首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18182篇
  免费   3294篇
  国内免费   2196篇
电工技术   4027篇
技术理论   1篇
综合类   1861篇
化学工业   301篇
金属工艺   124篇
机械仪表   877篇
建筑科学   467篇
矿业工程   173篇
能源动力   522篇
轻工业   108篇
水利工程   332篇
石油天然气   140篇
武器工业   144篇
无线电   2841篇
一般工业技术   786篇
冶金工业   291篇
原子能技术   61篇
自动化技术   10616篇
  2024年   59篇
  2023年   387篇
  2022年   611篇
  2021年   771篇
  2020年   807篇
  2019年   698篇
  2018年   620篇
  2017年   800篇
  2016年   885篇
  2015年   1009篇
  2014年   1326篇
  2013年   1182篇
  2012年   1311篇
  2011年   1222篇
  2010年   1009篇
  2009年   1074篇
  2008年   1188篇
  2007年   1245篇
  2006年   1032篇
  2005年   1051篇
  2004年   937篇
  2003年   736篇
  2002年   653篇
  2001年   535篇
  2000年   434篇
  1999年   346篇
  1998年   276篇
  1997年   232篇
  1996年   199篇
  1995年   209篇
  1994年   176篇
  1993年   114篇
  1992年   114篇
  1991年   90篇
  1990年   54篇
  1989年   47篇
  1988年   39篇
  1987年   20篇
  1986年   29篇
  1985年   32篇
  1984年   21篇
  1983年   16篇
  1982年   16篇
  1981年   9篇
  1980年   14篇
  1979年   8篇
  1978年   10篇
  1977年   4篇
  1976年   4篇
  1975年   3篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
根据煤矿井下的安全防爆要求,天线的射频发射功率受到严格限制,导致煤矿5G的基站部署密度显著高于地面场景。为了解决由此引发的交叉覆盖问题,本文提出了煤矿5G分布式MIMO组网技术,利用分布在不同位置的天线实现对用户数据的联合并行发送,不仅避免了由交叉覆盖导致的乒乓切换等负面效应,还提升了边缘区域的信号覆盖效果。在乌兰木伦煤矿的300米采煤工作面内,利用分布式MIMO组网技术实现了5G信号的无边界覆盖,上行速率不低于500Mbps,保障了煤机数据的实时有效传输。  相似文献   
2.
In this paper, we strive to propose a self-interpretable framework, termed PrimitiveTree, that incorporates deep visual primitives condensed from deep features with a conventional decision tree, bridging the gap between deep features extracted from deep neural networks (DNNs) and trees’ transparent decision-making processes. Specifically, we utilize a codebook, which embeds the continuous deep features into a finite discrete space (deep visual primitives) to distill the most common semantic information. The decision tree adopts the spatial location information and the mapped primitives to present the decision-making process of the deep features in a tree hierarchy. Moreover, the trained interpretable PrimitiveTree can inversely explain the constituents of the deep features, highlighting the most critical and semantic-rich image patches attributing to the final predictions of the given DNN. Extensive experiments and visualization results validate the effectiveness and interpretability of our method.  相似文献   
3.
We propose a general framework to study the relationship between the price of a painting and its color‐related attributes. To this end we focus on four key aspects: dominant colors, features of the color palette, color harmony, and color emotions. We demonstrate the usefulness of this approach with an example based on Mark Rothko's post‐1950 paintings (the “rectangular” series), and auction data from the 1994 to 2018 period. We identify two distinct price‐color regimes in Rothko's market: (a) [1994‐2005], a period in which prices are explained mainly by the growing popularity of the artist regardless of the color attributes of the paintings sold; and (b) [2006‐2018], a period in which color‐related attributes explain most of the prices. Furthermore, we find that in this second period, the dominant colors and the diversity of the color palette, are by far the most relevant attributes that influence the price; color harmony and color emotions hold almost no explanatory power during this period. Finally, we propose a new metric based on the Herfindahl Index to describe color diversity; this metric seems to be promising at characterizing the effect of the color palette on the price of a painting.  相似文献   
4.
5.
This paper investigates the state estimation issue for a class of wireless sensor networks (WSNs) with the consideration of limited energy resources. First, a multirate estimation model is established, and then, a new event‐triggered two‐stage information fusion algorithm is developed based on the optimal fusion criterion weighted by matrices. Compared with the existing methods, the presented fusion algorithm can significantly reduce the communication cost in WSNs and save energy resources of sensors efficiently. Furthermore, by presetting a desired containment probability over the interval [0,1] with the developed event‐triggered mechanism, one can obtain a suitable compromise between the communication cost and the estimation accuracy. Finally, a numerical simulation for the WSN tracking system is given to demonstrate the effectiveness of the proposed method.  相似文献   
6.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
7.
