首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11835篇
  免费   106篇
  国内免费   191篇
电工技术   168篇
综合类   80篇
化学工业   398篇
金属工艺   627篇
机械仪表   165篇
建筑科学   390篇
矿业工程   42篇
能源动力   89篇
轻工业   80篇
水利工程   62篇
石油天然气   46篇
武器工业   1篇
无线电   463篇
一般工业技术   285篇
冶金工业   192篇
原子能技术   90篇
自动化技术   8954篇
  2023年   5篇
  2022年   8篇
  2021年   9篇
  2020年   12篇
  2019年   33篇
  2018年   21篇
  2017年   11篇
  2016年   27篇
  2015年   24篇
  2014年   252篇
  2013年   298篇
  2012年   804篇
  2011年   3141篇
  2010年   1161篇
  2009年   1025篇
  2008年   684篇
  2007年   602篇
  2006年   473篇
  2005年   623篇
  2004年   659篇
  2003年   706篇
  2002年   361篇
  2001年   327篇
  2000年   241篇
  1999年   76篇
  1998年   126篇
  1997年   64篇
  1996年   38篇
  1995年   72篇
  1994年   54篇
  1993年   16篇
  1992年   13篇
  1991年   7篇
  1990年   14篇
  1989年   30篇
  1988年   9篇
  1987年   8篇
  1986年   13篇
  1985年   11篇
  1984年   28篇
  1983年   15篇
  1982年   6篇
  1981年   8篇
  1980年   2篇
  1979年   4篇
  1976年   3篇
  1974年   2篇
  1972年   1篇
  1965年   1篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 234 毫秒
991.
This paper introduces a novel global thresholding approach that exploits the multiscale gradient information. The multiscale gradient information, that is, the product of gradient magnitude (PGM), is obtained by multiplying the responses of the first derivative of Gaussian (FDoG) filter at three adjacent space scales. The output threshold is selected as the one that maximizes a new objective function of the gray level variable t. The objective function is defined as the ratio of the mean PGM values of the boundary and non-boundary regions in the binary image obtained by thresholding with variable t. Through analysis of 35 real images from different application areas, our results show that the proposed method can perform bilevel thresholding on the images with different histogram patterns, such as unimodal, bimodal, multimodal, or comb-like shape. Its segmentation quality is superior to five popular thresholding algorithms.  相似文献   
992.
Wireless mesh network (WMN) is a promising solution for last mile broadband internet access. Mesh nodes or mesh routers are connected via wireless links to form a multi-hop backbone infrastructure and improving throughput is the primary goal. While previous works mainly focused on either link level protocol design or complex mathematical model, in this paper, we investigate the performance gains from jointly optimizing scheduling and routing in a multi-radio, multi-channel and multi-hop wireless mesh network. Then, two optimization objectives are addressed by considering wireless media contention and spatial multiplexing. The first objective is to maximize throughput by exploiting spatial reuse while the second one is to ensure fairness among different links. We design a cross-layer algorithm by considering both MAC layer and network layer. Simulation results show that our joint optimization algorithm can significantly increase throughput as well as fairness.  相似文献   
993.
This paper addresses the field of stereophonic acoustic echo cancellation (SAEC) by adaptive filtering algorithms. Recently, we have proposed a new version of the fast Newton transversal FNTF algorithm for SAEC applications. In this paper, we propose an efficient modification of this algorithm for the same applications. This new algorithm uses a new proposed and simplified numerical stabilization technique and takes into account the cross-correlation between the inputs of the channels. The basic idea is to introduce a small nonlinearity into each channel that has the effect of reducing the inter-channel coherence while not being noticeable for speech due to self masking. The complexity of the proposed algorithm does not alter the complexity of the original version and is kept less than half the complexity of the fastest two-channel FTF filter version. Simulation results and comparisons with the extended two-channel normalized least mean square NLMS and FTF algorithms are presented.  相似文献   
994.
A procedure for designing digital Butterworth filters is proposed. The procedure determines the denominator and the numerator of the filter transfer function based on the positions of the poles in the s-plane and zeros in the z-plane, respectively, and calculates the gain factor using a maximum point normalization method. In contrast to some conventional algorithms, the presented procedure is much simpler by directly obtaining the filter with 3-dB frequencies. This makes the presented algorithm a useful tool for determining the boundaries in electronic or communication systems’ frequency responses. Moreover, the proposed algorithm is compatible with high-order transformations which are the limitations of general pole-zero placement techniques. The proposed method is illustrated by the examples of designing the low-pass, high-pass, band-pass, and band-stop filter.  相似文献   
995.
