首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8047篇
  免费   358篇
  国内免费   49篇
电工技术   222篇
综合类   20篇
化学工业   1702篇
金属工艺   173篇
机械仪表   195篇
建筑科学   246篇
矿业工程   8篇
能源动力   529篇
轻工业   773篇
水利工程   94篇
石油天然气   153篇
武器工业   4篇
无线电   1002篇
一般工业技术   1393篇
冶金工业   522篇
原子能技术   83篇
自动化技术   1335篇
  2024年   18篇
  2023年   185篇
  2022年   444篇
  2021年   544篇
  2020年   379篇
  2019年   391篇
  2018年   493篇
  2017年   346篇
  2016年   389篇
  2015年   241篇
  2014年   378篇
  2013年   621篇
  2012年   406篇
  2011年   457篇
  2010年   292篇
  2009年   255篇
  2008年   234篇
  2007年   219篇
  2006年   185篇
  2005年   160篇
  2004年   126篇
  2003年   105篇
  2002年   121篇
  2001年   65篇
  2000年   68篇
  1999年   87篇
  1998年   143篇
  1997年   124篇
  1996年   79篇
  1995年   85篇
  1994年   61篇
  1993年   59篇
  1992年   42篇
  1991年   24篇
  1990年   31篇
  1989年   44篇
  1988年   49篇
  1987年   29篇
  1986年   28篇
  1985年   46篇
  1984年   52篇
  1983年   43篇
  1982年   31篇
  1981年   23篇
  1980年   31篇
  1979年   25篇
  1978年   19篇
  1977年   22篇
  1976年   38篇
  1974年   19篇
排序方式: 共有8454条查询结果,搜索用时 15 毫秒
61.
We present a scheme for the implementation of three-qubit Grover’s algorithm using four-level superconducting quantum interference devices (SQUIDs) coupled to a superconducting resonator. The scheme is based on resonant, off-resonant interaction of the cavity field with SQUIDs and application of classical microwave pulses. We show that adjustment of SQUID level spacings during the gate operations, adiabatic passage, and second-order detuning are not required that leads to faster implementation. We also show that the marked state can be searched with high fidelity even in the presence of unwanted off-resonant interactions, level decay, and cavity dissipation.  相似文献   
62.
We propose a new formulation of quantum algorithm which allows to distribute amplitudes over two copies of small quantum subsystems. The new method gives a fixed number of copies and applied to the control of multi-qubit system. The analysis for the amount of error due to the distribution process has been presented for a system of 10 qubits with a small quantum subsystems to be copied. The present scheme provides a new way to distribute amplitudes over small quantum subsystems.  相似文献   
63.
The commonly used LRU replacement policy causes thrashing for memory- intensive workloads. A simple mechanism that dynamically changes the insertion policy used by LRU replacement reduces cache misses by 21 percent and requires a total storage overhead of less than 2 bytes.  相似文献   
64.
Although CAD tools have significantly assisted electronic system simulation, the system-level optoelectronics modeling field has lagged behind due to a lack of simulation methodologies and tools. Optisim, a system-level modeling and simulation methodology of optical interconnects for HPC systems, can provide computer architects, designers, and researchers with a highly optimized, efficient, and accurate discrete-event environment to test various HPC systems.  相似文献   
65.
66.
A fundamental challenge in the design of Wireless Sensor Networks (WSNs) is to maximize their lifetimes especially when they have a limited and non-replenishable energy supply. To extend the network lifetime, power management and energy-efficient communication techniques at all layers become necessary. In this paper, we present solutions for the data gathering and routing problem with in-network aggregation in WSNs. Our objective is to maximize the network lifetime by utilizing data aggregation and in-network processing techniques. We particularly focus on the joint problem of optimal data routing with data aggregation en route such that the above mentioned objective is achieved. We present Grid-based Routing and Aggregator Selection Scheme (GRASS), a scheme for WSNs that can achieve low energy dissipation and low latency without sacrificing quality. GRASS embodies optimal (exact) as well as heuristic approaches to find the minimum number of aggregation points while routing data to the Base-Station (BS) such that the network lifetime is maximized. Our results show that, when compared to other schemes, GRASS improves system lifetime with acceptable levels of latency in data aggregation and without sacrificing data quality.  相似文献   
67.
Ahmed F  Karim MA 《Applied optics》1995,34(32):7556-7560
Rotation-invariant target detection using a trained filter-feature-based joint Fourier transform (JFT) correlator is investigated. First, a composite reference image is obtained from a training set of targets. An optimum filter formulation is then applied on this composite image to come up with a new feature that we refer to as a filter feature. This feature is then used in a JFT correlator, which results in a simple and robust rotation-invariant target recognition system.  相似文献   
68.
For studying flow problems involved with complex physics it is now common to use numerical field methods for solving Navier-Stokes or Euler equations. However, for a large class of fluid mechanics problems, which can be dealt with linearized potential equations, the boundary element method proves to be quite useful, especially for its easy application and relatively less computational effort compared to the field methods. The boundary element method has undergone some significant advancements in the last decade with respect to the study of steady and unsteady flow problems concerning wing aerodynamics in compressible medium, flow fields of propellers and rotors and acoustical disturbance propagation from moving bodies. In this paper a few recent contributions which evolved in the DLR as research projects and as doctoral and diploma thesis of the Technical University Braunschweig are concisely described.List of symbols a Sound velocity - b Span of a wing - c p Coefficient of static pressure - c dp Coefficient of profile drag - c 1, c d, cm Coefficient of lift, drag and moment per unit span width - c L, cD, cM Total lift, drag and moment-coefficients - c T, cP Thrust and power-coefficient of a propeller - d Distance - D Doublet strength - e Specific heat energy - E Total energy in a moving medium element - f Frequency - F Field point - g Gravitational acceleration - h Radial distance in cylinder coordinates - I 1, I 2 Inducing functions - i, j, k Unit vectors in cartesian coordinates - k Wave number [/a ] - l Local wing-chord - l 0, l v Length of singularity element at t oand t v - m Notation for Fourier-component - M, M * Mach number based on local and critical sound speed - n Number of rotation per second - n Unit normal vector to a surface  相似文献   
69.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT.  相似文献   
70.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号