首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   198174篇
  免费   16940篇
  国内免费   9049篇
电工技术   12292篇
技术理论   16篇
综合类   12808篇
化学工业   32664篇
金属工艺   10829篇
机械仪表   12402篇
建筑科学   15206篇
矿业工程   5838篇
能源动力   5785篇
轻工业   13746篇
水利工程   3580篇
石油天然气   11686篇
武器工业   1544篇
无线电   23496篇
一般工业技术   24172篇
冶金工业   9800篇
原子能技术   2138篇
自动化技术   26161篇
  2024年   961篇
  2023年   3632篇
  2022年   6716篇
  2021年   8992篇
  2020年   6805篇
  2019年   5432篇
  2018年   6118篇
  2017年   6900篇
  2016年   6155篇
  2015年   8190篇
  2014年   10140篇
  2013年   12231篇
  2012年   13310篇
  2011年   13995篇
  2010年   11957篇
  2009年   11312篇
  2008年   10902篇
  2007年   10083篇
  2006年   10348篇
  2005年   8978篇
  2004年   5956篇
  2003年   5080篇
  2002年   4571篇
  2001年   4098篇
  2000年   4173篇
  1999年   4824篇
  1998年   4045篇
  1997年   3454篇
  1996年   3208篇
  1995年   2647篇
  1994年   2125篇
  1993年   1532篇
  1992年   1247篇
  1991年   947篇
  1990年   693篇
  1989年   577篇
  1988年   453篇
  1987年   293篇
  1986年   251篇
  1985年   172篇
  1984年   134篇
  1983年   91篇
  1982年   99篇
  1981年   80篇
  1980年   71篇
  1979年   35篇
  1978年   28篇
  1977年   27篇
  1976年   30篇
  1975年   18篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
本文主要从Moodle平台的特点以及高职院校信息化教学中存在的问题展开,在做了详细的需求分析的前提下,对教学方案的实施效果和存在的问题进行了分析和总结,指出必须确立"教育的最终结果,就是培养一个独立的学习者"的目标,同时加强师生互动交流和自主学习能力建设,才能构建科学合理的符合网络教学规律的教学方案。  相似文献   
992.
近几年来随着计算机虚拟化技术的迅速发展,基于完全虚拟化技术的安全监控应运而生,它不仅能确保监控工具的有效性、牢固性,而且监控技术易于实现.本文将从安全监控架构中内核、内核可加戢模块两个方面存在的问题对基于完全虚拟化的安全监控技术进行探析.  相似文献   
993.
Driver intention detection is an important component in human-centric driver assistance systems. This article proposes a novel method for detecting driver normal and emergency left- or right-lane-changing intentions by using driver models based on the queuing network cognitive architecture. Driver lane-changing and lane-keeping models are developed and used to simulate driver behavior data associated with 5 kinds of intentions (i.e., normal and emergency left- or right-lane-changing and lane-keeping intentions). The differences between 5 sets of simulated behavior data and the collected actual behavior data are computed, and the intention associated with the smallest difference is determined as the detection outcome. The experimental results from 14 drivers in a driving simulator show that the method can detect normal and emergency lane-changing intentions within 0.325 s and 0.268 s of the steering maneuver onset, respectively, with high accuracy (98.27% for normal lane changes and 90.98% for emergency lane changes) and low false alarm rate (0.294%).  相似文献   
994.
Reversible watermarking can be applied to the protection for important digital media, such as medical and military image, it allows the watermark to be extracted and the original image to be restored completely, but reversible watermarking with stronger robustness is seldom discussed in existing literature. In this paper, a novel reversible watermarking algorithm based on chaotic system is proposed; chaotic system is not only used to search space of reversibility of the scheme, but also used to randomly select the position of watermarking embedding. Consequently, the proposed scheme achieves larger threshold space of reversibility and better performance of security. For some specific thresholds, the proposed algorithm is not only reversible, but also has stronger robustness against image compression. The experimental results show that the ergodicity and sensitivity to initial values of chaotic system play an important role in reversible watermarking algorithm, and the proposed scheme can achieve balance between reversibility and robustness with the help of chaotic system.  相似文献   
995.
The main contribution of this paper is to completely characterize the dynamic behavior of the discrete‐time double integrator with a saturated locally stabilizing linear state feedback law. In continuous‐time setting, any linear state feedback control law that locally stabilizes the double integrator also globally stabilizes the system in the presence of actuator saturation. In discrete‐time setting, the equivalent of the double integrator does not have the same property. In this paper, we completely characterize the global behavior of saturated locally stabilizing linear state feedback laws for the discrete‐time double integrator. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
996.
