首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4524篇
  免费   375篇
  国内免费   28篇
工业技术   4927篇
  2024年   18篇
  2023年   63篇
  2022年   86篇
  2021年   234篇
  2020年   255篇
  2019年   297篇
  2018年   399篇
  2017年   353篇
  2016年   314篇
  2015年   205篇
  2014年   352篇
  2013年   557篇
  2012年   391篇
  2011年   378篇
  2010年   243篇
  2009年   231篇
  2008年   131篇
  2007年   104篇
  2006年   72篇
  2005年   33篇
  2004年   29篇
  2003年   24篇
  2002年   23篇
  2001年   12篇
  2000年   13篇
  1999年   19篇
  1998年   9篇
  1997年   11篇
  1996年   7篇
  1995年   14篇
  1994年   3篇
  1993年   7篇
  1992年   5篇
  1991年   5篇
  1990年   4篇
  1989年   4篇
  1988年   3篇
  1987年   1篇
  1986年   2篇
  1984年   6篇
  1982年   5篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1974年   1篇
  1967年   1篇
排序方式: 共有4927条查询结果,搜索用时 15 毫秒
41.
Rigorous control synthesis for an unmanned aerial vehicle necessitates the availability of a good, reasonable model for such a vehicle. The work reported in this paper focuses on the modeling of a rotary unmanned aerial vehicle (RUAV) and the development of a robust controller that can handle parameter uncertainties and disturbances. The parameters of the plant model are obtained through the use of the prediction error method with real flight data. The response of the identified linear model shows a good match with the measured flight data. The H control scheme is applied to obtain a robustly stable controller using the identified model. The proposed controller is analyzed using frequency-domain analysis and time-domain simulations. The performance of the proposed H controller is better than that of the conventional proportional derivative controller in that the proposed controller has a shorter settling time and less overshoot. Furthermore, the degradation of the proposed controller performance is negligible and stability is maintained when the input gains to the plant are doubled, which demonstrates the good performance and robustness of the controller.  相似文献   
42.
In this study, the effect of the chemical nature of different calcium (Ca)-based minerals as flame retardant additives in combination with ammonium polyphosphate (APP), in 1:1 proportions, on the flame retardancy behavior and performance of ethylene vinyl acetate copolymer was discussed. Combining APP with partly and completely hydrated calcium oxide led to superior flame-retardant function detected in mass loss calorimeter measurements with respect to the corresponding system containing carbonated calcium. This privileged character was attributed to the higher reactivity of hydrated Ca-based fillers toward APP in comparison with Ca carbonate, which induced the formation of an intumescent residue. The difference between reactivity potential of hydrated and dry Ca was demonstrated by the newly formed thermally stable species, and further evidenced by thermogravimetric analysis performed on APP/fillers blends. Moreover, the presence of more crystalline domains in the Ca/phosphorus-based compounds was evidenced by XRD analysis of the mass loss calorimeter test residues. The results of this work highlight the role of blend additive systems on the performance of flame retardancy of polymer materials.  相似文献   
43.
In this work, the snail shell/hydroxyapatite/chitosan composite was prepared as adsorbent. The adsorption potential of the composite was studied for simultaneous sorption behavior of Zn(Ⅱ) and Cu(Ⅱ) ions in a batch system. Chitosan and hydroxyapatite(HAP) were extracted from shrimp shell and bone ash,respectively, so this is a low cost natural composite. To prepare the composite, chitosan was dissolved in acetic acid, then HAP and snail shell powders were added to the chitosan solution. The morphology and characterization of the composite was studied by SEM and EDX analysis. Atomic adsorption was used to measure the amount of the ions. Experimental parameters were optimized with Design Expert Software and five parameters such as the concentration of ions, p H, adsorbent amount and contact time were studied at room temperature. Optimized value for the parameters of Zn(Ⅱ) and Cu(Ⅱ) concentrations, p H, adsorbent dose, and contact time were 3.01 mg·L~(-1), 5.5, 0.02 g and 95 min, respectively. The adsorption isotherms for Zn(Ⅱ) and Cu(Ⅱ) showed Langmuir and Tempkin, respectively. Kinetic and equilibrium studies showed the experimental data of Zn(Ⅱ) and Cu(Ⅱ) ions were best described by the pseudo-second-order model. Studies on thermodynamic show the adsorption process were physical and spontaneous.  相似文献   
44.
