首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   64509篇
  免费   5670篇
  国内免费   2914篇
电工技术   3617篇
技术理论   2篇
综合类   4169篇
化学工业   10823篇
金属工艺   3755篇
机械仪表   4153篇
建筑科学   4720篇
矿业工程   2163篇
能源动力   1714篇
轻工业   4127篇
水利工程   1098篇
石油天然气   3979篇
武器工业   526篇
无线电   7754篇
一般工业技术   7827篇
冶金工业   3102篇
原子能技术   646篇
自动化技术   8918篇
  2024年   356篇
  2023年   1149篇
  2022年   1882篇
  2021年   2632篇
  2020年   2011篇
  2019年   1804篇
  2018年   1941篇
  2017年   2141篇
  2016年   1943篇
  2015年   2512篇
  2014年   3059篇
  2013年   3666篇
  2012年   4091篇
  2011年   4514篇
  2010年   3716篇
  2009年   3563篇
  2008年   3442篇
  2007年   3334篇
  2006年   3692篇
  2005年   3076篇
  2004年   2138篇
  2003年   1814篇
  2002年   1611篇
  2001年   1458篇
  2000年   1576篇
  1999年   1720篇
  1998年   1527篇
  1997年   1272篇
  1996年   1157篇
  1995年   960篇
  1994年   837篇
  1993年   570篇
  1992年   433篇
  1991年   372篇
  1990年   263篇
  1989年   214篇
  1988年   186篇
  1987年   121篇
  1986年   97篇
  1985年   59篇
  1984年   30篇
  1983年   20篇
  1982年   28篇
  1981年   16篇
  1980年   22篇
  1979年   10篇
  1978年   7篇
  1977年   5篇
  1976年   14篇
  1975年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
961.
为了解决传统边缘检测算法对全方向M型心动图检测效果差的问题,根据基于蚁群算法边缘检测的思想,提出一种基于改进的蚁群算法的边缘检测算法。根据心动图间接来源于CT图的原理,一幅心动图中包含目标、背景、边界和噪声等内容,因此采用传统的边缘检测算法的效果并不理想。这里在传统蚁群算法边缘检测的基础上,根据心动图的特点,采取改进的转移规则和信息素更新策略,以提高检测精度和适应性。再逐步细化,使用蚂蚁算法进行详细的检测,得到最佳的运动曲线。实验结果表明,该算法可以获得精确的运动曲线,其结果能够比传统的方法获得更丰富更真实的心动图运动细节信息,为医生的诊断提供更多信息。  相似文献   
962.
胡芳  金峥华  刘哲  宋娴 《科普研究》2014,9(2):33-38
随着社会经济的飞速发展,人们的文化素养也得到了很大的提升,人们在社会中参与公共事务的愿望不断增强,对科技知识的要求也越来越高。本调研以2013年科技周期间上海向公众开放的科研机构实验室为调查样本,了解其对公众开放的情况以及开放效果,以期对今后相关工作提供切实可行的建议。调研发现虽然开放机构涉及各个专业,且展示形式多样,但开放期间的观众流量仍然偏低,建议在以后的开放活动中,应加大对活动的宣传力度;开放机构应与周边相关机构联动以扩大影响力;同时要对开放效果好的实验室予以奖励,以提高相关机构对开放活动的积极性。  相似文献   
963.
Wireless Mesh Networks (WMNs) have drawn much attention for emerging as a promising technology to meet the challenges in next generation networks. Security and privacy protection have been the primary concerns in pushing towards the success of WMNs. There have been a multitude of solutions proposed to ensure the security of the routing protocol and the privacy information in WMNs. However, most of them are based on the assumptions that all nodes cooperate with routing and forwarding packets and the attacks are from outside. In order to defend against the internal attacks and to achieve better security and privacy protection, this paper proposes a role based privacy-aware secure routing protocol (RPASRP), which combines a new dynamic reputation mechanism with the role based multi-level security technology and a hierarchical key management protocol. Simulation results show that RPASRP implements the security and privacy protection against the inside attacks more effectively and efficiently and performs better than the classical hybrid wireless mesh protocol in terms of packet delivery ratio and average route length.  相似文献   
964.
