首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   86645篇
  免费   6133篇
  国内免费   2930篇
电工技术   4353篇
技术理论   9篇
综合类   4649篇
化学工业   15512篇
金属工艺   4453篇
机械仪表   5232篇
建筑科学   7029篇
矿业工程   1985篇
能源动力   2480篇
轻工业   4901篇
水利工程   1447篇
石油天然气   4539篇
武器工业   488篇
无线电   10443篇
一般工业技术   11303篇
冶金工业   4687篇
原子能技术   831篇
自动化技术   11367篇
  2024年   324篇
  2023年   1314篇
  2022年   2280篇
  2021年   3117篇
  2020年   2337篇
  2019年   2030篇
  2018年   2255篇
  2017年   2518篇
  2016年   2359篇
  2015年   2942篇
  2014年   4018篇
  2013年   5070篇
  2012年   5243篇
  2011年   5519篇
  2010年   4899篇
  2009年   4716篇
  2008年   4466篇
  2007年   4402篇
  2006年   4647篇
  2005年   4133篇
  2004年   2784篇
  2003年   2497篇
  2002年   2192篇
  2001年   2019篇
  2000年   2281篇
  1999年   2560篇
  1998年   2386篇
  1997年   1886篇
  1996年   1743篇
  1995年   1446篇
  1994年   1216篇
  1993年   880篇
  1992年   655篇
  1991年   543篇
  1990年   409篇
  1989年   367篇
  1988年   318篇
  1987年   175篇
  1986年   165篇
  1985年   112篇
  1984年   98篇
  1983年   63篇
  1982年   60篇
  1981年   54篇
  1980年   38篇
  1979年   32篇
  1978年   13篇
  1977年   33篇
  1976年   16篇
  1975年   15篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
951.
本文设计一个可调可直观显示的直流稳压电源,电路采用三端可调式集成稳压器LM317等元件,构成从OV~20V连续可调的稳压电源电路,同时利用模数(A/D)转换,单片机控制电路,通过译码驱动,实现在数码管上直观显示瞬时电压数值。具有设计电路简单,制作容易,操作方便,显示直观,性能可靠,功能完善等特点。  相似文献   
952.
Efficient Tate pairing computation using double-base chains   总被引:2,自引:0,他引:2  
Pairing-based cryptosystems have developed very fast in the last few years. The efficiencies of these cryptosystems depend on the computation of the bilinear pairings, In this paper, a new efficient algorithm based on double-base chains for computing the Tate pairing is proposed for odd characteristic p 〉 3. The inherent sparseness of double-base number system reduces the computational cost for computing the Tate pairing evidently. The new algorithm is 9% faster than the previous fastest method for the embedding degree k = 6.  相似文献   
953.
QST108为意法半导体公司生产的电容触摸传感器,具有功能强大且易操作等特点,非常适合应用在能够对用户触摸做出响应的智能控制界面中。本文重点介绍了QST108的工作方式及主要操作命令,给出了QST108与PIC单片机的接口设计以及部分程序代码。  相似文献   
954.
Given a large spatio-temporal database of events, where each event consists of the fields event ID, time, location, and event type, mining spatio-temporal sequential patterns identifies significant event-type sequences. Such spatio-temporal sequential patterns are crucial to the investigation of spatial and temporal evolutions of phenomena in many application domains. Recent research literature has explored the sequential patterns on transaction data and trajectory analysis on moving objects. However, these methods cannot be directly applied to mining sequential patterns from a large number of spatio-temporal events. Two major research challenges still remain: 1) the definition of significance measures for spatio-temporal sequential patterns to avoid spurious ones and 2) the algorithmic design under the significance measures, which may not guarantee the downward closure property. In this paper, we propose a sequence index as the significance measure for spatio-temporal sequential patterns, which is meaningful due to its interpretability using spatial statistics. We propose a novel algorithm called Slicing-STS-miner to tackle the algorithmic design challenge using the spatial sequence index, which does not preserve the downward closure property. We compare the proposed algorithm with a simple algorithm called STS-miner that utilizes the weak monotone property of the sequence index. Performance evaluations using both synthetic and real-world data sets show that the slicing-STS-miner is an order of magnitude faster than STS-Miner for large data sets.  相似文献   
955.
