首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   54443篇
  免费   3062篇
  国内免费   166篇
电工技术   756篇
综合类   77篇
化学工业   11993篇
金属工艺   2282篇
机械仪表   3565篇
建筑科学   1197篇
矿业工程   29篇
能源动力   2380篇
轻工业   4224篇
水利工程   282篇
石油天然气   93篇
武器工业   3篇
无线电   8656篇
一般工业技术   11648篇
冶金工业   4117篇
原子能技术   693篇
自动化技术   5676篇
  2024年   52篇
  2023年   602篇
  2022年   920篇
  2021年   1581篇
  2020年   1155篇
  2019年   1309篇
  2018年   1575篇
  2017年   1575篇
  2016年   1917篇
  2015年   1457篇
  2014年   2326篇
  2013年   3347篇
  2012年   3633篇
  2011年   4284篇
  2010年   3136篇
  2009年   3223篇
  2008年   3082篇
  2007年   2404篇
  2006年   2214篇
  2005年   1910篇
  2004年   1739篇
  2003年   1715篇
  2002年   1500篇
  2001年   1241篇
  2000年   1106篇
  1999年   1050篇
  1998年   1682篇
  1997年   1062篇
  1996年   878篇
  1995年   616篇
  1994年   505篇
  1993年   431篇
  1992年   331篇
  1991年   291篇
  1990年   283篇
  1989年   272篇
  1988年   222篇
  1987年   180篇
  1986年   132篇
  1985年   127篇
  1984年   104篇
  1983年   76篇
  1982年   42篇
  1981年   46篇
  1980年   34篇
  1979年   32篇
  1978年   34篇
  1977年   46篇
  1976年   73篇
  1975年   22篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
931.
With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations based on JavaScript for portability, their performance is significantly lower than that of implementations based on native programming languages. Therefore, it is necessary to develop a portable and efficient Kyber implementation to secure web applications in the quantum computing era. Our Kyber software is based on JavaScript and Wasm to provide portability and efficiency while ensuring quantum security. Namely, the overall software is written in JavaScript, and the performance core parts (secure hash algorithm-3-based operations and polynomial multiplication) are written in Wasm. Furthermore, we parallelize the number theoretic transform (NTT)-based polynomial multiplication using single instruction multiple data (SIMD) functionality, which is available in Wasm. The three steps in the NTT-based polynomial multiplication have been parallelized with Wasm SIMD intrinsic functions. Our software outperforms the latest reference implementation of Kyber developed in JavaScript by ×4.02 (resp. ×4.32 and ×4.1), ×3.42 (resp. ×3.52 and ×3.44), and ×3.41 (resp. ×3.44 and ×3.38) in terms of key generation, encapsulation, and decapsulation on Google Chrome (resp. Firefox, and Microsoft Edge). As far as we know, this is the first software implementation of Kyber with Wasm technology in the web environment.  相似文献   
932.
Uncrewed aerial vehicles (UAVs) have become a vital element in nonterrestrial networks, especially with respect to 5G communication systems and beyond. The use of UAVs in support of 4G/5G base station (uncrewed aerial vehicle base station [UAV-BS]) has proven to be a practical solution for extending cellular network services to areas where conventional infrastructures are unavailable. In this study, we introduce a UAV-BS system that utilizes a high-capacity wireless backhaul operating in millimeter-wave frequency bands. This system can achieve a maximum throughput of 1.3 Gbps while delivering data at a rate of 300 Mbps, even at distances of 10 km. We also present the details of our testbed implementation alongside the performance results obtained from field tests.  相似文献   
933.
We propose an adaptive unmanned aerial vehicle (UAV)-assisted object recognition algorithm for urban surveillance scenarios. For UAV-assisted surveillance, UAVs are equipped with learning-based object recognition models and can collect surveillance image data. However, owing to the limitations of UAVs regarding power and computational resources, adaptive control must be performed accordingly. Therefore, we introduce a self-adaptive control strategy to maximize the time-averaged recognition performance subject to stability through a formulation based on Lyapunov optimization. Results from performance evaluations on real-world data demonstrate that the proposed algorithm achieves the desired performance improvements.  相似文献   
934.
This paper proposes a method that can reduce the complexity of a system matrix by analyzing the characteristics of a pseudoinverse matrix to receive a binomial frequency division multiplexing (BFDM) signal and decode it using the least squares (LS) method. The system matrix of BFDM can be expressed as a band matrix, and as this matrix contains many zeros, its amount of calculation when generating a transmission signal is quite small. The LS solution can be obtained by multiplying the received signal by the pseudoinverse matrix of the system matrix. The singular value decomposition of the system matrix indicates that the pseudoinverse matrix is a band matrix. The signal-to-interference ratio is obtained from their eigenvalues. Meanwhile, entries that do not contribute to signal generation are erased to enhance calculation efficiency. We decode the received signal using the pseudoinverse matrix and the removed pseudoinverse matrix to obtain the bit error rate performance and to analyze the difference.  相似文献   
935.