For decades now, Douglas Crimp’s landmark 1980 essay ‘The Photographic Activity of Postmodernism’ has shaped our understanding of modernism’s aftermath, at least as it unfolded in North America and Western Europe. Less remembered, however, is the degree to which the procedures of disjunction, copying, appropriation, and outright theft that he highlighted were epitomised not just by contemporary photography, but by photomontage in particular. This article recovers the debates that led critics such as Crimp, Abigail Solomon-Godeau, Christopher Phillips, Benjamin Buchloh and others to turn to photomontage as one of their principal objects of concern in what became known as the postmodern critique of photography. Why was montage tasked to perform this critical function, particularly by people around the journal October who had not otherwise devoted the balance of their writing to photography’s history? The article suggests that these men and women, along with the contemporary artists they foregrounded, manifested what Mary Anne Doane has called a ‘desire for signification’, a reaction in the late 1970s against the mute theatricality of minimalist and conceptual art. Photomontage reintroduced representation to contemporary art and to the canon of art history. But unlike the reemerging illusionism in painting that also manifested this desire, montage guarded against an uncomplicated realism by highlighting and critiquing operations of representation in a manner that painting no longer could.  相似文献   
8.
针对新闻文本领域,该文提出一种基于查询的自动文本摘要技术,更加有针对性地满足用户信息需求。根据句子的TF-IDF、与查询句的相似度等要素,计算句子权重,并根据句子指示的时间给定不同的时序权重系数,使得最近发生的新闻内容具有更高的权重,最后使用最大边界相关的方法选择摘要句。通过与基于TF-IDF、Text-Rank、LDA等六种方法的对比,该摘要方法ROUGE评测指标上优于其他方法。从结合评测结果及摘要示例可以看出,该文提出的方法可以有效地从新闻文档集中摘取核心信息,满足用户查询内容的信息需求。  相似文献   
9.
The operational environment can be a valuable source of information about the behavior of software applications and their usage context. Although a single instance of an application has limited evidence of the range of the possible behaviors and situations that might be experienced in the field, the collective knowledge composed by the evidence gathered by the many instances of a same application running in several diverse user environments (eg, a browser) might be an invaluable source of information. This information can be exploited by applications able to autonomously analyze how they behave in the field and adjust their behavior accordingly. Augmenting applications with the capability to collaborate and directly share information about their behavior is challenging because it requires the definition of a fully decentralized and dependable networked infrastructure whose nodes are the user machines. The nodes of the infrastructure must be collaborative, to share information, and autonomous, to exploit the available information to change their behavior, for instance, to better accommodate the needs of the users to prevent known problems. This paper describes the initial results that we obtained with the design and the development of an infrastructure that can enable the execution of collaborative scenarios in a fully decentralized way. Our idea is to combine the agent-based paradigm, which is well suited to design collaborative and autonomous nodes, and the peer-to-peer paradigm, which is well suited to design distributed and dynamic network infrastructures. To demonstrate our idea, we augmented the popular JADE agent-based platform with a software layer that supports both the creation of a fully decentralized peer-to-peer network of JADE platforms and the execution of services within that network, thus enabling JADE multiagent systems (MASs) to behave as peer-to-peer networks. The resulting platform can be used to study the design of collaborative applications running in the field.  相似文献   
10.
Numerical simulation techniques such as Finite Element Analyses are essential in today's engineering design practices. However, comprehensive knowledge is required for the setup of reliable simulations to verify strength and further product properties. Due to limited capacities, design-accompanying simulations are performed too rarely by experienced simulation engineers. Therefore, product models are not sufficiently verified or the simulations lead to wrong design decisions, if they are applied by less experienced users. This results in belated redesigns of already detailed product models and to highly cost- and time-intensive iterations in product development.Thus, in order to support less experienced simulation users in setting up reliable Finite Element Analyses, a novel ontology-based approach is presented. The knowledge management tools developed on the basis of this approach allow an automated acquisition and target-oriented provision of necessary simulation knowledge. This knowledge is acquired from existing simulation models and text-based documentations from previous product developments by Text and Data Mining. By offering support to less experienced simulation users, the presented approach may finally lead to a more efficient and extensive application of reliable FEA in product development.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号