首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7109篇
  免费   501篇
  国内免费   22篇
电工技术   75篇
综合类   13篇
化学工业   1170篇
金属工艺   91篇
机械仪表   117篇
建筑科学   140篇
矿业工程   17篇
能源动力   334篇
轻工业   416篇
水利工程   40篇
石油天然气   93篇
无线电   440篇
一般工业技术   790篇
冶金工业   3252篇
原子能技术   46篇
自动化技术   598篇
  2024年   9篇
  2023年   112篇
  2022年   201篇
  2021年   255篇
  2020年   206篇
  2019年   218篇
  2018年   258篇
  2017年   218篇
  2016年   284篇
  2015年   197篇
  2014年   266篇
  2013年   373篇
  2012年   215篇
  2011年   221篇
  2010年   180篇
  2009年   166篇
  2008年   134篇
  2007年   116篇
  2006年   95篇
  2005年   92篇
  2004年   79篇
  2003年   54篇
  2002年   45篇
  2001年   53篇
  2000年   42篇
  1999年   158篇
  1998年   1063篇
  1997年   623篇
  1996年   408篇
  1995年   191篇
  1994年   204篇
  1993年   206篇
  1992年   38篇
  1991年   27篇
  1990年   39篇
  1989年   39篇
  1988年   35篇
  1987年   27篇
  1986年   26篇
  1985年   25篇
  1984年   14篇
  1983年   16篇
  1982年   28篇
  1981年   22篇
  1980年   28篇
  1978年   14篇
  1977年   96篇
  1976年   172篇
  1975年   11篇
  1974年   8篇
排序方式: 共有7632条查询结果,搜索用时 15 毫秒
131.
Microsystem Technologies - This paper presents a critical analysis of the meta-heuristic techniques used in various researches on the optimisation of photovoltaic (PV) parameters, which involves...  相似文献   
132.
We propose a novel pose-invariant face recognition approach which we call Discriminant Multiple Coupled Latent Subspace framework. It finds the sets of projection directions for different poses such that the projected images of the same subject in different poses are maximally correlated in the latent space. Discriminant analysis with artificially simulated pose errors in the latent space makes it robust to small pose errors caused due to a subject’s incorrect pose estimation. We do a comparative analysis of three popular latent space learning approaches: Partial Least Squares (PLSs), Bilinear Model (BLM) and Canonical Correlational Analysis (CCA) in the proposed coupled latent subspace framework. We experimentally demonstrate that using more than two poses simultaneously with CCA results in better performance. We report state-of-the-art results for pose-invariant face recognition on CMU PIE and FERET and comparable results on MultiPIE when using only four fiducial points for alignment and intensity features.  相似文献   
133.
One of the most common difficulties arising when building roads and railway lines in seacoast areas is the high watertable in these regions. Among the applied dewatering methods, the most effective seems to be vertical drainage permanently lowering the level of underground water. Application of this method has also been carried out in Iraq. One should consider the fact that the vertical drainage method permits dewatering of not only the existing targets but also the areas designated for new construction. Lowering the watertable allows stabilization of the bed, and that secures stability and resistance of the foundation. The vertical drainage system depends upon underground water intake flowing to the drains from the directions of watershed in order to avoid its damming up under the building site. Dewatering according to the drainage system is much more efficient than open drain systems applied until now. From the technical point of view the system under discussion is much easier to operate, it consumes, less time and at the same time limits the number of people employed, workmen, engineers, and engineering equipment. Moreover, it has the advantage of dispensing with the expenses connected with the construction of passes and bridges, which are indispensable when the open drain ditches systems are applied. One opening of the proposed drainage may drain about 50 ha. The method is much more economical and much more efficient provided the whole drainage system is properly planned, and properly executed.  相似文献   
134.
In this study, we prepared a novel series of diester-functionalized cationic gemini surfactants (Cm-E2O2-Cm) containing ethylene oxide as a spacer with varying alkyl chain lengths and characterized by 1H NMR, FT-IR, elemental analysis, and ESI-MS. The physicochemical properties of the geminis were explored by tensiometry, fluorescence, dye solubilization, and Krafft point. These geminis acquire superior surface activity than the conventional surfactants. Fluorescence spectroscopy analysis affirmed that the micropolarity and aggregation number of micelles diminished with increase in the alkyl chain length. These geminis represent a new group of amphiphiles of considerably high biodegradability, better cleavability, and low toxicity as assessed by BOD test, FT-IR analysis, and HC50 analysis, respectively. They also showed significant level of antimicrobial activity toward some specified bacterial strains of Gram-positive and Gram-negative by using agar well diffusion method. Furthermore, the thermogravimetric analysis provided information regarding thermal stabilities of the newly synthesized gemini surfactants.  相似文献   
135.
