首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8921篇
  免费   2031篇
  国内免费   1330篇
电工技术   479篇
综合类   1025篇
化学工业   615篇
金属工艺   234篇
机械仪表   491篇
建筑科学   415篇
矿业工程   192篇
能源动力   85篇
轻工业   444篇
水利工程   112篇
石油天然气   196篇
武器工业   293篇
无线电   1629篇
一般工业技术   644篇
冶金工业   626篇
原子能技术   174篇
自动化技术   4628篇
  2024年   78篇
  2023年   334篇
  2022年   615篇
  2021年   630篇
  2020年   569篇
  2019年   427篇
  2018年   327篇
  2017年   398篇
  2016年   331篇
  2015年   452篇
  2014年   634篇
  2013年   650篇
  2012年   762篇
  2011年   773篇
  2010年   627篇
  2009年   567篇
  2008年   607篇
  2007年   683篇
  2006年   536篇
  2005年   472篇
  2004年   341篇
  2003年   306篇
  2002年   195篇
  2001年   166篇
  2000年   136篇
  1999年   111篇
  1998年   66篇
  1997年   81篇
  1996年   82篇
  1995年   54篇
  1994年   55篇
  1993年   30篇
  1992年   24篇
  1991年   20篇
  1990年   25篇
  1989年   17篇
  1988年   19篇
  1987年   13篇
  1986年   15篇
  1985年   7篇
  1984年   6篇
  1983年   5篇
  1982年   8篇
  1981年   6篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1977年   2篇
  1966年   2篇
  1956年   2篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
2.
Transmission electron microscopy (TEM) is an important analysis technique to visualize (bio)macromolecules and their assemblies, including collagen fibers. Many protocols for TEM sample preparation of collagen involve one or more washing steps to remove excess salts from the dispersion that could hamper analysis when dried on a TEM grid. Such protocols are not standardized and washing times as well as washing solvents vary from procedure to procedure, with each research group typically having their own protocol. Here, we investigate the influence of washing with water, ethanol, but also methanol and 2-propanol, for both mineralized and unmineralized collagen samples via a protocol based on centrifugation. Washing with water maintains the hydrated collagen structure and the characteristic banding pattern can be clearly observed. Conversely, washing with ethanol results in dehydration of the fibrils, often leading to aggregation of the fibers and a less obvious banding pattern, already within 1 min of ethanol exposure. As we show, this process is fully reversible. Similar observations were made for methanol and propanol. Based on these results, a standardized washing protocol for collagenous samples is proposed.  相似文献   
3.
In actual engineering scenarios, limited fault data leads to insufficient model training and over-fitting, which negatively affects the diagnostic performance of intelligent diagnostic models. To solve the problem, this paper proposes a variational information constrained generative adversarial network (VICGAN) for effective machine fault diagnosis. Firstly, by incorporating the encoder into the discriminator to map the deep features, an improved generative adversarial network with stronger data synthesis capability is established. Secondly, to promote the stable training of the model and guarantee better convergence, a variational information constraint technique is utilized, which constrains the input signals and deep features of the discriminator using the information bottleneck method. In addition, a representation matching module is added to impose restrictions on the generator, avoiding the mode collapse problem and boosting the sample diversity. Two rolling bearing datasets are utilized to verify the effectiveness and stability of the presented network, which demonstrates that the presented network has an admirable ability in processing fault diagnosis with few samples, and performs better than state-of-the-art approaches.  相似文献   
4.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。  相似文献   
5.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.  相似文献   
6.
7.
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time of encryption and decryption. Our experiments result demonstrates that the NTRU-type public-key cryptosystem over the binary field is relatively practical and effective.  相似文献   
8.
The integration of reinforcement learning (RL) and imitation learning (IL) is an important problem that has long been studied in the field of intelligent robotics. RL optimizes policies to maximize the cumulative reward, whereas IL attempts to extract general knowledge about the trajectories demonstrated by experts, i.e, demonstrators. Because each has its own drawbacks, many methods combining them and compensating for each set of drawbacks have been explored thus far. However, many of these methods are heuristic and do not have a solid theoretical basis. This paper presents a new theory for integrating RL and IL by extending the probabilistic graphical model (PGM) framework for RL, control as inference. We develop a new PGM for RL with multiple types of rewards, called probabilistic graphical model for Markov decision processes with multiple optimality emissions (pMDP-MO). Furthermore, we demonstrate that the integrated learning method of RL and IL can be formulated as a probabilistic inference of policies on pMDP-MO by considering the discriminator in generative adversarial imitation learning (GAIL) as an additional optimality emission. We adapt the GAIL and task-achievement reward to our proposed framework, achieving significantly better performance than policies trained with baseline methods.  相似文献   
9.
讨论了3种制样方法对直流辉光放电质谱法(dc-GDMS)检测氮化硼中的Na、Mg、Al、Si等27种杂质元素的影响。3种制样方法分别如下所示:方法1,直接把氮化硼压在铟薄片上;方法2,把氮化硼压在铟薄片上后,再盖上一层铟罩;方法3,把压碎后的氮化硼放在针状钽勺上。在优化的辉光放电参数下对比了3种不同制样方法对基体信号强度的影响。试验表明:在方法1中,当氮化硼尺寸约为3mm×3mm,厚度小于1mm时,基体11B的信号可达1.8×107 cps;在方法2中,选择铟孔大小合适的铟罩,基体11B的信号可达1.0×107 cps;方法3获得基体信号强度比方法1、方法2高一个数量级。大部分元素在中分辨率下可获得较好的结果,而对于在高分辨率下也较难分离的元素,可选择丰度较低的同位素在中分辨率下进行测定,如Ge选择70Ge+,Se选择82Se+,Cd选择111Cd+,Sn选择119Sn+,Ag选择109Ag+,Pt选择194Pt+。氮化硼中的杂质元素含量可通过样品片中待测元素含量减去来自于铟薄片或钽勺中该元素贡献的含量来计算获得。将样品平行测定5次,相对标准偏差均在20%以内。对于Al、Si、Ti等元素的测定,3种制样方法的测定结果基本一致;方法1、方法2中检测到的In含量较大,使得铟中的Ni、Cu对氮化硼的测定值影响较大;方法3由于钽中Fe、Cu的贡献导致氮化硼中Fe、Cu的检测值较大,但方法3获得的基体信号强度大,可降低部分元素的检出限,如Cr、Mn、Ga、Ge等。综上所述,方法3为优选方法。  相似文献   
10.
针对在军棋博弈不完全信息对弈中,面对棋子不同价值、不同位置、不同搭配所产生的不同棋力,传统的单子意图搜索算法,不能满足棋子之间的协同性与沟通性,同时也缺乏对敌方的引诱与欺骗等高级对抗能力。本文提出一种结合UCT搜索策略的高价值棋子博弈方法,实现高价值棋子协同博弈的策略。实战经验表明:高价值多棋子军棋协同博弈策略优于单棋子军棋博弈策略。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号