全文获取类型
收费全文 | 3670篇 |
免费 | 209篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 59篇 |
综合类 | 1篇 |
化学工业 | 841篇 |
金属工艺 | 39篇 |
机械仪表 | 67篇 |
建筑科学 | 77篇 |
矿业工程 | 3篇 |
能源动力 | 103篇 |
轻工业 | 315篇 |
水利工程 | 28篇 |
石油天然气 | 2篇 |
无线电 | 223篇 |
一般工业技术 | 455篇 |
冶金工业 | 52篇 |
原子能技术 | 38篇 |
自动化技术 | 1585篇 |
出版年
2024年 | 4篇 |
2023年 | 44篇 |
2022年 | 191篇 |
2021年 | 205篇 |
2020年 | 80篇 |
2019年 | 98篇 |
2018年 | 115篇 |
2017年 | 90篇 |
2016年 | 137篇 |
2015年 | 114篇 |
2014年 | 152篇 |
2013年 | 224篇 |
2012年 | 171篇 |
2011年 | 977篇 |
2010年 | 168篇 |
2009年 | 221篇 |
2008年 | 138篇 |
2007年 | 98篇 |
2006年 | 96篇 |
2005年 | 88篇 |
2004年 | 64篇 |
2003年 | 48篇 |
2002年 | 42篇 |
2001年 | 30篇 |
2000年 | 25篇 |
1999年 | 17篇 |
1998年 | 104篇 |
1997年 | 34篇 |
1996年 | 26篇 |
1995年 | 14篇 |
1994年 | 5篇 |
1993年 | 8篇 |
1992年 | 6篇 |
1991年 | 7篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 2篇 |
1987年 | 5篇 |
1985年 | 2篇 |
1984年 | 4篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1980年 | 3篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 4篇 |
1976年 | 2篇 |
1975年 | 3篇 |
1974年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有3888条查询结果,搜索用时 31 毫秒
71.
This paper proposes a novel signal transformation and interpolation approach based on the modification of DCT (Discrete Cosine Transform). The proposed algorithm can be applied to any periodic or quasi periodic waveform for time scale and/or pitch modification purposes in addition to signal reconstruction, compression, coding and packet lost concealment. The proposed algorithm has two advantages:
(i)
Since DCT does not have the explicit phase information, one does not need the cubic spline interpolation of the phase component of the sinusoidal model. (ii)
The parameters to be interpolated can be reduced because of the energy packing efficiency of the DCT. This is particularly important if signal synthesis is carried out on a remote location from the transmitted parameters.
72.
T. Hoang Ngan Le Chia-Chen Lin Chin-Chen Chang Hoai Bac LeAuthor vitae 《Digital Signal Processing》2011,21(6):734-745
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost and storage cost; that is, each shadow size is m times as big as the original secret image. The new (2,n) secret sharing scheme for grayscale images proposed in this paper is based a combination of acceptable image quality using block truncation coding (BTC), high compression ratio discrete wavelet transform (DWT) and good subjective performance of the vector quantization (VQ) technique. Experimental results confirm that our proposed scheme not only generates a high quality reconstructed original image but also generates small, random-like grayscale shadows. 相似文献
73.
This paper examines the role played by feedforward in model predictive control (MPC). We contrast feedforward with preview action. The latter is standard in model predictive control, whereas feedforward has been rarely, if ever, used in contemporary formulations of MPC. We argue that feedforward can significantly improve performance in the presence of measurement noise and certain types of model uncertainty. 相似文献
74.
Yacine Rebahi Mohamed Nassar Thomas Magedanz Olivier FestorAuthor vitae 《Information Security Technical Report》2011,16(1):12-19
The migration from circuit-switched networks to packet-switched networks necessitates the investigation of related issues such as service delivery, QoS, security, and service fraud and misuse. The latter can be seen as a combination of accounting and security aspects. In traditional telecommunication networks, fraud accounts for annual losses at an average of 3%–5% of the operators’ revenue and still increasing at a rate of more than 10% yearly. It is also expected that in VoIP networks, the situation will be worse due to the lack of strong built-in security mechanisms, and the use of open standards. This paper discusses the fraud problem in VoIP networks and evaluates the related available solutions. 相似文献
75.
