首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   104401篇
  免费   14822篇
  国内免费   9849篇
电工技术   15322篇
技术理论   9篇
综合类   11826篇
化学工业   3829篇
金属工艺   2850篇
机械仪表   5251篇
建筑科学   4167篇
矿业工程   2503篇
能源动力   2050篇
轻工业   1455篇
水利工程   1955篇
石油天然气   1834篇
武器工业   1035篇
无线电   21524篇
一般工业技术   5303篇
冶金工业   3778篇
原子能技术   307篇
自动化技术   44074篇
  2024年   368篇
  2023年   2131篇
  2022年   4057篇
  2021年   4578篇
  2020年   4617篇
  2019年   3275篇
  2018年   2741篇
  2017年   3279篇
  2016年   3431篇
  2015年   4013篇
  2014年   6855篇
  2013年   6089篇
  2012年   7853篇
  2011年   8451篇
  2010年   6491篇
  2009年   6863篇
  2008年   7142篇
  2007年   7901篇
  2006年   6673篇
  2005年   6030篇
  2004年   5069篇
  2003年   4431篇
  2002年   3508篇
  2001年   2968篇
  2000年   2285篇
  1999年   1858篇
  1998年   1338篇
  1997年   1098篇
  1996年   909篇
  1995年   723篇
  1994年   546篇
  1993年   384篇
  1992年   251篇
  1991年   160篇
  1990年   148篇
  1989年   131篇
  1988年   94篇
  1987年   35篇
  1986年   40篇
  1985年   46篇
  1984年   29篇
  1983年   28篇
  1982年   32篇
  1981年   12篇
  1980年   7篇
  1979年   14篇
  1977年   12篇
  1975年   7篇
  1959年   6篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
51.
探索五种异喹啉类生物碱抗肝癌的作用机制。借助TCMSP、String、venny数据库与WebGestalt在线分析软件获取靶点并进行蛋白互作网络(PPI)、基因本体(GO)、基因相互作用(KEGG)功能富集分析,利用Cytoscape软件构建网络。同时查阅文献并进行归纳、整理和分析得到小檗碱型中的小檗碱、双苄基类生物碱的粉防己碱、苯菲啶喹啉类的血根碱、吗啡烷类中的青藤碱和吡咯菲里啶中的石蒜碱等几种常见的生物碱,根据结构作用机制阐述每一类代表性异喹啉类生物碱治疗肝癌的潜力及抗肝癌作用机制。五个活性成分共筛选得到52个作用靶标如p53(抑癌基因)、NCOA2(核受体共激活剂2)、IL-2(白介素2),主要涉及钙离子信号通路、雌激素受体信号通路和PI3K/Akt信号传导途径等通路。通过网络药理学和文献收集证实异喹啉类生物碱可能参与调控PI3K-Akt通路等,可以通过多靶点、多通路对肝癌产生治疗作用,为进一步研究异喹啉类生物碱抗肝癌的临床研究提供参考和依据。  相似文献   
52.
Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra-lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.  相似文献   
53.
Phase change memory (PCM) is an emerging non-volatile data storage technology concerned by the semiconductor industry. To improve the performances, previous efforts have mainly focused on partially replacing or doping elements in the flagship Ge-Sb-Te (GST) alloy based on experimental “trial-and-error” methods. Here, the current largest scale PCM materials searching is reported, starting with 124 515 candidate materials, using a rational high-throughput screening strategy consisting of criteria related to PCM characteristics. In the results, there are 158 candidates screened for PCM materials, of which ≈68% are not employed. By further analyses, including cohesive energy, bond angle analyses, and Born effective charge, there are 52 materials with properties similar to the GST system, including Ge2Bi2Te5, GeAs4Te7, GeAs2Te4, so on and other candidates that have not been reported, such as TlBiTe2, TlSbTe2, CdPb3Se4, etc. Compared with GST, materials with close cohesive energy include AgBiTe2, TlSbTe2, As2Te3, TlBiTe2, etc., indicating possible low power consumption. Through further melt-quenching molecular dynamic calculation and structural/electronic analyses, Ge2Bi2Te5, CdPb3Se4, MnBi2Te4, and TlBiTe2 are found suitable for optical/electrical PCM applications, which further verifies the effectiveness of this strategy. The present study will accelerate the exploration and development of advanced PCM materials for current and future big-data applications.  相似文献   
54.
