首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14128篇
  免费   1530篇
  国内免费   1242篇
电工技术   840篇
综合类   1578篇
化学工业   1137篇
金属工艺   204篇
机械仪表   712篇
建筑科学   974篇
矿业工程   149篇
能源动力   369篇
轻工业   152篇
水利工程   123篇
石油天然气   250篇
武器工业   202篇
无线电   4339篇
一般工业技术   749篇
冶金工业   197篇
原子能技术   646篇
自动化技术   4279篇
  2024年   26篇
  2023年   139篇
  2022年   209篇
  2021年   313篇
  2020年   322篇
  2019年   265篇
  2018年   290篇
  2017年   386篇
  2016年   448篇
  2015年   564篇
  2014年   909篇
  2013年   972篇
  2012年   1120篇
  2011年   1170篇
  2010年   914篇
  2009年   979篇
  2008年   904篇
  2007年   1096篇
  2006年   977篇
  2005年   818篇
  2004年   659篇
  2003年   672篇
  2002年   516篇
  2001年   412篇
  2000年   373篇
  1999年   291篇
  1998年   217篇
  1997年   172篇
  1996年   154篇
  1995年   137篇
  1994年   100篇
  1993年   92篇
  1992年   50篇
  1991年   46篇
  1990年   33篇
  1989年   32篇
  1988年   16篇
  1987年   11篇
  1986年   7篇
  1985年   11篇
  1984年   13篇
  1983年   10篇
  1982年   3篇
  1981年   6篇
  1980年   8篇
  1979年   3篇
  1978年   4篇
  1977年   6篇
  1959年   10篇
  1954年   2篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
针对现有基于视频监控的人流量统计方案成本高、算法复杂且不利于个人隐私保护的局限性,利用毫米波雷达体积小、成本低、分辨率高的特点,提出了一种基于双时间点检测的人流量监测方法。该方法先获取人体目标散射点位置和多普勒频移信息来构成点云数据,然后根据多普勒频移正负来判断人体的运动方向,并筛选具有高多普勒频移值的点云数据以降低干扰点对聚类结果的影响;在双时间点对特定区域内人员数量进行统计,并根据双时间点之间所获取的点云数据聚类结果对所统计人员数据进行修正。实验结果表明,该方法能够用匿名的方式以较高的正确率统计人员进出。  相似文献   
2.
摘 要:为了提高码索引调制(code index modulation,CIM)系统的传输效率,提出了一种具有更低复杂度的单输入单输出(single input single output,SISO)的广义正交码索引调制(generalized orthogonal code index modulation,GQCIM)系统。CIM 系统使用扩频码和星座符号传输信息,但只能激活两个扩频码索引和一个调制符号。而 GQCIM 系统以一种新颖的方式克服了只激活一个调制符号的限制,同时充分利用了调制符号的正交性,增加扩频码索引以传输更多的额外信息位,提高了系统的传输效率。此外,分析了GQCIM系统的理论性能,推导了误码率性能的上界。通过蒙特卡罗仿真验证了GQCIM系统的性能,对比发现GQCIM系统的理论和仿真性能一致。而且在相同的传输效率下,结果显示GQCIM系统的性能优于同样具有正交性的调制系统,如广义码索引调制(generalized code index modulation,GCIM)系统、CIM系统、码索引调制-正交空间调制(code index modulation aided quadrature spatial modulation,CIM-QSM)系统、码索引调制-正交空间调制(code index modulation aided spatial modulation,CIM-SM)系统、脉冲索引调制(pulse index modulation,PIM)系统。  相似文献   
3.
The phase shift characteristics reflect the state change of electromagnetic wave in plasma sheath and can be used to reveal deeply the action mechanism between electromagnetic wave and plasma sheath. In this paper, the phase shift characteristics of electromagnetic wave propagation in plasma were investigated. Firstly, the impact factors of phase shift including electron density,collision frequency and incident frequency were discussed. Then, the plasma with different electron density distribution profiles were employed to investigate the influence on the phase shift characteristics. In a real case, the plasma sheath around the hypersonic vehicle will affect and even break down the communication. Based on the hypersonic vehicle model, we studied the electromagnetic wave phase shift under different flight altitude, speed, and attack angle. The results indicate that the phase shift is inversely proportional to the flight altitude and positively proportional to the flight speed and attack angle. Our work provides a theoretical guidance for the further research of phase shift characteristics and parameters inversion in plasma.  相似文献   
4.
归一化水体指数(NDWI)是水体遥感反演的一种重要指标,其阈值及修正直接影响反演结果的精度。基于Landsat-8与GF-1光学多光谱影像,使用归一化水体指数法阈值0(TH0)、最大类间方差法(OTSU)自适应阈值(THotsu)与均值漂移聚类算法(Mean-Shift)自适应阈值(THMS)分别对典型正常水体、云雾覆盖水体、富营养化水体、高含泥沙水体进行水体遥感提取与效果分析,结果表明:正常水体以TH0为阈值提取精度最高,THMS提取精度次之,THotsu提取精度最差;而云雾覆盖水体、富营养化水体以及含泥沙水体使用THMS提取精度最高,尤其少量云雾覆盖下的水体,THMS具有更明显的优势,TH0提取精度次之,THotsu提取精度最差;对于不同的阈值,Land?sat-8比GF-1总体表现出更高的水体提取精度。Mean-Shift算法应用于NDWI阈值修正与水体遥感反演具有快速、水质适应性强、效果稳定的优势,对尤其是复杂条件下的水体信息遥感反演具有较好的提取效果。  相似文献   
5.