76.
Giuseppe Ascia Vincenzo Catania Alessandro G. Di Nuovo Maurizio Palesi Davide Patti 《Applied Soft Computing》2011,11(1):382-398
Multi-objective evolutionary algorithms (MOEAs) have received increasing interest in industry because they have proved to be powerful optimizers. Despite the great success achieved, however, MOEAs have also encountered many challenges in real-world applications. One of the main difficulties in applying MOEAs is the large number of fitness evaluations (objective calculations) that are often needed before an acceptable solution can be found. There are, in fact, several industrial situations in which fitness evaluations are computationally expensive and the time available is very short. In these applications efficient strategies to approximate the fitness function have to be adopted, looking for a trade-off between optimization performance and efficiency. This is the case in designing a complex embedded system, where it is necessary to define an optimal architecture in relation to certain performance indexes while respecting strict time-to-market constraints. This activity, known as design space exploration (DSE), is still a great challenge for the EDA (electronic design automation) community. One of the most important bottlenecks in the overall design flow of an embedded system is due to simulation. Simulation occurs at every phase of the design flow and is used to evaluate a system which is a candidate for implementation. In this paper we focus on system level design, proposing an extensive comparison of the state-of-the-art of MOEA approaches with an approach based on fuzzy approximation to speed up the evaluation of a candidate system configuration. The comparison is performed in a real case study: optimization of the performance and power dissipation of embedded architectures based on a Very Long Instruction Word (VLIW) microprocessor in a mobile multimedia application domain. The results of the comparison demonstrate that the fuzzy approach outperforms in terms of both performance and efficiency the state of the art in MOEA strategies applied to DSE of a parameterized embedded system. 相似文献
77.
Natural scene categorization from images represents a very useful task for automatic image analysis systems. In the literature, several methods have been proposed facing this issue with excellent results. Typically, features of several types are clustered so as to generate a vocabulary able to describe in a multi-faceted way the considered image collection. This vocabulary is formed by a discrete set of visual codewords whose co-occurrence and/or composition allows to classify the scene category. A common drawback of these methods is that features are usually extracted from the whole image, actually disregarding whether they derive properly from the natural scene to be classified or from foreground objects, possibly present in it, which are not peculiar for the scene. As quoted by perceptual studies, objects present in an image are not useful to natural scene categorization, indeed bringing an important source of clutter, in dependence of their size. 相似文献
78.
79.
In this work we address the tracking control problems for autonomous underwater vehicles (AUVs). The proposed solution is based on the variable structure systems (VSS) theory and, in particular, on the second‐order sliding‐mode (2‐SM) methodology. The tuning of the controller is carried out via black‐box approach, dispensing with the knowledge of the actual AUV parameters, by simply progressively increasing a single gain parameter. The presented stability analysis includes explicitly the unmodelled actuator dynamics and the presence of external uncertain disturbances. The good performance of the proposed scheme is verified by means of simulations on a 6‐DOF AUV. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
80.
In this paper we study parallel batch scheduling problems with bounded batch capacity and equal-length jobs in a single and
parallel machine environment. It is shown that the feasibility problem 1|p-batch,b<n,r
j
,p
j
=p,C
j
≤d
j
|− can be solved in O(n
2) time and that the problem of minimizing the maximum lateness can be solved in O(n
2log n) time. For the parallel machine problem P|p-batch,b<n,r
j
,p
j
=p,C
j
≤d
j
|− an O(n
3log n)-time algorithm is provided, which can also be used to solve the problem of minimizing the maximum lateness in O(n
3log 2
n) time. 相似文献