首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77745篇
  免费   10134篇
  国内免费   6307篇
电工技术   11903篇
技术理论   4篇
综合类   8054篇
化学工业   7322篇
金属工艺   2094篇
机械仪表   3817篇
建筑科学   4931篇
矿业工程   1874篇
能源动力   2479篇
轻工业   1954篇
水利工程   2032篇
石油天然气   3054篇
武器工业   748篇
无线电   10786篇
一般工业技术   6017篇
冶金工业   2254篇
原子能技术   1004篇
自动化技术   23859篇
  2024年   289篇
  2023年   1294篇
  2022年   2192篇
  2021年   2552篇
  2020年   2905篇
  2019年   2464篇
  2018年   2319篇
  2017年   2901篇
  2016年   3112篇
  2015年   3452篇
  2014年   4858篇
  2013年   5409篇
  2012年   5564篇
  2011年   6015篇
  2010年   4469篇
  2009年   4978篇
  2008年   4933篇
  2007年   5270篇
  2006年   4623篇
  2005年   3838篇
  2004年   3288篇
  2003年   2879篇
  2002年   2431篇
  2001年   2025篇
  2000年   1767篇
  1999年   1475篇
  1998年   1243篇
  1997年   1016篇
  1996年   875篇
  1995年   735篇
  1994年   664篇
  1993年   492篇
  1992年   373篇
  1991年   295篇
  1990年   240篇
  1989年   198篇
  1988年   137篇
  1987年   98篇
  1986年   78篇
  1985年   101篇
  1984年   84篇
  1983年   64篇
  1982年   73篇
  1981年   13篇
  1980年   22篇
  1979年   15篇
  1978年   8篇
  1977年   9篇
  1959年   8篇
  1951年   11篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
32.
We investigate the problem of efficient wireless power transfer in wireless sensor networks. In our approach, special mobile entities (called the Mobile Chargers) traverse the network and wirelessly replenish the energy of sensor nodes. In contrast to most current approaches, we envision methods that are distributed and use limited network information. We propose four new protocols for efficient charging, addressing key issues which we identify, most notably (i) what are good coordination procedures for the Mobile Chargers and (ii) what are good trajectories for the Mobile Chargers. Two of our protocols (DC, DCLK) perform distributed, limited network knowledge coordination and charging, while two others (CC, CCGK) perform centralized, global network knowledge coordination and charging. As detailed simulations demonstrate, one of our distributed protocols outperforms a known state of the art method, while its performance gets quite close to the performance of the powerful centralized global knowledge method.  相似文献   
33.
We explore a truncation error criterion to steer adaptive step length refinement and coarsening in incremental-iterative path following procedures, applied to problems in large-deformation structural mechanics. Elaborating on ideas proposed by Bergan and collaborators in the 1970s, we first describe an easily computable scalar stiffness parameter whose sign and rate of change provide reliable information on the local behavior and complexity of the equilibrium path. We then derive a simple scaling law that adaptively adjusts the length of the next step based on the rate of change of the stiffness parameter at previous points on the path. We show that this scaling is equivalent to keeping a local truncation error constant in each step. We demonstrate with numerical examples that our adaptive method follows a path with a significantly reduced number of points compared to an analysis with uniform step length of the same fidelity level. A comparison with Abaqus illustrates that the truncation error criterion effectively concentrates points around the smallest-scale features of the path, which is generally not possible with automatic incrementation solely based on local convergence properties.  相似文献   
34.
为了准确测量不同材料在实际环境中的二次电子空间分布,设计了一种新型的二次电子发射空间分布测量结构,给出了实验测量原理,用求解特征矩阵的方法对实验结果进行处理,得到了所需的二次电子空间分布。通过模拟计算对该测量方法进行了校验,模拟结果与假设二次电子空间分布函数相吻合,表明该测量方法可靠、测量精度高,为后续样机研制奠定了理论基础。  相似文献   
35.
目前网络上的服装图像数量增长迅猛,对于大量服装图像实现智能分类的需求日益增加。将基于区域的全卷积网络(Region-Based Fully Convolutional Networks,R-FCN)引入到服装图像识别中,针对服装图像分类中网络训练时间长、形变服装图像识别率低的问题,提出一种新颖的改进框架HSR-FCN。新框架将R-FCN中的区域建议网络和HyperNet网络相融合,改变图片特征学习方式,使得HSR-FCN可以在更短的训练时间内达到更高的准确率。在模型中引入了空间转换网络,对输入服装图像和特征图进行了空间变换及对齐,加强了对多角度服装和形变服装的特征学习。实验结果表明,改进后的HSR-FCN模型有效地加强了对形变服装图像的学习,且在训练时间更短的情况下,比原来的网络模型R-FCN平均准确率提高了大约3个百分点,达到96.69%。  相似文献   
36.
