首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5563篇
  免费   320篇
  国内免费   248篇
工业技术   6131篇
  2023年   24篇
  2022年   31篇
  2021年   47篇
  2020年   70篇
  2019年   66篇
  2018年   67篇
  2017年   100篇
  2016年   140篇
  2015年   152篇
  2014年   264篇
  2013年   264篇
  2012年   317篇
  2011年   386篇
  2010年   315篇
  2009年   288篇
  2008年   299篇
  2007年   377篇
  2006年   375篇
  2005年   315篇
  2004年   265篇
  2003年   291篇
  2002年   233篇
  2001年   160篇
  2000年   155篇
  1999年   133篇
  1998年   135篇
  1997年   121篇
  1996年   111篇
  1995年   97篇
  1994年   72篇
  1993年   50篇
  1992年   54篇
  1991年   45篇
  1990年   24篇
  1989年   26篇
  1988年   22篇
  1986年   12篇
  1985年   16篇
  1984年   19篇
  1983年   26篇
  1982年   25篇
  1981年   24篇
  1980年   20篇
  1979年   17篇
  1978年   19篇
  1977年   15篇
  1976年   14篇
  1975年   7篇
  1974年   8篇
  1973年   9篇
排序方式: 共有6131条查询结果,搜索用时 328 毫秒
1.
This paper focuses on the design of a 2.3–21 GHz Distributed Low Noise Amplifier (LNA) with low noise figure (NF), high gain (S21), and high linearity (IIP3) for broadband applications. This distributed amplifier (DA) includes S/C/X/Ku/K-band, which makes it very suitable for heterodyne receivers. The proposed DA uses a 0.18 μm GaAs pHEMT process (OMMIC ED02AH) in cascade architecture with lines adaptation and equalization of phase velocity techniques, to absorb their parasitic capacitances into the gate and drain transmission lines in order to achieve wide bandwidth and to enhance gain and linearity. The proposed broadband DA achieved an excellent gain in the flatness of 13.5 ± 0.2 dB, a low noise figure of 3.44 ± 1.12 dB, and a small group delay variation of ±19.721 ps over the range of 2.3–21 GHz. The input and output reflection coefficients S11 and S22 are less than −10 dB. The input compression point (P1dB) and input third-order intercept point (IIP3) are −1.5 dBm and 11.5 dBm, respectively at 13 GHz. The dissipated power is 282 mW and the core layout size is 2.2 × 0.8 mm2.  相似文献   
2.
This paper proposes a new filtering method based on the Kalman filtering algorithm for hot-rolled strip flatness measurement system. The system involves processing slowly changing signal, which can be considered as a bounded random process, and its model parameters are completely unknown. The noise rejection strategy in double lasers can generate a compensation signal. Since the initial and accumulative error would lead to negative filter effect or even cause divergence, Kalman filter is integrated to effectively deal with the initial error and enhance convergence. In this setting, the noise rejection strategy is used as a prediction model to constitute a similar Kalman filter. The correlated error caused by measurement error is coped with by a compensation model based on the feature of correlated error to enhance the filter effect. Both theoretical analysis and simulations show that the new algorithm has a better filter effect than the traditional Kalman filtering algorithm for the system.  相似文献   
3.
This paper proposes a novel Multiple-Input Multiple-Output (MIMO) transmission scheme based on Pattern Recognition (PR), which is termed as the PR aided Transmission Antenna Selection MIMO (PR-TAS aided MIMO). As the conventional TAS algorithms need to search all possible legitimate antenna subsets, they may impose some redundant calculations. In order to avoid this problem, we employ some pattern recognition methods to carry out the TAS algorithm in this paper. To be specific, two PR algorithms, namely the K-Nearest Neighbor (KNN) algorithm and the Support Vector Machine (SVM) algorithm, are introduced and redesigned to obtain a TAS with lower complexity but higher efficiency. Moreover, in order to improve the performance of the SVM, we propose a new feature extraction of channel matrix for the TAS. Our simulation results show that the proposed KNN and SVM based PR-TAS algorithms are capable of striking a flexible tradeoff between the complexity and the Bit Error Rate (BER), and the new feature can effectively improve the BER performance compared with the conventional feature extraction method.  相似文献   
4.
