首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   357183篇
  免费   27911篇
  国内免费   15708篇
电工技术   20871篇
技术理论   45篇
综合类   25379篇
化学工业   59628篇
金属工艺   20781篇
机械仪表   22453篇
建筑科学   27616篇
矿业工程   11678篇
能源动力   9698篇
轻工业   24014篇
水利工程   6742篇
石油天然气   23418篇
武器工业   2797篇
无线电   38776篇
一般工业技术   39352篇
冶金工业   18522篇
原子能技术   3624篇
自动化技术   45408篇
  2024年   1459篇
  2023年   5567篇
  2022年   9863篇
  2021年   13866篇
  2020年   10429篇
  2019年   8542篇
  2018年   9853篇
  2017年   11058篇
  2016年   10127篇
  2015年   13863篇
  2014年   17440篇
  2013年   20891篇
  2012年   22686篇
  2011年   25167篇
  2010年   22236篇
  2009年   21057篇
  2008年   20638篇
  2007年   19685篇
  2006年   20052篇
  2005年   17650篇
  2004年   11960篇
  2003年   10690篇
  2002年   9893篇
  2001年   8811篇
  2000年   8755篇
  1999年   9389篇
  1998年   7181篇
  1997年   6138篇
  1996年   5813篇
  1995年   4785篇
  1994年   3887篇
  1993年   2622篇
  1992年   2073篇
  1991年   1569篇
  1990年   1233篇
  1989年   995篇
  1988年   830篇
  1987年   524篇
  1986年   410篇
  1985年   258篇
  1984年   206篇
  1983年   164篇
  1982年   128篇
  1981年   76篇
  1980年   96篇
  1979年   43篇
  1978年   17篇
  1977年   23篇
  1976年   28篇
  1973年   9篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
991.
提权攻击是针对Linux系统的一种重要攻击手段。根据提权攻击所利用的漏洞类型,一般可将其分为应用层提权攻击和内核提权攻击。现有的防御技术已经能够防御基本的应用层提权攻击,但是并不能完全防御内核提权攻击,内核提权攻击仍是Linux系统面临的一个重要威胁。内核提权攻击一般通过利用内核提权漏洞进行攻击。针对内核提权攻击,分析研究了基本的内核提权漏洞利用原理以及权限提升方法,并对典型的内核提权攻击防御技术进行了分析。最后通过实验对SELinux针对内核提权攻击的防御效果进行了分析验证,并针对发现的问题指出了下一步具有可行性的研究方向。  相似文献   
992.
Since the 1980s, the development of information and communication technologies (ICTs) has greatly changed people’s modes of production and lifestyle, and it has also had a significant influence on traditional social structures. Microblogs – a type of social media application such as Twitter or Weibo – have served as an important platform for network governance in some local governments in China. This study makes an attempt to answer the following questions: What types of strategies should governments implement on social media platforms during public emergencies? What are the effects of these strategies? Based on the case of the Shifang Incident, which was a large-scale environmental protest that occurred in Shifang, China in 2012, we analyze all the messages posted during the incident on the official microblog of the Shifang government and examine the public feedback by using an online big data analysis tool. In line with the time sequence and the extent of the conflict, we divide the Shifang Incident into three phases: the fermentation period, the confrontation period, and the digestion period. In addition, we classify government strategies on social media into five categories: introducing, appealing, explaining, rumor-refuting, and decision-making. The analysis results show that different government strategies are applied to different phases of the incident and that the responses of the public also vary during different periods.  相似文献   
993.
This paper is concerned with the problem of finite‐time asynchronous filtering for a class of discrete‐time Markov jump systems. The communication links between the system and filter are assumed to be unreliable, which lead to the simultaneous occurrences of packet dropouts, time delays, sensor nonlinearity and nonsynchronous modes. The objective is to design a filter that ensures not only the mean‐square stochastic finite‐time bounded but also a prescribed level of performance for the underlying error system over a lossy network. With the help of the Lyapunov–Krasovskii approach and stochastic analysis theory, sufficient conditions are established for the existence of an admissible filter. By using a novel simple matrix decoupling approach, a desired asynchronous filter can be constructed. Finally, a numerical example is presented and a pulse‐width‐modulation‐driven boost converter model is employed to demonstrate the effectiveness of the proposed approach. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
994.
