首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5284篇
  免费   675篇
  国内免费   564篇
电工技术   419篇
综合类   641篇
化学工业   147篇
金属工艺   55篇
机械仪表   226篇
建筑科学   302篇
矿业工程   72篇
能源动力   116篇
轻工业   40篇
水利工程   235篇
石油天然气   147篇
武器工业   70篇
无线电   621篇
一般工业技术   305篇
冶金工业   117篇
原子能技术   37篇
自动化技术   2973篇
  2024年   8篇
  2023年   61篇
  2022年   69篇
  2021年   92篇
  2020年   102篇
  2019年   133篇
  2018年   97篇
  2017年   137篇
  2016年   143篇
  2015年   175篇
  2014年   241篇
  2013年   287篇
  2012年   310篇
  2011年   362篇
  2010年   308篇
  2009年   356篇
  2008年   384篇
  2007年   479篇
  2006年   368篇
  2005年   356篇
  2004年   283篇
  2003年   261篇
  2002年   219篇
  2001年   157篇
  2000年   145篇
  1999年   133篇
  1998年   111篇
  1997年   124篇
  1996年   107篇
  1995年   81篇
  1994年   94篇
  1993年   73篇
  1992年   47篇
  1991年   48篇
  1990年   23篇
  1989年   29篇
  1988年   22篇
  1987年   15篇
  1986年   6篇
  1985年   11篇
  1984年   9篇
  1983年   7篇
  1982年   6篇
  1981年   6篇
  1980年   5篇
  1979年   3篇
  1978年   3篇
  1976年   3篇
  1974年   3篇
  1955年   3篇
排序方式: 共有6523条查询结果,搜索用时 15 毫秒
1.
针对轴承振动实时状态监控的需要,从符号动力学角度提出了符号聚合近似与Lempel-ziv复杂度(SAX-LZC)融合的振动监控参数。首先,以Logistic映射和Duffing方程为对象,从理论角度验证了SAX-LZC对动力学结构表征的准确性,并验证了该指标的抗噪能力和计算效率;其次,将SAX-LZC指标与信息熵、样本熵、多分段Lempel-ziv复杂度等动力学参数性能进行了综合对比;最后,从实验角度对轴承早期微弱异常进行了监测,并对轴承典型故障进行了特征提取。理论研究结果表明,SAX-LZC具有动力学结构表征准确、抗噪能力好、计算高效简洁等优点,克服了常规动力学参数工程应用能力弱的问题。实验研究结果表明,SAX-LZC对早期微弱异常有准确的监测,对不同种类故障具有较好的区分度,弥补了时域和频域对轴承微弱故障表征能力不足的缺陷,是一种轴承振动实时状态监控与故障特征提取的有效参数。  相似文献   
2.
在高性能计算领域,数据流是一类重要的计算结构,也在很多实际场景表现出很好的性能和适用性。在数据流计算模式中,程序是以数据流图来表示的,数据流计算中一个关键的问题是如何将数据流图映射到多个执行单元上。通过分析现有数据流结构的指令映射方法及其不足,提出了基于数据流结构的新型指令映射优化方法。主要是根据多地址共享数据包的特性对指令映射方法进行优化,延迟多地址共享数据路由包的拆分,减少网络拥堵。  相似文献   
3.
针对电子商务顾客购物人工系统的计算实验研究,提出一种基于状态类比假说的人工情绪模型,给出了情绪的产生、增强、衰落和消失过程的描述方法,研究了外部刺激、情感强度和内部驱动力的计算方法,并进行了模拟分析。基于此人工情绪模型,构建了电商顾客购物的情绪-行为影响关系模型;将其应用于电商顾客购物的计算实验分析。结果表明,该人工情绪模型能较好地应用于电商复杂人工系统顾客购物的计算实验。  相似文献   
4.
ContextMemory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security errors are important tasks of software testing for improving the quality and reliability of software in practice.ObjectiveThis paper presents a goal-oriented testing approach for effectively and efficiently exploring security vulnerability errors. A goal is a potential safety violation and the testing approach is to automatically generate test inputs to uncover the violation.MethodWe use type inference analysis to diagnose potential safety violations and dynamic symbolic execution to perform test input generation. A major challenge facing dynamic symbolic execution in such application is the combinatorial explosion of the path space. To address this fundamental scalability issue, we employ data dependence analysis to identify a root cause leading to the execution of the goal and propose a path exploration algorithm to guide dynamic symbolic execution for effectively discovering the goal.ResultsTo evaluate the effectiveness of our proposed approach, we conducted experiments against 23 buffer overflow vulnerabilities. We observed a significant improvement of our proposed algorithm over two widely adopted search algorithms. Specifically, our algorithm discovered security vulnerability errors within a matter of a few seconds, whereas the two baseline algorithms failed even after 30 min of testing on a number of test subjects.ConclusionThe experimental results highlight the potential of utilizing data dependence analysis to address the combinatorial path space explosion issue faced by dynamic symbolic execution for effective security testing.  相似文献   
5.
