首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3637篇
  免费   350篇
  国内免费   315篇
电工技术   356篇
综合类   186篇
化学工业   483篇
金属工艺   183篇
机械仪表   159篇
建筑科学   273篇
矿业工程   31篇
能源动力   191篇
轻工业   28篇
水利工程   64篇
石油天然气   11篇
武器工业   6篇
无线电   678篇
一般工业技术   608篇
冶金工业   43篇
原子能技术   23篇
自动化技术   979篇
  2024年   11篇
  2023年   139篇
  2022年   102篇
  2021年   151篇
  2020年   121篇
  2019年   98篇
  2018年   111篇
  2017年   242篇
  2016年   202篇
  2015年   235篇
  2014年   282篇
  2013年   314篇
  2012年   399篇
  2011年   338篇
  2010年   264篇
  2009年   285篇
  2008年   133篇
  2007年   239篇
  2006年   210篇
  2005年   74篇
  2004年   30篇
  2003年   36篇
  2002年   33篇
  2001年   46篇
  2000年   18篇
  1999年   23篇
  1998年   11篇
  1997年   8篇
  1996年   6篇
  1995年   8篇
  1994年   7篇
  1993年   5篇
  1992年   7篇
  1991年   8篇
  1990年   3篇
  1989年   8篇
  1988年   11篇
  1987年   26篇
  1986年   26篇
  1985年   5篇
  1984年   3篇
  1983年   6篇
  1982年   3篇
  1981年   5篇
  1980年   1篇
  1979年   4篇
  1978年   2篇
  1976年   3篇
排序方式: 共有4302条查询结果,搜索用时 0 毫秒
71.
The kernel method suffers from the following problem: the computational efficiency of the feature extraction procedure is inversely proportional to the size of the training sample set. In this paper, from a novel viewpoint, we propose a very simple and mathematically tractable method to produce the computationally efficient kernel-method-based feature extraction procedure. We first address the issue that how to make the feature extraction result of the reformulated kernel method well approximate that of the naïve kernel method. We identify these training samples that statistically contribute much to the feature extraction results and exploit them to reformulate the kernel method to produce the computationally efficient kernel-method-based feature extraction procedure. Indeed, the proposed method has the following basic idea: when one training sample has little effect on the feature extraction result and statistically has the high correlation with regard to all the training samples, the feature extraction term associated with this training sample can be removed from the feature extraction procedure. The proposed method has the following advantages: First, it proposes, for the first time, to improve the kernel method through formal and reasonable evaluation on the feature extraction term. Second, the proposed method improves the kernel method at a low extra cost and thus has a much more computationally efficient training phase than most of the previous improvements to the kernel method. The experimental comparison shows that the proposed method performs well in classification problems. This paper also intuitively shows the geometrical relation between the identified training samples and other training samples.  相似文献   
72.
异步消息驱动安全通信模块的设计与实现   总被引:1,自引:0,他引:1  
邱俊源  张跃 《计算机工程与设计》2011,32(8):2580-2583,2587
为了保障多参数监护数据汇总系统的数据传输安全,设计并实现了一个高性能的安全通信模块.通过WSAAsyncSelect I/O模型构建了异步套接字事件多路分解及调度框架,运用安全套接字层协议保证数据传输的安全可靠,并通过多态技术提高了模块的可扩展性.最后在Win32平台上实现了一个数据汇总通信系统作为示例,测试验证了安全...  相似文献   
73.
为实现室性早搏的自动判别,提出一种基于多模板匹配的自适应识别算法。采用滤波提高数据信噪比,利用样本数据通过特定的自学习机制建立模板库,设计模板的压缩算法实现待测心搏与模板心搏宽度的对齐,采用模板队列匹配和模板库匹配相结合的匹配策略,设计自适应更新规则实时优化队列与库的结构,利用相关系数检测室早。使用MIT-BIH数据库进行测试,达到99.39%的灵敏度和98.79%的特异度。  相似文献   
74.
