首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252094篇
  免费   3775篇
  国内免费   1045篇
电工技术   4329篇
综合类   202篇
化学工业   37132篇
金属工艺   8219篇
机械仪表   7263篇
建筑科学   6785篇
矿业工程   541篇
能源动力   7237篇
轻工业   28640篇
水利工程   2120篇
石油天然气   1852篇
武器工业   5篇
无线电   33393篇
一般工业技术   46181篇
冶金工业   46476篇
原子能技术   3366篇
自动化技术   23173篇
  2021年   1801篇
  2020年   1346篇
  2019年   1667篇
  2018年   2573篇
  2017年   2593篇
  2016年   2877篇
  2015年   2164篇
  2014年   3655篇
  2013年   11956篇
  2012年   6754篇
  2011年   9669篇
  2010年   7444篇
  2009年   8397篇
  2008年   8917篇
  2007年   8931篇
  2006年   8282篇
  2005年   7485篇
  2004年   7208篇
  2003年   7093篇
  2002年   6597篇
  2001年   7021篇
  2000年   6325篇
  1999年   6823篇
  1998年   16381篇
  1997年   11368篇
  1996年   8582篇
  1995年   6546篇
  1994年   5712篇
  1993年   5569篇
  1992年   3997篇
  1991年   3776篇
  1990年   3548篇
  1989年   3370篇
  1988年   3276篇
  1987年   2590篇
  1986年   2487篇
  1985年   3158篇
  1984年   2798篇
  1983年   2559篇
  1982年   2344篇
  1981年   2390篇
  1980年   2202篇
  1979年   2048篇
  1978年   1879篇
  1977年   2176篇
  1976年   2725篇
  1975年   1584篇
  1974年   1491篇
  1973年   1558篇
  1972年   1144篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Reversible watermarking scheme with image-independent embedding capacity   总被引:1,自引:0,他引:1  
Permanent distortion is one of the main drawbacks of all the irreversible watermarking schemes. Attempts to recover the original signal after the signal passes the authentication process are being made, starting just a few years ago. Some common problems, such as salt-and-pepper artefacts owing to intensity wraparound and low embedding capacity, can now be resolved. However, some significant problems remain unsolved. First, the embedding capacity is signal-dependent, i.e., capacity varies significantly depending on the nature of the host signal. The direct impact of this is compromised security for signals with low capacity. Some signals may be even non-embeddable. Secondly, while seriously tackled in irreversible watermarking schemes, the well-known problem of block-wise dependence, which opens a security gap for the vector quantisation attack and transplantation attack, are not addressed by researchers of the reversible schemes. This work proposes a reversible watermarking scheme with near-constant signal-independent embedding capacity and immunity to the vector quantisation attack and transplantation attack.  相似文献   
992.
Summary The thermal properties of an epoxy resin (diglycidyl ether Bisphenol A, DGEBA) cured with a primary amine (ethylenediamine, ETDA) and filled with 10, 20 and 30 wt. % of ultra fine copper particles were analyzed. The thermal results were evaluated by means of the Romero-Garcia method, which allowed to obtain the resin degradation kinetic parameters, as well as the possible decomposition mechanism. From the obtained results is possible to infer that higger copper content strongly affects the degradation process of the epoxy resin, which causes a drop off on the composites thermal stability. This behavior could be attributed to water presence, being this effect less pronounced for the resin with 10 wt. % copper and unfilled resin. Regarding to decomposition mechanism, three way transport showed the best correlation for all samples.  相似文献   
993.
Scaling System-Level Science: Scientific Exploration and IT Implications   总被引:1,自引:0,他引:1  
Foster  I. Kesselman  C. 《Computer》2006,39(11):31-39
The study and creation of the infrastructure required to enable system-level science--the integration of diverse sources of knowledge about the constituent parts of a complex system with the goal of obtaining an understanding of the system's properties as a whole--is becoming increasingly important, spawning new knowledge in variety of fields at a rapid pace.  相似文献   
994.
995.
996.
Abstract This paper outlines the work of the Conceptual Change in Science project, funded as part of the ESRC InTER programme. The aims of this research project are to clarify and describe the process of change in learners' conceptual understandings of natural phenomena. The domain of reasoning selected for study is that of mechanics. Computer software which may be useful in exploring and developing pupils' reasoning and promoting conceptual change in this domain is being developed and evaluated. The group that is carrying out the research is based at the Universities of Leeds, Glasgow and the Open University.  相似文献   
997.
998.
Fingerprint scanners may be susceptible to spoofing using artificial materials, or in the worst case, dismembered fingers. An anti-spoofing method based on liveness detection has been developed for use in fingerprint scanners. This method quantifies a specific temporal perspiration pattern present in fingerprints acquired from live claimants. The enhanced perspiration detection algorithm presented here improves our previous work by including other fingerprint scanner technologies; using a larger, more diverse data set; and a shorter time window. Several classification methods were tested in order to separate live and spoof fingerprint images. The dataset included fingerprint images from 33 live subjects, 33 spoofs created with dental material and Play-Doh, and fourteen cadaver fingers. Each method had a different performance with respect to each scanner and time window. However, all the classifiers achieved approximately 90% classification rate for all scanners, using the reduced time window and the more comprehensive training and test sets.  相似文献   
999.
The construction of a microcomputer-controlled electrode switch for use in potentiometric determinations is described. This can be coupled to most of the analytical equipment usually found in laboratories, to enable a setting up of automatic systems capable of performing sequential determinations with several ion-selective electrodes. The assessment of its analytical usage and behaviour are discussed.  相似文献   
1000.
Access path deployment is a critical issue in physical database design. Access paths typically include a clustered index as the primary access path and a set of secondary indexes as auxiliary access paths. To deploy the right access paths requires an effective algorithm and accurate estimation of the parameters used by the algorithm. One parameter central to any index-selection algorithm is the block selectivity of a query. Existing methods for estimating block selectivities are limited by restrictive assumptions. Furthermore, most existing methods produce estimates useful for aiding the selection of secondary indexes only. Little research has been done in the area of estimating block selectivities for supporting the selection of the clustered index. The paper presents a set of methods that do not depend on any specific assumption, produce accurate estimates, and can be used to aid in selecting the clustered index as well as secondary indexes  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号