首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7939篇
  免费   623篇
  国内免费   256篇
电工技术   447篇
技术理论   2篇
综合类   526篇
化学工业   1344篇
金属工艺   362篇
机械仪表   433篇
建筑科学   518篇
矿业工程   228篇
能源动力   214篇
轻工业   735篇
水利工程   138篇
石油天然气   476篇
武器工业   55篇
无线电   709篇
一般工业技术   948篇
冶金工业   645篇
原子能技术   59篇
自动化技术   979篇
  2024年   26篇
  2023年   114篇
  2022年   201篇
  2021年   296篇
  2020年   203篇
  2019年   196篇
  2018年   240篇
  2017年   268篇
  2016年   240篇
  2015年   291篇
  2014年   399篇
  2013年   505篇
  2012年   500篇
  2011年   551篇
  2010年   454篇
  2009年   421篇
  2008年   426篇
  2007年   411篇
  2006年   441篇
  2005年   314篇
  2004年   243篇
  2003年   219篇
  2002年   194篇
  2001年   214篇
  2000年   178篇
  1999年   192篇
  1998年   260篇
  1997年   189篇
  1996年   135篇
  1995年   111篇
  1994年   91篇
  1993年   66篇
  1992年   37篇
  1991年   31篇
  1990年   22篇
  1989年   22篇
  1988年   22篇
  1987年   13篇
  1986年   9篇
  1985年   8篇
  1984年   3篇
  1983年   11篇
  1982年   9篇
  1980年   3篇
  1979年   5篇
  1978年   3篇
  1977年   10篇
  1976年   11篇
  1975年   2篇
  1974年   3篇
排序方式: 共有8818条查询结果,搜索用时 187 毫秒
61.
62.
Winner-Take-All (WTA) or K-Winner-Take-All (KWTA) networks have been frequently used as the basic building blocks of complex neural networks. This paper introduces a new selection rule for network connections that implements stable KWTA networks. To widen the applications of WTA networks, a new class of WTA networks is proposed, and their efficient design methods are presented. We demonstrate the properties of the generalized class of WTA networks, through three application examples.  相似文献   
63.
本文研究了TiO2掺入对CaO稳定ZrO2(简称CaSZ-NiCr)金属陶瓷烧结特性的影响,测定了CaSZ-NiCr-TiO2金属陶瓷烧结样品的密度和显微硬度,结果表明,TiO2的掺入能提高CaSZ-NICr金属陶瓷的烧结密度和显微硬度,对CaSZ-NiCr金属陶瓷有助烧结作用.金相观察表明,TiO3的掺入改变了NiCr相在金属陶瓷中的形貌,说明了NiCr与CaSZ的浸润性有一定的改善.XRD和EPMA分析结果显示,TiO2偏聚在NiCr金属相中,不影响CaSZ的稳定性.  相似文献   
64.
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier.  相似文献   
65.
The Journal of Supercomputing - In this paper, we propose a parallel source separation system designed to extract heart and lung sounds from single-channel mixtures. The proposed system is based on...  相似文献   
66.
Mu  Dongdong  Wang  Guofeng  Fan  Yunsheng 《Neural computing & applications》2021,33(19):12777-12789
Neural Computing and Applications - In this paper, one concerns with the problem of trajectory tracking control for an underactuated unmanned surface vehicle subject to uncertain dynamics and input...  相似文献   
67.
The explosive growth of Chinese electronic market has made it possible for companies to better understand consumers?? opinion towards their products in a timely fashion through their online reviews. This study proposes a framework for extracting knowledge from online reviews through text mining and econometric analysis. Specifically, we extract product features, detect topics, and identify determinants of customer satisfaction. An experiment on the online reviews from a Chinese leading B2C (Business-to-Customer) website demonstrated the feasibility of the proposed method. We also present some findings about the characteristics of Chinese reviewers.  相似文献   
68.
This paper presents an indirect adaptive controller combined with hysteresis compensation to achieve high accuracy positioning control of piezoceramic actuators and illustrates the results with an atomic force microscope (AFM) application. A dynamic model of a piezoceramic actuator system in AFM is derived and analyzed. A feedforward controller based on the Preisach model is proposed to compensate for the nonlinear hysteresis effects. Then an indirect adaptive controller is designed to achieve desired tracking performance as well as deal with the uncompensated nonlinearity from hysteresis and the system parameter variation due to creep. Experimental results indicate that the proposed controller can significantly improve the positioning control accuracy of the piezoceramic actuator as well as achieve high image quality of the AFM system. The maximum scanning error was reduced from 2µm to 0.3µm in comparison with a proportional‐integral‐derivative (PID) controller. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
69.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
70.
采用水淬法制备了Zr—Ti—Cu—Ni—Be—Co块状非晶合金(BMGs)。使用XRD进行相分析,采用热分析仪进行玻璃转变温度、晶化温度和热稳定性等的测定,用SEM观察试样压缩后的外表面和断口形貌。研究了Co对Zr—Ti—Cu—Ni—Be合金非晶形成能力(GFA)、热稳定性及力学性能的影响。结果表明:含Co的所有Zr—Ti—Cu—Ni—Be BMGs都有1个明显的玻璃转变点和宽的过冷液相区(△T)。Zr38Ti17Cu10.5Co12Be22.5合金具有和Zr41Ti14Cu12.5Ni10Be22.5合金相当的△T;Co的添加明显提高Zr—Ti—Cu—Ni—Be BMGs的力学性能,含Co量大于10at%的Zr—Ti—Cu—Ni—Be BMGs的压缩断裂强度(σf)超过2000MPa,Zr38Ti17Co22.5Be22.5合金的σf达到2230MPa,比Zr41Ti14Cu12.5Ni10Be22.5合金的σf提高23%。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号