首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   25667篇
  免费   1963篇
  国内免费   877篇
电工技术   1347篇
技术理论   1篇
综合类   1409篇
化学工业   4574篇
金属工艺   1360篇
机械仪表   1411篇
建筑科学   1893篇
矿业工程   598篇
能源动力   889篇
轻工业   1678篇
水利工程   347篇
石油天然气   1370篇
武器工业   118篇
无线电   3131篇
一般工业技术   3290篇
冶金工业   1453篇
原子能技术   329篇
自动化技术   3309篇
  2024年   90篇
  2023年   417篇
  2022年   726篇
  2021年   1061篇
  2020年   742篇
  2019年   685篇
  2018年   712篇
  2017年   828篇
  2016年   779篇
  2015年   953篇
  2014年   1265篇
  2013年   1616篇
  2012年   1596篇
  2011年   1748篇
  2010年   1425篇
  2009年   1465篇
  2008年   1358篇
  2007年   1254篇
  2006年   1359篇
  2005年   1180篇
  2004年   851篇
  2003年   764篇
  2002年   772篇
  2001年   551篇
  2000年   529篇
  1999年   613篇
  1998年   580篇
  1997年   466篇
  1996年   453篇
  1995年   355篇
  1994年   287篇
  1993年   192篇
  1992年   180篇
  1991年   120篇
  1990年   94篇
  1989年   73篇
  1988年   90篇
  1987年   49篇
  1986年   46篇
  1985年   26篇
  1984年   33篇
  1983年   19篇
  1982年   27篇
  1981年   12篇
  1980年   10篇
  1979年   15篇
  1977年   4篇
  1976年   9篇
  1975年   4篇
  1965年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
信任模型是整个网络安全体系的基础,决定了在网络上采用信任的形式与采用该形式带来的信任风险,并提供了建立和管理信任关系的框架。可见,对于信任模型的研究在网络安全中非常重要。文章着重分析了基于PKI的各类信任模型的信任机制、认证过程及其存在优缺点,指出了各类信任模型对网络信息安全产生影响的主要原因。通过总结与对比,指出了PKI信任模型的设计策略与发展趋势。  相似文献   
72.
时间序列分析是动态数据分析的重要方法,在多学科领域中得到广泛的研究和运用.研究时间序列分析在城市轨道交通自动售检票系统数据分析中的应用方法,并结合某线路AFC系统的历史沉淀数据,给出两个完整的时间序列分析案例,其分析方法能够为AFC运营管理提供有效决策的手段.  相似文献   
73.
基于粒子系统和音频系统的烟花模拟   总被引:2,自引:1,他引:1  
针对模糊物体的模拟方法存在着粒子数量绘制巨大、粒子运动状态复杂、计算耗时、实时性及逼真性不够等问题,提出了一种基于粒子系统和音频系统的烟花模拟方法,以三角形格作为绘制烟花粒子的基本图元,结合纹理映射,色彩融合技术来绘制烟花粒子,在显示列表中生成纹理,再结合FMOD引擎技术,加入音频系统,实验结果表明提出的方法增强了模拟的逼真性.  相似文献   
74.
Hurricanes and tropical storms are severe threats to coastal properties, settlements, and infrastructure. Airborne light detection and ranging (lidar) surveys conducted before and after storm events allow detailed analysis of coastal geomorphologic and sediment volumetric changes and have been proved very useful in the study of coastal changes. Traditionally, most studies use the pixel-based differencing method to quantify the spatial extent and magnitude of coastal changes based on sequential lidar surveys. This research presents a graph theory-based approach and associated software tools for representing and quantifying storm-induced damages to buildings, beaches and sand dunes, coastal vegetation canopy, and infrastructure. Generation of elevation difference grids, construction of local contour trees, and derivation of semantic properties are key components of the new algorithm for change object detection and extraction. An ontology and taxonomy are proposed to classify change objects into different types of coastal damages in terms of their semantic properties. This method has been successfully applied to assess damages of Hurricane Ike to the Bolivar Peninsula on the Texas Gulf Coast based on pre- and post-storm airborne lidar data and colour infrared aerial photographs.  相似文献   
75.
