首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   171258篇
  免费   20826篇
  国内免费   11659篇
电工技术   12123篇
技术理论   12篇
综合类   14688篇
化学工业   19483篇
金属工艺   6833篇
机械仪表   9680篇
建筑科学   13002篇
矿业工程   5352篇
能源动力   4080篇
轻工业   9380篇
水利工程   3621篇
石油天然气   6874篇
武器工业   1806篇
无线电   21020篇
一般工业技术   13461篇
冶金工业   6938篇
原子能技术   2535篇
自动化技术   52855篇
  2024年   295篇
  2023年   2458篇
  2022年   4882篇
  2021年   6997篇
  2020年   5749篇
  2019年   4966篇
  2018年   4887篇
  2017年   6297篇
  2016年   7843篇
  2015年   8876篇
  2014年   12090篇
  2013年   11737篇
  2012年   11931篇
  2011年   12114篇
  2010年   9318篇
  2009年   9269篇
  2008年   9528篇
  2007年   12034篇
  2006年   11093篇
  2005年   9727篇
  2004年   7683篇
  2003年   6888篇
  2002年   5181篇
  2001年   3848篇
  2000年   3170篇
  1999年   2540篇
  1998年   1844篇
  1997年   1612篇
  1996年   1434篇
  1995年   1290篇
  1994年   1126篇
  1993年   746篇
  1992年   612篇
  1991年   545篇
  1990年   491篇
  1989年   412篇
  1988年   302篇
  1987年   204篇
  1986年   169篇
  1985年   222篇
  1984年   190篇
  1983年   151篇
  1982年   142篇
  1981年   119篇
  1980年   98篇
  1979年   72篇
  1978年   47篇
  1977年   53篇
  1976年   49篇
  1962年   69篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
针对目标估计过程需要大量人工参与、自动化程度低的问题,提出了基于数据质量评价的目标估计方法。利用目标数据质量评价方法,对不同传感器得到的目标数据质量进行科学、有效的测度和评价,并根据质量得分动态调整各数据源在目标估计过程中所占的权重,从而减少人工干预,提高目标估计效能。仿真试验结果证明了该方法的有效性。  相似文献   
2.
文章以“数字电子技术基础”课程为对象,设计了基于教学数据和问卷调查的教学框架。通过学生情况调查和雨课堂教学数据掌握学习状态和学习能力,针对性设计了个性化作业布置、拓展延伸、疫情线上自学跟学双通道等特色教学方式。结课问卷表明教学设计得到了良好评价和认可。  相似文献   
3.
苏志刚  刘卓伟 《激光与红外》2022,52(8):1153-1159
在单光子计数激光雷达检测领域,目前的检测方法在低信噪比情况下虚警概率会增加,同时也无法适应噪声变化的问题。针对这些问题,提出了一种基于Bayesian的检测方法,该方法首先通过雷达方程估计回波信号光子数的范围,将其作为先验信息,而后结合二项分布建立了累计概率模型,基于Bayesian判决准则计算得到检测阈值,此阈值能够在检测概率与虚警概率中间择其平衡。这种方法不仅克服了低信噪比检测困难的情况,还减少了先验信息的获取难度。实验结果表明,对比固定阈值其虚警概率降低了10倍。对比“恒虚警”其检测概率提高了约20。验证了方法具有良好的检测效果,具备一定的可操作性。  相似文献   
4.
Eliminating the gold preg-robbing effect of carbonaceous matter in carbonaceous gold ores is crucial for gold leaching. In this study, suspension oxidation roasting was proposed to accelerate the decarbonization of carbonaceous gold ore. The characteristics of oxidation reaction process and gas release were analyzed by TG-DTA-FTIR. The phase transformation and microstructure evolution of samples during roasting were analyzed by XRD, SEM and BET. The results show that the gold preg-robbing effect was eliminated after the gasification of carbonaceous matter, and the CaO generated by decomposition of carbonates can effectively capture the SO2. After roasting for 75 min at 650 °C in a 20% O2 atmosphere, the total carbon removal rate reached 99.42%, the distribution of exposed gold increased from 28.85% to 77.10% and the gold leaching efficiency increased from 4.55% to 84.83%. In addition, about 70% sulfur was mainly fixed in the roasted products in the form of sulfate. Therefore, the suspension oxidation roasting process is an efficient and clean pretreatment method for carbonaceous gold ores.  相似文献   
5.
