首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   82871篇
  免费   5772篇
  国内免费   2858篇
电工技术   978篇
综合类   1583篇
化学工业   1596篇
金属工艺   654篇
机械仪表   997篇
建筑科学   521篇
矿业工程   122篇
能源动力   1510篇
轻工业   359篇
水利工程   80篇
石油天然气   90篇
武器工业   34篇
无线电   11937篇
一般工业技术   4837篇
冶金工业   257篇
原子能技术   188篇
自动化技术   65758篇
  2024年   63篇
  2023年   988篇
  2022年   1787篇
  2021年   2383篇
  2020年   2296篇
  2019年   1952篇
  2018年   2402篇
  2017年   3990篇
  2016年   4281篇
  2015年   3658篇
  2014年   5806篇
  2013年   5734篇
  2012年   5067篇
  2011年   5596篇
  2010年   5000篇
  2009年   5317篇
  2008年   4853篇
  2007年   5008篇
  2006年   4434篇
  2005年   2974篇
  2004年   1701篇
  2003年   1746篇
  2002年   1742篇
  2001年   1528篇
  2000年   1330篇
  1999年   1375篇
  1998年   985篇
  1997年   888篇
  1996年   827篇
  1995年   594篇
  1994年   518篇
  1993年   468篇
  1992年   441篇
  1991年   381篇
  1990年   339篇
  1989年   271篇
  1988年   235篇
  1987年   227篇
  1986年   180篇
  1985年   328篇
  1984年   271篇
  1983年   241篇
  1982年   217篇
  1981年   190篇
  1980年   141篇
  1979年   162篇
  1978年   132篇
  1977年   105篇
  1976年   115篇
  1975年   71篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
Recently, single image super-resolution (SISR) has been widely applied in the fields of underwater robot vision and obtained remarkable performance. However, most current methods generally suffered from the problem of a heavy burden on computational resources with large model sizes, which limited their real-world underwater robotic applications. In this paper, we introduce and tackle the super resolution (SR) problem for underwater robot vision and provide an efficient solution for near real-time applications. We present a novel lightweight multi-stage information distillation network, named MSIDN, for better balancing performance against applicability, which aggregates the local distilled features from different stages for more powerful feature representation. Moreover, a novel recursive residual feature distillation (RRFD) module is constructed to progressively extract useful features with a modest number of parameters in each stage. We also propose a channel interaction & distillation (CI&D) module that employs channel split operation on the preceding features to produce two-part features and utilizes the inter channel-wise interaction information between them to generate the distilled features, which can effectively extract the useful information of current stage without extra parameters. Besides, we present USR-2K dataset, a collection of over 1.6K samples for large-scale underwater image SR training, and a testset with an additional 400 samples for benchmark evaluation. Extensive experiments on several standard benchmark datasets show that the proposed MSIDN can provide state-of-the-art or even better performance in both quantitative and qualitative measurements.  相似文献   
3.
Due to the limited improvement of single-image based super-resolution (SR) methods in recent years, the reference based image SR (RefSR) methods, which super-resolve the low-resolution (LR) input with the guidance of similar high-resolution (HR) reference images are emerging. There are two main challenges in RefSR, i.e. reference image warping and exploring the guidance information from the warped references. For reference warping, we propose an efficient dense warping method to deal with large displacements, which is much faster than traditional patch (or texture) matching strategy. For the SR process, since different reference images complement each other, and have different similarities with the LR image, we further propose a similarity based feature fusion strategy to take advantage of the most similar reference regions. The SR process is realized by an encoder–decoder network and trained with pixel-level reconstruction loss, degradation loss and feature-level perceptual loss. Extensive experiments on three benchmark datasets demonstrate that the proposed method outperforms state-of-the-art SR methods in both subjective and objective measurements.  相似文献   
4.
Wireless Personal Communications - A Delay Tolerant Network (DTN) is a network capable of handling long delays and data loss efficiently in various challenged scenarios and environments. Owing to...  相似文献   
5.
