首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8125篇
  免费   929篇
  国内免费   308篇
电工技术   539篇
技术理论   2篇
综合类   511篇
化学工业   1447篇
金属工艺   528篇
机械仪表   484篇
建筑科学   568篇
矿业工程   313篇
能源动力   202篇
轻工业   504篇
水利工程   158篇
石油天然气   576篇
武器工业   63篇
无线电   958篇
一般工业技术   1016篇
冶金工业   417篇
原子能技术   108篇
自动化技术   968篇
  2024年   56篇
  2023年   188篇
  2022年   385篇
  2021年   471篇
  2020年   370篇
  2019年   265篇
  2018年   344篇
  2017年   298篇
  2016年   307篇
  2015年   419篇
  2014年   485篇
  2013年   573篇
  2012年   608篇
  2011年   564篇
  2010年   510篇
  2009年   452篇
  2008年   420篇
  2007年   387篇
  2006年   363篇
  2005年   264篇
  2004年   188篇
  2003年   155篇
  2002年   130篇
  2001年   132篇
  2000年   158篇
  1999年   179篇
  1998年   138篇
  1997年   114篇
  1996年   117篇
  1995年   84篇
  1994年   67篇
  1993年   38篇
  1992年   42篇
  1991年   27篇
  1990年   17篇
  1989年   12篇
  1988年   6篇
  1987年   8篇
  1986年   8篇
  1985年   1篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1980年   1篇
  1965年   1篇
  1951年   4篇
排序方式: 共有9362条查询结果,搜索用时 0 毫秒
51.
靶场仿真中分布式异构网关技术研究   总被引:4,自引:2,他引:2  
为快速、高效地实现试验与训练领域各靶场、设施和仿真的互操作、重用和可组合,构建实物的、虚拟的、构造的(LVC)分布式网络,研究了目前主要存在的高级分布式仿真架构,包括分布式交互仿真(DIS)、高层体系架构(HLA)及试验与训练使能体系结构(TENA);在对它们的异同进行分析比较的基础上,确定以TENA网关对异构靶场进行无缝连接是实现靶场互联的最佳方案;对网关进行了总体设计并对关键技术进行了分析,网关原型的建立为网关的深入研究和开发奠定了基础。  相似文献   
52.
射频宽带功率放大器是目前功率放大器的主要发展趋势。为了提高射频宽带功率放大器的增益平坦度与效率,采用推挽结构LDmos晶体管,使用ADS软件对动态偏置电路和匹配电路进行仿真设计。详细介绍了动态偏置功率放大器的工作原理及其实现方法。实现了多倍频程带宽、确保带内增益平坦、提高功率附加效率。仿真结果表明该功率放大器对于100MHz~400MHz的信号,在整个输入功率变化范围内,功率附加效率(PAE)与传统的功放相比提高了5~15%左右。  相似文献   
53.
测试数据获取是嵌入式软件测试的关键技术,其准确性.实时性和可靠性对测试质量有决定性影响.嵌入式软件测试需要根据软件特性和测试要求对数据获取方法进行定制设计.针对侵入式的软件插桩测试技术,着重研究了硬件采集、硬件收发、纯软件方式的插桩实现过程.对非侵入式的边界扫描技术和虚拟仿真技术的数据获取原理进行了分析,并提出了嵌入式开发测试一体化集成应用和全生存周期嵌入式软件开发,测试与管理的思想,指出了嵌入式软件测试的新方向.  相似文献   
54.
Deceptive voting behaviors of malicious users are known as the main reason of causing content pollution in Peer-to-Peer (P2P) content sharing systems. Due to the nature of P2P overlay network such as self-organization and anonymity, the existing methods on identifying deceptive votes are not effective, especially for collusive attackers. This paper presents Sorcery, a novel active challenge-response mechanism based on the notion that one side of interaction with the dominant information can detect whether the other side is telling a lie. To make each client obtain the dominant information, our approach introduces the social network to the P2P content sharing system; therefore, clients can establish the friend-relationships with the users who are either acquaintances in reality or those reliable online friends. Using the confidential voting histories of friends as own dominant information, the client challenges target content providers with the overlapping votes of both his friends and the target content provider, thus detecting whether the content provider is a deceptive user. Moreover, Sorcery provides the punishment mechanism which can reduce the impact brought by deceptive voting behaviors, and our work also discusses some key practical issues. The experimental results illustrate that Sorcery can effectively overcome the problem of deceptive voting behaviors in P2P content sharing systems, and work better than the existing reputation models.  相似文献   
55.
