首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28742篇
  免费   4277篇
  国内免费   3406篇
电工技术   1179篇
技术理论   4篇
综合类   2906篇
化学工业   403篇
金属工艺   634篇
机械仪表   1552篇
建筑科学   627篇
矿业工程   333篇
能源动力   229篇
轻工业   226篇
水利工程   204篇
石油天然气   387篇
武器工业   218篇
无线电   7436篇
一般工业技术   1474篇
冶金工业   304篇
原子能技术   120篇
自动化技术   18189篇
  2024年   65篇
  2023年   538篇
  2022年   794篇
  2021年   1042篇
  2020年   1157篇
  2019年   889篇
  2018年   860篇
  2017年   1152篇
  2016年   1296篇
  2015年   1572篇
  2014年   2606篇
  2013年   2266篇
  2012年   2565篇
  2011年   2478篇
  2010年   1876篇
  2009年   1797篇
  2008年   2038篇
  2007年   2182篇
  2006年   1656篇
  2005年   1583篇
  2004年   1280篇
  2003年   1124篇
  2002年   831篇
  2001年   716篇
  2000年   436篇
  1999年   354篇
  1998年   261篇
  1997年   205篇
  1996年   181篇
  1995年   163篇
  1994年   124篇
  1993年   59篇
  1992年   59篇
  1991年   34篇
  1990年   44篇
  1989年   29篇
  1988年   27篇
  1987年   14篇
  1986年   12篇
  1985年   13篇
  1984年   8篇
  1983年   9篇
  1982年   8篇
  1980年   6篇
  1979年   5篇
  1977年   4篇
  1976年   1篇
  1975年   1篇
  1972年   2篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 25 毫秒
1.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。  相似文献   
2.
3.
移动边缘云是公司“云+5G”双引擎战略的最佳契合点,边缘网络是发挥移动云“大云”产品和5G网络融合优势,实现云网统筹、构建运营商“连接+计算”核心能力的关键。运营商传统接入网存在云网割裂、分段入云和组网复杂等突出问题,难以适应边缘业务敏捷交付要求。本文通过深入分析边缘云业务特征和技术架构,对标业界主流云商建设实践,研究基于云网PoP网的边缘网络建设思路,创新性提出云网一体化规划设计和建设交付流程变革,基于云网POP统一网络和业务锚点,构建Overlay和Underlay融合双层加速网络架构,探索Spine-leaf化的新型城域接入网实现L3下沉和弹性扩容等方法,实现“云+网+应用”一体化敏捷交付的边缘网络能力。  相似文献   
4.
Understanding the mechanisms leading to the rise and dissemination of antimicrobial resistance (AMR) is crucially important for the preservation of power of antimicrobials and controlling infectious diseases. Measures to monitor and detect AMR, however, have been significantly delayed and introduced much later after the beginning of industrial production and consumption of antimicrobials. However, monitoring and detection of AMR is largely focused on bacterial pathogens, thus missing multiple key events which take place before the emergence and spread of AMR among the pathogens. In this regard, careful analysis of AMR development towards recently introduced antimicrobials may serve as a valuable example for the better understanding of mechanisms driving AMR evolution. Here, the example of evolution of tet(X), which confers resistance to the next-generation tetracyclines, is summarised and discussed. Initial mechanisms of resistance to these antimicrobials among pathogens were mostly via chromosomal mutations leading to the overexpression of efflux pumps. High-level resistance was achieved only after the acquisition of flavin-dependent monooxygenase-encoding genes from the environmental microbiota. These genes confer resistance to all tetracyclines, including the next-generation tetracyclines, and thus were termed tet(X). ISCR2 and IS26, as well as a variety of conjugative and mobilizable plasmids of different incompatibility groups, played an essential role in the acquisition of tet(X) genes from natural reservoirs and in further dissemination among bacterial commensals and pathogens. This process, which took place within the last decade, demonstrates how rapidly AMR evolution may progress, taking away some drugs of last resort from our arsenal.  相似文献   
5.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
6.
《Ceramics International》2022,48(8):10592-10600
Zinc oxide is widely used in gas sensors, solar cells, and photocatalysts because of its wide bandgap and exciton binding energy of 60 meV in various metal oxides. To use ZnO as a gas sensor, it is necessary to synthesize it with surface defects and a large specific surface area. In this study, hydrothermal synthesis without surfactants was employed to obtain organic-additive-free ZnO. For morphology control, we varied the ratio of the hydroxide ion concentration to the zinc ion concentration. To confirm the growth mechanism of ZnO, we performed X-ray diffraction, scanning electron microscopy, and transmission electron microscopy analyses. Raman spectroscopy and photoluminescence measurements were performed to analyze the surface properties. The Brunauer–Emmett–Teller method and probe stations were used to measure the specific surface area and sensitivity of the gas sensor, respectively. The results confirmed that flower-shaped ZnO is the most suitable gas-sensing material.  相似文献   
7.
A random placement of large-scale sensor network in the outdoor environment often causes low coverage.An area coverage optimization algorithm of mobile sensor network (MSN) based on virtual force perturbation and Cuckoo search (VF-CS) was proposed.Firstly,the virtual force of the sensor nodes within the Thiessen polygon was analyzed based on the partitioning of Voronoi diagram of the monitoring area.Secondly,the force of polygon vertices and neighbor nodes was taken as the perturbation factor for updating the node’s location of the Cuckoo search (CS).Finally,the VF-CS guided the node to move so as to achieve the optimal coverage.The simulation results demonstrate that the proposed algorithm has higher coverage and shorter average moving distance of nodes than the Voronoi diagram based algorithms in literatures.  相似文献   
8.
为了精确地评价纱线的表观条干均匀性,提出一种基于亚像素边缘检测的纱线条干均匀度检测方法。首先通过图像采集装置获取纱线图像;然后对纱线图像进行亚像素边缘检测获取纱线边缘点集;利用开运算对获取的边缘点集进行处理,进而获得纱线条干的边缘;最后采用坐标直方图方法计算纱线平均直径和条干CV值。为验证方法的有效性和准确性,对多种不同线密度的纯棉纱线进行测试,并将测试结果与电容式条干仪的均匀度检测及基于模糊C均值分类和Otsu图像法的检测结果进行了对比。结果表明:基于亚像素边缘检测的纱线条干均匀度检测方法与电容式的测量结果有着较好的一致性,证明所提方法可得到准确的结果。  相似文献   
9.
云计算应用层中的组合服务具有演化属性,因此,隐私数据在服务组合过程中,用户的隐私数据可能会因为服务或服务流程的演化而暴露。根据服务演化的特征,以描述逻辑为基础,提出了一种面向云计算应用层演化的隐私保护方法。对隐私协议进行形式化描述;根据服务的演化特征,对服务的演化进行监控,保证满足用户的隐私需求;利用实例研究证明该方法的正确性与可行性。  相似文献   
10.
面对三维空间移动机器人从起始点到终止点的最短路径问题,提出一种新型的边缘点树启发式搜索(TreeEP)算法,该方法将地图空间进行密度可调的三维离散化处理,根据障碍安全距离筛选出障碍物的可靠边缘点信息,再利用树扩散架构选出最能引导搜索方向的潜力点进行扩散搜索,最终得出最短路径。提出局部调整策略,得到改进的Tree-EP算法。实验结果表明,在带障碍复杂地形最短路径搜索应用中,提出的Tree-EP算法与已有方法相比,能找到更短的移动路径。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号