首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4925篇
  免费   571篇
  国内免费   537篇
电工技术   392篇
综合类   549篇
化学工业   150篇
金属工艺   72篇
机械仪表   237篇
建筑科学   273篇
矿业工程   72篇
能源动力   111篇
轻工业   43篇
水利工程   229篇
石油天然气   147篇
武器工业   69篇
无线电   582篇
一般工业技术   291篇
冶金工业   74篇
原子能技术   37篇
自动化技术   2705篇
  2024年   16篇
  2023年   73篇
  2022年   63篇
  2021年   89篇
  2020年   106篇
  2019年   127篇
  2018年   89篇
  2017年   135篇
  2016年   140篇
  2015年   166篇
  2014年   220篇
  2013年   266篇
  2012年   285篇
  2011年   345篇
  2010年   277篇
  2009年   334篇
  2008年   356篇
  2007年   450篇
  2006年   346篇
  2005年   319篇
  2004年   252篇
  2003年   233篇
  2002年   194篇
  2001年   140篇
  2000年   132篇
  1999年   120篇
  1998年   104篇
  1997年   114篇
  1996年   98篇
  1995年   71篇
  1994年   90篇
  1993年   61篇
  1992年   39篇
  1991年   45篇
  1990年   18篇
  1989年   23篇
  1988年   19篇
  1987年   13篇
  1986年   4篇
  1985年   11篇
  1984年   7篇
  1983年   6篇
  1982年   6篇
  1981年   6篇
  1980年   5篇
  1978年   2篇
  1977年   2篇
  1976年   3篇
  1974年   3篇
  1962年   2篇
排序方式: 共有6033条查询结果,搜索用时 15 毫秒
31.
陈正初 《大电机技术》1995,(1):55-58,F004
本文对电液调速器的人工失灵区电路进行定量分析,导出了失灵区的一套计算公式,并指出失灵区与调差率、功率偏差的内在关系。  相似文献   
32.
Motion vector plays one significant feature in moving object segmentation. However, the motion vector in this application is required to represent the actual motion displacement, rather than regions of visually significant similarity. In this paper, region-based selective optical flow back-projection (RSOFB) which back-projects optical flows in a region to restore the region's motion vector from gradient-based optical flows, is proposed to obtain genuine motion displacement. The back-projection is performed based on minimizing the projection mean square errors of the motion vector on gradient directions. As optical flows of various magnitudes and directions provide various degrees of reliability in the genuine motion restoration, the optical flows to be used in the RSOFB are optimally selected based on their sensitivity to noises and their tendency in causing motion estimation errors. In this paper a deterministic solution is also derived for performing the minimization and obtaining the genuine motion magnitude and motion direction.  相似文献   
33.
 基于波动方程的聚焦点控制照明叠前深度偏移技术借助于差分计算,把速度、密度等介质参数的影响体现在差分计算的矩阵方程中,能够自动适应速度场的任意变化,快速傅里叶变换的使用也加速了波场延拓的计算速度。因此此法兼具有限差分偏移方法和傅里叶偏移方法的优点,既可适应速度场的剧烈变化,又可保证对陡倾地层的成像效果,是目前针对复杂构造最有效的成像方法之一。对于单个聚焦点及其周围的成像步骤为:①采用矩形网格情况下绕射走时的有限差分计算方法生成合成算子;②应用合成算子来合成面炮震源和面波记录;③对合成的面炮震源和面波记录做傅里叶有限差分法波动方程叠前深度偏移,得到该聚焦点及其附近区域的成像结果。按照上述成像步骤,将震源波场和炮集记录依据相应的外推公式进行延拓,最终应用成像条件求取成像值。在地质目标处选取多个聚焦点,可以得到面向目标的控制照明偏移成像,在多个层位上选取多个聚焦点进行控制照明叠前深度偏移,可以得到整块区域的成像。通过对Marmousi模型的试算,取得了较好的效果。  相似文献   
34.
