首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9870篇
  免费   39篇
  国内免费   2篇
工业技术   9911篇
  2023年   5篇
  2022年   3篇
  2021年   26篇
  2020年   7篇
  2019年   12篇
  2018年   18篇
  2017年   16篇
  2016年   20篇
  2015年   25篇
  2014年   224篇
  2013年   215篇
  2012年   789篇
  2011年   2311篇
  2010年   1128篇
  2009年   982篇
  2008年   698篇
  2007年   626篇
  2006年   482篇
  2005年   596篇
  2004年   538篇
  2003年   594篇
  2002年   288篇
  2001年   19篇
  2000年   23篇
  1999年   21篇
  1998年   10篇
  1997年   14篇
  1996年   25篇
  1995年   10篇
  1994年   20篇
  1993年   16篇
  1992年   15篇
  1991年   10篇
  1990年   7篇
  1989年   14篇
  1988年   9篇
  1987年   8篇
  1986年   6篇
  1985年   8篇
  1984年   8篇
  1983年   6篇
  1982年   8篇
  1981年   4篇
  1980年   6篇
  1979年   7篇
  1978年   7篇
  1977年   4篇
  1976年   9篇
  1975年   4篇
  1973年   6篇
排序方式: 共有9911条查询结果,搜索用时 31 毫秒
31.
This paper generalizes the frequency-domain results on the delay-type Nehari problem in the stable case to the unstable case. The solvability condition of the delay-type Nehari problem is formulated in terms of the nonsingularity of three matrices. The optimal value γopt is the maximal γ∈(0,∞) such that one of the three matrices becomes singular. All sub-optimal compensators are parameterized in a transparent structure incorporating a modified Smith predictor.  相似文献   
32.
Image segmentation using Markov random fields involves parameter estimation in hidden Markov models for which the EM algorithm is widely used. In practice, difficulties arise due to the dependence structure in the models and approximations are required. Using ideas from the mean field approximation principle, we propose a class of EM-like algorithms in which the computation reduces to dealing with systems of independent variables. Within this class, the simulated field algorithm is a new stochastic algorithm which appears to be the most promising for its good performance and speed, on synthetic and real image experiments.  相似文献   
33.
Fingerprints are the oldest and most widely used biometrics for personal identification. Unfortunately, it is usually possible to deceive automatic fingerprint identification systems by presenting a well-duplicated synthetic or dismembered finger. This paper introduces one method to provide fingerprint vitality authentication in order to solve this problem. Detection of a perspiration pattern over the fingertip skin identifies the vitality of a fingerprint. Mapping the two-dimensional fingerprint images into one-dimensional signals, two ensembles of measures, namely static and dynamic measures, are derived for classification. Static patterns as well as temporal changes in dielectric mosaic structure of the skin, caused by perspiration, demonstrate themselves in these signals. Using these measures, this algorithm quantifies the sweating pattern and makes a final decision about vitality of the fingerprint by a neural network trained by examples.  相似文献   
34.
Using a mullite (3Al2O3 · 2SiO2)-tube and ZrO2-9 mol pct MgO-plug type solid electrolyte galvanic cells, the activities of supersaturated oxygen in Fe-0.0017 to 0.41 mass pct Al-M (M=C, Te, Mn, Cr, Si, Ti, Zr, and Ce) alloys were measured as a function of total Al or M contents at 1873 K in an alumina crucible. Based on these results, the effects of alloying elements on the supersaturated oxygen activity with respect to alumina precipitation were studied. In the Fe-Al-M (M=C, Te, Mn, Cr, and Si) alloys, the supersaturated oxygen activities for a given Al level approach the equilibrium values with increasing contents of alloying elements. However, the oxygen activities for a given Al level are still supersaturated in the Fe-Al-M (M=Ti, Zr, and Ce) alloys even in the presence of considerable amounts of the alloying elements.  相似文献   
35.
36.
A two-stage algorithm for identification of nonlinear dynamic systems   总被引:1,自引:0,他引:1  
This paper investigates the two-stage stepwise identification for a class of nonlinear dynamic systems that can be described by linear-in-the-parameters models, and the model has to be built from a very large pool of basis functions or model terms. The main objective is to improve the compactness of the model that is obtained by the forward stepwise methods, while retaining the computational efficiency. The proposed algorithm first generates an initial model using a forward stepwise procedure. The significance of each selected term is then reviewed at the second stage and all insignificant ones are replaced, resulting in an optimised compact model with significantly improved performance. The main contribution of this paper is that these two stages are performed within a well-defined regression context, leading to significantly reduced computational complexity. The efficiency of the algorithm is confirmed by the computational complexity analysis, and its effectiveness is demonstrated by the simulation results.  相似文献   
37.
The selection of valuable features is crucial in pattern recognition. In this paper we deal with the issue that part of features originate from directional instead of common linear data. Both for directional and linear data a theory for a statistical modeling exists. However, none of these theories gives an integrated solution to problems, where linear and directional variables are to be combined in a single, multivariate probability density function. We describe a general approach for a unified statistical modeling, given the constraint that variances of the circular variables are small. The method is practically evaluated in the context of our online handwriting recognition system frog on hand and the so-called tangent slope angle feature. Recognition results are compared with two alternative modeling approaches. The proposed solution gives significant improvements in recognition accuracy, computational speed and memory requirements.  相似文献   
38.
The Apollonius Tenth Problem, as defined by Apollonius of Perga circa 200 B.C., has been useful for various applications in addition to its theoretical interest. Even though particular cases have been handled previously, a general framework for the problem has never been reported. Presented in this paper is a theory to handle the Apollonius Tenth Problem by characterizing the spatial relationship among given circles and the desired Apollonius circles. Hence, the given three circles in this paper do not make any assumption regarding on the sizes of circles and the intersection/inclusion relationship among them. The observations made provide an easy-to-code algorithm to compute any desired Apollonius circle which is computationally efficient and robust.  相似文献   
39.
Years have lapsed since the inauguration of the first Wireless Application Protocol (WAP) application. One of the main reasons for the lukewarm response so far may be attributed to the lack of a “Killer” application. Many companies and developers have attempted to replicate email services (an Internet Killer appplication) within the WAP realm, but till now, no significant success has been reported. This paper will first discuss on the key functions which are lacking in the present WAP-email service, and which are arguably necessary if a much larger user base is to be attracted to these services. A new system will be proposed which can enable the user to send files residing in a remote personal computer (PC) as attachments to his emails using WAP-enabled mobile devices. The implementation of the system will be presented in details. Issue relating to the connection to various types of email servers and the security of the system will also be addressed in the paper.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号