the security related to data transmission during surgeries with acceptable performance.

  相似文献   
15.
In this paper, we present an analysis and synthesis approach for guaranteeing that the phase of a single-input, single-output closed-loop transfer function is contained in the interval [−α,α] for a given α>0 at all frequencies. Specifically, we first derive a sufficient condition involving a frequency domain inequality for guaranteeing a given phase constraint. Next, we use the Kalman–Yakubovich–Popov theorem to derive an equivalent time domain condition. In the case where , we show that frequency and time domain sufficient conditions specialize to the positivity theorem. Furthermore, using linear matrix inequalities, we develop a controller synthesis approach for guaranteeing a phase constraint on the closed-loop transfer function. Finally, we extend this synthesis approach to address mixed gain and phase constraints on the closed-loop transfer function.  相似文献   
16.
The objective of this paper is to propose an architecture for aCAble TeleVision (CATV) network, capable of supporting two-way transmission. This evolution is necessary for the survival of the CATV industry in an era of deregulation and of the development of the B-ISDN by the telecommunications companies. A communication transactional service is then considered and performance analysis is done under realistic assumptions.  相似文献   
17.
Wireless Personal Communications - Electroencephalography (EEG) is a technique of Electrophysiology used in a wide variety of scientific studies and applications. Inadequately, many commercial...  相似文献   
18.
We describe a quasi-Monte Carlo method for the simulation of discrete time Markov chains with continuous multi-dimensional state space. The method simulates copies of the chain in parallel. At each step the copies are reordered according to their successive coordinates. We prove the convergence of the method when the number of copies increases. We illustrate the method with numerical examples where the simulation accuracy is improved by large factors compared with Monte Carlo simulation.  相似文献   
19.
Markov chains are a well-known stochastic process that provide a balance between being able to adequately model the system's behavior and being able to afford the cost of the model solution. The definition of stochastic temporal logics like continuous stochastic logic (CSL) and its variant asCSL, and of their model-checking algorithms, allows a unified approach to the verification of systems, allowing the mix of performance evaluation and probabilistic verification. In this paper we present the stochastic logic CSLTA, which is more expressive than CSL and asCSL, and in which properties can be specified using automata (more precisely, timed automata with a single clock). The extension with respect to expressiveness allows the specification of properties referring to the probability of a finite sequence of timed events. A typical example is the responsiveness property "with probability at least 0.75, a message sent at time 0 by a system A will be received before time 5 by system B and the acknowledgment will be back at A before time 7", a property that cannot be expressed in either CSL or asCSL. We also present a model-checking algorithm for CSLTA.  相似文献   
20.
In this paper we derive guaranteed gain, sector, and disk margins for nonlinear optimal and inverse optimal regulators that minimize a nonlinear-nonquadratic performance criterion involving cross-weighting terms. Specifically, sufficient conditions that guarantee gain, sector, and disk margins are given in terms of the state, control, and cross-weighting nonlinear-nonquadratic weighting functions. The proposed results provide a generalization of the “meaningful” inverse optimal nonlinear regulator stability margins as well as the classical linear-quadratic optimal regulator gain and phase margins.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号