首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2342篇
  免费   71篇
  国内免费   2篇
电工技术   40篇
综合类   1篇
化学工业   427篇
金属工艺   45篇
机械仪表   67篇
建筑科学   178篇
矿业工程   3篇
能源动力   89篇
轻工业   279篇
水利工程   6篇
石油天然气   18篇
无线电   107篇
一般工业技术   510篇
冶金工业   255篇
原子能技术   19篇
自动化技术   371篇
  2023年   21篇
  2022年   17篇
  2021年   39篇
  2020年   30篇
  2019年   32篇
  2018年   64篇
  2017年   54篇
  2016年   59篇
  2015年   55篇
  2014年   73篇
  2013年   181篇
  2012年   109篇
  2011年   134篇
  2010年   90篇
  2009年   118篇
  2008年   98篇
  2007年   115篇
  2006年   105篇
  2005年   96篇
  2004年   80篇
  2003年   71篇
  2002年   66篇
  2001年   43篇
  2000年   40篇
  1999年   27篇
  1998年   87篇
  1997年   50篇
  1996年   43篇
  1995年   46篇
  1994年   38篇
  1993年   19篇
  1992年   25篇
  1991年   13篇
  1990年   10篇
  1989年   16篇
  1988年   15篇
  1986年   10篇
  1985年   25篇
  1984年   24篇
  1983年   11篇
  1982年   14篇
  1981年   13篇
  1980年   24篇
  1979年   12篇
  1978年   12篇
  1977年   15篇
  1976年   22篇
  1975年   9篇
  1973年   8篇
  1971年   10篇
排序方式: 共有2415条查询结果,搜索用时 15 毫秒
81.

In the context of historical document analysis, image binarization is a first important step, which separates foreground from background, despite common image degradations, such as faded ink, stains, or bleed-through. Fast binarization has great significance when analyzing vast archives of document images, since even small inefficiencies can quickly accumulate to years of wasted execution time. Therefore, efficient binarization is especially relevant to companies and government institutions, who want to analyze their large collections of document images. The main challenge with this is to speed up the execution performance without affecting the binarization performance. We modify a state-of-the-art binarization algorithm and achieve on average a 3.5 times faster execution performance by correctly mapping this algorithm to a heterogeneous platform, consisting of a CPU and a GPU. Our proposed parameter tuning algorithm additionally improves the execution time for parameter tuning by a factor of 1.7, compared to previous parameter tuning algorithms. We see that for the chosen algorithm, machine learning-based parameter tuning improves the execution performance more than heterogeneous computing, when comparing absolute execution times.

  相似文献   
82.
83.
A game theoretic model of six kinds of players is analyzed, i.e. countries, central banks, banks, firms, households, and financial inter-governmental organizations. Each player has a strategy set, with strategies such as setting interest rates, lending, borrowing, producing, consuming, investing, importing, exporting, defaulting, and penalizing default. Markets for goods, debt, and capital are modeled endogenously. This conceptualization of strategic opportunities for as many as six types of players is richer than anything that has been attempted earlier. 2005–2011 empirical data for Greece is used to analyze how utility is impacted by public consumption and lump sum transfers, and negative productivity shocks, and to analyze equilibrium over several time periods with and without the possibility of default. 2007–2008 empirical data for Greece and Germany is used to determine how the two countries’ utilities depend on Greece’s public 2007 consumption, with and without negative productivity shocks. Greece’s high debt burden is shown to make default optimal when productivity shocks are large and the default penalty is small. We find that Germany has limited ability, through its available strategies, to prevent a Greek default, and may need to resort to unconventional tools such as debt forgiveness and changing the default penalty.  相似文献   
84.
85.
This paper endogenizes the value of an information set which has to be produced and protected. The profit is inverse U shaped in security investment and production effort. The breach probability is commonly assumed to decrease convexly in security investment, which means that modest security investment is sufficient to deter most perpetrators. We allow the breach probability to be not only convex, but concave, which means that substantial security investment is needed to deter most perpetrators. Convexity versus concavity depends on the security environment, perpetrators, technology, and law enforcement. A firm strikes a balance between producing and protecting an information set dependent on seven model parameters for production, protection, convexity, concavity, vulnerability, and resource strength.  相似文献   
86.
In this paper, we study the response to external disturbances of a double integrator with a saturating feedback. For a class of disturbances that have bounded integrals over all intervals, we show that a linear static feedback law can always be designed to ensure boundedness of the states. Moreover, boundedness can be preserved if the disturbance is biased by a small DC signal. In the special case that the disturbance is made up of a finite number of sinusoids and a small bias, any linear static feedback ensures boundedness of the states. These results are an extension of previous results by Wen, Roy, and Saberi (2008).  相似文献   
87.
