首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7290篇
  免费   355篇
  国内免费   53篇
电工技术   134篇
综合类   27篇
化学工业   1828篇
金属工艺   122篇
机械仪表   215篇
建筑科学   299篇
矿业工程   8篇
能源动力   477篇
轻工业   732篇
水利工程   78篇
石油天然气   116篇
无线电   665篇
一般工业技术   1167篇
冶金工业   368篇
原子能技术   83篇
自动化技术   1379篇
  2024年   24篇
  2023年   157篇
  2022年   323篇
  2021年   414篇
  2020年   300篇
  2019年   343篇
  2018年   422篇
  2017年   364篇
  2016年   359篇
  2015年   242篇
  2014年   326篇
  2013年   655篇
  2012年   372篇
  2011年   518篇
  2010年   362篇
  2009年   338篇
  2008年   303篇
  2007年   223篇
  2006年   209篇
  2005年   149篇
  2004年   116篇
  2003年   126篇
  2002年   90篇
  2001年   64篇
  2000年   74篇
  1999年   53篇
  1998年   86篇
  1997年   43篇
  1996年   56篇
  1995年   41篇
  1994年   39篇
  1993年   48篇
  1992年   37篇
  1991年   32篇
  1990年   31篇
  1989年   21篇
  1988年   36篇
  1987年   30篇
  1986年   21篇
  1985年   16篇
  1984年   28篇
  1983年   23篇
  1982年   24篇
  1981年   17篇
  1980年   21篇
  1979年   16篇
  1978年   19篇
  1976年   18篇
  1975年   21篇
  1974年   12篇
排序方式: 共有7698条查询结果,搜索用时 0 毫秒
111.
Numerical simulation has been performed to improve the performance of Cu2ZnSnS4 (CZTS) solar cells by replacing CdS with Zn1–xSnxO buffer layer. The influences of thickness, donor concentration and defect density of buffer layers on the performance of CZTS solar cells were investigated. It has been found that Zn1–xSnxO buffer layer for Sn content of 0.20 is better for CZTS solar cell. A higher efficiency can be achieved with thinner buffer layer. The optimized solar cell demonstrated a maximum power conversion efficiency of 13%.  相似文献   
112.
In this work, chaos game optimization (CGO), a robust optimization approach, is employed for efficient design of a novel cascade controller for four test systems with interconnected power systems (IPSs) to tackle load–frequency control (LFC) difficulties. The CGO method is based on chaos theory principles, in which the structure of fractals is seen via the chaotic game principle and the fractals’ self-similarity characteristics are considered. CGO is applied in LFC studies as a novel application, which reveals further research gaps to be filled. For practical implementation, it is also highly desirable to keep the controller structure simple. Accordingly, in this paper, a CGO-based controller of fractional-order (FO) proportional–integral–derivative–FO proportional–integral (FOPID–FOPI) controller is proposed, and the integral time multiplied absolute error performance function is used. Initially, the proposed CGO-based FOPID–FOPI controller is tested with and without the nonlinearity of the governor dead band for a two-area two-source model of a non-reheat unit. This is a common test system in the literature. A two-area multi-unit system with reheater–hydro–gas in both areas is implemented. To further generalize the advantages of the proposed scheme, a model of a three-area hydrothermal IPS including generation rate constraint nonlinearity is employed. For each test system, comparisons with relevant existing studies are performed. These demonstrate the superiority of the proposed scheme in reducing settling time, and frequency and tie-line power deviations.  相似文献   
113.
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats.  相似文献   
114.
