首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21836篇
  免费   2163篇
  国内免费   1071篇
电工技术   1389篇
技术理论   1篇
综合类   1354篇
化学工业   3481篇
金属工艺   1353篇
机械仪表   1375篇
建筑科学   2071篇
矿业工程   617篇
能源动力   657篇
轻工业   1240篇
水利工程   384篇
石油天然气   1345篇
武器工业   143篇
无线电   2743篇
一般工业技术   2602篇
冶金工业   982篇
原子能技术   300篇
自动化技术   3033篇
  2024年   126篇
  2023年   392篇
  2022年   781篇
  2021年   1112篇
  2020年   764篇
  2019年   618篇
  2018年   640篇
  2017年   753篇
  2016年   659篇
  2015年   940篇
  2014年   1120篇
  2013年   1363篇
  2012年   1416篇
  2011年   1502篇
  2010年   1360篇
  2009年   1229篇
  2008年   1213篇
  2007年   1090篇
  2006年   1181篇
  2005年   1024篇
  2004年   678篇
  2003年   604篇
  2002年   632篇
  2001年   502篇
  2000年   528篇
  1999年   554篇
  1998年   449篇
  1997年   355篇
  1996年   342篇
  1995年   272篇
  1994年   215篇
  1993年   145篇
  1992年   115篇
  1991年   116篇
  1990年   77篇
  1989年   63篇
  1988年   30篇
  1987年   32篇
  1986年   19篇
  1985年   15篇
  1984年   7篇
  1983年   11篇
  1982年   6篇
  1981年   4篇
  1980年   11篇
  1979年   1篇
  1978年   1篇
  1965年   1篇
  1959年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
In this work, we have put forth two different protocols to address a concrete secure multi-party computational (MPC) problem related to a triangle, of which the coordinates of the three vertices are confidentially kept by the three participants, respectively. The three parties wish to collaboratively compute the area of this triangle while preserving their own coordinate privacy. As one of the merits, our protocols employ weaker assumptions of the existence of pseudorandom generators. In particular, unlike massive secure MPC protocols that rely a lot on oblivious transfer, ours utilize a new computing idea called “pseudorandom-then-rounding” method to avoid this burdensome obstacle. The two protocols are based on different theorems, while they both make use of the same underlying idea. At last, we provide a detailed proof for the first protocol by a series of security reductions of our newly defined games, which seems somewhat stronger than the previous simulation-based proofs and a proof sketch for the second one. Analysis and discussion about the reasons are provided as well to round off our work.  相似文献   
22.
23.
在ASP.NET 2.0中自动化构建数据访问层   总被引:2,自引:0,他引:2  
使用ASP.NET2.0所提供的BuildProvider类,将自动化构建的数据访问层源代码编译到程序集中,使得开发者利用Ob-jectDataSource控件,可以简单、快速地实现三层架构的Web应用。  相似文献   
24.
孔轶  吴威  张晓峰 《移动信息》2024,46(1):156-159
光交箱端口状态对通信网络的正常运行具有重要作用,由于光交箱内部布线杂乱,容易对端口产生排线遮挡问题,导致传统的光交箱端口图像识别操作不便。文中提出了一种基于AR技术的光交箱资源校准技术,该技术可以对实时视频自适应选取关键帧,然后对关键帧进行光交箱端口状态和文字识别,最后返回加权融合后的识别结果,并利用实时AR交互指引巡检人员处理被遮挡端口,这不仅能提升巡检人员的工作效率,还能提高实时识别准确率。将该校准技术应用到光交箱端口的智能检测中,能对光交箱的端口识别提供极大便利。  相似文献   
25.
To evaluate the impact of zinc sulfate (ZnSO4) concentration on the structural properties of the films, Cd1-xZnxS thin films were formed on glass substrates using chemical bath deposition (CBD) in this study. The effect of ZnSO4 precursor concentration on the surface morphology, optical properties, and morphological structure of the Cd1-xZnxS films was investigated. To study the impact of zinc doping content on the performance metrics of Cu(In1-xGax)Se2 (CIGS) cells in the experimental group and to improve the buffer layer thickness, simulations were run using one-dimensional solar cell capacitance simulator (SCAPS-1D) software.  相似文献   
26.
Gong  Biyao  Xing  Tianzhang  Liu  Zhidan  Wang  Junfeng  Liu  Xiuya 《Mobile Networks and Applications》2022,27(4):1520-1530
Mobile Networks and Applications - Although federated learning has been widely used in collaborative training of machine learning models, its practical uses are still challenged by heterogeneous...  相似文献   
27.
Zhang  Tianheng  Zhao  Jianli  Sun  Qiuxia  Zhang  Bin  Chen  Jianjian  Gong  Maoguo 《Applied Intelligence》2022,52(7):7761-7776
Applied Intelligence - In recent years, low-rank tensor completion has been widely used in color image recovery. Tensor Train (TT), as a balanced tensor rank minimization method, has achieved good...  相似文献   
28.
29.
Let G1 and G2 be two connected graphs. The Kronecker product G1×G2 has vertex set V(G1×G2)=V(G1V(G2) and the edge set . In this paper, we show that if G is a bipartite graph with κ(G)=δ(G), then G×Kn(n?3) is super-κ.  相似文献   
30.
Artificial immune systems (AIS) are computational systems inspired by the principles and processes of the vertebrate immune system. The AIS‐based algorithms typically exploit the immune system's characteristics of learning and adaptability to solve some complicated problems. Although, several AIS‐based algorithms have proposed to solve multi‐objective optimization problems (MOPs), little focus have been placed on the issues that adaptively use the online discovered solutions. Here, we proposed an adaptive selection scheme and an adaptive ranks clone scheme by the online discovered solutions in different ranks. Accordingly, the dynamic information of the online antibody population is efficiently exploited, which is beneficial to the search process. Furthermore, it has been widely approved that one‐off deletion could not obtain excellent diversity in the final population; therefore, a k‐nearest neighbor list (where k is the number of objectives) is established and maintained to eliminate the solutions in the archive population. The k‐nearest neighbors of each antibody are founded and stored in a list memory. Once an antibody with minimal product of k‐nearest neighbors is deleted, the neighborhood relations of the remaining antibodies in the list memory are updated. Finally, the proposed algorithm is tested on 10 well‐known and frequently used multi‐objective problems and two many‐objective problems with 4, 6, and 8 objectives. Compared with five other state‐of‐the‐art multi‐objective algorithms, namely NSGA‐II, SPEA2, IBEA, HYPE, and NNIA, our method achieves comparable results in terms of convergence, diversity metrics, and computational time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号