Wheat is one of the most important crops in Hungary, which represents approximately 20% of the entire agricultural area of the country, and about 40% of cereals. A robust yield method has been improved for estimating and forecasting wheat yield in Hungary in the period of 2003–2015 using normalized difference vegetation index (NDVI) derived from the data of the Moderate Resolution Imaging Spectroradiometer. Estimation was made at the end of June – it is generally the beginning of harvest of winter wheat in Hungary – while the forecasts were performed 1–7 weeks earlier. General yield unified robust reference index (GYURRI) vegetation index was calculated each year using different curve-fitting methods to the NDVI time series. The correlation between GYURRI and country level yield data gave correlation coefficient (r) of 0.985 for the examined 13 years in the case of estimation. Simulating a quasi-operative yield estimation process, 10 years’ (2006–2015) yield data was estimated. The differences between the estimated and actual yield data provided by the Hungarian Central Statistical Office were less than 5%, the average difference was 2.5%. In the case of forecasting, these average differences calculated approximately 2 and 4 weeks before the beginning of harvest season were 4.5% and 6.8%, respectively. We also tested the yield estimation procedure for smaller areas, for the 19 counties (Nomenclature of Territorial Units for Statistics-3 level) of Hungary. We found that, the relationship between GYURRI and the county level yield data had r of 0.894 for the years 2003–2014, and by simulating the quasi-operative forecast for 2015, the resulting 19 county average yield values differed from the actual yield as much as 8.7% in average.  相似文献   
88.
Poly(oxyethylene 20 sorbitan) monolaurate (Tween® 20) methacrylates were synthesized by coupling methacryloyl chloride (MeOCl) to Tween 20 in the presence of 4-(N,N-dimethylamino) pyridine, using THF as a solvent, in order to investigate their suitability as precursors for photopolymerizable hydrogels in tissue engineering applications. The degree of substitution could be controlled by adjusting the molar ratio of MeOCl and Tween 20, giving three different monomers: Tween 20 monomethacrylate, Tween 20 dimethacrylate and Tween 20 trimethacrylate. Combined 1 H NMR and MALDI-TOF MS confirmed these monomers to be of high purity and to have polydispersities less than 1.3. It was shown that aqueous solutions of the monomers were photoactive, all the methacrylate groups reacting within 30 minutes exposure to a UV light intensity of 145 mW/cm2. Aqueous Tween 20 trimethacrylate was then combined with N-vinyl-2-pyrrolidone (NVP), giving tough copolymer hydrogels on photopolymerization, whose swelling ratios and swelling rates could be tuned by varying the Tween 20 trimethacrylate content. The use of a flexible spacer with a multifunctional monomer gives a permanent three-dimensional network, whilst maintaining degrees of swelling of between 60 and 85%, with potential for a wide range of biological and non-biological applications.  相似文献   
89.
We present a perception system for enabling automated loading with waist-articulated wheel loaders. To enable autonomous loading of piled materials, using either above-ground wheel loaders or underground load-haul-dump vehicles, 3D data of the pile shape is needed. However, using common 3D scanners, the scan data is distorted while the wheel loader is moving towards the pile. Existing methods that make use of 3D scan data (for autonomous loading as well as tasks such as mapping, localisation, and object detection) typically assume that each 3D scan is accurate. For autonomous robots moving over rough terrain, it is often the case that the vehicle moves a substantial amount during the acquisition of one 3D scan, in which case the scan data will be distorted. We present a study of auto-loading methods, and how to locate piles in real-world scenarios with nontrivial ground geometry. We have compared how consistently each method performs for live scans acquired in motion, and also how the methods perform with different view points and scan configurations. The system described in this paper uses a novel method for improving the quality of distorted 3D scans made from a vehicle moving over uneven terrain. The proposed method for improving scan quality is capable of increasing the accuracy of point clouds without assuming any specific features of the environment (such as planar walls), without resorting to a “stop-scan-go” approach, and without relying on specialised and expensive hardware. Each new 3D scan is registered to the preceding using the normal-distributions transform (NDT). After each registration, a mini-loop closure is performed with a local, per-scan, graph-based SLAM method. To verify the impact of the quality improvement, we present data that shows how auto-loading methods benefit from the corrected scans. The presented methods are validated on data from an autonomous wheel loader, as well as with simulated data. The proposed scan-correction method increases the accuracy of both the vehicle trajectory and the point cloud. We also show that it increases the reliability of pile-shape measures used to plan an efficient attack pose when performing autonomous loading.  相似文献   
90.
In this paper, we study control of a chain of integrators under actuator saturation and non‐additive disturbances. We shall show that boundedness of the states can be ensured if the disturbances are matched and integral‐bounded, misaligned and magnitude‐bounded, or a combination of the two, using either a static or a dynamic low‐gain state feedback. This result is an extension of our earlier work on double integrator. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号