首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7261篇
  免费   1275篇
  国内免费   839篇
电工技术   326篇
技术理论   1篇
综合类   984篇
化学工业   174篇
金属工艺   104篇
机械仪表   631篇
建筑科学   477篇
矿业工程   181篇
能源动力   82篇
轻工业   308篇
水利工程   131篇
石油天然气   126篇
武器工业   42篇
无线电   1046篇
一般工业技术   585篇
冶金工业   113篇
原子能技术   29篇
自动化技术   4035篇
  2024年   18篇
  2023年   117篇
  2022年   197篇
  2021年   248篇
  2020年   309篇
  2019年   204篇
  2018年   229篇
  2017年   263篇
  2016年   322篇
  2015年   381篇
  2014年   521篇
  2013年   515篇
  2012年   565篇
  2011年   612篇
  2010年   540篇
  2009年   499篇
  2008年   545篇
  2007年   546篇
  2006年   438篇
  2005年   358篇
  2004年   314篇
  2003年   282篇
  2002年   188篇
  2001年   157篇
  2000年   164篇
  1999年   127篇
  1998年   111篇
  1997年   84篇
  1996年   112篇
  1995年   82篇
  1994年   71篇
  1993年   46篇
  1992年   50篇
  1991年   24篇
  1990年   31篇
  1989年   27篇
  1988年   16篇
  1987年   16篇
  1986年   8篇
  1985年   14篇
  1984年   4篇
  1983年   9篇
  1982年   1篇
  1981年   1篇
  1980年   3篇
  1979年   2篇
  1978年   2篇
  1976年   1篇
  1974年   1篇
排序方式: 共有9375条查询结果,搜索用时 15 毫秒
1.
毕晓美 《矿山测量》2021,49(2):120-123
为解决沧州市涉地税源管理手段单一等问题,文中提出以测绘地理信息技术为支撑,通过对多源数据组织管理,建立风险分析指标,采用多种GIS空间分析方法构建了涉地风险税源识别模式并在沧州进行应用。结果表明:该模式能有效识别多种涉地风险,为涉地税源管理提供了支撑。  相似文献   
2.
为了准确地从复杂干扰背景下检测出真实弱小目标,本文引入视觉显著性,设计了基于快速光谱尺度空间与动态管道滤波的红外目标检测算法。基于真实目标与背景内容之间的整体差异,引入快速光谱尺度空间与阈值分割技术,设计视觉显著性机制,对红外图像完成处理,输出全局显著性映射,以高效过滤干扰背景内容。考虑目标与背景的局部特征差异,构建自适应局部对比度增强机制,对粗检测结果实施处理,获取对应的局部显著性映射,改善视觉显著性区域内目标的对比度。引入高斯差分理论,通过估算每一帧红外图像中的目标像素直径,形成动态管道滤波,充分消除虚警,准确识别出弱小目标。多组实验数据显示:较已有的红外目标检测技术而言,在各种不同的复杂背景干扰下,所提算法呈现出更好的检测能力,拥有更理想的接收机工作特性ROC曲线。  相似文献   
3.
针对云计算应用于无线传感器网络(Wireless Sensor Network,WSN)时延敏感型业务时存在的高传输时延问题,提出了一种WSN低功耗低时延路径式协同计算方法。该方法基于一种云雾网络架构开展研究,该架构利用汇聚节点组成雾计算层;在数据传输过程中基于雾计算层的计算能力分步骤完成任务计算,降低任务处理时延;由于汇聚节点计算能力较弱,时延降低将导致能耗增加,WSN工作寿命减短,为此提出能耗约束下的任务映射策略,并利用离散二进制粒子群优化(Binary Particle Swarm Optimization,BPSO)算法解决能耗约束下的时延优化问题。仿真结果表明,在相同的能耗约束下,对比其他算法,基于BPSO算法得出的映射方案能有效降低业务处理时延,满足时延敏感型业务的需求。  相似文献   
4.
