全文获取类型
收费全文 | 19937篇 |
免费 | 2474篇 |
国内免费 | 1653篇 |
专业分类
电工技术 | 1861篇 |
综合类 | 2003篇 |
化学工业 | 2413篇 |
金属工艺 | 1271篇 |
机械仪表 | 2022篇 |
建筑科学 | 2186篇 |
矿业工程 | 809篇 |
能源动力 | 608篇 |
轻工业 | 234篇 |
水利工程 | 584篇 |
石油天然气 | 1480篇 |
武器工业 | 273篇 |
无线电 | 1735篇 |
一般工业技术 | 1690篇 |
冶金工业 | 557篇 |
原子能技术 | 86篇 |
自动化技术 | 4252篇 |
出版年
2024年 | 133篇 |
2023年 | 333篇 |
2022年 | 548篇 |
2021年 | 632篇 |
2020年 | 675篇 |
2019年 | 667篇 |
2018年 | 545篇 |
2017年 | 733篇 |
2016年 | 791篇 |
2015年 | 821篇 |
2014年 | 1302篇 |
2013年 | 1216篇 |
2012年 | 1575篇 |
2011年 | 1621篇 |
2010年 | 1186篇 |
2009年 | 1229篇 |
2008年 | 1123篇 |
2007年 | 1363篇 |
2006年 | 1162篇 |
2005年 | 992篇 |
2004年 | 815篇 |
2003年 | 858篇 |
2002年 | 694篇 |
2001年 | 556篇 |
2000年 | 482篇 |
1999年 | 406篇 |
1998年 | 348篇 |
1997年 | 237篇 |
1996年 | 228篇 |
1995年 | 180篇 |
1994年 | 146篇 |
1993年 | 106篇 |
1992年 | 85篇 |
1991年 | 59篇 |
1990年 | 45篇 |
1989年 | 46篇 |
1988年 | 29篇 |
1987年 | 13篇 |
1986年 | 12篇 |
1985年 | 16篇 |
1984年 | 20篇 |
1983年 | 10篇 |
1982年 | 11篇 |
1981年 | 6篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1973年 | 1篇 |
1964年 | 1篇 |
1959年 | 1篇 |
1951年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Mehmet Önder Efe 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(1):23-29
This paper presents an approach to improve the performance of intelligent sliding model control achieved by the use of a fundamental
constituent of soft computing, named Adaptive Linear Element (ADALINE). The proposed scheme is based on the fractional calculus.
A previously considered tuning scheme is revised according to the rules of fractional order differintegration. After a comparison
with the integer order counterpart, it is seen that the control system with the proposed adaptation scheme provides (1) better
tracking performance, (2) suppression of undesired drifts in parameter evolution and (3) a very high degree of robustness
and insensitivity to disturbances. The claims are justified through some simulations utilizing the dynamic model of a two
degrees of freedom (DOF) direct drive robot arm and overall, the contribution of the paper is to introduce the fractional
order calculus into a robust and nonlinear control problem with some outperforming features that are absent when the integer
order differintegration operators are adopted. 相似文献
102.
Xiaonan Lu Saurabh Kataria William J. Brouwer James Z. Wang Prasenjit Mitra C. Lee Giles 《International Journal on Document Analysis and Recognition》2009,12(2):65-81
Authors use images to present a wide variety of important information in documents. For example, two-dimensional (2-D) plots
display important data in scientific publications. Often, end-users seek to extract this data and convert it into a machine-processible
form so that the data can be analyzed automatically or compared with other existing data. Existing document data extraction
tools are semi-automatic and require users to provide metadata and interactively extract the data. In this paper, we describe
a system that extracts data from documents fully automatically, completely eliminating the need for human intervention. The
system uses a supervised learning-based algorithm to classify figures in digital documents into five classes: photographs,
2-D plots, 3-D plots, diagrams, and others. Then, an integrated algorithm is used to extract numerical data from data points
and lines in the 2-D plot images along with the axes and their labels, the data symbols in the figure’s legend and their associated
labels. We demonstrate that the proposed system and its component algorithms are effective via an empirical evaluation. Our
data extraction system has the potential to be a vital component in high volume digital libraries. 相似文献
103.
