首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   47420篇
  免费   5646篇
  国内免费   3422篇
电工技术   9082篇
技术理论   3篇
综合类   5094篇
化学工业   784篇
金属工艺   390篇
机械仪表   2327篇
建筑科学   1091篇
矿业工程   796篇
能源动力   666篇
轻工业   368篇
水利工程   621篇
石油天然气   391篇
武器工业   500篇
无线电   13680篇
一般工业技术   1788篇
冶金工业   943篇
原子能技术   133篇
自动化技术   17831篇
  2024年   143篇
  2023年   636篇
  2022年   1021篇
  2021年   1330篇
  2020年   1430篇
  2019年   1134篇
  2018年   1068篇
  2017年   1468篇
  2016年   1605篇
  2015年   2032篇
  2014年   3205篇
  2013年   2787篇
  2012年   3697篇
  2011年   3695篇
  2010年   2914篇
  2009年   2830篇
  2008年   3151篇
  2007年   3420篇
  2006年   2997篇
  2005年   2870篇
  2004年   2445篇
  2003年   2321篇
  2002年   1684篇
  2001年   1398篇
  2000年   1045篇
  1999年   883篇
  1998年   607篇
  1997年   522篇
  1996年   465篇
  1995年   408篇
  1994年   303篇
  1993年   189篇
  1992年   137篇
  1991年   90篇
  1990年   61篇
  1989年   66篇
  1988年   49篇
  1987年   26篇
  1986年   23篇
  1985年   32篇
  1984年   35篇
  1983年   21篇
  1982年   27篇
  1981年   18篇
  1980年   17篇
  1979年   20篇
  1978年   14篇
  1977年   16篇
  1964年   13篇
  1955年   13篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
11.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
12.
The intermittent wind power in isolated hybrid distributed generation (IHDG) may cause serious problems associated with frequency (f) and power (P) fluctuation. Energy storage devices such as battery, super capacitor, and superconducting magnetic energy storage (SMES) may be used to reduce these fluctuations associated with f and P. This paper presents a study of IHDG power system for improving both f and P deviation profiles with the help of SMES. The studied IHDG power system is consisted of wind turbine generator and diesel engine generator. Both f and P control problems of the studied power system model are addressed in presence or absence of SMES. Fuzzy logic based proportional–integral–derivative (PID) controller with SMES is used for the purpose of minimization of f and P deviations. The different tunable parameters of the PID controller and those of the SMES are tuned by a novel quasi-oppositional harmony search algorithm. Performance study of the IHDG power system model is carried out under different perturbation conditions. The results demonstrate minimum f and P deviations may be achieved by using the proposed fuzzy logic based PID controller along with SMES.  相似文献   
13.
研究和分析了面向航空通信应用的边沿触发器教学设计。以边沿触发电路实现原理为核心,引导边沿触发机制的探究式学习;以航空机载网络通信为具体应用背景,引入科学研究和工程实现中实际问题,设计曼切斯特码检测系统实验;使得边沿触发器教学成为“知识再创造”的过程和创新实践的新载体,以期培养新工科背景下的独立、创新和实践精神。  相似文献   
14.
Social media-based screening is a well-known practice to both recruiters and job seekers. Little is known, however, about how job seekers present themselves on social media, i.e. ‘self-disclosure’, for employment purposes. This study builds on the theories of hyperpersonal computer-mediated communication, self-efficacy and social exchange to examine job seekers’ professional online image concerns, social media self-efficacy, and perceptions of social media effectiveness in the job search as predictors of inappropriate and career-oriented self-disclosures on these media. Findings from a sample of 3374 Italian respondents showed that career-oriented self-disclosure was predicted by all three factors, whereas inappropriate self-disclosure was only predicted by social media self-efficacy. Furthermore, the relationship between professional online image concerns and inappropriate self-disclosure was moderated by age, education and work experience, but not by gender. Theoretical and practical implications are discussed, and directions for future research are suggested.  相似文献   
15.
In eukaryotes, microRNAs (miRNAs) have roles in development, homeostasis, disease and the immune response. Recent work has shown that plant and mammalian miRNAs also mediate cross-kingdom and cross-domain communications. However, these studies remain controversial and are lacking critical mechanistic explanations. Bacteria do not produce miRNAs themselves, and therefore it is unclear how these eukaryotic RNA molecules could function in the bacterial recipient. In this review, we compare and contrast the biogenesis and functions of regulatory RNAs in eukaryotes and bacteria. As a result, we discovered several conserved features and homologous components in these distinct pathways. These findings enabled us to propose novel mechanisms to explain how eukaryotic miRNAs could function in bacteria. Further understanding in this area is necessary to validate the findings of existing studies and could facilitate the use of miRNAs as novel tools for the directed remodelling of the human microbiota.  相似文献   
16.
张绍英 《电讯技术》2019,59(6):678-683
针对空空宽带高速通信的需求,设计了小型化机载激光通信系统。仿真分析了300 km、2.5 Gb/s无线激光链路性能,并通过运动仿真台模拟机动环境测试了系统的跟踪与通信性能,其中粗跟踪误差为533.2 μrad(1σ),精跟踪误差为3.6 μrad(1σ),测试数据传输240 s,通信误码率为2.82×10-9。仿真与实验验证了该系统用于远距离空空无线激光通信的可行性。  相似文献   
17.
针对新闻文本领域,该文提出一种基于查询的自动文本摘要技术,更加有针对性地满足用户信息需求。根据句子的TF-IDF、与查询句的相似度等要素,计算句子权重,并根据句子指示的时间给定不同的时序权重系数,使得最近发生的新闻内容具有更高的权重,最后使用最大边界相关的方法选择摘要句。通过与基于TF-IDF、Text-Rank、LDA等六种方法的对比,该摘要方法ROUGE评测指标上优于其他方法。从结合评测结果及摘要示例可以看出,该文提出的方法可以有效地从新闻文档集中摘取核心信息,满足用户查询内容的信息需求。  相似文献   
18.
Abstract

Multi-agent systems need to communicate to coordinate a shared task. We show that a recurrent neural network (RNN) can learn a communication protocol for coordination, even if the actions to coordinate are performed steps after the communication phase. We show that a separation of tasks with different temporal scale is necessary for successful learning. We contribute a hierarchical deep reinforcement learning model for multi-agent systems that separates the communication and coordination task from the action picking through a hierarchical policy. We further on show, that a separation of concerns in communication is beneficial but not necessary. As a testbed, we propose the Dungeon Lever Game and we extend the Differentiable Inter-Agent Learning (DIAL) framework. We present and compare results from different model variations on the Dungeon Lever Game.  相似文献   
19.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view.  相似文献   
20.
This paper presents a control design for the one‐phase Stefan problem under actuator delay via a backstepping method. The Stefan problem represents a liquid‐solid phase change phenomenon which describes the time evolution of a material's temperature profile and the interface position. The actuator delay is modeled by a first‐order hyperbolic partial differential equation (PDE), resulting in a cascaded transport‐diffusion PDE system defined on a time‐varying spatial domain described by an ordinary differential equation (ODE). Two nonlinear backstepping transformations are utilized for the control design. The setpoint restriction is given to guarantee a physical constraint on the proposed controller for the melting process. This constraint ensures the exponential convergence of the moving interface to a setpoint and the exponential stability of the temperature equilibrium profile and the delayed controller in the norm. Furthermore, robustness analysis with respect to the delay mismatch between the plant and the controller is studied, which provides analogous results to the exact compensation by restricting the control gain.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号