Sediment flushing in many reservoirs of the world is accomplished with low efficiency. In this study, a new configuration was proposed for reservoir bottom outlet to increase the pressurized flushing efficiency. In the new configuration, a projecting semi-circular structure was connected to the upstream edge of bottom outlet. It was observed that by employing the projecting bottom outlet, the sediment removal efficiency increased significantly compared to the flushing via typical bottom outlet. In the case of new-configuration bottom outlet with L sc /D outlet  = 5.26 and D sc /D outlet  = 1.32, the dimensionless length, width and depth of flushing cone increased 280%, 45% and 14%, respectively, compared to the reference test. The proposed structure can ensure the sustainable use of reservoirs.  相似文献   
45.
Nonnegative matrix factorization (NMF) algorithms have been utilized in a wide range of real applications; however, the performance of NMF is highly dependent on three factors including: (1) choosing a problem dependent cost function; (2) using an effective initialization method to start the updating procedure from a near‐optimal point; and (3) determining the rank of factorized matrices prior to decomposition. Due to the nonconvex nature of the NMF cost function, finding an analytical‐based optimal solution is impossible. This paper is aimed at proposing an efficient initialization method to modify the NMF performance. To widely explore the search space for initializing the factorized matrices in NMF, the island genetic algorithm (IGA) is employed as a diverse multiagent search scheme. To adapt IGA for NMF initialization, we present a specific mutation operator. To assess how the proposed IGA initialization method efficiently enhances NMF performance, we have implemented state‐of‐the‐art initialization methods and applied to the Japanese Female Facial Expression dataset to recognize the facial expression states. Experimental results demonstrate the superiority of the proposed approach to the compared methods in terms of relative error and fast convergence.  相似文献   
46.
With the high availability of digital video contents on the internet, users need more assistance to access digital videos. Various researches have been done about video summarization and semantic video analysis to help to satisfy these needs. These works are developing condensed versions of a full length video stream through the identification of the most important and pertinent content within the stream. Most of the existing works in these areas are mainly focused on event mining. Event mining from video streams improves the accessibility and reusability of large media collections, and it has been an active area of research with notable recent progress. Event mining includes a wide range of multimedia domains such as surveillance, meetings, broadcast, news, sports, documentary, and films, as well as personal and online media collections. Due to the variety and plenty of Event mining techniques, in this paper we suggest an analytical framework to classify event mining techniques and to evaluate them based on important functional measures. This framework could lead to empirical and technical comparison of event mining methods and development of more efficient structures at future.  相似文献   
47.
A new variant of Differential Evolution (DE), called ADE-Grid, is presented in this paper which adapts the mutation strategy, crossover rate (CR) and scale factor (F) during the run. In ADE-Grid, learning automata (LA), which are powerful decision making machines, are used to determine the proper value of the parameters CR and F, and the suitable strategy for the construction of a mutant vector for each individual, adaptively. The proposed automata based DE is able to maintain the diversity among the individuals and encourage them to move toward several promising areas of the search space as well as the best found position. Numerical experiments are conducted on a set of twenty four well-known benchmark functions and one real-world engineering problem. The performance comparison between ADE-Grid and other state-of-the-art DE variants indicates that ADE-Grid is a viable approach for optimization. The results also show that the proposed ADE-Grid improves the performance of DE in terms of both convergence speed and quality of final solution.  相似文献   
48.
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms.  相似文献   
49.
The widespread availability of broadband internet access and the growth in server-based processing have provided an opportunity to run games away from the player into the cloud and offer a new promising service known as cloud gaming. The concept of cloud gaming is to render a game in the cloud and stream the resulting game scenes to the player as a video sequence over a broadband connection. To meet the stringent network bandwidth requirements of cloud gaming and support more players, efficient bit rate reduction techniques are needed. In this paper, we introduce the concept of game attention model (GAM), which is basically a game context-based visual attention model, as a means for reducing the bit rate of the streaming video more efficiently. GAM estimates the importance of each macro-block in a game frame from the player’s perspective and allows encoding the less important macro-blocks with lower bit rate. We have evaluated nine game video sequences, covering a wide range of game genre and a spectrum of scene content in terms of details, motion and brightness. Our subjective assessment shows that by integrating this model into the cloud gaming framework, it is possible to decrease the required bit rate by nearly 25 % on average, while maintaining a relatively high user quality of experience. This clearly enables players with limited communication resources to benefit from cloud gaming with acceptable quality.  相似文献   
50.
在赛车运动开始后不久,工程人员就意识到提高汽车转弯速度的方法之一是使汽车与路面产生更大的摩擦力.在早期进行的获取汽车与路面之间更大摩擦力的众多尝试中,较有趣的一种是采用双后轮行驶.然而,最有代表性的解决办法是采用胎面更宽,即断面宽度更大的轮胎.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号