首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   121544篇
  免费   13496篇
  国内免费   8104篇
电工技术   9807篇
技术理论   7篇
综合类   10616篇
化学工业   18051篇
金属工艺   6739篇
机械仪表   7460篇
建筑科学   9531篇
矿业工程   3675篇
能源动力   3274篇
轻工业   12535篇
水利工程   3274篇
石油天然气   5326篇
武器工业   1378篇
无线电   14447篇
一般工业技术   12595篇
冶金工业   4319篇
原子能技术   1313篇
自动化技术   18797篇
  2024年   844篇
  2023年   2640篇
  2022年   5210篇
  2021年   6944篇
  2020年   5156篇
  2019年   3815篇
  2018年   4011篇
  2017年   4577篇
  2016年   4095篇
  2015年   5881篇
  2014年   7303篇
  2013年   8424篇
  2012年   9666篇
  2011年   10170篇
  2010年   8955篇
  2009年   8273篇
  2008年   8160篇
  2007年   7441篇
  2006年   6616篇
  2005年   5442篇
  2004年   3689篇
  2003年   2954篇
  2002年   2899篇
  2001年   2461篇
  2000年   1789篇
  1999年   1466篇
  1998年   854篇
  1997年   706篇
  1996年   649篇
  1995年   465篇
  1994年   383篇
  1993年   260篇
  1992年   235篇
  1991年   163篇
  1990年   114篇
  1989年   91篇
  1988年   64篇
  1987年   48篇
  1986年   52篇
  1985年   18篇
  1984年   17篇
  1983年   12篇
  1982年   24篇
  1981年   16篇
  1980年   30篇
  1979年   22篇
  1977年   3篇
  1973年   2篇
  1959年   14篇
  1951年   19篇
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
991.
基于Android的火车票实名检票系统设计   总被引:3,自引:0,他引:3  
黄江平  吴昊 《电子技术应用》2012,38(9):21-23,27
介绍了一种基于嵌入式平台的实名制检票手持终端的硬件构成和软件实现。采用了Android嵌入式操作系统,对火车票上QR二维码和二代身份证RFID系统采集到的数据进行提取、显示。同时通过WIFI,将采集到的数据与服务器数据进行比对。实际运行表明,系统运行稳定,可正确快速地识别出实名火车票的真伪,实现了系统设计的功能要求。  相似文献   
992.
IEEE802.11p下删余卷积编码译码方法的研究   总被引:1,自引:1,他引:0  
应用于智能交通系统的无线接入协议IEEE802.11p,其物理层卷积编码的码率可通过对(2,1,7)卷积编码器的删余来实现。讨论了删余位置的图案和算法,分析了在删余位置插入不同哑元时维特比译码后误码率的统计特性。仿真的同时比较了固定哑元下不同码率所引入的误比特率。  相似文献   
993.
基于CC1110单片机的无线升级方法研究   总被引:4,自引:0,他引:4  
针对现有嵌入式设备无线升级方法中存在的占用资源多、升级程序类型不灵活以及功耗消耗大等问题,设计了一种基于CC1110无线单片机的应用程序装载系统来实现应用程序的无缝切换。介绍了系统无线升级的模型及方法,并分析了装载程序的长度和无线传输数据包长度与装载时间及能量消耗的关系。经试验平台测试表明,该方案具有较强的可靠性、及时性、灵活性和较好的节能性。  相似文献   
994.
Making-a-stop: A new bufferless routing algorithm for on-chip network   总被引:1,自引:0,他引:1  
In the deep submicron regime, the power and area consumed by router buffers in network-on-chip (NoC) have become a primary concern. With buffers elimination, bufferless routing is emerging as a promising solution to provide power-and-area efficiency for NoC. In this paper, we present a new bufferless routing algorithm that can be coupled with any topology. The proposed routing algorithm is based on the concept of making-a-stop (MaS), aiming to deadlock and livelock freedom in wormhole-switched NoC. Performance evaluation is carried out by using a flit-level, cycle-accurate network simulator under synthetic traffic scenarios. Simulation results indicate that the proposed routing algorithm yields an improvement over the recent bufferless routing algorithm in average latency, power consumption, and area overhead by up to 10%, 9%, and 80%, respectively.  相似文献   
995.
