首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   970篇
  免费   52篇
  国内免费   5篇
电工技术   7篇
综合类   2篇
化学工业   197篇
金属工艺   22篇
机械仪表   28篇
建筑科学   25篇
矿业工程   1篇
能源动力   55篇
轻工业   58篇
水利工程   2篇
石油天然气   3篇
无线电   137篇
一般工业技术   206篇
冶金工业   102篇
原子能技术   3篇
自动化技术   179篇
  2024年   4篇
  2023年   24篇
  2022年   67篇
  2021年   55篇
  2020年   65篇
  2019年   46篇
  2018年   63篇
  2017年   64篇
  2016年   54篇
  2015年   31篇
  2014年   42篇
  2013年   73篇
  2012年   58篇
  2011年   50篇
  2010年   40篇
  2009年   35篇
  2008年   37篇
  2007年   24篇
  2006年   25篇
  2005年   17篇
  2004年   20篇
  2003年   13篇
  2002年   7篇
  2001年   6篇
  2000年   2篇
  1999年   5篇
  1998年   11篇
  1997年   3篇
  1996年   11篇
  1995年   7篇
  1994年   3篇
  1993年   6篇
  1992年   12篇
  1991年   5篇
  1990年   7篇
  1989年   2篇
  1988年   4篇
  1987年   9篇
  1986年   4篇
  1985年   5篇
  1982年   1篇
  1980年   2篇
  1979年   1篇
  1978年   2篇
  1977年   1篇
  1976年   2篇
  1969年   1篇
  1966年   1篇
排序方式: 共有1027条查询结果,搜索用时 15 毫秒
1.
The synthesis of BaMgAl10O17∶ Eu2 (BAM) phosphors using the sol-gel method and their luminescence properties were reported. The blue-light emitting BAM was synthesized using citric acid and ethylene glycol as chelating materials. Emission of blue-light was obtained from these phosphors. The luminescent intensity increases as the temperature of heat treatment is increased. This study investigated the effects of the molar ratio of ethylene glycol to citric acid (Φ value), with respect to the phase formation and luminescence properties of BAM. The variation of the Φ value resulted in the change of the sol-gel reaction mechanism and the microstructures of the resultant powders. An increase in Φ value leads to an increase in the rate of BAM phase formation. The photoluminescent intensity of the prepared phosphors increases with heating temperatures because of enhanced crystallization.  相似文献   
2.
3.
As transistor feature sizes continue to shrink intothe sub-90nm range and beyond, the effects of process variationson critical path delay and chip yields have amplified. A commonconcept to remedy the effects of variation is speed-binning, bywhich chips from a single batch are rated by a discrete range offrequencies and sold at different prices. In this paper, we discussstrategies to modify the number of chips in different bins andhence enhance the profits obtained from them. Particularly, wepropose a scheme that introduces a small Substitute Cacheassociated with each cache way to replicate the data elementsthat will be stored in the high latency lines. Assuming a fixedpricing model, this method increases the revenue by as much as13.8% without any impact on the performance of the chips.  相似文献   
4.
We propose a novel pose-invariant face recognition approach which we call Discriminant Multiple Coupled Latent Subspace framework. It finds the sets of projection directions for different poses such that the projected images of the same subject in different poses are maximally correlated in the latent space. Discriminant analysis with artificially simulated pose errors in the latent space makes it robust to small pose errors caused due to a subject’s incorrect pose estimation. We do a comparative analysis of three popular latent space learning approaches: Partial Least Squares (PLSs), Bilinear Model (BLM) and Canonical Correlational Analysis (CCA) in the proposed coupled latent subspace framework. We experimentally demonstrate that using more than two poses simultaneously with CCA results in better performance. We report state-of-the-art results for pose-invariant face recognition on CMU PIE and FERET and comparable results on MultiPIE when using only four fiducial points for alignment and intensity features.  相似文献   
5.