Colors can be characterized by three main attributes: hue, value, and saturation. But colors also exhibit other phenomenological qualities. In this study, we identify one such secondary attribute of color: perceived density. We discuss the prevalence of dense colors in Japan starting from the “48 Teas and 100 Mice” colors of the Edo period, and develop the concept of perceived density through this aspect of Japanese color preference. When vivid colors were forbidden to commoners during the Edo period, subtle variations of brownish and grayish colors were created. These colors with base tones were not salient, yet they looked dense. Muted colors with paradoxical richness are still common in Japan today. Japanese commodity design often uses muddy colors with white or gray undertones, and deep colors with black undertones. Together they form distinct groupings of relatively dense color. The perceived density of color corresponds to how dense and filled, or thin and airy a color appears. Colors of higher perceived density appear to be more packed and to have mass. Perceived density of color is unusual in that it does not have a monotonic relationship with one of the primary perceptual attributes. High apparent density is observed in a central region of an equi‐hue plane where value or saturation are at intermediate values. We consider two possible explanations of how high values of density can coincide with middling values of value and saturation: characteristics of the spectral reflectance curves, or the complexity of the neural signals that underlie the emergent property.  相似文献   
6.
能源和化学品价格的快速上涨使得制浆工作者尤为关注如何降低纸浆漂白成本。本研究构建了纸浆漂白成本的在线计算模型,并应用于典型ECF漂白技术(D0EpPD1),同时系统分析了影响纸浆漂白成本的主要因素和该模型在漂白工艺条件优化过程中的应用效果。研究发现,化学品成本是影响漂白成本的最主要因素,其次是能源成本、废水处理成本、清水成本;化学品中ClO2用量对纸浆漂白成本的影响最大,其次是H2O2用量,NaOH用量影响最小;能源成本中蒸汽用量对纸浆漂白成本影响最大;而清水成本和废水处理成本影响最小;通过对化学品用量、漂白温度等漂白工艺条件的调整可降低纸浆漂白成本;该模型可实现对漂白工艺条件的优化或能源及化学品价格变化后纸浆漂白成本的在线预测,也是实现纸浆漂白系统全局优化、进一步降低漂白成本的基础。  相似文献   
7.
López-Alt et al.(STOC12)put forward a primitive called multi-key fully homomorphic encryption(MKFHE),in which each involved party encrypts their own data using keys that are independently and randomly chosen whereby arbitrary computations can be performed on these encrypted data by a final collector.Subsequently,several superior schemes based on the standard assumption(LWE)were proposed.Most of these schemes were constructed by expanding a fresh GSW-ciphertext or BGV-ciphertext under a single key to a new same-type ciphertext of the same message under a combination of associated parties’keys.Therefore,the new ciphertext’s size grew more or less linearly with an increase in the number of parties.In this paper,we proposed a novel and simple scheme of MKFHE based on LWE without increasing the size of the ciphertext in the two non-collusion server model.In other words,each party first independently shares their own data between two servers and each server only needs a one-round communication with another to construct a ciphertext of the same plaintext under a sum of associated parties’keys.Our new ciphertext under multiple keys has the same size as that of the original one with only one-round communication between two servers.The communication complexity is O(kmlogq)-bit,where k is the number of input ciphertexts involved,m is the size of a GSW-ciphertext and q is a modulus.In conclusion,we proved that our scheme is CPA-secure against semi-honest adversaries.  相似文献   
8.
The essential requirement for precise localization of a self-driving car is a lane-level map which includes road markings (RMs). Obviously, we can build the lane-level map by running a mobile mapping system (MMS) which is equipped with a high-end 3D LiDAR and a number of high-cost sensors. This approach, however, is highly expensive and ineffective since a single high-end MMS must visit every place for mapping. In this paper, a lane-level RM mapping system using a monocular camera is developed. The developed system can be considered as an alternative to expensive high-end MMS. The developed RM map includes the information of road lanes (RLs) and symbolic road markings (SRMs). First, to build a lane-level RM map, the RMs are segmented at pixel level through the deep learning network. The network is named RMNet. The segmented RMs are then gathered to build a lane-level RM map. Second, the lane-level map is improved through loop-closure detection and graph optimization. To train the RMNet and build a lane-level RM map, a new dataset named SeRM set is developed. The set is a large dataset for lane-level RM mapping and it includes a total of 25157 pixel-wise annotated images and 21000 position labeled images. Finally, the proposed lane-level map building method is applied to SeRM set and its validity is demonstrated through experimentation.   相似文献   
9.
反倾岩石边坡变形破坏试验及有限元分析   总被引:4,自引:0,他引:4  
根据相似理论建立地质力学模型,研究反倾层状边坡岩体的变形破坏机制。介绍了模型试验的设计和过程,研究了原型边坡的变形破坏机制和岩层倾角对边坡稳定性的影响。同时进行了Ansys模拟计算。通过比较这两种研究方法的结果,发现反倾层状边坡岩体的变形机制为倾倒变形,破坏模式为弯折破坏;破坏首先在坡顶产生,边坡变形加速的过程是在开挖结束一段时间后才出现;岩层倾角的变化对反倾边坡的变形影响不敏感,但对边坡变形加速持续时间的长短有较大的影响,岩层倾角越小,变形加速所持续的时间越长。  相似文献   
10.
无论是解算通风网路还是进行通风系统稳定性分析,都必须考虑自然风压的影响。当自然风压以能量源形式考虑时,必须将自然风压放置在网孔中适当的分支上,否则将导致计算结果的失真,或得出错误的风流稳定性判别式。本文给出一种在网孔中正确表示自然风压的方法,以保证网路解算结果的正确性和通风系统稳定性分析结论的合理性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号