首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   160695篇
  免费   8980篇
  国内免费   5414篇
电工技术   7286篇
技术理论   4篇
综合类   8866篇
化学工业   22104篇
金属工艺   10028篇
机械仪表   8408篇
建筑科学   8087篇
矿业工程   2954篇
能源动力   3535篇
轻工业   8715篇
水利工程   3278篇
石油天然气   4043篇
武器工业   1079篇
无线电   18234篇
一般工业技术   24200篇
冶金工业   6058篇
原子能技术   1266篇
自动化技术   36944篇
  2024年   195篇
  2023年   904篇
  2022年   1854篇
  2021年   2836篇
  2020年   2158篇
  2019年   1704篇
  2018年   16131篇
  2017年   15474篇
  2016年   12077篇
  2015年   3736篇
  2014年   4290篇
  2013年   4906篇
  2012年   9125篇
  2011年   15604篇
  2010年   14173篇
  2009年   11248篇
  2008年   12434篇
  2007年   13070篇
  2006年   5117篇
  2005年   5302篇
  2004年   4317篇
  2003年   4185篇
  2002年   3804篇
  2001年   2922篇
  2000年   1961篇
  1999年   1319篇
  1998年   758篇
  1997年   635篇
  1996年   564篇
  1995年   416篇
  1994年   315篇
  1993年   215篇
  1992年   167篇
  1991年   144篇
  1990年   109篇
  1989年   95篇
  1988年   68篇
  1987年   41篇
  1986年   34篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   45篇
  1960年   30篇
  1959年   42篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 125 毫秒
991.
无线传感器网络的广泛应用对其安全性的要求日益提高,网络安全是WSN的基础技术,入侵检测是重要的网络安全技术。本文详细分析了无线传感器网络入侵检测的特点,提出了轻量级的基于危险理论的WSN入侵检测模型。阐述了模型的各个组件的实现过程,并分析了模型的特点。  相似文献   
992.
本文分析了突发事件新闻的特点、建设突发事件新闻语料库的目的和意义,研究了突发事件新闻语料的分类体系和编码。研究结果对突发事件新闻语料库的建设、突发事件新闻信息检索、国家相关部门对突发事件应急处理方案制定以及对流行病学的医学研究等领域具有一定的理论意义和应用价值。  相似文献   
993.
改进型时间触发嵌入式系统编程模式   总被引:1,自引:0,他引:1  
对于成本敏感的嵌入式系统,通常因为资源有限而难以采用抢先式实时多任务操作系统。传统的基于超级循环的前后台编程方法和基于时间触发的合作式多任务编程方法对任务的划分需要较高的技巧。本文通过对基于时间触发合作式调度器的改进,建立了一种适用于小型嵌入式系统的通用编程模式,使这类系统的编程变得清晰、简单。  相似文献   
994.
995.
In this paper, we present an efficient way of implementing OpenGL ES 1.1 3D graphics API library for the environments with hardware-supported OpenGL facility, typically as desktop PCs. Although OpenGL ES was started from the existing OpenGL features, it rapidly became the standard 3D graphics library customized for embedded systems through introducing fixed-point arithmetic operations, buffer management with fixed-point data type supports, completely new texture mapping functions and others. Currently, it is the official 3D graphics API for Google Android, Apple iPhone, Sony PlayStation3, etc. In this paper, we achieved improvements on the arithmetic operations for the fixed-point number representation, which is the most characteristic data type for OpenGL ES 1.1. For the conversion of fixed-point data types to the floating-point number representations for the underlying OpenGL, we show the way of efficient conversion processes even with satisfying OpenGL ES standard requirements. We also introduced a specialized memory management scheme to manage the converted data from the buffer containing fixed-point numbers. In the case of texture processing, the requirements in both standards are quite different, and thus we used completely new software-implementations. Our final implementation of OpenGL ES library provides all of more than 200 functions in the standard specification and passed its conformance test, to show its compliance with the standard. From the efficiency point of view, we measured its execution times for several OpenGL ES-specific application programs and achieved remarkable improvements.  相似文献   
996.