This study investigates the effect of multiple sources using STS across a Time-Hopping-PPM Modulation that is over an UWB Saleh-Valenzuela channel with each source using two transmit antennas. We model and analyze this system, showing that the presence of such MAI results in a significant degradation in BER performance. Simulation results show that for strong signal strength of interfering MAI signals degradation in BER performance is observed for the cases where we have five and 10 distinct MAI sources present when using Walsh-Hadamard thirty two chip spreading sequences. Using simulation, we investigate the use of other sets of orthogonal spreading sequences with improved cross correlation properties and find that for some sequences a significant improvement is seen compared to Walsh-Hadamard sequences when they are similarly misaligned. We show that MAI degrades the BER performance of such systems and that selection of improved cross correlation spreading code sequence sets improves BER.  相似文献   
996.
An accurate image registration method based on Local Upsampling Fourier Transform (LUFT) is developed in this paper. It uses a hierarchical strategy to estimate more accurate image pair’s registration parameters, which consists of a coarse estimation and a robust and efficient refinement stage as well. The initial parameter is estimated through a conventional Phase Only Correlation (POC) method in the coarse stage, and then it is refined by the Local Upsampling Fourier Transform in frequency domain to achieve higher accuracy. Furthermore, as will be shown in many experiments, the LUFT can achieve more accurate translation and rotation estimation, and it is efficient, robust to noise, and it can be applied to accurate 2D and 3D image rotation and translation estimation.  相似文献   
997.
Cloud infrastructure is expected to be able to support Internet scale critical applications (e.g. hospital systems and smart grid systems). Critical infrastructure services and organizations alike will not outsource their critical applications to a public Cloud without strong assurances that their requirements will be enforced. Central to this concern is that the user should be provided with evidence of the trustworthiness of the elements of the Cloud without getting involved into infrastructure details. In addition, users should be able to control their outsourced data at public Clouds. Establishing Cloud’s trust model is important but the Cloud’s infrastructure complexity and dynamism makes it difficult to address. This paper focuses on an important angle in this direction. We start by identifying the related challenges for establishing trust in the Cloud, and then propose a foundation framework which can help in addressing the identified challenges. Our focus is on IaaS Cloud type and on organizations as Cloud users.  相似文献   
998.
Currently multi-channel multi-interface ad hoc networks (multi-channel ad hoc networks) have received amount of interest, especially under the context of real-time traffics, such as video applications. Channel assignment is one of the key challenges in multi-channel ad hoc networks. In this paper, based on a representative hybrid channel assignment strategy named as HMCP, a statistic link load based hybrid channel assignment strategy, SLL-HCA, is presented to obtain a better channel assignment metric than that in HMCP. SLL-HCA is based on the HMCP protocol and adopts the statistic link load metric to ensure load balancing in a two-hop neighborhood, and to prevent both the hidden node problem and the exposed node problem. In addition, an enhanced strategy, VE-SLL-HCA, by setting harsher channel assignment conditions and reserving lower interference of routing path for video-streaming traffic than other non-video traffic, is proposed to improve the QoS support of video-streaming over multi-channel ad hoc networks. Simulation results show that SLL-HCA achieves better throughput performance than HMCP in the presence of background traffic including CBR traffic or VBR traffic; and, the PSNR QoS metric for video-streaming is enhanced when using VE-SLL-HCA compared with SLL-HCA and HMCP, which confirms the validity of the proposed strategy for video-streaming traffics. Moreover, the simulation results also indicate that non-video traffic unlikely suffers an unacceptable performance in terms of throughput.  相似文献   
999.
A proxy signature scheme, introduced by Mambo, Usuda and Okamoto, allows an entity to delegate its signing rights to another entity. Identity based public key cryptosystems are a good alternative for a certificate based public key setting, especially when efficient key management and moderate security are required. From inception several ID-based proxy signature schemes have been discussed, but no more attention has been given to proxy signature with message recovery. In this paper, we are proposing provably secure ID-based proxy signature scheme with message recovery and we have proved that our scheme is secure as existential forgery-adaptively chosen message and ID attack. As proposed scheme is efficient in terms of communication overhead and security, it can be a good alternative for certificate based proxy signatures, used in various applications such as wireless e-commerce, mobile agents, mobile communication and distributed shared object systems, etc.  相似文献   
1000.
Mechanisms to control concurrent access over project artefacts are needed to execute the software development process in an organized way. These mechanisms are implemented by concurrency control policies in version control systems that may inhibit (i.e. ‘to lock’) or allow (i.e., ‘not to lock’) parallel development. This work presents a novel approach named Orion that analyzes the project's historical changes and suggests the most appropriate concurrency control policy for each software element. This suggestion aims at minimizing conflict situations and thus improving the productivity of the development team. In addition, it identifies critical elements that do not work well with any of these policies and are candidates to refactoring. We evaluated Orion through two experimental studies and the results, which indicated it was effective, led us to a prototype implementation. Apart from the Orion approach this paper also presents the planning, execution, and analysis stages of the evaluation, and details of prototype internals.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号