首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30358篇
  免费   890篇
  国内免费   281篇
电工技术   481篇
综合类   33篇
化学工业   4774篇
金属工艺   1063篇
机械仪表   708篇
建筑科学   448篇
矿业工程   48篇
能源动力   1497篇
轻工业   1213篇
水利工程   169篇
石油天然气   100篇
武器工业   1篇
无线电   2787篇
一般工业技术   4686篇
冶金工业   1672篇
原子能技术   276篇
自动化技术   11573篇
  2024年   103篇
  2023年   431篇
  2022年   1003篇
  2021年   1183篇
  2020年   928篇
  2019年   979篇
  2018年   1253篇
  2017年   996篇
  2016年   966篇
  2015年   628篇
  2014年   1080篇
  2013年   1768篇
  2012年   1695篇
  2011年   4180篇
  2010年   2036篇
  2009年   1875篇
  2008年   1434篇
  2007年   1191篇
  2006年   943篇
  2005年   955篇
  2004年   822篇
  2003年   830篇
  2002年   494篇
  2001年   199篇
  2000年   192篇
  1999年   211篇
  1998年   423篇
  1997年   287篇
  1996年   263篇
  1995年   199篇
  1994年   180篇
  1993年   169篇
  1992年   127篇
  1991年   158篇
  1990年   125篇
  1989年   113篇
  1988年   103篇
  1987年   109篇
  1986年   101篇
  1985年   102篇
  1984年   110篇
  1983年   93篇
  1982年   74篇
  1981年   81篇
  1980年   56篇
  1979年   46篇
  1978年   39篇
  1977年   36篇
  1976年   45篇
  1975年   19篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
121.
In this paper, we present a novel two-stage minimum-mean-squared-error (MMSE) multiuser decision feedback detector (DFD) for code division multiple access systems working in the frequency-selective multipath fading environment. The first stage of the proposed cascaded structure is the noise-predictive successive DFD (NP-S-DFD), in which the active users are detected successively using the conventional bell labs layered space-time (BLAST) ordering criterion. The second stage includes an adaptive successive/parallel DFD (SP-DFD), which uses the tentative decisions obtained at the first stage for multiuser interference cancellation and data detection. Therefore, the proposed two-stage DFD may be called noise-predictive successive SP-DFD (NP-S-SP-DFD). Simulation results are presented to demonstrate the substantial improvement in the bit error rate performance of NP-S-SP-DFD over the conventional single-stage and cascaded DFDs. It may be inferred that the proposed DFD provides additional performance gain, when the order in which the users are detected is optimized according to the BLAST ordering based on MMSE criterion.  相似文献   
122.
In this paper we present an efficient technique for piecewise cubic Bézier approximation of digitized curve. An adaptive breakpoint detection method divides a digital curve into a number of segments and each segment is approximated by a cubic Bézier curve so that the approximation error is minimized. Initial approximated Bézier control points for each of the segments are obtained by interpolation technique i.e. by the reverse recursion of De Castaljau's algorithm. Two methods, two-dimensional logarithmic search algorithm (TDLSA) and an evolutionary search algorithm (ESA), are introduced to find the best-fit Bézier control points from the approximate interpolated control points. ESA based refinement is proved to be better experimentally. Experimental results show that Bézier approximation of a digitized curve is much more accurate and uses less number of points compared to other approximation techniques.  相似文献   
123.
This study compares the performances of various statistical pattern recognition techniques for the differentiation of commonly encountered features in indoor environments, possibly with different surface properties, using simple infrared (IR) sensors. The intensity measurements obtained from such sensors are highly dependent on the location, geometry, and surface properties of the reflecting feature in a way that cannot be represented by a simple analytical relationship, therefore complicating the differentiation process. We construct feature vectors based on the parameters of angular IR intensity scans from different targets to determine their geometry and/or surface type. Mixture of normals classifier with three components correctly differentiates three types of geometries with different surface properties, resulting in the best performance (100%) in geometry differentiation. Parametric differentiation correctly identifies six different surface types of the same planar geometry, resulting in the best surface differentiation rate (100%). However, this rate is not maintained with the inclusion of more surfaces. The results indicate that the geometrical properties of the targets are more distinctive than their surface properties, and surface recognition is the limiting factor in differentiation. The results demonstrate that simple IR sensors, when coupled with appropriate processing and recognition techniques, can be used to extract substantially more information than such devices are commonly employed for.  相似文献   
124.
Robust control synthesis of linear time-invariant SISO polytopic systems is investigated using the polynomial approach. A convex set of all stabilizing controllers for a polytopic system is given over an infinite-dimensional space. A finite-dimensional approximation of this set is obtained using the orthonormal basis functions and represented by a set of LMIs thanks to the KYP lemma. Then, an LMI based convex optimization problem for robust pole placement with sensitivity function shaping in two- and infinity-norm is proposed. The simulation results show the effectiveness of the proposed method.  相似文献   
125.
We introduce a new graph cut for clustering which we call the Information Cut. It is derived using Parzen windowing to estimate an information theoretic distance measure between probability density functions. We propose to optimize the Information Cut using a gradient descent-based approach. Our algorithm has several advantages compared to many other graph-based methods in terms of determining an appropriate affinity measure, computational complexity, memory requirements and coping with different data scales. We show that our method may produce clustering and image segmentation results comparable or better than the state-of-the art graph-based methods.  相似文献   
126.
127.
Three dimensional models play an important role in many applications; the problem is how to select the appropriate models from a 3D database rapidly and accurately. In recent years, a variety of shape representations, statistical methods, and geometric algorithms have been proposed for matching 3D shapes or models. In this paper, we propose a 3D shape representation scheme based on a combination of principal plane analysis and dynamic programming. The proposed 3D shape representation scheme consists of three steps. First, a 3D model is transformed into a 2D image by projecting the vertices of the model onto its principal plane. Second, the convex hall of the 2D shape of the model is further segmented into multiple disjoint triangles using dynamic programming. Finally, for each triangle, a projection score histogram and moments are extracted as the feature vectors for similarity searching. Experimental results showed the robustness of the proposed scheme, which resists translation, rotation, scaling, noise, and destructive attacks. The proposed 3D model retrieval method performs fairly well in retrieving models having similar characteristics from a database of 3D models.  相似文献   
128.
We demonstrate a simple optical-fiber-based autocorrelator for picosecond short pulses based on degree-of-polarization measurement while tuning the relative delay of the two orthogonal polarization states of the pulse. The pulsewidths of 20-, 40-, and 80-GHz pulse trains and 2-ps pulses generated by a mode-locked laser are measured. The <-10-dBm optical powers are used in the experiment. The measurement results agree well with the measurements using conventional techniques. Compared with conventional autocorrelators, this technique has the advantages of 1) wavelength independent, 2) significant less alignment, and 3) no high power required.  相似文献   
129.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
130.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号