首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5115篇
  免费   151篇
  国内免费   11篇
工业技术   5277篇
  2023年   22篇
  2022年   44篇
  2021年   129篇
  2020年   39篇
  2019年   62篇
  2018年   77篇
  2017年   79篇
  2016年   101篇
  2015年   105篇
  2014年   150篇
  2013年   430篇
  2012年   267篇
  2011年   353篇
  2010年   296篇
  2009年   348篇
  2008年   287篇
  2007年   255篇
  2006年   210篇
  2005年   167篇
  2004年   148篇
  2003年   140篇
  2002年   110篇
  2001年   108篇
  2000年   77篇
  1999年   96篇
  1998年   217篇
  1997年   148篇
  1996年   131篇
  1995年   86篇
  1994年   97篇
  1993年   87篇
  1992年   56篇
  1991年   37篇
  1990年   38篇
  1989年   36篇
  1988年   36篇
  1987年   19篇
  1986年   18篇
  1985年   15篇
  1984年   16篇
  1983年   10篇
  1982年   17篇
  1980年   9篇
  1979年   20篇
  1978年   12篇
  1977年   11篇
  1976年   9篇
  1975年   10篇
  1974年   8篇
  1973年   9篇
排序方式: 共有5277条查询结果,搜索用时 15 毫秒
91.
Display technologies are used in various industries. However, few studies on color vision testing using self‐luminous displays are reported. In this study, a screen‐based color vision test, termed the digital color vision test (DCVT), is developed on a color‐calibrated monitor. A control bar is adjusted by the observer to build just noticeable chromatic difference ellipses in CIE u′v′ chromaticity diagram, which indicate the capabilities of subjects' color visions. Ten color‐normal observers and 13 deutan observers participated in the psychophysical experiments. The observers also performed the other two typical diagnostic tests (D‐15 and anomaloscope). Results from the experiment using the adjustment psychophysical method for digital quantification of deutan color vision defects are presented. It is found that the diagnosis accuracy of the DCVT is approximately equivalent to those of D‐15 and anomaloscope tests.  相似文献   
92.
93.
On a novel press system with six links for precision deep drawing   总被引:1,自引:0,他引:1  
The objective of this paper is to propose a novel press system with six links for precision deep drawing, and verify its feasibility. First, the system is presented and its advantages are discussed. Then, the kinematic analysis of the system is obtained by examining the geometry of the design. Moreover, kinematic dimensions of the variable coupling are found by using optimization method. Furthermore, the proposed approach is illustrated by a design example, its solid model for the proposed design is established, and then kinematic simulation is performed by ADAMS software. Finally, a prototype and an experimental setup are established, and the experiment is conducted. The results show that the proposed new mechanism is feasible and of reasonable accuracy. In addition, it has the advantages of easy manufacture, lower cost, higher precision, and easy adjustability.  相似文献   
94.
In social psychology, emotional contagion describes the widely observed phenomenon of one person’s emotions being influenced by surrounding people’s emotions. While the overall effect is agreed upon, the underlying mechanism of the spread of emotions has seen little quantification and application to computational agents despite extensive evidence of its impacts in everyday life. In this paper, we examine computational models of emotional contagion by implementing two models (Bosse et al., European council on modeling and simulation, pp. 212–218, 2009) and Durupinar, From audiences to mobs: Crowd simulation with psychological factors, PhD dissertation, Bilkent University, 2010) that draw from two separate lines of contagion research: thermodynamics-based and epidemiological-based. We first perform sensitivity tests on each model in an evacuation simulation, ESCAPES, showing both models to be reasonably robust to parameter variations with certain exceptions. We then compare their ability to reproduce a real crowd panic scene in simulation, showing that the thermodynamics-style model (Bosse et al., European council on modeling and simulation, pp. 212–218, 2009) produces superior results due to the ill-suited contagion mechanism at the core of epidemiological models. We also identify that a graduated effect of fear and proximity-based contagion effects are key to producing the superior results. We then reproduce the methodology on a second video, showing that the same results hold, implying generality of the conclusions reached in the first scene.  相似文献   
95.