ZHANG Xiao-yu 《通讯和计算机》2009,6(1):53-60
Sliding mode-like fuzzy logic control (SMFC) algorithm for nonlinear systems is presented in this paper. Firstly dead zone parameters of sliding mode control (SMC) are selftuned by proper adaptive laws and then combined into fuzzy logic system (FLS) to compose the opportune fuzzy logic control (FLC), which is equivalent to the predesigned SMC controller with self-tuning parameters. Robustness and invariance to the uncertainties of the closed-loop systems are improved and chattering of the SMC is eliminated. Finally simulation results of numerical examples show that the proposed control algorithm is efficient and feasible. 相似文献
104.
Daewon Lee H. Jin Kim Shankar Sastry 《International Journal of Control, Automation and Systems》2009,7(3):419-428
This paper presents two types of nonlinear controllers for an autonomous quadrotor helicopter. One type, a feedback linearization
controller involves high-order derivative terms and turns out to be quite sensitive to sensor noise as well as modeling uncertainty.
The second type involves a new approach to an adaptive sliding mode controller using input augmentation in order to account
for the underactuated property of the helicopter, sensor noise, and uncertainty without using control inputs of large magnitude.
The sliding mode controller performs very well under noisy conditions, and adaptation can effectively estimate uncertainty
such as ground effects.
Recommended by Editorial Board member Hyo-Choong Bang under the direction of Editor Hyun Seok Yang. This work was supported
by the Korea Research Foundation Grant (MOEHRD) KRF-2005-204-D00002, the Korea Science and Engineering Foundation(KOSEF) grant
funded by the Korea government(MOST) R0A-2007-000-10017-0 and Engineering Research Institute at Seoul National University.
Daewon Lee received the B.S. degree in Mechanical and Aerospace Engineering from Seoul National University (SNU), Seoul, Korea, in 2005,
where he is currently working toward a Ph.D. degree in Mechanical and Aerospace Engineering. He has been a member of the UAV
research team at SNU since 2005. His research interests include applications of nonlinear control and vision-based control
of UAV.
H. Jin Kim received the B.S. degree from Korea Advanced Institute of Technology (KAIST) in 1995, and the M.S. and Ph.D. degrees in Mechanical
Engineering from University of California, Berkeley in 1999 and 2001, respectively. From 2002–2004, she was a Postdoctoral
Researcher and Lecturer in Electrical Engineering and Computer Science (EECS), University of California, Berkeley (UC Berkeley).
From 2004–2009, she was an Assistant Professor in the School of in Mechanical and Aerospace Engineering at Seoul National
University (SNU), Seoul, Korea, where she is currently an Associate Professor. Her research interests include applications
of nonlinear control theory and artificial intelligence for robotics, motion planning algorithms.
Shankar Sastry received the B.Tech. degree from the Indian Institute of Technology, Bombay, in 1977, and the M.S. degree in EECS, the M.A.
degree in mathematics, and the Ph.D. degree in EECS from UC Berkeley, in 1979, 1980, and 1981, respectively. He is currently
Dean of the College of Engineering at UC Berkeley. He was formerly the Director of the Center for Information Technology Research
in the Interest of Society (CITRIS). He served as Chair of the EECS Department from January, 2001 through June 2004. In 2000,
he served as Director of the Information Technology Office at DARPA. From 1996 to 1999, he was the Director of the Electronics
Research Laboratory at Berkeley (an organized research unit on the Berkeley campus conducting research in computer sciences
and all aspects of electrical engineering). He is the NEC Distinguished Professor of Electrical Engineering and Computer Sciences
and holds faculty appointments in the Departments of Bioengineering, EECS and Mechanical Engineering. Prior to joining the
EECS faculty in 1983 he was a Professor with the Massachusetts Institute of Technology (MIT), Cambridge. He is a member of
the National Academy of Engineering and Fellow of the IEEE. 相似文献
105.