Journal of Computational Electronics - In this work, a Schottky junction on the drain side employing low workfunction (WF) metal is proposed as a method to suppress the OFF-state leakage in...  相似文献   
136.
A laser-based light attenuation technique was successfully used to measure interfacial areas as high as 5832 m2/m3 and Sauter mean bubble diameter varying between 50 and 5600 μm. Good agreement between this approach and the photographic technique was obtained particularly at low gas holdups.  相似文献   
137.
Silhouette-based human action recognition using SAX-Shapes   总被引:1,自引:0,他引:1  
Human action recognition is an important problem in Computer Vision. Although most of the existing solutions provide good accuracy results, the methods are often overly complex and computationally expensive, hindering practical applications. In this regard, we introduce the combination of time-series representation for the silhouette and Symbolic Aggregate approXimation (SAX), which we refer to as SAX-Shapes, to address the problem of human action recognition. Given an action sequence, the extracted silhouettes of an actor from every frame are transformed into time series. Each of these time series is then efficiently converted into the symbolic vector: SAX. The set of all these SAX vectors (SAX-Shape) represents the action. We propose a rotation invariant distance function to be used by a random forest algorithm to perform the human action recognition. Requiring only silhouettes of actors, the proposed method is validated on two public datasets. It has an accuracy comparable to the related works and it performs well even in varying rotation.  相似文献   
138.
Miniemulsification technology was used to encapsulate TiO2 particles inside a styrene/n‐butyl acrylate copolymer with high loading levels (11 to 70% PVC (pigment volume concentration)). In this approach, a St/BA copolymer dissolved in toluene in the presence of a costabilizer (hexadecane) was mixed with a dispersion of TiO2 particles in toluene and sonified, and then emulsified in an aqueous surfactant solution by sonification. The effect of sonification time on both the dispersibility of the TiO2 particles in the presence of the copolymer and hexadecane and on the encapsulated particle size was investigated. Particle size analysis by dynamic light scattering showed that these composite latexes are quite stable. It was also found that as the TiO2 loading increased from 11 to 43% PVC, the particle size of the TiO2 dispersion decreased while the polymer‐encapsulated TiO2 particle size increased. The effect of surfactant concentration (sodium lauryl sulfate, SLS) on the encapsulated particle size was investigated using four different SLS concentrations in the 11% PVC system. The results showed that as the SLS concentration increased the particle size decreased, as expected. Also it was found that the minimum surfactant concentration that gives stable encapsulated TiO2 particles is above 10 mM SLS. The role of HD in the recipe was studied for an artificial latex containing no TiO2 and one prepared at 11% PVC, in terms of particle size before and after solvent stripping, and its effect on the Tg. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 101: 4504–4516, 2006  相似文献   
139.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious.  相似文献   
140.
Chip Multiprocessors (CMPs) have different technological parameters and physical constraints than earlier multi-processor systems, which should be taken into consideration when designing cache coherence protocols. Also, contemporary cache coherence protocols use invalidate schemes that are known to generate a high number of coherence misses. This is especially true under producer-consumer sharing patterns that can become a performance bottleneck as the number of cores increases. This paper presents two mechanisms to design efficient and scalable cache coherence protocols for CMPs. First, we propose an adaptive hybrid protocol to reduce coherence misses observed in write-invalidate based protocols. The proposed protocol is based on a write-invalidate scheme. However, adaptively, it can push updates to potential consumers based on observed producer-consumer sharing patterns. Secondly, we extend this adaptive protocol with an interconnection resource aware mechanism. Experimental evaluations, conducted on a tiled-CMP via full-system simulation, were used to assess the performance from our proposed dynamic hybrid protocols. Performance analysis is presented on a set of scientific applications from the SPLASH-2 and NAS parallel benchmark suites. Results showed that the proposed mechanisms reduce cache-to-cache sharing misses up to 48 % and speed up application performance up to 34 %. In addition, the proposed interconnection resource aware mechanism is proven to perform well under varying interconnection utilizations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号