Sleep modes are widely accepted as an effective technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, a proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for wireless access networks, computing variable percentages of energy savings. In this paper we characterize the maximum energy saving that can be achieved in a cellular wireless access network under a given performance constraint. In particular, our approach allows the derivation of realistic estimates of the energy-optimal density of base stations corresponding to a given user density, under a fixed performance constraint. Our results allow different sleep mode proposals to be measured against the maximum theoretically achievable improvement. We show, through numerical evaluation, the possible energy savings in today’s networks, and we further demonstrate that even with the development of highly energy-efficient hardware, a holistic approach incorporating system level techniques is essential to achieving maximum energy efficiency.  相似文献   
37.
针对高可靠度机载多余度EWIS各组成部分寿命服从指数分布但参数未知的情况,提出采用无失效数据可靠度分析方法评估EWIS的可靠度水平。通过Monte-Carlo仿真方法对连接形式为“先并联、后串联”EWIS各组成部分寿命进行抽样,利用“最小最大值”方法获得系统寿命的抽样值,用概率纸检验法初步判断EWIS寿命是否服从威布尔分布,再用Pearson拟合优度检验法判断EWIS寿命是否服从威布尔分布。结合无故障飞行时间的样本值与EWIS寿命服从威布尔分布的假设,采用无失效数据分析方法评估EWIS的可靠度水平。研究方法对机载多余度EWIS无失效数据可靠度分析有一定的贡献。  相似文献   
38.
配电网停电会造成电力系统供配电可靠性以及服务质量下降,研究基于地理信息系统(GIS)单线图的配网停电单模拟操作应用。利用网格长度作为基本单位建立坐标系,以选取起始点与终止点为基础,通过四参数法将GIS坐标映射至图纸网格内,实现配网内设备初步布局,将杆塔、站房和整体均匀分布作为优化目标,设置多目标优化目标函数实现GIS单线图最终优化。选取某电力公司配网作为单模拟操作应用对象,模拟结果表明,单模拟操作配网停电后,该配网各负荷点年故障率、次平均停电时间以及年停电时间均有所减少,可有效提升配网的供配电可靠性。  相似文献   
39.
在钻井过程中,常常钻遇不同宽度的井下地层裂缝。钻遇裂缝时容易发生钻井液漏失现象,甚至发生钻井液失返现象,严重影响了安全、高效钻井。目前裂缝封堵的方法常存在封堵成功率不高、堵漏承压能力低的问题,其中一个重要的原因是对井下地层的裂缝宽度等特征认识不清。基于地层裂缝产生的岩石力学机理,确定影响裂缝宽度关键的6个力学和工程因素,并利用神经网络计算的非线性、大数据特点建立了井下地层裂缝宽度的分析模型,模型包含输入层、输出层和3个隐藏层。通过该模型诊断井下裂缝宽度,提高了计算精度,平均误差仅为2.09%,最大误差为5.88%,解决钻井现场仅凭经验判断裂缝误差较大和依靠成像测井成本较高的问题。同时根据神经网络模型诊断得到的裂缝宽度优化堵漏材料的粒径配比,提高了裂缝内的架桥封堵强度和架桥的稳定性,封堵层的承压能力达到12.8 MPa,反向承压能力达到4.5 MPa。现场堵漏试验最高憋压10 MPa,经过封堵作业后大排量循环不漏,达到了裂缝性地层高效堵漏的目的,堵漏一次成功。   相似文献   
40.
One of the major challenges in wireless body area networks (WBANs) is sensor fault detection. This paper reports a method for the precise identification of faulty sensors, which should help users identify true medical conditions and reduce the rate of false alarms, thereby improving the quality of services offered by WBANs. The proposed sensor fault detection (SFD) algorithm is based on Pearson correlation coefficients and simple statistical methods. The proposed method identifies strongly correlated parameters using Pearson correlation coefficients, and the proposed SFD algorithm detects faulty sensors. We validated the proposed SFD algorithm using two datasets from the Multiparameter Intelligent Monitoring in Intensive Care database and compared the results to those of existing methods. The time complexity of the proposed algorithm was also compared to that of existing methods. The proposed algorithm achieved high detection rates and low false alarm rates with accuracies of 97.23% and 93.99% for Dataset 1 and Dataset 2, respectively.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号