Debra L. Cook Moti Yung Angelos D. Keromytis 《International Journal of Information Security》2009,8(3):211-231
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while
incurring a computational workload that is proportional to the block size. Our method uses the round function of an existing
block cipher as a black box and inserts it into a substitution- permutation network. Our method is designed to enable us to
form a reduction between the elastic and the original versions of the cipher. Using this reduction, we prove that the elastic
version of a cipher is secure against key-recovery attacks if the original cipher is secure against such attacks. We note
that while reduction-based proofs of security are a cornerstone of cryptographic analysis, they are typical when complete
components are used as sub-components in a larger design. We are not aware of the use of such techniques in the case of concrete
block cipher designs. We demonstrate the general applicability of the elastic block cipher method by constructing examples
from existing block ciphers: AES, Camellia, MISTY1, and RC6. We compare the performance of the elastic versions to that of
the original versions and evaluate the elastic versions using statistical tests measuring the randomness of the ciphertext.
We also use our examples to demonstrate the concept of a generic key schedule for block ciphers.
相似文献
Angelos D. KeromytisEmail: |
106.
傅慧 《计算机与数字工程》2009,37(7):107-109
文章采用Logistic混沌序列对实时视频传输系统进行数据的分块加/解密,并从算法的安全性、效率等方面进行了性能分析,该算法具有良好的实时性、快速性和易实施性,可以有效地防止敏感信息被轻易的窃取、篡改和传播,有效保障网络视频传输的流畅性及安全性。 相似文献
107.
一种新结构的DM-multipath与动态负载平衡 总被引:1,自引:0,他引:1
对于存储设备,Linux 在多路径 I/O方面主要有两种类型的解决方案:位于I/O调度器之上的顶层方案(BIO映射器)和位于底层的子系统具体方案(如IDE,SCSI)。因为实施它们的所在存储堆栈中的位置不同,每种方案各有优势。通过与第一种方案比较,介绍具体硬件子系统之上的另一种解决方案,新结构中重点实现移动内核当前多路径层——多路径设备映射器 (dm-multipath)到I/O调度层之下,这种方案能够有效地支持动态的负载平衡。 相似文献
108.
磁盘阵列(RAID)是当前能够提供存储系统高可用性和高可靠性的一项重要技术。它通过软硬件的冗余和奇偶校验提供数据的重构和恢复。针对当前在RAID控制软件设计的过程中面临多次数据拷贝的问题,文中提出了一种基于块I/O的RAID系统设计。它利用最新的Linux内核所提供的BIO机制,插入到SCSI Target的中间层进行数据I/O的处理。它能屏蔽掉上层不同的设备驱动类型,提供到IP-SAN的无缝链接。实验表明,该设计能够减少数据的传输延迟,最大限度地提高数据传输过程中的吞吐率,避免了多次昂贵的内存拷贝操作。 相似文献
109.
提出了一种基于小波域的彩色图像数字水印算法,先将图像从RGB色彩空间转化到YIQ色彩空间,在YIQ模型中取其亮度分量Y,依据块能量的大小选取合适的嵌入点,结合JND自适应地嵌入水印,然后再反变回RGB色彩空间。理论分析与仿真结果表明应用该算法实现的水印具有很好的不可见性和鲁棒性。 相似文献
110.
When it comes to data storage, cloud computing and cloud storage providers play a critical role. The cloud data can be accessed from any location with an internet connection. Additionally, the risk of losing privacy when data is stored in a cloud environment is also increased. A variety of security techniques are employed in the cloud to enhance security. In this paper, we aim at maintaining the privacy of stored data in cloud environment by implementing block-based modelling to boost the privacy level with Anti-Codify Technique (ACoT) and block cipher-based algorithms. Initially, the cipher text is generated using Deoxyribo Nucleic Acid (DNA) model. Block-cipher-based encryption is used by ACoT, but the original encrypted file and its extension are broken up into separate blocks. When the original file is broken up into two separate blocks, it raises the security level and makes it more difficult for outsiders to cloud data access. ACoT improves the security and privacy of cloud storage data. Finally, the fuzzy-based classification is used that stores various access types in servers. The simulation results shows that the ACoT-DNA method achieves higher entropy against various block size with reduced computational cost than existing methods. 相似文献