首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1339篇
  免费   80篇
  国内免费   1篇
电工技术   17篇
综合类   1篇
化学工业   298篇
金属工艺   25篇
机械仪表   25篇
建筑科学   44篇
矿业工程   1篇
能源动力   59篇
轻工业   92篇
水利工程   8篇
石油天然气   2篇
无线电   134篇
一般工业技术   269篇
冶金工业   162篇
原子能技术   12篇
自动化技术   271篇
  2023年   14篇
  2022年   25篇
  2021年   51篇
  2020年   27篇
  2019年   48篇
  2018年   44篇
  2017年   34篇
  2016年   48篇
  2015年   44篇
  2014年   61篇
  2013年   93篇
  2012年   87篇
  2011年   134篇
  2010年   79篇
  2009年   71篇
  2008年   90篇
  2007年   57篇
  2006年   63篇
  2005年   47篇
  2004年   31篇
  2003年   32篇
  2002年   19篇
  2001年   6篇
  2000年   8篇
  1999年   6篇
  1998年   21篇
  1997年   20篇
  1996年   20篇
  1995年   16篇
  1994年   11篇
  1993年   12篇
  1992年   8篇
  1991年   7篇
  1990年   6篇
  1989年   4篇
  1988年   4篇
  1987年   5篇
  1984年   3篇
  1983年   4篇
  1982年   6篇
  1981年   5篇
  1980年   6篇
  1977年   5篇
  1976年   4篇
  1972年   3篇
  1958年   2篇
  1954年   3篇
  1948年   2篇
  1947年   2篇
  1946年   2篇
排序方式: 共有1420条查询结果,搜索用时 15 毫秒
41.
The paper describes a software method to extend ITK (Insight ToolKit, supported by the National Library of Medicine), leading to ITK++. This method, which is based on the extension of the iterator design pattern, allows the processing of regions of interest with arbitrary shapes, without modifying the existing ITK code. We experimentally evaluate this work by considering the practical case of the liver vessel segmentation from CT-scan images, where it is pertinent to constrain processings to the liver area. Experimental results clearly prove the interest of this work: for instance, the anisotropic filtering of this area is performed in only 16 s with our proposed solution, while it takes 52 s using the native ITK framework. A major advantage of this method is that only add-ons are performed: this facilitates the further evaluation of ITK++ while preserving the native ITK framework.  相似文献   
42.
This work addresses the soundtrack indexing of multimedia documents. Our purpose is to detect and locate sound unity to structure the audio dataflow in program broadcasts (reports). We present two audio classification tools that we have developed. The first one, a speech music classification tool, is based on three original features: entropy modulation, stationary segment duration (with a Forward–Backward Divergence algorithm) and number of segments. They are merged with the classical 4 Hz modulation energy. It is divided into two classifications (speech/non-speech and music/non-music) and provides more than 90% of accuracy for speech detection and 89% for music detection. The other system, a jingle identification tool, uses an Euclidean distance in the spectral domain to index the audio data flow. Results show that is efficient: among 132 jingles to recognize, we have detected 130. Systems are tested on TV and radio corpora (more than 10 h). They are simple, robust and can be improved on every corpus without training or adaptation.
Régine André-ObrechtEmail:
  相似文献   
43.
Analysis of a clock synchronization protocol for wireless sensor networks   总被引:1,自引:0,他引:1  
The Dutch company Chess develops a wireless sensor network (WSN) platform using an epidemic communication model. One of the greatest challenges in the design is to find suitable mechanisms for clock synchronization. In this paper, we study a proposed clock synchronization protocol for the Chess platform. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker. Next, we present a full parametric analysis of the protocol for the special case of cliques (networks with full connectivity), that is, we give constraints on the parameters that are both necessary and sufficient for correctness. These results have been checked using the proof assistant Isabelle. We report on the exhaustive analysis of the protocol for networks with four nodes, and we present a negative result for the special case of line topologies: for any instantiation of the parameters, the protocol will eventually fail if the network grows.  相似文献   
44.
Due to the extensive growth of grid computing networks, security is becoming a challenge. Usual solutions are not enough to prevent sophisticated attacks fabricated by multiple users especially when the number of nodes connected to the network is changing over the time. Attackers can use multiple nodes to launch DDoS attacks which generate a large amount of security alerts. On the one hand, this large number of security alerts degrades the overall performance of the network and creates instability in the operation of the security management solutions. On the other hand, they can help in camouflaging other real attacks. To address these issues, a?correlation mechanism is proposed which reduces the security alerts and continue detecting attacks in grid computing networks. To obtain the more accurate results, a?major portion of the experiments are performed by launching DDoS and Brute Force (BF) attacks in real grid environment, i.e., the Grid??5000 (G5K) network.  相似文献   
45.