A dual-coolant integrated experimental facility named DRAGON-V has been developed at the Institute of Nuclear Energy Safety Technology, Hefei Institute of Physical Science, Chinese Academy of Sciences, for the key technology research and performance evaluation of candidate liquid lithium-lead (PbLi) blanket of hydrogen fusion reactors. The loop is composed of a material test sub-loop and thermal-hydraulic test sub-loop, the design parameters are PbLi inventory 20 tons, PbLi temperature up to 550 °C, the maximum PbLi flow rate up to 40 kg/s. A novel cold trap system is designed to remove the suspended and crystalized impurities in PbLi fluid with three cooling zones and cross row arrangement of rod bundle filter elements. The paper describes the loop itself and its major components, initial loop testing, flow and measurement diagnostics and current experiments. The obtained test results of the loop and its components have demonstrated that the new facility is fully functioning and ready for experimental studies of material corrosion with/without a magnetic field, magnetohydrodynamic (MHD) effect, purification, heat and mass transfer phenomena in PbLi flows and can also be used in mock-up testing in conditions relevant to fusion applications.  相似文献   
6.
In the present paper, therapeutic treatment of infected tumorous cells has been studied through mathematical modeling and simulation of heat transfer in tissues by using a nonlinear dual-phase lag bioheat transfer model with Dirichlet boundary condition. The components of volumetric heat source in this model such as blood perfusion and metabolism are assumed experimentally validated temperature-dependent function, which gives more accurate temperature distribution in tissues through this model. We have used the finite difference and RK (4, 5) techniques of numerical methods to solve the proposed problem and obtained the exact solution in a particular case. After comparison, we got a good agreement between them. We have used dimensionless quantities throughout this paper. The effect of relaxation and thermalization time with respect to dimensionless temperature distribution has been analyzed in the treatment process.  相似文献   
7.
针对目前气象数据存储所面临的海量扩张、高并发读写、结构化和非结构化数据并存以及长时间序列和大数据集检索效率低下等问题,提出了以Hadoop开源框架为基础的气象数据分布式存储方案。通过对气象数据自身属性和特点进行分析,得出了气象数据在经过充分优化的基础上,在分布式存储框架中具有很强的适应性和规模化应用的潜力;并在HBase数据库中的Row Key设计和小文件合并策略方面做了创新。最后针对气象数据中广泛存在的结构化和非结构化这两种主要数据类型,以自动气象站数据和雷达产品数据为具体实例,给出了详细的设计思路和实现方法。  相似文献   
8.
诱导式卫星欺骗干扰可诱导航空器逐渐偏离预定航迹,难以被发现,因此及时有效地检测干扰是飞行安全的保障。在现有紧组合导航体制基础上,设计了一种基于误差估值累加开环校正的紧组合导航结构,并证明了其性能与传统闭环校正紧组合导航性能等效。在此结构中,将紧组合导航系统与自适应序贯概率比检测方法结合,提出了一种基于误差估值累加开环校正的诱导式欺骗检测方法,融合紧组合导航信息与其他不受欺骗影响的导航信息,构建欺骗检测统计量进行诱导式欺骗检测。仿真结果表明,开环校正结构可避免随时间累加的惯性导航系统误差所导致的组合导航滤波器发散问题,同时欺骗检测方法可进一步提高算法对“最坏”情形下微小诱导式欺骗的检测效果。  相似文献   
9.
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning.  相似文献   
10.
Joint photographic experts group (JPEG) can provide good quality with small file size but also eliminate extensively the redundancies of images. Therefore, hiding data into JPEG images in terms of maintaining high visual quality at small file sizes has been a great challenge for researchers. In this paper, an adaptive reversible data hiding method for JPEG images containing multiple two-dimensional (2D) histograms is proposed. Adaptability is mainly reflected in three aspects. The first one is to preferentially select sharper histograms for data embedding after K histograms are established by constructing the kth (k{1,2,,K}) histogram using the kth non-zero alternating current (AC) coefficient of all the quantized discrete cosine transform blocks. On the other hand, to fully exploit the strong correlation between coefficients of one histogram, the smoothness of each coefficient is estimated by a block smoothness estimator so that a sharply-distributed 2D-histogram is constructed by combining two coefficients with similar smoothness into a pair. The pair corresponding to low complexity is selected priorly for data embedding, leading to high embedding performance while maintaining low file size. Besides, we design multiple embedding strategies to adaptively select the embedding strategy for each 2D histogram. Experimental results demonstrate that the proposed method can achieve higher rate–distortion performance which maintaining lower file storage space, compared with previous studies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号