首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11530篇
  免费   997篇
  国内免费   525篇
电工技术   884篇
技术理论   2篇
综合类   744篇
化学工业   1938篇
金属工艺   656篇
机械仪表   708篇
建筑科学   754篇
矿业工程   294篇
能源动力   301篇
轻工业   697篇
水利工程   236篇
石油天然气   683篇
武器工业   97篇
无线电   1306篇
一般工业技术   1454篇
冶金工业   613篇
原子能技术   168篇
自动化技术   1517篇
  2024年   42篇
  2023年   224篇
  2022年   306篇
  2021年   475篇
  2020年   382篇
  2019年   309篇
  2018年   353篇
  2017年   389篇
  2016年   352篇
  2015年   465篇
  2014年   593篇
  2013年   643篇
  2012年   686篇
  2011年   822篇
  2010年   652篇
  2009年   639篇
  2008年   689篇
  2007年   688篇
  2006年   650篇
  2005年   562篇
  2004年   388篇
  2003年   379篇
  2002年   440篇
  2001年   354篇
  2000年   251篇
  1999年   213篇
  1998年   188篇
  1997年   169篇
  1996年   163篇
  1995年   140篇
  1994年   125篇
  1993年   64篇
  1992年   66篇
  1991年   35篇
  1990年   22篇
  1989年   32篇
  1988年   23篇
  1987年   18篇
  1986年   11篇
  1985年   11篇
  1984年   7篇
  1983年   5篇
  1982年   8篇
  1980年   2篇
  1976年   6篇
  1975年   2篇
  1967年   2篇
  1963年   1篇
  1961年   1篇
  1957年   2篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
91.
图像的超分辨率是指利用一幅或者多幅的低分辨率图像,通过相应的算法来获得一幅对应的清晰的高分辨率图像.针对现有的基于学习的超分辨率方法低效率的问题,提出一种基于人工神经网络的快速超分辨率方法,该方法试图利用人工神经网络学习到高分辨率图像和低分辨率图像之间的函数关系,其理论基础来自于人工神经网络能够很好地求解流形学习中高维流形和低维流形之间的映射关系.  相似文献   
92.
In the literature, more and more clues show that the bidders indeed tend to risk averse. But as a good structure estimation procedure in first-price sealed-bid auctions, the traditional PPMLE (Piecewise Pseudo-Maximum Likelihood Estimation) approach is only applicable to the risk neutrality case. This study generalizes this approach to the risk aversion case, and obtains a simple estimation procedure for the Pareto family of private costs. In the procedure, the estimation order of distribution parameters of private costs is not important, which is different from the traditional PPMLE method. Though there is no unique estimator for θ 1 and γ, some guidance is given for real-world applications on the basis of our Monte Carlo simulation experiments. What’s more, this procedure can be reduced further, if one is only interested in estimating the private costs. Extensive simulation experimental results indicate that our approach outperforms or matches at least the traditional one in the case of risk neutrality, and is applicable to the risk aversion case.  相似文献   
93.
We propose a James-Stein-type shrinkage estimator for the parameter vector in a general linear model when it is suspected that some of the parameters may be restricted to a subspace. The James-Stein estimator is shown to demonstrate asymptotically superior risk performance relative to the conventional least squares estimator under quadratic loss. An extensive simulation study based on a multiple linear regression model and a logistic regression model further demonstrates the improved performance of this James-Stein estimator in finite samples. The application of this new estimator is illustrated using Ontario newborn infants data spanning four fiscal years.  相似文献   
94.
The System Wide Information Management (SWIM) approach has been conceived to overcome the capacity and flexibility limitations of the current ATM systems. On the other hand the commercial applications of Unmanned Aerial Vehicles (UAVs) require the integration of these vehicles in the ATM. From this perspective, the unavoidable modernization of the ATM is seen as an opportunity to integrate the UAVs with the rest of the air traffic. This paper is devoted to study the feasibility and impact of the aggregation of UAVs on the future ATM supported by a SWIM inspired architecture. Departing from the existing technical documents that describe the fundamentals of SWIM we have explored the compatibility with a potential UAVs integration and also explored how the UAVs could help to improve the future ATM system. We will use the weather application as an example in both cases.  相似文献   
95.
Congestion on roads leads to uncertainty in travel times, which is important in delivery of goods, especially in a business environment where high levels of customer service are expected. Delivery periods to customers might be constrained by time windows, which makes the scheduling and routing of vehicles from the supplier’s side more difficult. Operations Research methods turn into heuristics for this type of application. But when, on top, uncertainty on travel times are the case, any hope of a simple and well-performing heuristic is lost. This study applies a methodology in which a heuristic is used to find a solution for scheduling and routing under deterministic travel times and, by means of simulation, though the use of Time Petri nets evaluates the sensitivity of the solution to uncertainties in travel times from one customer to the next in a route.  相似文献   
96.
TPS中调节控制点的综合应用   总被引:1,自引:1,他引:0  
提出了在控制系统更新时,利用新系统的控制功能,实现对老系统中一些特殊控制回路的控制方法.详细介绍了利用Hon-eywell公司HPM中常规控制点的功能,对现场多变量参数求和运算以后进行大可调比参数的控制,以及这种控制回路的控制策略和组态方法.应用结果表明,该控制回路控制精度高、可靠性高.据此提出了充分利用系统软件提供的各种功能模块,解决生产实际问题的方法.  相似文献   
97.
为了提高直升机风洞试验中桨叶载荷、变距拉杆载荷等旋转弱小信号的测量精度,研制了一套40通道的无线遥测系统.该系统成功解决了高精度测量技术,高精度同步触发技术、高速无线数据通信、大容量数据压缩等关键技术难题,构建了高精度、模块化、小型化、实时无线传输的遥测系统.通过性能测试及试验运行,证明该系统能够提高旋转信号的测量精度及传输的实时性,满足直升机风洞试验等旋转环境下弱小信号的测量.  相似文献   
98.
传统的水合物形成条件预测方法都存在各种缺点,而小波神经网络预测水合物形成条件的精度比较高,利于推广。针对水合物形成条件预测值之间相对差距较大,本文提出群体最大误差比率代表机制来改进小波神经网络的学习方式。实验结果表明,该算法有效可行,预测准确度高。  相似文献   
99.
Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure.  相似文献   
100.
In the partition of unity (PU)-based methods, the global approximation is built by multiplying a partition of unity by local approximations. Within this framework, high-order approximations are achieved by directly adopting high-order polynomials as local approximations, and therefore nodes along sides or inside elements, which are usually adopted in the conventional finite element methods, are no more required. However, the PU-based approximation constructed in this way may suffer from rank deficiency due to the linear dependence of the global degrees of freedom. In this paper, the origin of the rank deficiency in the PU-based approximation space is first dissected at an element level, and then an approach to predict the rank deficiency for a mesh is proposed together with the principle of the increase of rank deficiency. Finally, examples are investigated to validate the present approach. The current work indicates such a fact that the rank deficiency is an unrelated issue to the nullity of the global matrix. It can be resolved in its own manner.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号