For the first time with a directly modulated InAs-GaAs quantum-dot laser, high extinction ratio (up to 17 dB) and 25/spl deg/C-85/spl deg/C single-mode-fiber data floor-free transmissions are achieved at 2.5 Gb/s. Moreover, an interferometric technique showed a nearly constant Henry factor /spl sim/2 until a bias current six times the threshold current.  相似文献   
46.
Shear Stress in Smooth Rectangular Open-Channel Flows   总被引:1,自引:0,他引:1  
The average bed and sidewall shear stresses in smooth rectangular open-channel flows are determined after solving the continuity and momentum equations. The analysis shows that the shear stresses are function of three components: (1) gravitational; (2) secondary flows; and (3) interfacial shear stress. An analytical solution in terms of series expansion is obtained for the case of constant eddy viscosity without secondary currents. In comparison with laboratory measurements, it slightly overestimates the average bed shear stress measurements but underestimates the average sidewall shear stress by 17% when the width–depth ratio becomes large. A second approximation is formulated after introducing two empirical correction factors. The second approximation agrees very well (R2>0.99 and average relative error less than 6%) with experimental measurements over a wide range of width–depth ratios.  相似文献   
47.
The increased reliance on natural gas for heating worldwide makes the search for carbon-free alternatives imperative, especially if international decarbonisation targets are to be met. Hydrogen does not release carbon dioxide (CO2) at the point of use which makes it an appealing candidate to decarbonise domestic heating. Hydrogen can be produced from either 1) the electrolysis of water with no associated carbon emissions, or 2) from methane reformation (using steam) which produces CO2, but which is easily captured and storable during production. Hydrogen could be transported to the end-user via gas distribution networks similar to, and adapted from, those in use today. This would reduce both installation costs and end-user disruption. However, before hydrogen can provide domestic heat, it is necessary to assess the ‘risk’ associated with its distribution in direct comparison to natural gas. Here we develop a comprehensive and multi-faceted quantitative risk assessment tool to assess the difference in ‘risk’ between current natural gas distribution networks, and the potential conversion to a hydrogen based system. The approach uses novel experimental and modelling work, scientific literature, and findings from historic large scale testing programmes. As a case study, the risk assessment tool is applied to the newly proposed H100 demonstration (100% hydrogen network) project. The assessment includes the comparative risk of gas releases both upstream and downstream of the domestic gas meter. This research finds that the risk associated with the proposed H100 network (based on its current design) is lower than that of the existing natural gas network by a factor 0.88.  相似文献   
48.
Petty corruption is a barrier to entrepreneurship in emerging countries, justifying to investigate its determinants. Using data on 1,240 entrepreneurs across Indonesian regions, we analyse the effects of social capital. Two-evel ordered probit regressions show that weak-ties discourage entrepreneurs' bribing, strong-ties encourage it, whereas this latter effect is moderated by the quality of access to formal credit. Bribing banks or turning to relatives for external funding are alternative solutions for entrepreneurs facing poor access to formal credit, a common feature in emerging countries, and the second solution is preferred given the risk and psychological costs of corruption.  相似文献   
49.
50.
An extended state observer (ESO)-based loop flter is designed for the phase-locked loop (PLL) involved in a disturbed gridconnected converter (GcC). This ESO-based design enhances the performances and robustness of the PLL, and, therefore, improves control performances of the disturbed GcCs. Besides, the ESO-based LF can be applied to PLLs with extra flters for abnormal grid conditions. The unbalanced grid is particularly taken into account for the performance analysis. A tuning approach based on the well-designed PI controller is discussed, which results in a fair comparison with conventional PItype PLLs. The frequency domain properties are quantitatively analysed with respect to the control stability and the noises rejection. The frequency domain analysis and simulation results suggest that the performances of the generated ESO-based controllers are comparable to those of the PI control at low frequency, while have better ability to attenuate high-frequency measurement noises. The phase margin decreases slightly, but remains acceptable. Finally, experimental tests are conducted with a hybrid power hardware-in-the-loop benchmark, in which balanced/unbalanced cases are both explored. The obtained results prove the efectiveness of ESO-based PLLs when applied to the disturbed GcC.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号