Riad  Rabia  Ros  Frédéric  hajji  Mohamed El  Harba  Rachid 《Applied Intelligence》2022,52(10):11592-11605

Background removal of an identity (ID) picture consists in separating the foreground (face, body, hair and clothes) from the background of the image. It is a necessary groundwork for all modern identity documents that also has many benefits for improving ID security. State of the art image processing techniques encountered several segmentation issues and offer only partial solutions. It is due to the presence of erratic components like hairs, poor contrast, luminosity variation, shadow, color overlap between clothes and background. In this paper, a knowledge infused approach is proposed that hybridizes smart image processing tasks and prior knowledge. The research is based on a divide and conquer strategy aiming at simulating the sequential attention of human when performing a manual segmentation. Knowledge is infused by considering the spatial relation between anatomic elements of the ID image (face feature, forehead, body and hair) as well as their “signal properties”. The process consists in first determining a convex hull around the person’s body including all the foreground while keeping very close to the contour between the background and the foreground. Then, a body map generated from biometric analysis associated to an automatic grab cut process is applied to reach a finer segmentation. Finally, a heuristic-based post-processing step consisting in correcting potential hair and fine boundary issues leads to the final segmentation. Experimental results show that the newly proposed architecture achieves better performances than tested current state-of-the-art methodologies including active contours, generalist popular deep learning techniques, and also two other ones considered as the smartest for portrait segmentation. This new technology has been adopted by an international company as its industrial ID foreground solution.

  相似文献   
115.
In this work, acrylic acid (AAc) monomer was grafted onto low-density polyethylene (LDPE) films by the direct method to obtain acid (LDPE-grafted poly(acrylic acid) (LDPE-g-PAAc)) graft copolymers. The presence of the grafted PAAc with COOH groups allows coupling with Fe2+/3+ ions. The stabilization of Fe3O4 particles onto the graft copolymers was done by in situ reduction of LDPE-g-PAAc/Fe2+/3+ with sodium borohydride (NaBH4) in aqueous solution. The LDPE-g-PAAc graft copolymer and LDPE-g-PAAc/Fe3O4 composite films were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FT-IR), differential scanning calorimetry (DSC), and electron spin resonance (ESR). The synthesized composites exhibit excellent magnetic properties. The results indicated that the magnetic oxide (Fe3O4) was embedded and homogenously dispersed into the surfaces of the graft copolymer films as indicated by SEM. The FT-IR analysis clearly suggests that an AAc monomer was effectively grafted onto LDPE. The XRD studies elucidate the change in the crystallinity of the graft copolymers.
Graphical Abstract The procedures for magnetic film manufacture LDPE-g-PAAc/Fe3O4 using gamma irradiation technique
  相似文献   
116.
117.
In this paper, the problem of scheduling with agreements (SWA) is considered. In scheduling, this consists of a set of jobs non-preemptively on identical machines subject to constraints that only some specific jobs can be scheduled concurrently on different machines. These constraints are given by an agreement graph and the aim is to minimise the makespan. In the case of two machines we extend two NP-hardness results of SWA with processing times at most three that hold for bipartite agreement graphs to more general agreement graphs. Complexity results of SWA are established in the case of split and complement of bipartite graphs. We also present some approximation results for SWA.  相似文献   
118.
This article proposes to solve the problem of minimizing the total completion time in a two-machine permutation flowshop environment in which time delays between the machines are considered. For this purpose, an enumeration algorithm based on the branch-and-bound framework is developed, which includes new lower and upper bounds as well as dominance rules. The computational study shows that problems with up to 40 jobs can be solved in a reasonable amount of time.  相似文献   
119.
120.
With the rapid development of emerging 5G and beyond (B5G), Unmanned Aerial Vehicles (UAVs) are increasingly important to improve the performance of dense cellular networks. As a conventional metric, coverage probability has been widely studied in communication systems due to the increasing density of users and complexity of the heterogeneous environment. In recent years, stochastic geometry has attracted more attention as a mathematical tool for modeling mobile network systems. In this paper, an analytical approach to the coverage probability analysis of UAV-assisted cellular networks with imperfect beam alignment has been proposed. An assumption was considered that all users are distributed according to Poisson Cluster Process (PCP) around base stations, in particular, Thomas Cluster Process (TCP). Using this model, the impact of beam alignment errors on the coverage probability was investigated. Initially, the Probability Density Function (PDF) of directional antenna gain between the user and its serving base station was obtained. Then, association probability with each tier was achieved. A tractable expression was derived for coverage probability in both Line-of-Sight (LoS) and Non-Line-of-Sight (NLoS) condition links. Numerical results demonstrated that at low UAVs altitude, beam alignment errors significantly degrade coverage performance. Moreover, for a small cluster size, alignment errors do not necessarily affect the coverage performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号