Interaction and communication between humans with smart mobile devices are a new trend of development in Internet of Things (IoT). With the powerful sensing capability of smart device and human mobility, various services could be provided by building a trusted chain between service requesters and suppliers. The cognition of social relations between mobile nodes is the basis of final mobile-aware services. It involves many decision factors, such as time, space and activity patterns. Using social network theory, a new cognitive model for social relations of mobile nodes in IoT is proposed. Firstly, nodes' social relations are reasoned and quantified from multiple perspectives based on the summary of social characteristics of mobile nodes and the definition of different decision factors. Then the location factor, interconnection factor, service evaluation factor and feedback aggregation factor are defined to solve the shortcomings in existing quantitative models. Finally, the weight distribution is set up by information entropy and rough set theory for these decision factors; it can overcome the shortage of traditional methods, in which the weight is set up by subjective ways and hence their dynamic adaptability is poor. We compare our cognitive model to existing models using MIT dataset by defining a variety of test indicators, such as network overall density (NOD), the degree center potential (DCP), the network distribution index (EI), etc. Simulation results show that, the cognitive model has better internal structure and significant validity in network analysis, and thus can provide mobile-aware service effectively in dynamic environment.  相似文献   
997.
Network watermarking schemes have been proposed to trace secret network attack flows transferred through stepping stones as well as anonymous channels. However, most existing network flow watermark detection techniques focus on a fixed sample size of network data to achieve the required accuracy. Irrespective of the uncertainty or information content of successive observations, such detection techniques will result in low efficiency of watermark detection. We herein propose a novel sequential watermark detection model (SWDM) supporting three sequential detectors for efficient traceback of network attack flows. By exploiting the sequential probability ratio test approach, we first propose the intuitive paired-intervals-based optimum watermark detector (POWD) and the single-interval-based optimum watermark detector (SOWD) under the assumption of known parameters of the observed attack flow. We then propose the sequential sign watermark detector (SSWD) that operates on two-level quantized observations for nonparametric watermark detection. Based on our SWDM model, a statistical analysis of sequential detectors, with no assumptions or limitations concerning the distribution of the timing of packets, proves their effectiveness despite traffic timing perturbations. The experiments using a large number of synthetically-generated SSH traffic flows demonstrate that there is a significant advantage in using our sequential watermark detectors based on the proposed SWDM model over the existing fixed sample size watermark detector (FSWD). Compared to the FSWD detector, the POWD detector achieves almost 28% savings in the average number of packets. Especially, given the required probability of detection errors, the SOWD detector and the SSWD detector can achieve almost 47% and 29% savings, respectively, in the average number of required packets, thus resulting in not only guaranteed rates of detection errors but also high efficiency of flow traceback.  相似文献   
998.
Topology control can enhance energy efficiency and prolong network lifetime for wireless sensor networks. Several studies that attempted to solve the topology control problem focused only on topology construction or maintenance. This work designs a novel distributed and reliable energy-efficient topology control (RETC) algorithm for topology construction and maintenance in real application environments. Particularly, many intermittent links and accidents may result in packet loss. A reliable topology can ensure connectivity and energy efficiency, prolonging network lifetime. Thus, in the topology construction phase, a reliable topology is generated to increase network reachable probability. In the topology maintenance phase, this work applies a novel dynamic topology maintenance scheme to balance energy consumption using a multi-level energy threshold. This topology maintenance scheme can trigger the topology construction algorithm to build a new network topology with high reachable probability when needed. Experimental results demonstrate the superiority of the RETC algorithm in terms of average energy consumption and network lifetime.  相似文献   
999.
This study proposes an intelligent algorithm with tri-state architecture for real-time car body extraction and color classification. The algorithm is capable of managing both the difficulties of viewpoint and light reflection. Because the influence of light reflection is significantly different on bright, dark, and colored cars, three different strategies are designed for various color categories to acquire a more intact car body. A SARM (Separating and Re-Merging) algorithm is proposed to separate the car body and the background, and recover the entire car body more completely. A robust selection algorithm is also performed to determine the correct color category and car body. Then, the color type of the vehicle is decided only by the pixels in the extracted car body. The experimental results show that the tri-state method can extract almost 90% of car body pixels from a car image. Over 98% of car images are distinguished correctly in their categories, and the average accuracy of the 10-color-type classification is higher than 93%. Furthermore, the computation load of the proposed method is light; therefore it is applicable for real-time systems.  相似文献   
1000.
As social media services such as Twitter and Facebook are gaining popularity, the amount of information published from those services is explosively growing. Most of them use feeds to facilitate distribution of a huge volume of content they publish. In this context, many users subscribe to feeds to acquire up-to-date information through feed aggregation services, and recent real-time search engines also increasingly utilize feeds to promptly find recent web content when it is produced. Accordingly, it is necessary for such services to effectively fetch feeds for minimizing fetching delay, while at the same time maximizing the number of fetched entries. Fetching delay is a time lag between entry publication and retrieval, which is primarily incurred by finiteness of fetching resources. In this paper, we consider a polling-based approach among the methods applicable to fetching feeds, which bases on a specific schedule for visiting feeds. While the existing polling-based approaches have focused on the allocation of fetching resources to feeds in order to either reduce the fetching delay or increase the number of fetched entries, we propose a resource allocation policy that can optimize both objectives. Extensive experiments have been carried out to evaluate the proposed model, in comparison with the existing alternative methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号