首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28202篇
  免费   3305篇
  国内免费   2015篇
电工技术   3899篇
综合类   3320篇
化学工业   497篇
金属工艺   504篇
机械仪表   2336篇
建筑科学   1212篇
矿业工程   1363篇
能源动力   254篇
轻工业   602篇
水利工程   445篇
石油天然气   766篇
武器工业   339篇
无线电   7893篇
一般工业技术   1838篇
冶金工业   289篇
原子能技术   285篇
自动化技术   7680篇
  2024年   85篇
  2023年   358篇
  2022年   578篇
  2021年   672篇
  2020年   690篇
  2019年   471篇
  2018年   447篇
  2017年   678篇
  2016年   831篇
  2015年   1060篇
  2014年   1816篇
  2013年   1640篇
  2012年   2235篇
  2011年   2436篇
  2010年   1905篇
  2009年   2003篇
  2008年   2116篇
  2007年   2438篇
  2006年   2196篇
  2005年   1922篇
  2004年   1439篇
  2003年   1216篇
  2002年   919篇
  2001年   736篇
  2000年   574篇
  1999年   398篇
  1998年   256篇
  1997年   233篇
  1996年   207篇
  1995年   212篇
  1994年   159篇
  1993年   123篇
  1992年   84篇
  1991年   73篇
  1990年   59篇
  1989年   51篇
  1988年   40篇
  1987年   24篇
  1986年   20篇
  1985年   22篇
  1984年   26篇
  1983年   14篇
  1982年   16篇
  1981年   9篇
  1980年   10篇
  1979年   11篇
  1978年   3篇
  1977年   3篇
  1959年   4篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 234 毫秒
911.
针对PnP问题的方程建立与求解, 提出一种基于矢量差分的未标定摄像机P5P问题的线性求解算法. 将5个控制点组成非共面的4点集合, 按照成像过程, 通过两个集合间的控制点矢量差分逐步构建摄像机姿态及相机矩阵的线性约束方程. 再依据线性理论与旋转阵 R 的正交性化简约束方程, 利用矢量积运算给出未标定P5P问题摄像机姿态及相机矩阵的解析解. 模拟和真实实验都验证了该方法的有效性.  相似文献   
912.
卫星定位接收机高精度伪码跟踪的设计与实现   总被引:3,自引:0,他引:3  
在卫星定位接收机中,伪码跟踪的精度直接影响定位精度。介绍了延迟锁相环及其数学模型。在对比分析等量采样和非等量采样条件下延迟锁相环跟踪精度的基础上,提出了采用非等量采样延迟锁相环的伪码跟踪数字实现方案。该方案复杂度低,易于实现。实验结果表明该方案对码速率为10.23 MHz的伪码跟踪精度可达1 ns,实现了伪码的精确同步。该设计已应用于卫星定位接收机的研制开发中。  相似文献   
913.
在油田录井作业中,钻井现场环境恶劣,电磁干扰较大,为保证录井数据采集和传输的正确和可靠,在无线录井数据采集设计中采用先进的数字隔离器替代常用的光电隔离器。现场应用试验表明,该设计不仅降低了系统功耗,减少了PCB板面积,而且达到了高可靠性和高速传输的目的,完全满足录井工作的现场要求。  相似文献   
914.
嵌入式平台下的RFID数据处理终端   总被引:1,自引:0,他引:1  
介绍一种以AT91SAM9260处理器和Linux嵌入式操作系统为平台的RFID信息采集与处理系统。该系统充分利用AT91SAM9260芯片丰富的标准接口资源,集门禁、考勤、监控为一体,以Linux操作系统为软件平台,完成了RFID数据信息和USB摄像头照片数据的采集、保存与TCP/IP远程数据传输等。介绍了系统的硬件组成原理、软件设计方案和实现方法,为射频识别技术在智能一卡通系统中的应用提供了一种先进的解决方案。  相似文献   
915.
916.
Based on the best wavelet packet decomposition of images, a new universal steganalysis method with high detection correct ratio is proposed. First, the best wavelet packet decomposition of image based on the Shannon entropy information cost function is made. Second, high order absolute characteristic function moments of histogram extracted from the coefficient subbands obtained by best wavelet packet decomposition are regarded as features. Finally, these features are processed and a back-propagation (BP) ne...  相似文献   
917.
功率因数校正技术是抑制电网谐波电流,提高功率因数的有效方法。本文设计了一款基于TMS320LF2407的平均电流控制型的数字控制单相Boost-PFC控制器,研究了电压电流双闭环数字控制回路的设计方法,除此之外,还在Matlab/Simulink中建立了该数字控制PFC(Power Factor Correction)控制器模型,并对其性能进行了仿真研究。  相似文献   
918.
The recognition of digital shapes is a deeply studied problem. The arithmetical framework, initiated by Reveillès [Géométrie discrète, calcul en nombres entiers et algorithmique, Thèse d’Etat, 1991], provides a powerful theoretical basis, as well as many algorithms to deal with digital objects. The tangential cover, first presented in Feschet and Tougne [Optimal time computation of the tangent of a discrete curve: application to the curvature, in: G. Bertrand, M. Couprie, L. Perroton (Eds.), 8th Discrete Geometry for Computer Imagery, Lecture Notes in Computer Science, vol. 1568, Springer, Berlin, 1999, pp. 31-40] and Feschet [Canonical representations of discrete curves, Pattern Anal. Appl. 8(1-2) (2005) 84-94] is a useful tool for representing geometric digital primitives. It computes the set of all maximal segments of a digital curve and permits either to obtain minimal length polygonalization or asymptotic convergence of tangents estimations. Nevertheless, the arithmetical approach does not tolerate the introduction of irregularities, which are however inherent to the acquisition of digital shapes. The present paper is an extension of Faure and Feschet [Tangential cover for thick digital curves, in: D. Coeurjolly, I. Sivignon, L. Tougne, F. Dupont (Eds.), DGCI 2008, Lecture Notes in Computer Science, vol. 4992, Springer, Berlin, 2008, pp. 358-369], in which we propose a new definition for a class of the so-called “thick digital curves” that applies well to a large class of digital object boundaries. We then propose an extension of the tangential cover to thick digital curves and provide an algorithm with an O(nlogn) time complexity, where n denotes the number of points of specific subparts of the thick digital curve. In order to keep up with this low complexity, some critical points must be taken into account. We describe all required implementation details in this paper.  相似文献   
919.
Design of DL-based certificateless digital signatures   总被引:1,自引:0,他引:1  
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification.  相似文献   
920.
Mobile TV service, which provides television-like content through a mobile device, holds a limelight as the next killer application of wireless technologies and also as a prospective hedonic information technology. However, in a world where other potential wireless technologies and services speedily emerge, vendors and service providers interested in mobile TV hope that it will be diffused over the gulf between early users to general ones prior to competing sprouts. At this point, an investigation of early consumers’ adoption of mobile TV may offer precious information for its survival. Based on the theoretical assumptions of the technology acceptance model (TAM), this study examines influences of cognitive concentration (or flow experience) and media content on consumers’ acceptance of mobile TV. The results are threefold. First, results suggest that cognitive concentration (or flow experience) and content have a significant role in consumers’ intention to use hedonic information technology. Second, results show that content has a critical impact on cognitive concentration. Finally, results support the use of the extended TAM as an explainer in the context of hedonic information technology.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号