首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7856篇
  免费   1131篇
  国内免费   810篇
电工技术   317篇
综合类   834篇
化学工业   556篇
金属工艺   386篇
机械仪表   323篇
建筑科学   738篇
矿业工程   128篇
能源动力   130篇
轻工业   168篇
水利工程   137篇
石油天然气   208篇
武器工业   236篇
无线电   1289篇
一般工业技术   470篇
冶金工业   238篇
原子能技术   74篇
自动化技术   3565篇
  2024年   14篇
  2023年   128篇
  2022年   215篇
  2021年   243篇
  2020年   243篇
  2019年   195篇
  2018年   198篇
  2017年   240篇
  2016年   214篇
  2015年   281篇
  2014年   498篇
  2013年   561篇
  2012年   626篇
  2011年   729篇
  2010年   589篇
  2009年   591篇
  2008年   601篇
  2007年   681篇
  2006年   526篇
  2005年   512篇
  2004年   373篇
  2003年   360篇
  2002年   239篇
  2001年   217篇
  2000年   158篇
  1999年   108篇
  1998年   62篇
  1997年   69篇
  1996年   49篇
  1995年   57篇
  1994年   32篇
  1993年   39篇
  1992年   22篇
  1991年   15篇
  1990年   15篇
  1989年   7篇
  1988年   17篇
  1987年   4篇
  1986年   6篇
  1985年   8篇
  1984年   9篇
  1983年   5篇
  1982年   5篇
  1981年   3篇
  1980年   5篇
  1979年   4篇
  1978年   3篇
  1975年   3篇
  1966年   4篇
  1957年   2篇
排序方式: 共有9797条查询结果,搜索用时 31 毫秒
1.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing.  相似文献   
2.
A large-scale high-precision scan stage is important equipment in the industrial productions of micro-fabrication such as flat panel display (FPD) lithography systems. Designing controllers for multi-input multi-output (MIMO) systems is time-consuming and needs experience because of the interaction between each axis and many controller tuning parameters. The aim of this study is to develop a peak filter design method based on frequency response data to reduce repetitive disturbance. This data-based approach does not use the model and only uses the frequency response data of the controlled system and the disturbance spectrum calculated from the scanning error data (Contribution 1). The peak filter is designed by convex optimization and satisfies robust stability conditions for six-degree-of-freedom systems (Contribution 2). The control performance of the designed peak filter is experimentally demonstrated with an industrial MIMO large-scale high-precision scan stage in reducing the scanning error of the main stroke of the translation along the x-axis (Contribution 3).  相似文献   
3.
In this study, fluid flow over an array of eight, 0.029 m × 0.029 m, square cross‐section cylinders in an octagonal configuration is studied numerically. The mean force coefficients (drag and lift) and the vortex formation characteristics of the array are calculated numerically by utilizing a three‐dimensional large eddy simulation mathematical model for turbulence. The numerical simulation is performed with commercial software ANSYS Fluent 19R1. To investigate the parametric influences, three spacings between the cylinders (0.07, 0.14, and 0.2 m), two array attack angles (0° and 15°), and two Reynolds numbers (4060 and 45 800) are considered. The results comprise flow patterns and force coefficients' variations with Reynolds numbers. The lift force of the downstream cylinder reaches its maximum at α = 15°, and the drag force of the upstream cylinders finds its peak at α = 0°. It is observed through velocity and viscosity contour plots that vortex formation length near the cylinder increases at higher Reynolds number. Velocity vector plots are also presented to show fluid flow behavior near the cylinder. Furthermore, the predicted mean forces on the cylinders are slightly different for different Reynolds numbers, spacings, and angles of attack.  相似文献   
4.
针对超高强钢在机械行业的广泛使用,焊接接头易出现淬硬脆化、裂纹等缺陷的情况,采用焊条电弧焊(SMAW)和药芯气体保护焊(FCAW-GS)组合的焊接方法,对API X52管线钢与Corus RQT 701超高强钢的焊接进行了工艺试验,并进行常规力学性能试验。结果表明,通过合理匹配焊接工艺参数,严格控制低热输入量及层间温度,实现了小熔合比的异种钢焊接,且焊接接头具有良好的力学性能,达到了标准和规格书的要求;异种高强钢焊接,采用SMAW打底焊接和FCAWGS填充并盖面的方法,焊接效率较单纯采用焊条电弧焊工艺提高2倍以上。  相似文献   
5.
