首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6852篇
  免费   366篇
  国内免费   58篇
电工技术   95篇
综合类   22篇
化学工业   1832篇
金属工艺   151篇
机械仪表   247篇
建筑科学   193篇
矿业工程   4篇
能源动力   429篇
轻工业   635篇
水利工程   98篇
石油天然气   54篇
无线电   735篇
一般工业技术   1250篇
冶金工业   361篇
原子能技术   91篇
自动化技术   1079篇
  2024年   27篇
  2023年   134篇
  2022年   374篇
  2021年   461篇
  2020年   344篇
  2019年   369篇
  2018年   410篇
  2017年   339篇
  2016年   374篇
  2015年   217篇
  2014年   361篇
  2013年   611篇
  2012年   347篇
  2011年   366篇
  2010年   314篇
  2009年   288篇
  2008年   205篇
  2007年   183篇
  2006年   159篇
  2005年   110篇
  2004年   89篇
  2003年   88篇
  2002年   71篇
  2001年   51篇
  2000年   41篇
  1999年   51篇
  1998年   92篇
  1997年   79篇
  1996年   60篇
  1995年   66篇
  1994年   37篇
  1993年   48篇
  1992年   45篇
  1991年   36篇
  1990年   40篇
  1989年   32篇
  1988年   23篇
  1987年   41篇
  1986年   36篇
  1985年   27篇
  1984年   36篇
  1983年   31篇
  1982年   23篇
  1981年   11篇
  1980年   19篇
  1979年   13篇
  1978年   14篇
  1977年   15篇
  1976年   18篇
  1975年   11篇
排序方式: 共有7276条查询结果,搜索用时 9 毫秒
81.
The widespread use of the Internet and the convenient mechanism it provides, such as easy access, easy downloads, and easy copy and paste functions have made many types of unethical behaviors easier, particularly those involving students in academic settings. Among the issues in ethics within the academic environment that can be triggered by the Internet are fraudulence, plagiarism, falsification, delinquency, unauthorized help, and facility misuse. Given these issues, the study seeks to investigate the extent to which students at a public university in Malaysia engage in such unethical behavior and their relationship with the big five personality model. This study was conducted using a survey method of 252 students in three different academic faculties. The results of factor analyses confirm and refine the reliability of the scales for both big five personality variables and unethical Internet behaviors as conceptualized through Internet triggered academic dishonesty (ITADS). The findings indicate that personality traits such as (1) agreeableness, (2) conscientiousness and (3) emotional stability are significantly and negatively correlated with unethical Internet behavior in university students. Significant differences in facility misuse are also observed between the three academic faculties investigated. This research should provide significant contributions to educators in designing the computer ethics curriculum and in allowing for educational institutions as well as other organizations in developing relevant policies and guidelines on matters pertaining to academic conduct, utilization of computers and Internet, and recruitment exercises.  相似文献   
82.
83.
A note on the stability of fractional order systems   总被引:1,自引:0,他引:1  
In this paper, a new approach is suggested to investigate stability in a family of fractional order linear time invariant systems with order between 1 and 2. The proposed method relies on finding a linear ordinary system that possesses the same stability property as the fractional order system. In this way, instead of performing the stability analysis on the fractional order systems, the analysis is converted into the domain of ordinary systems which is well established and well understood. As a useful consequence, we have extended two general tests for robust stability check of ordinary systems to fractional order systems.  相似文献   
84.
Microwave imaging for medical applications has been of interest for many years. A novel near-field microwave non-invasive testing and evaluation (NIT&E) technique utilizing tapered rectangular waveguide probes is presented for breast cancer detection. Near-field microwave NIT&E techniques can be a successful candidate for the detection of breast cancer because of their potential in dealing with materials of low conductivity (i.e. lossy dielectrics like the breast tissue). The physical basis for breast tumor detection with microwave imaging is the contrast in dielectric properties of normal and malignant breast tissues. A method adopting Fourier transform matching (FTM) technique and utilizing the reflection coefficient at the aperture of a tapered rectangular waveguide sensor radiating into a breast is described resulting in microwave images that indicate the presence of a tumor. These images demonstrate the feasibility of detecting breast tumors using this approach.  相似文献   
85.
This paper proposes the Mobility-Aware Resource Reservation Protocol (MARSVP) in which mobility and QoS signaling are performed as a single functional block. The key concept of MARSVP is to convey mobility-specific information (binding updates and their associated acknowledgments) by using newly defined RSVP objects embedded in existing RSVP messages. An appealing feature of MARSVP is that it adheres to the current RSVP standard (RFC 2205) and thus requires minimal changes to end nodes without affecting any of the conventional RSVP routers in between. The proposed mechanism is evaluated using a simulation model for application-level performance and an analytical model for network-level signaling cost. Simulation results indicate a 27.9% improvement in QoS interruption when using Mobile IPv6 (MIPv6), 12.5% when using Hierarchical Mobile IPv6 (HMIPv6), and no improvement when using Fast Handovers for MIPv6 (FMIPv6). On the network-level, signaling cost savings of 9.4% and 11.9% are achieved for MIPv6 and HMIPv6, respectively, while FMIPv6 achieves savings of 17.9% when using Voice-over-IP traffic and 26.7% for Video-over-IP traffic. The results of the conducted studies indicate MARSVP’s superiority to conventional RSVP when deployed over wireless networks.  相似文献   
86.
This paper deals with the leader-follower consensus problem of Lipschitz nonlinear systems under fixed directed communication networks. Both state and output feedback control are proposed based on state and output measurements of neighbouring agents, respectively. Laplacian matrix features are explored for the stability analysis, and the sufficient conditions are derived to solve the consensus problem. Finally, simulation results are included to demonstrate the effectiveness of the output-based consensus controller.  相似文献   
87.
Digital image processing systems are complex, being usually composed of different computer vision libraries. Algorithm implementations cannot be directly used in conjunction with algorithms developed using other computer vision libraries. This paper formulates a software solution by proposing a processor with the capability of handling different types of image processing algorithms, which allow the end users to install new image processing algorithms from any library. This approach has other functionalities like capability to process one or more images, manage multiple processing jobs simultaneously and maintain the manner in which an image was processed for later use. It is a computational efficient and promising technique to handle variety of image processing algorithms. To promote the reusability and adaptation of the package for new types of analysis, a feature of sustainability is established. The framework is integrated and tested on a medical imaging application, and the software is made freely available for the reader. Future work involves introducing the capability to connect to another instance of processing service with better performance. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
88.
In this article, a hybrid technique for user activities outliers detection is introduced. The hybrid technique consists of a two‐stage integration of principal component analysis and fuzzy rule‐based systems. In the first stage, the Hamming distance is used to measure the differences between different activities. Principal component analysis is then applied to the distance measures to find two indices of Hotelling's T2 and squared prediction error. In the second stage of the process, the calculated indices are provided as inputs to the fuzzy rule‐based systems to model them heuristically. The model is used to identify the outliers and classify them. The proposed system is tested in real home environments, equipped with appropriate sensory devices, to identify outliers in the activities of daily living of the user. Three case studies are reported to demonstrate the effectiveness of the proposed system. The proposed system successfully identifies the outliers in activities distinguishing between the normal and abnormal behavioral patterns.  相似文献   
89.
90.
In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号