Aggregate similarity search, also known as aggregate nearest-neighbor (Ann) query, finds many useful applications in spatial and multimedia databases. Given a group Q of M query objects, it retrieves from a database the objects most similar to Q, where the similarity is an aggregation (e.g., \({{\mathrm{sum}}}\), \(\max \)) of the distances between each retrieved object p and all the objects in Q. In this paper, we propose an added flexibility to the query definition, where the similarity is an aggregation over the distances between p and any subset of \(\phi M\) objects in Q for some support \(0< \phi \le 1\). We call this new definition flexible aggregate similarity search and accordingly refer to a query as a flexible aggregate nearest-neighbor ( Fann ) query. We present algorithms for answering Fann queries exactly and approximately. Our approximation algorithms are especially appealing, which are simple, highly efficient, and work well in both low and high dimensions. They also return near-optimal answers with guaranteed constant-factor approximations in any dimensions. Extensive experiments on large real and synthetic datasets from 2 to 74 dimensions have demonstrated their superior efficiency and high quality.  相似文献   
995.
996.
As a new information sharing platform, microblog has got explosive growth in recent years and has become an important source for public opinion mining. A variety of information like the reviews of brands/products or the trends of events can be socially sensed from such kind of data. However, it is still a challenging task to search relevant microblogs as the user generated content tends to be mixed with noise. Besides short text, image is getting popular in microblogs due to its power in visual information conveying. In this paper, we leverage textual and visual cues integratedly and propose a general re-ranking approach for microblog retrieval via multi-graph semi-supervised learning. We argue that the different types of information in microblogs correspond to different relationships among microblogs and each type of the relationship can be represented as a similarity graph. We then integrate different graphs into a unified framework and solve them simultaneously for microblog re-ranking. Extensive experiments on a recently published Brand-Social-Net dataset showed the effectiveness of the proposed method and marginal improvements have been achieved in accuracy as compared to the single graph model based method.  相似文献   
997.
In this article, the design and test of both a K‐band dual‐mode bandpass filter (BPF) pair and a K‐band triple‐mode BPF are presented based on N‐mode temporal coupled‐mode theory (CMT). The expressions of transmission and reflection responses are analytically derived. All the parameters in the expressions have clear physical meanings and are easily optimized to reach the required filter performance. Aided by eigenmode simulations, concrete structures of the three integrated BPFs are designed and optimized to approach the calculated physical parameters. After the fabrications and measurements of the three BPFs, extended upper/lower stopband with high stopband rejections are achieved, and by increasing the number of resonant modes, improved frequency selectivity and better passband flatness are obtained. The analytical analysis well predicts the simulation and measurement results, which provides an efficient way for BPF designs. © 2016 Wiley Periodicals, Inc. Int J RF and Microwave CAE 26:609–622, 2016.  相似文献   
998.
This paper aims to design an appropriate switching law to stabilize the switched neural networks with time-varying delays when all subsystems are unstable. By using the discretized Lyapunov function approach and the extended comparison principle for impulsive systems, the stability of switched delayed neural networks composed full of unstable subsystems is analyzed and a computable sufficient condition is derived in the framework of dwell time. The effectiveness of the proposed results is illustrated by a numerical example.  相似文献   
999.
Based on advantages of basic non-negative sparse coding (NNSC) model, and considered the prior class constraint of image features, a novel NNSC model is discussed here. In this NNSC model, the sparseness criteria is selected as a two-parameter density estimation model and the dispersion ratio of within-class and between-class is used as the class constraint. Utilizing this NNSC model, image features can be extracted successfully. Further, the feature recognition task by using different classifiers can be implemented well. Simulation results prove that our NNSC model proposed is indeed effective in extracting image features and recognition task in application.  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号