In this paper, we present AutoMed, an automated mediator for multi-issue bilateral negotiation under time constraints. AutoMed elicits the negotiators preferences and analyzes them. It monitors the negotiations and proposes possible solutions for resolving the conflict. We conducted experiments in a simulated environment. The results show that negotiations mediated by AutoMed are concluded significantly faster than non-mediated ones and without any of the negotiators opting out. Furthermore, the subjects in the mediated negotiations are more satisfied with the resolutions than the subjects in the non-mediated negotiations.  相似文献   
997.
In this paper, we present a formulation of the quaternion constraint for rigid body rotations in the form of a standard perfect bilateral mechanical constraint, for which the associated Lagrangian multiplier has the meaning of a constraint force. First, the equations of motion of a scalable body are derived. A scalable body has three translational, three rotational, and one uniform scaling degree of freedom. As generalized coordinates, an unconstrained quaternion and a displacement vector are used. To the scalable body, a perfect bilateral constraint is added, restricting the quaternion to unit length and making the body rigid. This way a quaternion based differential algebraic equation (DAE) formulation for the dynamics of a rigid body is obtained, where the 7×7 mass matrix is regular and the unit length restriction of the quaternion is enforced by a mechanical constraint. Finally, the equations of motion in the form of a DAE are linked to the Newton–Euler equations of motion of a rigid body. The rigid body DAE formulation is useful for the construction of (energy) consistent integrators.  相似文献   
998.
Over the last decade, privacy has been widely recognised as one of the major problems of data collections in general and the Web in particular. This concerns specifically data arising from Web usage (such as querying or transacting) and social networking (characterised by rich self-profiling including relational information) and the inferences drawn from them. The data mining community has been very conscious of these issues and has addressed in particular the inference problems through various methods for “privacy-preserving data mining” and “privacy-preserving data publishing”. However, it appears that these approaches by themselves cannot effectively solve the privacy problems posed by mining. We argue that this is due to the underlying notions of privacy and of data mining, both of which are too narrow. Drawing on notions of privacy not only as hiding, but as control and negotiation, as well as on data mining not only as modelling, but as the whole cycle of knowledge discovery, we offer an alternative view. This is intended to be a comprehensive view of the privacy challenges as well as solution approaches along all phases of the knowledge discovery cycle. The paper thus combines a survey with an outline of an agenda for a comprehensive, interdisciplinary view of Web mining and privacy.  相似文献   
999.
The availability of cheap network based video cameras and the prevalence of wireless networks has lead to a major thrust towards deployment of large scale Distributed Video Surveillance (DVS) systems. This has opened up an important area of research to deal with the issues involved in DVS system for efficient collection and transmission of large scale video streams from the cameras at the guarded sites, to the end users in possibly constrained network conditions. In this paper, we propose a framework based on content-based video classification and scalable compression scheme to provide a robust bandwidth efficient video transmission for DVS. The scheme builds on a Discrete Wavelet Transform (DWT) based Color-Set Partitioning for Hierarchical Trees (CSPIHT) coding to obtain a scalable bitstream. Wavelet domain segmentation and compression assists in development of a DVS architecture. The architecture includes a novel module for dynamic allocation of Network bandwidth based on the current available resources and constraints. Different frame constituents are optimally coded based on their relative significance, perceptual quality, and available estimate of network bandwidth. Experimental result over different video sequences and simulations for Network conditions demonstrate the efficient performance of the approach.  相似文献   
1000.
One of the central problems regarding media search is the semantic gap between the low-level features computed automatically from media data and the human interpretation of them. This is because the notion of similarity is usually based on high-level abstraction but the low-level features do not sometimes reflect the human perception. In this paper, we assume the semantics of media is determined by the contextual relationship in a dataset, and introduce the method to capture the contextual information from a large media (especially image) dataset for effective search. Similarity search in an image database based on this contextual information shows encouraging experimental results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号