This paper presents a new loss function for neural network classification, inspired by the recently proposed similarity measure called Correntropy. We show that this function essentially behaves like the conventional square loss for samples that are well within the decision boundary and have small errors, and L0 or counting norm for samples that are outliers or are difficult to classify. Depending on the value of the kernel size parameter, the proposed loss function moves smoothly from convex to non-convex and becomes a close approximation to the misclassification loss (ideal 0–1 loss). We show that the discriminant function obtained by optimizing the proposed loss function in the neighborhood of the ideal 0–1 loss function to train a neural network is immune to overfitting, more robust to outliers, and has consistent and better generalization performance as compared to other commonly used loss functions, even after prolonged training. The results also show that it is a close competitor to the SVM. Since the proposed method is compatible with simple gradient based online learning, it is a practical way of improving the performance of neural network classifiers.  相似文献   
6.
The initial rate of colloid deposition onto semi‐permeable membranes is largely controlled by the coupled influence of permeation drag and particle‐membrane colloidal interactions. Recent studies show that the particle‐membrane interactions are subject to immense local variations due to the inherent morphological heterogeneity (roughness) of reverse osmosis (RO) and nanofiltration (NF) membranes. This experimental investigation reports the effect of membrane roughness on the initial deposition of polystyrene latex particles on a rough NF membrane during cross flow membrane filtration under different operating pressures and solution chemistries. Atomic force microscopy was used to characterize the roughness of the membrane and observe the structure of particle deposits. At the initial stages of fouling, the AFM images show that more particles preferentially accumulate near the “peaks” than in the “valleys” of the rough NF membrane surface.  相似文献   
7.

Handwriting recognition is used for the prediction of various demographic traits such as age, gender, nationality, etc. Out of all the applications gender prediction is mainly admired topic among researchers. The relation between gender and handwriting can be seen from the physical appearance of the handwriting. This research work predicts gender from handwriting using the landmarks of differences between the two genders. We use the shape or visual appearance of the handwriting for extracting features of the handwriting such as slanteness (direction), area (no of pixels occupied by text), perimeter (length of edges), etc. Classification is carried out using the Support Vector Machine (SVM) as a classifier which transforms the nonlinear problem into linear using its kernel trick, logistic regression, KNN and at the end to enhance the classification rates we use Majority Voting. The experimental results obtained on a dataset of 282 writers with 2 samples per writer shows that the proposed method attains appealing performance on writer detection and text-independent environment.

  相似文献   
8.
Multibody System Dynamics - Collision between hard objects causes abrupt changes in the velocities of the system, which are characterized by very large contact forces over very small time...  相似文献   
9.
The ferroelectric liquid crystals, because of their fast electro‐optical response, are one of the most important classes of liquid crystals. Here, in this review, we have summarized the different electro‐optical modes for ferroelectric liquid crystals. Clark–Lagerwall effect (surface stabilized ferroelectric liquid crystal), deformed helix ferroelectric (DHF) effect, electrically suppressed helix (ESH) mode, DHF orientational Kerr effect, and ESH diffraction modes have been discussed. All of the crucial features, that is, optics, electro‐optics, dynamics, and their dependence on material parameters, operational regime, and applications, have been reviewed.  相似文献   
10.
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportunistically access and use parts of the spectrum not being used by others. Though cooperation among nodes is desirable for efficient network operations and performance, there might be some malicious nodes whose objective could be to hinder communications and disrupt network operations. The absence of a central authority or any policy enforcement mechanism makes these kinds of open-access network more vulnerable and susceptible to attacks.In this paper, we analyze a common form of denial-of-service attack, i.e., collaborative jamming. We consider a network in which a group of jammers tries to jam the channels being used by legitimate users who in turn try to evade the jammed channels. First, we compute the distribution of the jamming signal that a node experiences by considering a random deployment of jammers. Then, we propose different jamming and defending schemes that are employed by the jammers and legitimate users, respectively. In particular, we model and analyze the channel availability when the legitimate users randomly choose available channels and the jammers jam different channels randomly. We propose a multi-tier proxy-based cooperative defense strategy to exploit the temporal and spatial diversity for the legitimate secondary users in an infrastructure-based centralized cognitive radio network. Illustrative results on spectrum availability rates show how to improve resiliency in cognitive radio networks in the presence of jammers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号