This paper introduces an efficient algorithm for the bike request scheduling problem (BRSP). The BRSP is built around the concept of request, defined as the pickup or dropoff of a number of identical items (bikes) at a specific station, within a certain time window, and with a certain priority. The aim of the BRSP is to sequence requests on (and hence determine the routes of) a set of vehicles, in such a way that the sum of the priorities of the executed requests is maximized, all time windows are respected, and the capacity of the vehicles is not exceeded. The generation of the set of requests is explicitly not a part of the problem definition of the BRSP. The primary application of the BRSP, from which it derives its name, is to determine the routes of a set of repositioning vehicles in a bike sharing system, although other applications exist. The algorithm introduced in this paper is based on a set of related greedy randomized adaptive search procedure followed by variable neighborhood descent (GRASP + VND) operators embedded in a large neighborhood search (LNS) framework. Since this paper presents the first heuristic for the BRSP, a computational comparison to existing approaches is not possible. We therefore compare the solutions found by our LNS heuristic to those found by an exact solver (Gurobi). These experiments confirm that the proposed algorithm scales to realistic dimensions and is able to find near‐optimal solutions in seconds.  相似文献   
6.
无证书签名具有基于身份密码体制和传统公钥密码体制的优点,可解决复杂的公钥证书管理和密钥托管问题.Wu和Jing提出了一种强不可伪造的无证书签名方案,其安全性不依赖于理想的随机预言机.针对该方案的安全性,提出了两类伪造攻击.分析结果表明,该方案无法实现强不可伪造性,并在"malicious-but-passive"的密钥生成中心攻击下也是不安全的.为了提升该方案的安全性,设计了一个改进的无证书签名方案.在标准模型中证明了改进的方案对于适应性选择消息攻击是强不可伪造的,还能抵抗恶意的密钥生成中心攻击.此外,改进的方案具有较低的计算开销和较短的私钥长度,可应用于区块链、车联网、无线体域网等领域.  相似文献   
7.
针对现实网络中诸如侧信道攻击、HID 攻击等传统的物理攻击,物理隔离被认为是一种较为彻底的抵御网络攻击的安全防护手段。2018 年,业界首次提出了一种物理隔离环境下的 Wi-Fi 隐蔽信道方法——Ghost Tunnel,即在Wi-Fi尚未连接的状态下,无线AP可成功将数据传给发起连接请求的计算机。提出了一种基于Ghost Tunnel方法的攻击框架—— GreyFan,利用该攻击框架攻击者可以对未连接Wi-Fi的用户实施无感知攻击,如文件隐蔽传输、任意代码执行等,并分析了相应的防御技术。  相似文献   
8.
陈皓  肖利雪  李广  潘跃凯  夏雨 《计算机应用》2019,39(8):2235-2241
针对人体攻击性行为识别问题,提出一种基于人体关节点数据的攻击性行为识别方法。首先,利用OpenPose获得单帧图像中的人体关节点数据,并通过最近邻帧特征加权法和分段多项式回归完成由人体自遮挡和环境因素所导致缺失值的补全;然后,对每个人体定义动态"安全距离"阈值,如果两人真实距离小于阈值,则构建行为特征矢量,其中包括帧间人体重心位移、人体关节旋转角角速度和发生交互时的最小攻击距离等;最后,提出改进的LightGBM算法w-LightGBM,并对攻击性行为进行识别。采用公共数据集UT-interaction对所提出的攻击性行为分类识别方法进行测试实验,准确率达到95.45%。实验结果表明,所提方法能够有效识别各种角度的攻击性行为。  相似文献   
9.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.  相似文献   
10.
The paper presents in-depth three-dimensional finite element analyses investigating geosynthetic-reinforced soil walls with turning corners. Validation of the 3D numerical procedure was first performed via comparisons between the simulated and reported results of a benchmark physical modeling built at the Royal Military College of Canada. GRS walls with corners of 90°, 105°, 120°, 135°, 150°, and 180° were simulated adopting the National Concrete Masonry Association guidelines. The behaviors of the GRS walls with corners, including the lateral facing displacement, maximum reinforcement load, factor of safety, potential failure surface, vertical separation of facing blocks, and types of corners were carefully evaluated. Our comprehensive results show (i) minimum lateral displacement occurs at the corner; (ii) lower strength of reinforcements are required at the corner; (iii) higher corner angles lead to lower stability; (iv) potential failure surface forms earlier at the end walls; (v) deeper potential failure surfaces are found at the corners; (vi) larger numbers of vertical separations are found at walls with smaller corner angles. The paper highlighted the salient influence of the corners on the behaviors of GRS walls and indicated that a 3D analysis could reflect the required reinforcement length and the irregular formation of the potential failure surfaces.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号