数据安全是图书馆开展各项数字化服务前提和保证,本文通过分析目前西藏高校图书馆数据安全的现状及存在的问题,结合西藏各高校图书馆实际,提出了数据安全的防护策略,希望为西藏高校图书馆数据安全建设抛砖引玉。  相似文献   
56.
Speed up kernel discriminant analysis   总被引:2,自引:0,他引:2  
Linear discriminant analysis (LDA) has been a popular method for dimensionality reduction, which preserves class separability. The projection vectors are commonly obtained by maximizing the between-class covariance and simultaneously minimizing the within-class covariance. LDA can be performed either in the original input space or in the reproducing kernel Hilbert space (RKHS) into which data points are mapped, which leads to kernel discriminant analysis (KDA). When the data are highly nonlinear distributed, KDA can achieve better performance than LDA. However, computing the projective functions in KDA involves eigen-decomposition of kernel matrix, which is very expensive when a large number of training samples exist. In this paper, we present a new algorithm for kernel discriminant analysis, called Spectral Regression Kernel Discriminant Analysis (SRKDA). By using spectral graph analysis, SRKDA casts discriminant analysis into a regression framework, which facilitates both efficient computation and the use of regularization techniques. Specifically, SRKDA only needs to solve a set of regularized regression problems, and there is no eigenvector computation involved, which is a huge save of computational cost. The new formulation makes it very easy to develop incremental version of the algorithm, which can fully utilize the computational results of the existing training samples. Moreover, it is easy to produce sparse projections (Sparse KDA) with a L 1-norm regularizer. Extensive experiments on spoken letter, handwritten digit image and face image data demonstrate the effectiveness and efficiency of the proposed algorithm.  相似文献   
57.
为改善微电子器件性能,提高可靠性,确定筛选、考核条件等都必须对器件的结温、表面温度分布以及热斑等热特性进行精确测量,红外热像法是当前测量微电子器件热特性最有效的方法之一。文章针对InfrascopeⅡ型显微红外热像仪在实际应用中如何提高其测温准确度和一致性等问题进行了研究,重点分析了样品发射率、背景环境和大气衰减等因素的影响,并给出验证解决方案,取得了满意的结果。  相似文献   
58.
文章在通信资源的形式化描述基础上,设计了一种信息栅格的传输体系,为一体化信息系统提供透明的传输服务。针对多重网络传输服务与网络性能的多样性,提出了一种基于作战任务的层次覆盖网络模型,以及实现网络负载均衡的QoS路由算法。  相似文献   
59.
In this paper, we have developed a model that integrates system dynamics with fuzzy multiple objective programming (SD-FMOP). This model can be used to study the complex interactions in a industry system. In the process of confirming sensitive parameters and fuzzy variables of the SD model, we made use of fuzzy multi-objective programming to help yield the solution. We adopted the chance-constraint programming model to convert the fuzzy variables into precise values. We use genetic algorithm to solve FMOP model, and obtain the Pareto solution through the programming models. It is evident that FMOP is effective in optimizing the given system to obtain the decision objectives of the SD model. The results recorded from the SD model are in our option, reasonable and credible. These results may help governments to establish more effective policy related to the coal industry development.  相似文献   
60.
Features play a fundamental role in sentiment classification. How to effectively select different types of features to improve sentiment classification performance is the primary topic of this paper. Ngram features are commonly employed in text classification tasks; in this paper, sentiment-words, substrings, substring-groups, and key-substring-groups, which have never been considered in sentiment classification area before, are also extracted as features. The extracted features are then compared and analyzed. To demonstrate generality, we use two authoritative Chinese data sets in different domains to conduct our experiments. Our statistical analysis of the experimental results indicate the following: (1) different types of features possess different discriminative capabilities in Chinese sentiment classification; (2) character bigram features perform the best among the Ngram features; (3) substring-group features have greater potential to improve the performance of sentiment classification by combining substrings of different lengths; (4) sentiment words or phrases extracted from existing sentiment lexicons are not effective for sentiment classification; (5) effective features are usually at varying lengths rather than fixed lengths.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号