首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   57393篇
  免费   5650篇
  国内免费   3192篇
电工技术   3230篇
技术理论   1篇
综合类   3939篇
化学工业   9556篇
金属工艺   3105篇
机械仪表   3593篇
建筑科学   3617篇
矿业工程   1313篇
能源动力   1498篇
轻工业   6096篇
水利工程   1150篇
石油天然气   2023篇
武器工业   464篇
无线电   7317篇
一般工业技术   7187篇
冶金工业   2489篇
原子能技术   693篇
自动化技术   8964篇
  2024年   283篇
  2023年   893篇
  2022年   1703篇
  2021年   2237篇
  2020年   1687篇
  2019年   1500篇
  2018年   1748篇
  2017年   1856篇
  2016年   1846篇
  2015年   2376篇
  2014年   3024篇
  2013年   3825篇
  2012年   4234篇
  2011年   4809篇
  2010年   4225篇
  2009年   4228篇
  2008年   4009篇
  2007年   3718篇
  2006年   3374篇
  2005年   2835篇
  2004年   2053篇
  2003年   1651篇
  2002年   1533篇
  2001年   1270篇
  2000年   1008篇
  1999年   787篇
  1998年   670篇
  1997年   478篇
  1996年   424篇
  1995年   343篇
  1994年   264篇
  1993年   251篇
  1992年   177篇
  1991年   162篇
  1990年   118篇
  1989年   106篇
  1988年   77篇
  1987年   75篇
  1986年   51篇
  1985年   38篇
  1984年   37篇
  1983年   31篇
  1982年   41篇
  1981年   15篇
  1980年   24篇
  1979年   17篇
  1978年   15篇
  1977年   18篇
  1976年   27篇
  1975年   19篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
混沌权值变异的Huffman树图像加密算法   总被引:1,自引:0,他引:1  
提出一种采用混沌权值变异的Huff man树的图像加密算法.此算法在熵编码过程中,以基本的Huffman树为标准,利用双耦合混沌序列1对DC系数进行树的结构未变异、路径值变异的加密;再利用双耦合混沌序列2对AC系数进行码字序号的加密.论文对算法进行了仿真,并对安全性、计算复杂度、压缩比性能进行了分析.实验结果表明,该算法基本上不影响压缩效率,且计算复杂度低、安全性高和实时性好,可用于网络上的图像服务.  相似文献   
72.
A superhydrophobic micromesh covered with nanoprotrusions has been introduced and its applicability to a waterproof mobile phone speaker has been evaluated. The nanotextured superhydrophobic micromesh showed excellent water repellency, self-cleaning and waterproofing performances. In a waterproof speaker test using the fabricated nanotextured micromesh, the micromesh did not lose its waterproof function at 2 m water depth and did not form a remnant water film after being removed from the water. The packaged speaker showed almost the same sound quality before and after dipping at a 2 m water depth. These results demonstrate that the superhydrophobic nanotextured micromesh could be directly applicable for various products that need to resist water penetration, yet allow the transmission of gases and sound/light waves.  相似文献   
73.
74.
This paper is devoted to investigating inventory control problems under nonstationary and uncertain demand. A belief-rule-based inventory control (BRB-IC) method is developed, which can be applied in situations where demand and demand-forecast-error (DFE) do not follow certain stochastic distribution and forecasting demand is given in single-point or interval styles. The method can assist decision-making through a belief-rule structure that can be constructed, initialized and adjusted using both manager’s knowledge and operational data. An extended optimal base stock (EOBS) policy is proved for initializing the belief-rule-base (BRB), and a BRB-IC inference approach with interval inputs is proposed. A numerical example and a case study are examined to demonstrate potential applications of the BRB-IC method. These studies show that the belief-rule-based expert system is flexible and valid for inventory control. The case study also shows that the BRB-IC method can compensate DFE by training BRB using historical demand data for generating reliable ordering policy.  相似文献   
75.
This paper investigates the influence of goal awareness and IT self-efficacy on job satisfaction based on the motivation sequence model, goal-setting theory, and social cognitive theory. Using a large-scale field survey of healthcare enterprise resource planning (ERP) system users (n?=?352), this study investigates these relationships and provides important insight to healthcare ERP system researchers and managers. Both goal awareness and IT self-efficacy influence positive job satisfaction of healthcare ERP system users, as expected. Furthermore, the influence of goal awareness is stronger when the role of ERP systems is highly perceived for decision-making of the job. There was no interaction effect between goal awareness and IT self-efficacy in the post hoc analysis. The model is significantly supported by the empirical test with the large number of field data from healthcare ERP system users in the healthcare company. Practical and academic implications are discussed in the paper.  相似文献   
76.
77.
Large holes are unavoidably generated in depth image based rendering (DIBR) using a single color image and its associated depth map. Such holes are mainly caused by disocclusion, which occurs around the sharp depth discontinuities in the depth map. We propose a divide-and-conquer hole-filling method which refines the background depth pixels around the sharp depth discontinuities to address the disocclusion problem. Firstly, the disocclusion region is detected according to the degree of depth discontinuity, and the target area is marked as a binary mask. Then, the depth pixels located in the target area are modified by a linear interpolation process, whose pixel values decrease from the foreground depth value to the background depth value. Finally, in order to remove the isolated depth pixels, median filtering is adopted to refine the depth map. In these ways, disocclusion regions in the synthesized view are divided into several small holes after DIBR, and are easily filled by image inpainting. Experimental results demonstrate that the proposed method can effectively improve the quality of the synthesized view subjectively and objectively.  相似文献   
78.
In this work, we aim to discover real-world events from Flickr data by devising a three-stage event detection framework. In the first stage, a multimodal fusion (MF) model is designed to deal with the heterogeneous feature modalities possessed by the user-shared data, which is advantageous in computation complexity. In the second stage, a dual graph regularized non-negative matrix factorization (DGNMF) model is proposed to learn compact feature representations. DGNMF incorporates Laplacian regularization terms for the data graph and base graph into the objective, keeping the geometry structures underlying the data samples and dictionary bases simultaneously. In the third stage, hybrid clustering algorithms are applied seamlessly to discover event clusters. Extensive experiments conducted on the real-world dataset reveal the MF-DGNMF-based approaches outperform the baselines.  相似文献   
79.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed.  相似文献   
80.
We propose a new approximate numerical algorithm for the steady-state solution of general structured ergodic Markov models. The approximation uses a state-space encoding based on multiway decision diagrams and a transition rate encoding based on a new class of edge-valued decision diagrams. The new method retains the favorable properties of a previously proposed Kronecker-based approximation, while eliminating the need for a Kronecker-consistent model decomposition. Removing this restriction allows for a greater utilization of event locality, which facilitates the generation of both the state-space and the transition rate matrix, thus extends the applicability of this algorithm to larger and more complex models.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号