To save bandwidth and storage space as well as speed up data transmission, people usually perform lossy compression on images. Although the JPEG standard is a simple and effective compression method, it usually introduces various visually unpleasing artifacts, especially the notorious blocking artifacts. In recent years, deep convolutional neural networks (CNNs) have seen remarkable development in compression artifacts reduction. Despite the excellent performance, most deep CNNs suffer from heavy computation due to very deep and wide architectures. In this paper, we propose an enhanced wide-activated residual network (EWARN) for efficient and accurate image deblocking. Specifically, we propose an enhanced wide-activated residual block (EWARB) as basic construction module. Our EWARB gives rise to larger activation width, better use of interdependencies among channels, and more informative and discriminative non-linearity activation features without more parameters than residual block (RB) and wide-activated residual block (WARB). Furthermore, we introduce an overlapping patches extraction and combination (OPEC) strategy into our network in a full convolution way, leading to large receptive field, enforced compatibility among adjacent blocks, and efficient deblocking. Extensive experiments demonstrate that our EWARN outperforms several state-of-the-art methods quantitatively and qualitatively with relatively small model size and less running time, achieving a good trade-off between performance and complexity.  相似文献   
55.
This paper proposes an approach to improve the performance of no-reference video quality assessment for sports videos with dynamic motion scenes using an efficient spatiotemporal model. In the proposed method, we divide the video sequences into video blocks and apply a 3D shearlet transform that can efficiently extract primary spatiotemporal features to capture dynamic natural motion scene statistics from the incoming video blocks. The concatenation of a deep residual bidirectional gated recurrent neural network and logistic regression is used to learn the spatiotemporal correlation more robustly and predict the perceptual quality score. In addition, conditional video block-wise constraints are incorporated into the objective function to improve quality estimation performance for the entire video. The experimental results show that the proposed method extracts spatiotemporal motion information more effectively and predicts the video quality with higher accuracy than the conventional no-reference video quality assessment methods.  相似文献   
56.
Xilei Dai  Junjie Liu  Yongle Li 《Indoor air》2021,31(4):1228-1237
Due to the severe outdoor PM2.5 pollution in China, many people have installed air-cleaning systems in homes. To make the systems run automatically and intelligently, we developed a recurrent neural network (RNN) that uses historical data to predict the future indoor PM2.5 concentration. The RNN architecture includes an autoencoder and a recurrent part. We used data measured in an apartment over the course of an entire year to train and test the RNN. The data include indoor/outdoor PM2.5 concentration, environmental parameters and time of day. By comparing three different input strategies, we found that a strategy employing historical PM2.5 and time of day as inputs performed best. With this strategy, the model can be applied to predict the relatively stable trend of indoor PM2.5 concentration in advance. When the input length is 2 h and the prediction horizon is 30 min, the median prediction error is 8.3 µg/m3 for the whole test set. For times with indoor PM2.5 concentrations between (20,50] µg/m3 and (50,100] µg/m3, the median prediction error is 8.3 and 9.2 µg/m3, respectively. The low prediction error between the ground-truth and predicted values shows that the RNN can predict indoor PM2.5 concentrations with satisfactory performance.  相似文献   
57.
58.
总结了常见的城市排水管网风险评估的方法及软件,对污水管网的气体爆炸风险、雨水管网的内涝风险、综合风险这三类风险评估的文献进行了归纳整理,并对未来的研究重点及趋势做出了预测。  相似文献   
59.
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library.  相似文献   
60.
This article develops practical methods for Bayesian inference in the autoregressive fractionally integrated moving average (ARFIMA) model using the exact likelihood function, any proper prior distribution, and time series that may have thousands of observations. These methods utilize sequentially adaptive Bayesian learning, a sequential Monte Carlo algorithm that can exploit massively parallel desktop computing with graphics processing units (GPUs). The article identifies and solves several problems in the computation of the likelihood function that apparently have not been addressed in the literature. Four applications illustrate the utility of the approach. The most ambitious is an ARFIMA(2,d,2) model for the Campito tree ring time series (length 5405), for which the methods developed in the article provide an essentially uncorrelated sample of size 16,384 from the exact posterior distribution in under four hours. Less ambitious applications take as little as 4 minutes without exploiting GPUs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号