Universal Access in the Information Society - In recent years, researchers have attempted to shift patient decision aids (PDAs) from paper-based to web-based to increase its accessibility. Insulin...  相似文献   
76.
交流阻抗法测定锂离子电池正极材料的导电率   总被引:1,自引:0,他引:1  
采用交流阻抗法测定了3种锂离子电池正极材料LiCoO2,LiMn2O4和LiFePO4的电子导电率、离子导电率和材料电导率.结果表明,LiCoO2材料的电导率较高,含有聚阴离子基团LiFePO4材料的电子电导率和离子电导率均较低.  相似文献   
77.
异质环境中可靠组播的代理结构   总被引:1,自引:0,他引:1  
文章提出了一种适于异质网络环境的可靠组播代理结构。这种代理结构将网络环境相异的可靠组播会话分解成若干个网络环境相似的子会话,从而缓解了异质网络环境的异构问题。不仅如此,通过在可靠组播代理中引入应用程序的语义,实现了语义可靠性,即应用程序能够根据语义控制它所需要的数据可靠性。  相似文献   
78.
数据仓库中元数据技术研究   总被引:11,自引:0,他引:11  
元数据及其管理是数据仓库系统的核心部件,是内部技术人员开发与维护数据仓库的蓝图,是商业终端用户导航数据仓库以及定位有用信息的路标。该文详细介绍了无数据的功能及其管理,然后简单介绍了元数据联盟的开放信息模型。  相似文献   
79.
An Internet-based negotiation server for e-commerce   总被引:6,自引:0,他引:6  
This paper describes the design and implementation of a replicable, Internet-based negotiation server for conducting bargaining-type negotiations between enterprises involved in e-commerce and e-business. Enterprises can be buyers and sellers of products/services or participants of a complex supply chain engaged in purchasing, planning, and scheduling. Multiple copies of our server can be installed to complement the services of Web servers. Each enterprise can install or select a trusted negotiation server to represent his/her interests. Web-based GUI tools are used during the build-time registration process to specify the requirements, constraints, and rules that represent negotiation policies and strategies, preference scoring of different data conditions, and aggregation methods for deriving a global cost-benefit score for the item(s) under negotiation. The registration information is used by the negotiation servers to automatically conduct bargaining type negotiations on behalf of their clients. In this paper, we present the architecture of our implementation as well as a framework for automated negotiations, and describe a number of communication primitives which are used in the underlying negotiation protocol. A constraint satisfaction processor (CSP) is used to evaluate a negotiation proposal or counterproposal against the registered requirements and constraints of a client company. In case of a constraint violation, an event is posted to trigger the execution of negotiation strategic rules, which either automatically relax the violated constraint, ask for human intervention, invoke an application, or perform other remedial operations. An Event-Trigger-Rule (ETR) server is used to manage events, triggers, and rules. Negotiation strategic rules can be added or modified at run-time. A cost-benefit analysis component is used to perform quantitative analysis of alternatives. The use of negotiation servers to conduct automated negotiation has been demonstrated in the context of an integrated supply chain scenario. Received: 30 October 2000 / Accepted: 12 January 2001 Published online: 2 August 2001  相似文献   
80.
A Regression Approach to Music Emotion Recognition   总被引:3,自引:0,他引:3  
Content-based retrieval has emerged in the face of content explosion as a promising approach to information access. In this paper, we focus on the challenging issue of recognizing the emotion content of music signals, or music emotion recognition (MER). Specifically, we formulate MER as a regression problem to predict the arousal and valence values (AV values) of each music sample directly. Associated with the AV values, each music sample becomes a point in the arousal-valence plane, so the users can efficiently retrieve the music sample by specifying a desired point in the emotion plane. Because no categorical taxonomy is used, the regression approach is free of the ambiguity inherent to conventional categorical approaches. To improve the performance, we apply principal component analysis to reduce the correlation between arousal and valence, and RReliefF to select important features. An extensive performance study is conducted to evaluate the accuracy of the regression approach for predicting AV values. The best performance evaluated in terms of the R 2 statistics reaches 58.3% for arousal and 28.1% for valence by employing support vector machine as the regressor. We also apply the regression approach to detect the emotion variation within a music selection and find the prediction accuracy superior to existing works. A group-wise MER scheme is also developed to address the subjectivity issue of emotion perception.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号