The audit point is to understand and use to perform the upgrade wearable innovation injuries in sports. Understanding the game's biomechanics is that damage response and performance upgrades are essential, and usually, investigation uses optical motion capture. In any case, this approach may be limited by the amount of limit catch climatic factors and the overwhelmed wearable research center of innovation. Ordered to make queries are used to study in seven information centers and sports car wearable innovation factors. This article was banned because they do not measure the program members on the sensor zero and the motor or motor factors or the application of an innovative set. Thirty-three incorporated into the collection of the full text of the survey carried out to identify members' dynamic development through observation and a slice of wearable progress in the game. Inertial sensors, the sensor and the flexible, attractive and precise speed field sensors are used in the game with more than 15 measured motion gadgets. The use of wearable innovation, the potential of these innovative practices, and the impact of competitors' training methods are still in the exploratory stage.  相似文献   
6.
《Ceramics International》2021,47(24):34455-34462
Herein, the tungsten trioxide (WO3) nanostructure thin films with different morphologies are firstly fabricated by magnetron sputtering with glancing angle deposition technique (MS-GLAD), followed by the post annealed treatment process in air ambient for 2 h. It is demonstrated that the geometry of MS-GLAD setup, mainly substrate position, played a crucial role in determining the morphology, crystallinity, optical transmittance, and photo-electrochemical (PEC) performance of the WO3 nanostructured thin film. With the different substrate positions in the MS-GLAD system, the WO3 nanorod film layer could be precisely changed to combine an underlying dense layer with a nanorod layer and then nanocolumnar film. Moreover, the prepared samples' chemical composition and work function are studied by X-ray photoelectron spectroscopy (XPS) and ultraviolet photoelectron spectroscopy (UPS), respectively. The combining WO3 nanostructure produced high PEC efficiency compared to the single layer of the WO3 nanorods sample and the dense WO3 thin film sample. Thus, morphology-controlled nanostructure film based on the MS-GLAD technique in our study provides a simple approach to enhance the photo-anode for PEC water splitting application.  相似文献   
7.
8.
9.
Built-in applications built on a stand-alone device, TCP / IP network and interconnected are a need for high integration with other systems. The system provided through Web services interconnects service-oriented distributed architecture. The TCP / IP network is widely employed to integrate business applications. This integration is still not provided through the embedded application. The applications connected to the Internet are an especially difficult problem in embedded systems to interpret the sensor data. Real-time sensor function generates a training/classification result for IoT application selected, customized, or data structure design. It has an integrated hardware/software system to achieve the continuous training and real-time data analysis and re-training of Machine Learning (ML) algorithm. World of English native speakers on top of all, this is the database of words that have been separated from the local and non-collection English. It also reported a variety of methods that are used in the English vocabulary recognition system. Please check the study of learners of mediation based on the part of the corpus. Students, in writing, too much-advanced technology and general vocabulary. These students, publicly their discourse in and contributed to the professional corpus of "existence" I mentioned that there is a professional writer, is better. To stimulate the different means of integration, it evaluated several network technology today, discussing the balance between the use of shared with this integration in the adaptability and built-in the field of Web network technology of today.  相似文献   
10.

In recent days, the manufacture of automotive vehicles is dramatically enhanced worldwide. Most vehicle crashes are due to the drive distraction on the real highway roads and traffic-density. In this proposed method, a novel collision detection and avoidance algorithm are coined for Midvehicle Collision Detection and Avoidance System (MCDAS), addressing two scenarios, namely, (a) A rear-end collision avoidance with host vehicle under no front-end vehicle condition and (b) offset-based curvilinear motion under critical conditions, while, suitable parallel parking manoeuvring also addressed using offset-based curvilinear motion. The Monte Carlo analysis of the proposed MCDAS is demonstrated using the Constant Velocity (CV) manoeuvring strategy and simulated with real-time data using the NGSIM database.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号