卢喜东  段哲民  钱叶魁  周巍 《软件学报》2020,31(5):1454-1464
针对当前恶意代码静态分析方法精度不足的问题,将恶意代码映射为无压缩的灰度图像,然后根据图像变换方法将图像变换为恒定大小的图像,使用方向梯度直方图提取图像的特征,最后提出一种基于深度森林的恶意代码分类方法.实验中选择不同家族的多个恶意代码样本进行分类,验证了该方法的有效性,并且实验结果优于近期提出的SPAM-GIST方法.  相似文献   
6.
由于命名数据网络(NDN,Named-Data Networking)无环路、逐包、逐跳转发的特点,使得数据包回传成功率降低,而传统的TCP/IP协议中的ARQ和ACK机制对于多播会话不再适用.由于NDN中的传输信道可以等效为二进制删除信道,因此可以通过应用层编码来实现文件的可靠传输.传统的信道编码技术如卷积码、级联码和RS码等复杂度较高,而将NDN与低复杂度的喷泉码的结合可以实现分布式的存储架构,因而可通过喷泉编码在应用层协议中实现可靠的纠删机制,保证整体文件的传输可靠性.以往的研究一般是基于确定的删除概率信道模型,但是由于网络的异构性和信道噪声等因素影响,可能会造成信道丢包概率呈随机性分布.因此,本文在Beta-Binomial分布模型的前提下,根据贝叶斯统计的先验信息和中心极限定理,对随机概率下的纠删信道的文件可靠传输协议进行了数学建模和理论推导.仿真结果显示此模型更具有普适性,此传输协议可在信道状况未知的前提下从理论上求出最小发包数,减少冗余编码包,提高文件整体的投递成功率,在保证传输可靠性的同时有效提升协议传输效率.  相似文献   
7.
Crocodiles play important roles in many ecosystems, but their populations worldwide are threatened by human exploitation and habitat destruction. We studied ontogenetic changes in habitat use and seasonal activity patterns in a population of Nile crocodiles (Crocodylus niloticus) inhabiting the Lake Albert Delta Wetland System, a Ramsar Site of international importance in Murchison Falls National Park of western Uganda. A total of 186 crocodile observations were made from monthly surveys of five transects during October 2017 to September 2018. Crocodiles exhibited a marginally bi-modal seasonal pattern, with the fewest observations from July to August and October to November, and the highest observations from January to February and April to May. Crocodiles were most frequently encountered along the north shore of the delta, especially on riverbanks with woody vegetation, followed by Cyperus papyrus-Vossia dominated habitats, while crocodiles were infrequently observed on islands and muddy banks. Habitat niche breadth was narrowest in hatchlings and widest in sub-adults, with juveniles and large adults exhibiting intermediate values. Overlap in habitat resource use across size classes was generally high, with the lowest overlap between hatchlings and juveniles, and the highest between large and sub-adult crocodiles. Our study on Nile crocodiles in the Lake Albert delta provides insights into habitat partitioning among different demographic segments of this population that can be utilized to improve its management in one of Africa’s Great Lakes by spatially and temporally focusing conservation efforts on the most used habitats and seasonal aggregations, respectively.  相似文献   
8.
One of the constant challenges faced by the Android community, when it comes to the safety of the end users, is the ability of applications to load code dynamically. This mechanism may be used for both legitimate and malicious purposes. A particular problem is the fact that remote code is not analyzed during the verification process because it doesn’t have to be present in the application package at the publishing time. Previous research has shown that using this concept in an insecure way can cause serious consequences for the user and his device. Solving this problem has proved to be a big challenge that many have tried to address in different ways. This paper deals with the problem of dynamic code loading on Android platform. For the purpose of this paper, an application that demonstrates the abuse of the dynamic code loading concept has been developed and published in the Google Play Store. Also, a proposal of the modified Android ecosystem that should address this problem and improve the security of the whole platform is given.  相似文献   
9.
Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks. In this paper, a new design of LFSR against power attacks is proposed. The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop. The design method has been implemented easily by circuits in this new design in comparison with the others.  相似文献   
10.
In bacteria, selenocysteine (Sec) is incorporated into proteins via the recoding of a particular codon, the UGA stop codon in most cases. Sec-tRNASec is delivered to the ribosome by the Sec-dedicated elongation factor SelB that also recognizes a Sec-insertion sequence element following the codon on the mRNA. Since the excess of SelB may lead to sequestration of Sec-tRNASec under selenium deficiency or oxidative stress, the expression levels of SelB and tRNASec should be regulated. In this bioinformatic study, I analyzed the Rhizobiales SelB species because they were annotated to have a non-canonical C-terminal extension. I found that the open reading frame (ORF) of diverse Alphaproteobacteria selB genes includes an entire tRNASec sequence (selC) and overlaps with the start codon of the downstream ORF. A remnant tRNASec sequence was found in the Sinorhizobium meliloti selB genes whose products have a shorter C-terminal extension. Similar overlapping traits were found in Gammaproteobacteria and Nitrospirae. I hypothesized that once the tRNASec moiety is folded and processed, the expression of the full-length SelB may be repressed. This is the first report on a nested tRNA gene inside a protein ORF in bacteria.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号