In this article, the issue of adaptive finite-time dynamic surface control (DSC) is discussed for a class of parameterized nonlinear systems with full state constraints. Using the property of logarithmic function, a one-to-one nonlinear mapping is constructed to transform a constrained system into an unconstrained system with the same structure. The nonlinear filter is constructed to replace the first-order linear filter in the traditional DSC, and the demand on the filter time constant is reduced. Based on finite-time stable theory and using modified DSC, the finite-time controller is designed via DSC. Theoretical analysis shows that all the signals in the closed-loop system are semiglobal practical finite-time stable. Furthermore, none of the states are outside the defined open set. In the end, simulation results are presented to demonstrate the effectiveness of the proposed control schemes with both linear filters and nonlinear filters.  相似文献   
5.
With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the new location privacy challenges caused by DLBS, since the service device is enabled to perform the localization without the permission of the user. To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user. The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information of their device. We make the simulation of our proposed scheme and the result convince its effectiveness.  相似文献   
6.
We present a comparison of the precision of different approaches for orientation imaging using electron backscatter diffraction (EBSD) in the scanning electron microscope. We have used EBSD to image the internal structure of WC grains, which contain features due to dislocations and subgrains. We compare the conventional, Hough-transform based orientation results from the EBSD system software with results of a high-precision orientation refinement using simulated pattern matching at the full available detector resolution of 640 × 480 pixels. Electron channelling contrast imaging (ECCI) is used to verify the correspondence of qualitative ECCI features with the quantitative orientation data from pattern matching. For the investigated sample, this leads to an estimated pattern matching sensitivity of about 0.5 mrad (0.03°) and a spatial feature resolution of about 100 nm. In order to investigate the alternative approach of postprocessing noisy orientation data, we analyse the effects of two different types of orientation filters. Using reference features in the high-precision pattern matching results for comparison, we find that denoising of orientation data can reduce the spatial resolution, and can lead to the creation of orientation artefacts for crystallographic features near the spatial and orientational resolution limits of EBSD.  相似文献   
7.
This paper presents a novel method for mapping a texture for machining onto a freeform surface. When a grain texture designed on a 2D plane is projected onto a freeform surface simply, the texture is distorted along the curvature of the surface in the projection direction. Therefore, a method is required to suppress this distortion. The algorithm proposed in this paper rapidly generates a point cloud that represents a texture with less distortion on a simply connected parametric surface. Specifically, four equations that express local geometry constraints instead of conventional parameterization methods are presented to reduce the distortion between adjacent points on the point cloud. Solving these equations can generate grain textures on freeform surfaces. This paper examines two grain images mapped to two freeform surfaces that were prepared as case studies to demonstrate the effectiveness of the proposed method.  相似文献   
8.
9.
Modern manufacturing enterprises are shifting toward multi-variety and small-batch production. By optimizing scheduling, both transit and waiting times within the production process can be shortened. This study integrates the advantages of a digital twin and supernetwork to develop an intelligent scheduling method for workshops to rapidly and efficiently generate process plans. By establishing the supernetwork model of a feature-process-machine tool in the digital twin workshop, the centralized and classified management of multiple data types can be realized. A feature similarity matrix is used to cluster similar attribute data in the feature layer subnetwork to realize rapid correspondence of multi-source association information among feature-process-machine tools. Through similarity calculations of decomposed features and the mapping relationships of the supernetwork, production scheduling schemes can be rapidly and efficiently formulated. A virtual workshop is also used to simulate and optimize the scheduling scheme to realize intelligent workshop scheduling. Finally, the efficiency of the proposed intelligent scheduling strategy is verified by using a case study of an aeroengine gear production workshop.  相似文献   
10.
Despite the benefits of EHRs (Electronic Health Records), there is a growing concern over the risks of privacy exposure associated with the technologies of EHR storing and transmission. To deal with this problem, a time-aware searchable encryption with designated server is proposed in this paper. It is based on Boneh's public key encryption with keyword search and Rivest's timed-release cryptology. Our construction has three features: the user cannot issue a keyword search query successfully unless the search falls into the specific time range; only the authorized user can generate a valid trapdoor; only the designated server can execute the search. Applying our scheme in a multi-user environment, the number of the keyword ciphertexts would not increase linearly with the number of the authorized users. The security and performance analysis shows that our proposed scheme is securer and more efficient than the existing similar schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号