首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   167221篇
  免费   8893篇
  国内免费   4393篇
电工技术   6436篇
技术理论   6篇
综合类   7785篇
化学工业   24864篇
金属工艺   9757篇
机械仪表   8618篇
建筑科学   8464篇
矿业工程   3458篇
能源动力   3638篇
轻工业   10005篇
水利工程   2896篇
石油天然气   5270篇
武器工业   794篇
无线电   18856篇
一般工业技术   25465篇
冶金工业   6636篇
原子能技术   1305篇
自动化技术   36254篇
  2024年   354篇
  2023年   1406篇
  2022年   2731篇
  2021年   3908篇
  2020年   2943篇
  2019年   2379篇
  2018年   16763篇
  2017年   16089篇
  2016年   12461篇
  2015年   4541篇
  2014年   5103篇
  2013年   5697篇
  2012年   9118篇
  2011年   15688篇
  2010年   13817篇
  2009年   10527篇
  2008年   11605篇
  2007年   12383篇
  2006年   4770篇
  2005年   5082篇
  2004年   3690篇
  2003年   3175篇
  2002年   2384篇
  2001年   1561篇
  2000年   1772篇
  1999年   1828篇
  1998年   1420篇
  1997年   1177篇
  1996年   1200篇
  1995年   997篇
  1994年   789篇
  1993年   529篇
  1992年   447篇
  1991年   353篇
  1990年   268篇
  1989年   236篇
  1988年   198篇
  1987年   114篇
  1986年   90篇
  1985年   64篇
  1984年   54篇
  1982年   36篇
  1968年   43篇
  1966年   44篇
  1965年   45篇
  1959年   39篇
  1958年   37篇
  1957年   37篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 64 毫秒
991.
Li  Hongjian  Wei  Yaojun  Xiong  Yu  Ma  Enjie  Tian  Wenhong 《The Journal of supercomputing》2021,77(10):11575-11596
The Journal of Supercomputing - With the fast growth of big data applications, it has brought about a huge increase in the energy consumption for big data processing in Cloud data centers. In this...  相似文献   
992.
Ma  Bin  Chang  Lili  Wang  Chunpeng  Li  Jian  Li  Gang  Xia  Zhiqiu  Wang  Xingyuan 《Journal of Mathematical Imaging and Vision》2021,63(9):1160-1178
Journal of Mathematical Imaging and Vision - Different from the traditional watermarking schemes, zero-watermarking schemes are lossless embedding methods, which are applicable to be used in...  相似文献   
993.
Wang  Nan  Zou  Qi  Ma  Qiulin  Huang  Yaping  Lou  Haitao  Wu  Xiaoyu  Liu  Huiyong 《Applied Intelligence》2021,51(11):8010-8029

We propose a novel online multiple object tracker taking structure information into account. State-of-the-art multi-object tracking (MOT) approaches commonly focus on discriminative appearance features, while neglect in different levels structure information and the core of data association. Addressing this, we design a new tracker fully exploiting structure information and encoding such information into the cost function of the graph matching model. Firstly, a new measurement is proposed to compare the structure similarity of two graphs whose nodes are equal. With this measurement, we define a complete matching which performs association in high efficiency. Secondly, for incomplete matching scenarios, a structure keeper net (SKnet) is designed to adaptively establish the graph for matching. Finally, we conduct extensive experiments on benchmarks including MOT2015 and MOT17. The results demonstrate the competitiveness and practicability of our tracker.

  相似文献   
994.
Ma  Boyuan  Zhu  Yu  Yin  Xiang  Ban  Xiaojuan  Huang  Haiyou  Mukeshimana  Michele 《Neural computing & applications》2021,33(11):5793-5804
Neural Computing and Applications - Muti-focus image fusion is the extraction of focused regions from different images to create one all-in-focus fused image. The key point is that only objects...  相似文献   
995.
Liu  Jiahuan  Guo  Fei  Gao  Huang  Huang  Zhigao  Zhang  Yun  Zhou  Huamin 《Neural computing & applications》2021,33(21):14179-14197
Neural Computing and Applications - Image classification tasks widely exist in many actual scenarios, including medicine, security, manufacture and finance. A major problem that hurts algorithm...  相似文献   
996.
Yang  Chao  Ding  Yijie  Meng  Qiaozhen  Tang  Jijun  Guo  Fei 《Neural computing & applications》2021,33(17):11387-11399
Neural Computing and Applications - RNA-binding proteins play an important role in the biological process. However, the traditional experiment technology to predict RNA-binding residues is...  相似文献   
997.
Wang  Fei  Zhang  Weiwei  Xu  Zongfeng  Ping  Jingyu  Chu  Hao 《Neural computing & applications》2021,33(15):9061-9073
Neural Computing and Applications - In real-world application of affective brain–computer interface (aBCI), individual differences across subjects and non-stationary characteristics of...  相似文献   
998.
云存储安全增强系统的设计与实现   总被引:1,自引:0,他引:1  
云存储是一种新型的网络存储形式,并逐步为大家所接受,企业和个人用户都开始使用云存储作为其网络存储媒介。目前很多著名的IT企业都推出了云存储服务,其中Amazon公司推出的SimpleStorageService(S3)就是商用云存储服务的典型代表。随着云存储的广泛使用,云存储中数据的安全问题,如数据泄漏和数据篡改,也成了用户广泛关注的问题。文章基于Amazons3的云存储服务,设计并实现了一款云存储安全增强系统,对用户上传至Amazons3的数据进行加密保护,使得文件以密文形式存储于Amazons3,可以有效防止数据在传输和存储过程中的泄漏;同时系统还对从s3下栽的文件进行完整性校验,检测其内容与上传时是否一致,以防止文件被篡改;最后,系统还提供了多用户访问控制支持,多个用户可以共享同一个S3账号,同时保证各自存储的内容互相隔离,禁止一个用户非授权访问其他用户存储的文件。  相似文献   
999.
Radio frequency identification (RFID) tag delegation enables a centralized back-end server to delegate the right to identify and authenticate a tag to specified readers. This should be used to mitigate the computational load on the server side and also to solve the issues in terms of latency and dependency on network connectivity. In this study, we describe a basic RFID delegation architecture and then under this model, we investigate the security of an RFID delegation protocol: Song Mitchell delegation (SMD), which is recently proposed by Song and Mitchell. We point out security flaws that have gone unnoticed in the design and present two attacks namely, a tag impersonation attack and a desynchronization attack against it. We also discover a subtle flaw by which a delegated entity can still keep its delegation rights after the expire of them—this infringes security policy of the scheme. More precisely, we show that the protocol will be still vulnerable to previously mentioned attacks, even if the back-end server ends the delegation right of a delegated reader and update the secrets of the delegated tags. To counteract such flaws, we improve the SMD protocol with a stateful variant so that it provides the claimed security properties.  相似文献   
1000.
Examining several sources of data on smartphone use, this paper presents evidence for the popular conjecture that mobile devices are “habit-forming.” The form of habits we identified is called a checking habit: brief, repetitive inspection of dynamic content quickly accessible on the device. We describe findings on kinds and frequencies of checking behaviors in three studies. We found that checking habits occasionally spur users to do other things with the device and may increase usage overall. Data from a controlled field experiment show that checking behaviors emerge and are reinforced by informational “rewards” that are very quickly accessible. Qualitative data suggest that although repetitive habitual use is frequent, it is experienced more as an annoyance than an addiction. We conclude that supporting habit-formation is an opportunity for making smartphones more “personal” and “pervasive.”  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号