针对人脸识别因光照、姿态、表情、遮挡及噪声等多种因素的影响而导致的识别率不高的问题,提出一种加权信息熵(IEw)与自适应阈值环形局部二值模式(ATRLBP)算子相结合的人脸识别方法(IE (w) ATR-LBP)。首先,从原始人脸图像分块提取信息熵,得到每个子块的IEw;然后,利用ATRLBP算子分别对每个人脸子块提取特征从而得到概率直方图;最后,将各个块的IEw与概率直方图相乘,再串联成为原始人脸图像最后的特征直方图,并利用支持向量机(SVM)对人脸进行识别。在AR人脸库的表情、光照、遮挡A和遮挡B四个数据集上,IE (w) ATR-LBP方法分别取得了98.37%、94.17%、98.20%和99.34%的识别率。在ORL人脸库上,IE (w) ATR-LBP方法的最大识别率为99.85%;而且在ORL人脸库5次不同训练样本的实验中,与无噪声时相比,加入高斯和椒盐噪声后的平均识别率分别下降了14.04和2.95个百分点。实验结果表明,IE (w) ATR-LBP方法能够有效提高人脸在受光照、姿态、遮挡等影响时的识别率,尤其是存在表情变化及脉冲类噪声干扰时的识别率。  相似文献   
5.
This paper proposes a recovery plan for managing disruptions in a three-stage production-inventory system under a mixed production environment. First, a mathematical model is developed to deal with a disruption at any stage while maximizing total profit during the recovery-time window. The model is solved after the occurrence of a disruption event, with changed data used to generate a revised plan. We also propose a new and efficient heuristic for solving the developed mathematical model. Second, multiple disruptions are considered, where a new disruption may or may not affect the recovery plans of earlier disruptions. The heuristic, developed for a single disruption, is extended to deal with a series of disruptions so that it can be implemented for disruption recovery on a real-time basis. We compare the heuristic solutions with those obtained by a standard search algorithm for a set of randomly generated disruption test problems, and that show the consistent performance of our developed heuristic with lower computational times. Finally, some numerical examples and a real-world case study are presented to demonstrate the benefits and usefulness of our proposed approach.  相似文献   
6.
Noise detection and its removal is very important in the image processing. Detection of noise is very crucial and significant in random valued impulse noise because it does not hamper the image pixels uniformly. This paper presents a novel and unique concept of adaptive dual threshold for the detection of random valued impulse noise along with simple median filter at noise removal stage. Simulation results shows that an efficient noise detection leads to a superior quality of de-noised image as compared to existing adaptive threshold based image de-noising techniques. Proposed threshold computation is based on averaging of pixel values of window which enhances the PSNR of our system as compared to existing median filter based image de-noising methods.  相似文献   
7.
针对传统的小区内开环功率控制算法通常以提升本小区的吞吐量性能为目标,忽略了当前小区用户对邻小区用户同频干扰的问题,为提升边缘用户性能的同时兼顾系统整体性能,提出了一种LTE系统小区间上行联合功率控制(UJPC)算法。该算法采用单基站三扇区为系统模型,以最优化系统吞吐量比例公平函数为目标,首先根据最小信干噪比(SINR)约束值和用户最大发射功率这两个约束条件得到相应的数学优化模型,然后采用连续凸近似的方法求解优化问题得出各个基站所管辖的小区内所有用户的最优发射功率。仿真结果表明,与基准的开环功控方案相比,联合功控方案在保证系统平均频谱利用率的情况下能够较大幅度地提高小区边缘频谱利用率,其最佳性能增益能达到50%。  相似文献   
8.
9.
Although greedy algorithms possess high efficiency, they often receive suboptimal solutions of the ensemble pruning problem, since their exploration areas are limited in large extent. And another marked defect of almost all the currently existing ensemble pruning algorithms, including greedy ones, consists in: they simply abandon all of the classifiers which fail in the competition of ensemble selection, causing a considerable waste of useful resources and information. Inspired by these observations, an interesting greedy Reverse Reduce-Error (RRE) pruning algorithm incorporated with the operation of subtraction is proposed in this work. The RRE algorithm makes the best of the defeated candidate networks in a way that, the Worst Single Model (WSM) is chosen, and then, its votes are subtracted from the votes made by those selected components within the pruned ensemble. The reason is because, for most cases, the WSM might make mistakes in its estimation for the test samples. And, different from the classical RE, the near-optimal solution is produced based on the pruned error of all the available sequential subensembles. Besides, the backfitting step of RE algorithm is replaced with the selection step of a WSM in RRE. Moreover, the problem of ties might be solved more naturally with RRE. Finally, soft voting approach is employed in the testing to RRE algorithm. The performances of RE and RRE algorithms, and two baseline methods, i.e., the method which selects the Best Single Model (BSM) in the initial ensemble, and the method which retains all member networks of the initial ensemble (ALL), are evaluated on seven benchmark classification tasks under different initial ensemble setups. The results of the empirical investigation show the superiority of RRE over the other three ensemble pruning algorithms.  相似文献   
10.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号