首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4547篇
  免费   441篇
  国内免费   207篇
电工技术   231篇
技术理论   3篇
综合类   378篇
化学工业   804篇
金属工艺   151篇
机械仪表   230篇
建筑科学   406篇
矿业工程   108篇
能源动力   89篇
轻工业   362篇
水利工程   75篇
石油天然气   242篇
武器工业   90篇
无线电   602篇
一般工业技术   484篇
冶金工业   200篇
原子能技术   31篇
自动化技术   709篇
  2024年   14篇
  2023年   68篇
  2022年   148篇
  2021年   151篇
  2020年   141篇
  2019年   102篇
  2018年   118篇
  2017年   155篇
  2016年   150篇
  2015年   161篇
  2014年   184篇
  2013年   268篇
  2012年   279篇
  2011年   294篇
  2010年   281篇
  2009年   247篇
  2008年   265篇
  2007年   252篇
  2006年   291篇
  2005年   244篇
  2004年   160篇
  2003年   137篇
  2002年   138篇
  2001年   85篇
  2000年   103篇
  1999年   144篇
  1998年   114篇
  1997年   88篇
  1996年   84篇
  1995年   52篇
  1994年   55篇
  1993年   40篇
  1992年   27篇
  1991年   34篇
  1990年   20篇
  1989年   21篇
  1988年   25篇
  1987年   12篇
  1986年   6篇
  1985年   4篇
  1984年   8篇
  1983年   3篇
  1982年   3篇
  1981年   5篇
  1980年   5篇
  1978年   2篇
  1977年   3篇
  1976年   3篇
  1975年   1篇
排序方式: 共有5195条查询结果,搜索用时 0 毫秒
81.
针对目前自动售货机都存在的只能接受硬币和小额面值钞票的缺点,提出采用智能IC卡与GPRS网络通信技术相结合的方案,并在此基础上设计了基于IC卡支付的无线网络自动售货终端。它包含了自动售货机终端的硬件设计与软件设计两部分。采用MDB总线与自动售货机控制器通讯。实际应用证实了其可行性,在自动售货业有广泛的应用前景。  相似文献   
82.
提出基于多串口卡实现低成本的中波发射机通用实时监控方案;基于Windows API实现了多串口卡数据收发模块,并将中波发射机所需采集的模拟量、状态量以及执行命令分成实时数据和非实时数据两类,对这两类数据采用不同的采集频次,实现用户对实时数据监控的要求;对各发射机设备进行数据采集时采用了统一发送-流水接收的处理方式,即统一地给各发射机发送数据采集命令,而以流水的方式依次处理接收数据,提高数据采集的效率;监控系统在Delphi7.0+SQL2000平台下实现,实际运行表明,该监控方案是有效的。  相似文献   
83.
变换编码对于电能质量数据压缩的提高是一项很重要的技术。文章首先介绍了离散余弦变换(DCT)的基本概念,然后对电能质量数据进行映射变换,并利用MATLAB进行仿真研究,利用离散余弦变换将原始电能质量数据映射到离散余弦空间,产生了更有效更紧凑的系数,但是直接对采样数据进行DCT处理,压缩比与精度成反比。提出数据复制组合方法进行改进,实验证明此方法有利于熵编码压缩码率和数据精度的提高。  相似文献   
84.
根据OSEK/VDX规范,以及μC/OS-Ⅱ内核的特点,分析二者的差异,通过修改μC/OS-Ⅱ内核,设计出一种符合OSEK/VDX规范的车载嵌入式操作系统.并从任务管理与调度、资源管理、警报与计数器管理、事件管理和中断管理等多方面,详细地介绍了该系统的主要设计思想.  相似文献   
85.
The polarization properties for tilted fiber Bragg gratings (TFBGs) are investigated theoretically based on coupled-mode theory and Mueller matrix method. The expression of wavelength-related polarizationdependent loss (PDL) for TFBGs with different tilt angles is derived and calculated. Simulation results are compared, and the results indicate that the polarization capability of TFBGs with 45° angle is stronger than other TFBGs with smaller angles. The degree of polarization for unpolarized light passing T...  相似文献   
86.