This paper presents an effective and efficient method for speeding up ant colony optimization (ACO) in solving the codebook generation problem. The proposed method is inspired by the fact that many computations during the convergence process of ant-based algorithms are essentially redundant and thus can be eliminated to boost their convergence speed, especially for large and complex problems. To evaluate the performance of the proposed method, we compare it with several state-of-the-art metaheuristic algorithms. Our simulation results indicate that the proposed method can significantly reduce the computation time of ACO-based algorithms evaluated in this paper while at the same time providing results that match or outperform those ACO by itself can provide.  相似文献   
96.
T. L. Lee  T. Y. Li  C. H. Tsai 《Computing》2008,83(2-3):109-133
HOM4PS-2.0 is a software package in FORTRAN 90 which implements the polyhedral homotopy continuation method for solving polynomial systems. It updates its original version HOM4PS in three key aspects: (1) new method for finding mixed cells, (2) combining the polyhedral and linear homotopies in one step, (3) new way of dealing with curve jumping. Numerical results show that this revision leads to a spectacular speed-up, ranging up to 1950s, over its original version on all benchmark systems, especially for large ones. It surpasses the existing packages in finding isolated zeros, such as PHCpack (Verschelde in ACM Trans Math Softw 25:251–276, 1999), PHoM (Gunji et al. in Computing 73:57–77, 2004), and Bertini (Bates et al. in Software for numerical algebraic geometry. Available at http://www.nd.edu/~sommese/bertini), in speed by big margins.  相似文献   
97.
Applying dither to highly nonlinear systems may suppress chaotic phenomena, but dynamic performance, such as convergence rate and disturbance attenuation, is usually not guaranteed. This paper presents a dithered H robust fuzzy control scheme to stabilize chaotic systems that ensures disturbance attenuation bounds. In the proposed scheme, Takagi-Sugeno (T-S) fuzzy linear models are used to describe the relaxed models of the dithered chaotic system, and fuzzy controllers are designed based on an extension to the concept of parallel distributed compensation (PDC). Sufficient condition for the existence of the H robust fuzzy controllers is presented in terms of a novel linear matrix inequalities (LMI) form which takes full consideration of modeling error and disturbances, but cannot be solved by the standard procedures. In order to solve the LMI problem and to identify the chaotic systems as T-S fuzzy modes, we propose a compound optimization strategy called the island-based random-walk algorithm (IRA). The algorithm is composed of a set of communicating random-walk optimization procedures concatenated with the down-hill simplex method. The design procedure and validity of the proposed scheme is demonstrated via numerical simulation of the dithered fuzzy control of a chaotic system.  相似文献   
98.
Customs and quarantine departments are applying information systems to automate their inspection processes and improve their inspection efficiency and accuracy. The product codes from the Harmonized System (HS codes) are the essential elements of the system's integration, automation and intelligence. The identified HS codes are well-accepted and precise product references used by customs authorities, to match applicable policies to the products being inspected and taxed. Domain ontology for importing and exporting industry can be used to acquire HS codes for given products, and is a prerequisite for an integrated and intelligent automated inspection system. The authors have proposed and implemented an importing and exporting domain ontology. The ontology is composed of an integrated and comprehensive knowledge base derived from static dictionaries and the HS specification, and dynamic processing data. Based on this ontology, a reasoning engine is developed to generate HS codes intelligently for the given product names. Information systems can use the engine to get HS codes for submitted products and find applicable policies automatically. The ontology and the engine have been implemented in a Java-based platform and published as a HS Web service. In this paper, knowledge structure, reasoning mechanism and implementation details for the domain ontology and reasoning engine are presented. A test bed in the application environment has been conducted and experimental results have been obtained. The ontology and the service have the potential to be widely used by authorities and international traders of importing and exporting industry around the world.  相似文献   
99.
In this paper, we propose a novel scheme of automatic image authentication and recovery, in which the altered region of the image can be detected and recovered in a fully automated fashion. To achieve high-quality image recovery, we choose the region of importance (ROI) in the image and perform fractal encoding for the blocks of ROI. And then we insert the fractal codes of ROI and the watermark into the original image to obtain the watermarked image. By watermark extraction, we can determine whether the watermarked image has been tampered or not. If the watermarked image has been tampered, we can automatically localize the altered region, and apply either fractal decoding or image inpainting for image recovery. Finally, experimental results are given to show the effectiveness of the proposed scheme.  相似文献   
100.
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号