This research aims to discover the general factors that influence mobile commerce adoption. A meta-analysis of previous empirical studies on individuals’ mobile commerce adoption behavior was conducted and the proposed mobile commerce adoption model was tested using structural equation modeling. Furthermore, moderator analysis was carried out using partition tests by dividing context into subgroups of eastern and western culture, to investigate the moderating effect of culture. Results confirm the proposed model, and moderator analysis indicates that culture does have specific moderating effects on mobile commerce adoption. The findings of this paper will yield theoretical and managerial implications for the future.  相似文献   
996.
Developing security-aware packet scheduling algorithms can efficiently enhance the security while delivering packets through wireless links. Existing scheduling algorithms developed for real-time wireless networks provide security at the cost of other important performance, e.g., schedulability. The performance problem becomes especially apparent when wireless networks are heavily loaded. To address this issue, we propose in this paper an improved security-aware packet scheduling algorithm (or ISAPS in short) in wireless networks. ISAPS first gives high priority to deal with schedulability when the real-time system is heavily loaded. When the system is under light workload, ISAPS strives to improve the security levels while achieving high schedulability for real-time packets. Compared with the existing packet scheduling algorithm SPSS, ISAPS shows excellent scheduling quality under a wide range of workload characteristics.  相似文献   
997.
Restricted computational capacity has become a key factor in limiting the development of a majority of distributed basin models. Parallel computing is one of the most effective methods for solving this problem. Although many parallel-computing methods have been employed in basin models, few studies have carried out theoretical research on parallel characteristics of river basins. In this paper, the drainage network of river basins is treated as a binary-tree structure. Using the binary-tree theory, we find that there exists a maximum speedup curve (MSC) for an arbitrary drainage network. The x-coordinate of the MSC represents the number of processors used during the computing, while the y-coordinate corresponds to the maximum speedup ratio (MSR) that can be obtained. Under several essential assumptions, the theoretical function of MSC is established. The function indicates that the MSC consists of an ascending section and a horizontal section. A parallel algorithm capable of acquiring the MSC is proposed as well. Using this algorithm, the MSC is tested at two different-resolution drainage networks of the Lhasa River Basin. A 2-year rainfall-runoff process is simulated. The results prove the existence of MSC. However, primarily influenced by the load imbalance of subbasins, the simulation values of MSR are usually smaller than the theoretical ones.  相似文献   
998.
999.
We present an approach for animating cracks and fractures in cartoon style. In our method we take a 2D hand-drawn object as input and then construct a 2.5D model of the object in order to approximate the object volume. Next, we generate the Voronoi textures on the 2.5D object model for visual abstraction of cartoon cracks. Further, cracking gaps on the Voronoi textures are widened progressively until Voronoi cells split apart and finally fall onto ground according to simplified physical rules. With minimum user intervention, our model is able to generate cartoon cracks and fractures animations procedurally, as demonstrated by examples given in the paper.  相似文献   
1000.
Combinatorial (or rule-based) methods for inferring haplotypes from genotypes on a pedigree have been studied extensively in the recent literature. These methods generally try to reconstruct the haplotypes of each individual so that the total number of recombinants is minimized in the pedigree. The problem is NP-hard, although it is known that the number of recombinants in a practical dataset is usually very small. In this paper, we consider the question of how to efficiently infer haplotypes on a large pedigree when the number of recombinants is bounded by a small constant, i.e. the so called k-recombinant haplotype configuration (k-RHC) problem. We introduce a simple probabilistic model for k-RHC where the prior haplotype probability of a founder and the haplotype transmission probability from a parent to a child are all assumed to follow the uniform distribution and k random recombination events are assumed to have taken place uniformly and independently in the pedigree. We present an O(mnlog? k+1 n) time algorithm for k-RHC on tree pedigrees without mating loops, where m is the number of loci and n is the size of the input pedigree, and prove that when 90log?n<m<n 3, the algorithm can correctly find a feasible haplotype configuration that obeys the Mendelian law of inheritance and requires no more than k recombinants with probability $1 -O(k^{2}\frac{\log^{2}n}{mn}+\frac{1}{n^{2}})$ . The algorithm is efficient when k is of a moderate value and could thus be used to infer haplotypes from genotypes on large tree pedigrees efficiently in practice. We have implemented the algorithm as a C++ program named Tree-k-RHC. The implementation incorporates several ideas for dealing with missing data and data with a large number of recombinants effectively. Our experimental results on both simulated and real datasets show that Tree-k-RHC can reconstruct haplotypes with a high accuracy and is much faster than the best combinatorial method in the literature.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号