In order to detect the unused spectrum bands (the spectrum holes) efficiently in cognitive radios with low signal-to-noise radio (SNR), we propose to adopt two independent branches of wavelet to detect the singularities of the received signals’ power spectrum density (PSD). The sensing structure is flexible such that we can use one or two branches to cope with different SNRs. Under low SNR condition, each branch uses distinct characteristics between noise and signals in the wavelet transform to eliminate the singularities generated by the noise. By using bandpass filter to calculate PSD values of the subbands which are distinguished by the signal’s singularities, the subband with the minimum PSD value among all of the subbands could be found. Then, the results of the two branches are merged and analyzed in order to make the final decision. Finally, we use signal reconstruction to further remove the noise and then accurately detect the spectrum holes. When the SNR is high, only one branch through the denoising procedure is needed to get accurate sensing result. Our simulation results show that the two-branch wavelet method is more accurate than conventional approaches under given SNRs.  相似文献   
965.
To achieve unforgeability and confidentiality simultaneously, signcryption has been introduced with better efficiency than the signature-then-encryption approach in terms of computational costs and communication overheads. Taking the key leakage into account, it is desirable to design identity-based key-insulated signcryption (ID-KI-SC) scheme to reduce the damage caused by the secret key leakage. In this paper, we have shown that all of the existing ID-KI-SC scheme can not offer either the unforgeability property or the indistinguishability property. Furthermore, an improved scheme along with the formal security proof in the standard model has been suggested in this paper. In view of computational cost and communication overhead, our scheme is amongst the most efficient IB-SC schemes secure in the standard model.  相似文献   
966.
姜银方  程志军  丁报  潘禹  李娟  金华  王春辉 《激光与红外》2014,44(10):1090-1094
孔结构往往会造成零件上的应力集中,降低零件的疲劳寿命,激光冲击强化能够有效地缓解这一问题。在试验研究中发现采用高峰值压力对试件进行激光冲击强化后,试件的疲劳寿命反而降低,同时断口上的疲劳源也随之发生内移,这很可能是因为高峰值压力在孔壁内产生较大的残余拉应力而降低了小孔件的疲劳寿命。为此采用ABAQUS软件,针对不同峰值压力、载荷脉宽对7050-T7451小孔件孔壁上应力分布的影响进行研究。研究结果表明:峰值压力的提高在增大压应力层深度的同时也会增大带孔件孔壁上的拉应力,同时残余拉应力所在位置也随之发生内移;当峰值压力不同时,载荷脉宽对孔壁上应力分布的影响也会随之改变。  相似文献   
967.
The effect of active layer deposition temperature on the electrical performance of amorphous InGaZnO (a-IGZO) thin film transistors (TFTs) is investigated. With increasing annealing temperature, TFT performance is firstly improved and then degraded generally. Here TFTs with best performance defined as "optimized-annealed" are selected to study the effect of active layer deposition temperature. The field effect mobility reaches maximum at deposition temperature of 150℃ while the room-temperature fabricated device shows the best subthreshold swing and off-current. From Hall measurement results, the carrier concentration is much higher for intentional heated a-IGZO films, which may account for the high off-current in the corresponding TFT devices. XPS characterization results also reveal that deposition temperature affects the atomic ratio and Ols spectra apparently. Importantly, the variation of field effect mobility of a-IGZO TFTs with deposition temperature does not coincide with the tendencies in Hall mobility of a-IGZO thin films, Based on the further analysis of the experimental results on a-IGZO thin films and the corresponding TFT devices, the trap states at front channel interface rather than IGZO bulk layer properties may be mainly responsible for the variations of field effect mobility and subthreshold swing with IGZO deposition temperature.  相似文献   
968.
针对高功率激光器合成效率低、能量不集中的问题,构建基于角锥棱镜腔的相干合成激光器,分析远场合成效率不高的原因,提出光—电闭环的自适应驱动方法,通过反馈调节,克服因线路、器件以及其他电磁干扰等因素造成的不同步问题,提高相干合成效率。实验结果表明,经过自适应驱动的激光器,能显著提高相干合成效率,避免人工调整参数带来的误差,提高了激光器的稳定性和工作效率。  相似文献   
969.
本文从二极管箝位型三电平逆变器的基本结构出发,分析其输出状态,推导出六角形空间电压矢量图。然后从一种改进的,可以减小开关损耗,避免高的dv/dt三电平空间矢量PWM调制策略出发,建立了基于Matlab的详细仿真方案,验证了方案的可行性。文章给出了扇区判断的算法流程图,脉冲生成模块的内部结构图,其中的扇区判断的算法和脉冲生成方法对于用DSP实现三电平SVPWM具有重要的参考价值。  相似文献   
970.
Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack. Furtherlnore, based on the elliptic curve cryptosystem, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号