The safety of patients and the quality of medical care provided to them are vital for their wellbeing. This study establishes a set of RFID (Radio Frequency Identification)-based systems of patient care based on physiological signals in the pursuit of a remote medical care system. The RFID-based positioning system allows medical staff to continuously observe the patient's health and location. The staff can thus respond to medical emergencies in time and appropriately care for the patient. When the COVID-19 pandemic broke out, the proposed system was used to provide timely information on the location and body temperature of patients who had been screened for the disease. The results of experiments and comparative analyses show that the proposed system is superior to competing systems in use. The use of remote monitoring technology makes user interface easier to provide high-quality medical services to remote areas with sparse populations, and enables better care of the elderly and patients with mobility issues. It can be found from the experiments of this research that the accuracy of the position sensor and the ability of package delivery are the best among the other related studies. The presentation of the graphical interface is also the most cordial among human-computer interaction and the operation is simple and clear.  相似文献   
936.
International Journal of Computer Vision - Machine learning models are known to perpetuate and even amplify the biases present in the data. However, these data biases frequently do not become...  相似文献   
937.

Human activity recognition using smartphone has been attracting great interest. Since collecting large amount of labeled data is expensive and time-consuming for conventional machine learning techniques, transfer learning techniques have been proposed for activity recognition. However, existing transfer learning techniques typically rely on feature matching based on global domain shift and lack considering the intra-class knowledge transfer. In this paper, a novel transfer learning technique is proposed for cross-domain activity recognition, which can properly integrate feature matching and instance reweighting across the source and target domain in principled dimensionality reduction. The experiments using three real datasets demonstrate that the proposed scheme can achieve much higher precision (92%), recall (91%), and F1-score (92%), in comparison with the existing schemes.

  相似文献   
938.
This research investigated the microdrilling characteristics of metal foils depending on the materials of the cover plates and metal foils in the cover plate-laser beam machining (c-LBM) process, which is a method to achieve better quality in metal foil machining with a given piece of equipment. Laser beam drilling using a nanosecond pulsed laser was carried out on 10-µm-thick stainless steel 304 (STS304), nickel, and copper foils with 100-µm-thick cover plates of each material. Consequently, STS304 was found to be an effective cover plate material for reducing the hole diameter and spatter deposition on metal foils. Compared to the results without using a cover plate, the average hole diameter and the area of spatter deposition decreased by up to 77% and 96%, respectively, by using the STS304 cover plate. Meanwhile, the thermal deformation of the STS304 and nickel foils was prevented by using a cover plate, while the copper foil was barely deformed even without a cover plate. Lastly, it was remarkable that the copper foil was drilled with approximately 67% lower pulse energy than the effective minimum pulse energy required to drill it by using the STS304 cover plate, resulting in a smaller hole with little spatter.  相似文献   
939.
We investigate the relationship between superconductivity and spin glasses, which were observed to be coexistent in heavy fermion superconductors (HFSs). We begin by explaining the phase of spin glass using concepts of finite-sized block spin. We then introduce the phase of superconductivity in HFSs as collective Cooper pairing, that is, the pairing of block spins with net spin = 1/2, each of which is comprised of a large number of random spins that together produce a majority spin direction. The superconducting Bardeen-Cooper-Schrieffer (BCS)-type phonon-mediated electron-electron interaction is substituted for the BCS-type electron-electron interaction mediated by phonon-enhanced spin flips previously suggested by us. An effective charge of any value stemming from an electron attached to the flux of an electric field can be referred to as a composite charge. The distinguished difference between ours and the original BCS model is the following: (i) another BCS-type interaction, (ii) bare electrons that are substituted for block spins with net spin = 1/2 and net charge = e in the presence of electric fields, and (iii) Fermi-Dirac distributions that are replaced by a new distribution called as Brillouin distribution.  相似文献   
940.
Defects in bulk crystals can be classified into vacancies, interstitials, grain boundaries, stacking faults, dislocations, and so forth. In particular, the vacancy in semiconductors is a primary defect that governs electrical transport. Concentration of vacancies depends mainly on the growth conditions. Individual vacancies instead of aggregated vacancies are usually energetically more favorable at room temperature because of the entropy contribution. This phenomenon is not guaranteed in van der Waals 2D materials due to the reduced dimensionality (reduced entropy). Here, it is reported that the 1D connected/aggregated vacancies are energetically stable at room temperature. Transmission electron microscopy observations demonstrate the preferential alignment direction of the vacancy chains varies in different 2D crystals: MoS2 and WS2 prefer direction, while MoTe2 prefers direction. This difference is mainly caused by the different strain effect near the chalcogen vacancies. Black phosphorous also exhibits directional double‐chain vacancies along 〈01〉 direction. Density functional theory calculations predict that the chain vacancies act as extended gap (conductive) states. The observation of the chain vacancies in 2D crystals directly explains the origin of n‐type behavior in MoTe2 devices in recent experiments and offers new opportunities for electronic structure engineering with various 2D materials.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号