A. Chin 《Algorithmica》1994,12(2-3):170-181
Consider the problem of efficiently simulating the shared-memory parallel random access machine (PRAM) model on massively parallel architectures with physically distributed memory. To prevent network congestion and memory bank contention, it may be advantageous to hash the shared memory address space. The decision on whether or not to use hashing depends on (1) the communication latency in the network and (2) the locality of memory accesses in the algorithm.We relate this decision directly to algorithmic issues by studying the complexity of hashing in the Block PRAM model of Aggarwal, Chandra, and Snir, a shared-memory model of parallel computation which accounts for communication locality. For this model, we exhibit a universal family of hash functions having optimal locality. The complexity of applying these hash functions to the shared address space of the Block PRAM (i.e., by permuting data elements) is asymptotically equivalent to the complexity of performing a square matrix transpose, and this result is best possible for all pairwise independent universal hash families. These complexity bounds provide theoretical evidence that hashing and randomized routing need not destroy communication locality, addressing an open question of Valiant.This work was started when the author was a student at Oxford University, supported by a National Science Foundation Graduate Fellowship and a Rhodes Scholarship. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the National Science Foundation or the Rhodes Trust.  相似文献   
35.
蔡楹  杨妹 《系统仿真技术》2012,8(3):209-213
为实现对个体的兴趣建模,提出基于进化计算的建模(Evolutionary Computation Based Modeling,ECBM)方法。该方法采用定性和定量相结合的方式对个体的兴趣系统进行建模,首先通过定性分析构建个体的兴趣模型框架,然后通过进化计算(Evolutionary Computation)方法对模型参数自动进化。实验结果表明,ECBM能够通过数据驱动模式优化模型参数,并利用更新信息进化模型,使其不断逼近真实系统。  相似文献   
36.
37.
The problem of packing circles into a domain of prescribed topology is considered. The circles need not have equal radii. The Collins-Stephenson algorithm computes such a circle packing. This algorithm is parallelized in two different ways and its performance is reported for a triangular, planar domain test case. The implementation uses the highly parallel graphics processing unit (GPU) on commodity hardware. The speedups so achieved are discussed based on a number of experiments.  相似文献   
38.
Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost and can be integrated into the ubiquitous EPCglobal Class 1 Generation 2 tag protocol (C1G2) are still needed and being investigated. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-ofth-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the EPCglobal C1G2 tag protocol, which assures low implementation cost. We also present a successful implementation of our protocol on real-world components such as the INTEL WISP UHF RFID tag and a C1G2 compliant reader.  相似文献   
39.
Design of optimal plans for environmental planning and management applications should ideally consider the multiple quantitative and qualitative criteria relevant to the problem. For example, in ground water monitoring design problems, qualitative criteria such as acceptable spatial extent and shape of the contaminant plume predicted from the monitored locations can be equally important as the typical quantitative criteria such as economic costs and contaminant prediction accuracy. Incorporation of qualitative criteria in the problem-solving process is typically done in one of two ways: (a) quantifying approximate representations of the qualitative criteria, which are then used as additional criteria during the optimization process, or (b) post-optimization analysis of designs by experts to evaluate the overall performance of the optimized designs with respect to the qualitative criteria. These approaches, however, may not adequately represent all of the relevant qualitative information that affect a human expert involved in design (e.g. engineers, stakeholders, regulators, etc.), and do not necessarily incorporate the effect of the expert's own learning process on the suitability of the final design. The Interactive Genetic Algorithm with Mixed Initiative Interaction (IGAMII) is a novel approach that addresses these limitations by using a collaborative human-computer search strategy to assist users in designing optimized solutions to their applications, while also learning about their problem. The algorithm adaptively learns from the expert's feedback, and explores multiple designs that meet her/his criteria using both the human expert and a simulated model of the expert's responses in a collaborative fashion. The algorithm provides an introspection-based learning framework for the human expert and uses the human's subjective confidence measures to adjust the optimization search process to the transient learning process of the user. This paper presents the design and testing of this computational framework, and the benefits of using this approach for solving groundwater monitoring design problems.  相似文献   
40.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号