Biologists hope to address grand scientific challenges by exploring the abundance of data made available through modern microarray technology and other high-throughput techniques. The impact of this data, however, is limited unless researchers can effectively assimilate such complex information and integrate it into their daily research; interactive visualization tools are called for to support the effort. Specifically, typical studies of gene co-expression require novel visualization tools that enable the dynamic formulation and fine-tuning of hypotheses to aid the process of evaluating sensitivity of key parameters. These tools should allow biologists to develop an intuitive understanding of the structure of biological networks and discover genes residing in critical positions in networks and pathways. By using a graph as a universal representation of correlation in gene expression, our system employs several techniques that when used in an integrated manner provide innovative analytical capabilities. Our tool for interacting with gene co-expression data integrates techniques such as: graph layout, qualitative subgraph extraction through a novel 2D user interface, quantitative subgraph extraction using graph-theoretic algorithms or by compound queries, dynamic level-of-detail abstraction, and template-based fuzzy classification. We demonstrate our system using a real-world workflow from a large-scale, systems genetics study of mammalian gene co-expression.  相似文献   
956.
Developments in optical microscopy imaging have generated large high-resolution data sets that have spurred medical researchers to conduct investigations into mechanisms of disease, including cancer at cellular and subcellular levels. The work reported here demonstrates that a suitable methodology can be conceived that isolates modality-dependent effects from the larger segmentation task and that 3D reconstructions can be cognizant of shapes as evident in the available 2D planar images. In the current realization, a method based on active geodesic contours is first deployed to counter the ambiguity that exists in separating overlapping cells on the image plane. Later, another segmentation effort based on a variant of Voronoi tessellations improves the delineation of the cell boundaries using a Bayesian formulation. In the next stage, the cells are interpolated across the third dimension thereby mitigating the poor structural correlation that exists in that dimension. We deploy our methods on three separate data sets obtained from light, confocal, and phase-contrast microscopy and validate the results appropriately.  相似文献   
957.
It is still not very clear to what extent and how does the amino acid sequences of proteins determine their tertiary structures. In this paper, we report our investigations of the sequence-structure relations of the proteins in the beta-propeller fold family, which adopt highly symmetrical tertiary structures while their sequences appear "random". We analyzed the amino acid sequences by using a similarity matrix plus Pearson correlation method and found that the sequences can show the same symmetries as their tertiary structures only if we deduce the conditions of sequence similarity. This suggests that some key residues may play an important role in the formation of the tertiary structures of these proteins.  相似文献   
958.
959.
In the paper, we try to find a method that can service more users in a video-on-demand (VoD) system, based on MPEG-4 object streams. The characteristics of object segmentation made on MPEG-4 videos can be utilized to reduce re-transmission of the same objects, and then the saved bandwidth can be used to service more users. However, some thresholds must be analyzed first to maintain the acceptable quality of services (QoS) requested by users, when reducing unnecessary object transmission on one side. Thus, according to the defined thresholds, we propose a dynamically adjusting algorithm to coordinate the object streams between the server and clients. The server not only allocates network bandwidth, but also adjusts ever-allocated QoS appropriately using a degrading and upgrading strategy, based on the current network status. Lastly, through the simulation, we found that our method has better performance than the other three methods owing to its flexibility to the network status.
Yin-Fu HuangEmail:
  相似文献   
960.
WiMAX technology, the commercialization of the evolving IEEE 802.16 standard, aims to solve the last-mile problem with broadband wireless access at the scale of metropolitan area networks. WiMAX has attracted significant attention and interest because of its wide transmission range, high transmission rate, and mobility support. However, to make WiMAX networks usable and reliable, several security issues must be addressed in the standard and its protocols. In this article, the authors give an introduction to the security protocols used in WiMAX networks and then discuss why these protocols are deficient in terms of anti-replay, efficiency, scalability, and forward and backward secrecy, as well as how they can be enhanced to address these issues for real applications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号