Colorization is a technique to automatically produce color components for monochrome images and videos based on a few input colors. Generally, image colorization is initialized from a number of seed pixels whose colors are specified by users, and then the colors are gradually prorogating to the monochrome surroundings under a given optimization constraint. So, the performance of colorization is highly dependent on the selection of seed pixels. However, little attention has been paid to the selection of seed pixels, and how to improve the effectiveness of manual input remains a challenging task. To address this, an improved colorization method using seed pixel selection is proposed to assist the users in determining which pixels are highly required to be colorized for a high-quality colorized image. Specifically, the gray-scale image is first divided into non-overlapped blocks, and then, for each block, two pixels that approximate the average luminance of block are selected as the seeds. After the seed pixels are colored by users, an optimization that minimizes the difference between the seeds and their adjacent pixels is employed to propagate the colors to the other pixels. The experimental results demonstrate that, for a given amount of inputs, the proposed method can achieve a higher PSNR than the conventional colorization methods.  相似文献   
87.
针对当前流行的破解有线等效加密无线局域网密钥进而盗用上网资源的现象,研究了相关产品的攻击手段.对其提供的交互式重放攻击、ARP注入攻击、chopchop攻击和分片攻击四种攻击方式,通过跟踪记录攻击过程,分析了它们的攻击原理.在借鉴KDD99等特征提取方法的基础上,提取了9个用于识别攻击的流量统计特征,并利用支持向量机设...  相似文献   
88.
Abstract Owing to the lack of face-to-face interactions, students using a web-based learning system are likely to study alone and with relatively little classmate support and pressure. Teachers in a web-based learning system may apply a group-learning model to overcome this problem. Teachers first need to organise, manage and monitor the group learning and they must take appropriate actions based on teaching strategies to improve the learning achievements of the students. To perform these tasks effectively, teachers must obtain relevant information by analysing the huge volume of web-access logs or by monitoring web interactions. This paper presents novel methodologies for developing instruments to assist teachers in performing intervention and strategy analysis. The proposed methodologies apply data mining tools provided by existing database management systems. Database techniques, including the multi-dimensional cube, are then applied to make student web logs meaningful and helpful to teachers in managing group learning. The associate rule mining tool is finally employed to assist teachers in analysing their pedagogical strategies. These tools relieve teachers of tedious data collection and analysis, allowing them to focus on managing the groups to promote students' learning achievement.  相似文献   
89.
In this paper, a model‐refining method is proposed to alleviate the complexity involved in specification interpretation of DES control problems. The legal constraint language is defined in terms of illegal states and events in contrast with constructing the automaton of the specification language. This method could provide a more intuitive view of the DES control problem and would be suitable for practical implementation. Two examples, which have commonly been used in the literature, are employed to show the efficiency of the proposed method. Further, under this framework, it is shown that the supremal controllable sublanguage can take a simpler form based on the concept of an illegal state set. A state‐based supervisor synthesis procedure is presented, and a simple example is provided.  相似文献   
90.
Based on the importance of fractured rock mass seepage research, in order to analyze seepage flow characteristics of collapse column under the influence of mining, a method by embedding fractured rock mass flow solid coupling relationship into FLAC3D internal flow models is presented according to fluid–solid coupling theory and strength criterion. A calculation model of numerical analysis was established, and the influences of mining pressure and plastic damage to pore water pressure and seepage vector change rule were studied. The results show that collapse column is the main channel of confined water seepage upward. The impact is not big when the workface is away from the collapse column. But when the workface is nearing a collapse column, there will be a seepage channel on a side near the workface, in which seepage vector and head are comparatively large. With workface pushing through collapse column, the seepage channel transfers to the other side of the column. In addition, when the plastic damage area within the collapse column breaks through, a “pipeline flow” will be formed within the column, and seepage field will change remarkably and the possibility of water bursting will be greater.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号