分布式视频编码虚拟依赖信道模型研究   总被引:4,自引:1,他引:3  
视频信息固有的非平稳特性,如冲突区域等,使时域预测技术变得非常复杂.在分布式视频编码(DVC)中,由于解码端不能获取当前编码帧的信息,精确地对时域相关噪声进行建模变得更为困难.文中以虚拟依赖信道模型为切入点对如何降低时域相关噪声进行了研究.首先对DVC虚拟依赖信道进行了建模,并对影响边信息的主要因素进行了分析,分析结果表明在变换域中不同的频率子带对时域相关噪声的敏感度不同.在此基础上提出了一种新的基于小波变换域的虚拟依赖信道模型VCMDWT,基于分类编码的思想对较为平稳的LL子带进行Wyner-Ziv编码,对非平稳的高频子带进行SPIHT帧内编码.实验结果表明,与基于像素域的方法相比,所提出的VCMDWT模型能够得到更稳定的虚拟信道,提高DVC系统的率失真性能达到2.6dBs以上.  相似文献   
75.
Copyright protection and information security have become serious problems due to the ever growing amount of digital data over the Internet. Reversible data hiding is a special type of data hiding technique that guarantees not only the secret data but also the cover media can be reconstructed without any distortion. Traditional schemes are based on spatial, discrete cosine transformation (DCT) and discrete wavelet transformation (DWT) domains. Recently, some vector quantization (VQ) based reversible data hiding schemes have been proposed. This paper proposes an improved reversible data hiding scheme based on VQ-index residual value coding. Experimental results show that our scheme outperforms two recently proposed schemes, namely side-match vector quantization (SMVQ)-based data hiding and modified fast correlation vector quantization (MFCVQ)-based data hiding.  相似文献   
76.
More and more complicated conceptual design of ship’s engine room (CDSER) heavily depends on designers’ engineering knowledge and existing ship data. To achieve intelligent design at the initial ship design stage, many researchers have made much significant progress in this field, however, most of them only focused on how to find the similar constructed ships. At present, how to utilize these existing data remains an untouched topic. In order to make good use of the existing data and reduce the dependence on designers’ experience, a novel system named Expert System for Aided Conceptual Design of Ship’s Engine Room Automation (ESACD), is elaborated in this study. With the support of the constructed Ship Data Warehouse System, two core subsystems Configuration Selection Assistant (CSA) and Design Scheme Decision Assistant (DSDA) are included in ESACD. A promising approach integrating Fuzzy c-means algorithm (FCM) and Rough Sets Theory (RST) to extract configuration rules from the stored data is adopted in CSA. According to engineers’ proposals, RST is utilized to reason knowledge in incomplete scheme information systems for getting design scheme rules in DSDA, which are useful suggestions for engineers to get better schemes at this stage. Finally, the validity and necessity of this interactive expert system are demonstrated through the CDSER of a new 50,000 DWT Handymax bulk carrier. It is proved that ESACD can efficiently facilitate rapid and intelligent design in CDSER, and reduce the cost of a new ship design.  相似文献   
77.
基于身份密码的安全电子邮件系统   总被引:1,自引:1,他引:0       下载免费PDF全文
针对现有电子邮件系统中的安全性问题,采用基于身份的密码体制和基于内容的过滤扫描技术,构建具有反垃圾/反病毒功能的邮件服务器及具有涉密扫描功能的邮件网关服务器,设计并实现了邮件系统客户端及其必备管理控制中心。系统具有扫描并过滤涉密邮件、加密或解密邮件、签名或认证邮件等功能,能够满足在不可控、动态和松散企业组织成员问的安全通信。  相似文献   
78.
79.
It is well-known that critical infrastructures would be targets for cyber attacks. In this paper, we focus on the power systems (i.e. smart grids) in ubiquitous cities, where every meter is linked to an information network through wireless networking. In a smart grid system, information from smart meters would be used to perform a state estimation in real time to maintain the stability of the system. A wrong estimation may lead to disastrous consequences (e.g. suspension of electricity supply or a big financial loss). Unfortunately, quite a number of recent results showed that attacks on this estimation process are feasible by manipulating readings of only a few meters. In this paper, we focus on nonlinear state estimation which is a more realistic model and widely employed in a real power grid environment. We category cyber attacks against nonlinear state estimation, and review the mechanisms behind. State-of-the-art security measures to detect these attacks are discussed via sensor protection. Hope that the community would be able to come up with a secure system architecture for ubiquitous cities.  相似文献   
80.
胡东  张盛  林孝康 《微处理机》2013,34(1):31-33,40
针对目前家庭通信网络日益复杂化和多样化问题,提出了一种新型的基于Wire-lessHART和PLC的无线自组织网络系统智能终端结构。通过兼容电力线通信、WirelessHART协议以及以太网的方法,实现了异构型网络通信、智能化控制家电等功能。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号