首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   73128篇
  免费   8974篇
  国内免费   5677篇
电工技术   7067篇
技术理论   2篇
综合类   6650篇
化学工业   9442篇
金属工艺   4500篇
机械仪表   5007篇
建筑科学   5785篇
矿业工程   2657篇
能源动力   2107篇
轻工业   6560篇
水利工程   2129篇
石油天然气   3273篇
武器工业   1000篇
无线电   9174篇
一般工业技术   6698篇
冶金工业   2942篇
原子能技术   1182篇
自动化技术   11604篇
  2024年   468篇
  2023年   1291篇
  2022年   2815篇
  2021年   3832篇
  2020年   2727篇
  2019年   2145篇
  2018年   2269篇
  2017年   2622篇
  2016年   2346篇
  2015年   3532篇
  2014年   4375篇
  2013年   5134篇
  2012年   6172篇
  2011年   6325篇
  2010年   5773篇
  2009年   5633篇
  2008年   5316篇
  2007年   5225篇
  2006年   4738篇
  2005年   3713篇
  2004年   2735篇
  2003年   1834篇
  2002年   1780篇
  2001年   1415篇
  2000年   1076篇
  1999年   645篇
  1998年   342篇
  1997年   277篇
  1996年   252篇
  1995年   227篇
  1994年   149篇
  1993年   97篇
  1992年   96篇
  1991年   68篇
  1990年   59篇
  1989年   40篇
  1988年   24篇
  1987年   14篇
  1986年   19篇
  1985年   12篇
  1984年   14篇
  1983年   10篇
  1982年   11篇
  1981年   13篇
  1980年   23篇
  1979年   13篇
  1977年   9篇
  1976年   18篇
  1959年   12篇
  1951年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
环境一号B星热红外波段单通道算法温度反演   总被引:1,自引:0,他引:1  
文中在考虑环境一号B星(HJ-1B)热红外波段(infrared scanner,IRS4)光谱响应函数和有效波长的基础上,通过MODTRAN4模型模拟,对Jimenez-Munoz和Sobrino(JM&S)单通道算法中的大气函数进行改进,重新计算得到了适合HJ-1B星IRS4地表温度(land surface temperature,LST)反演的3个大气函数公式,并反演了福州地区的地表温度.采用基于星上辐亮度法对反演的地表温度进行精度评价,并将反演的地表温度与JM&S算法、段四波等修正的JM&S算法反演的地表温度进行对比分析.结果表明:使用文中改进后的大气参数对HJ-1B星IRS4进行地表温度反演,可取得较好结果.  相似文献   
992.
993.
安全风险评估是电信网运维阶段安全防护的重要内容,为了深入了解全网的安全状态、控制运行过程中的安全风险,需要建立一套有效的风险评估方法。本文对电信网运维阶段风险评估方法进行研究,提出了一套量化的风险计算方法。该方法不仅可以定量分析网络存在的内在脆弱性和面临的外部威胁,而且可对风险高低情况进行梳理,找出网络运行中的薄弱点,提出安全需求,从而为实施合适的安全防范措施、制定有效的风险控制策略提供理论基础。  相似文献   
994.
Most image retargeting algorithms rely heavily on valid saliency map detection to proceed. However, the inefficiency of high quality saliency map detection severely restricts the application of these image retargeting methods. In this paper, we propose a random algorithm for efficient context-aware saliency map detection. Our method is a multiple level saliency map detection algorithm that integrates multiple level coarse saliency maps into the resulting saliency map and selectively updates unreliable regio...  相似文献   
995.
The fast Fourier transform (FFT) is a fundamental kernel of many computation-intensive scientific applications.This paper deals with an implementation of the FFT on the accelerator system,a heterogeneous multi-core architecture to accelerate computation-intensive parallel computing in scientific and engineering applications.The Engineering and Scientific Computation Accelerator (ESCA) consists of a control unit and a single instruction multiple data (SIMD) processing element (PE) array,in which PEs communicate with each other via a hierarchical two-level network-on-chip (NoC) with high bandwidth and low latency.We exploit the architecture features of ESCA to implement a parallel FFT algorithm efficiently.Experimental results show that both the proposed parallel FFT algorithm and the ESCA architecture are scalable.The 16-bit fixed-point parallel FFT performance of ESCA is compared with a published work to prove the superiority of the mapping algorithm and the hardware architecture.The floating-point parallel FFT performances of ESCA are evaluated and compared with those of the IBM Cell processor and GPU to demonstrate the computing power of the ESCA system for high performance applications.  相似文献   
996.
Bo Yang  Huajing Fang 《Automatica》2010,46(3):629-632
This communique presents forced second-order consensus protocols with communication time-delays for the network of agents with double integrator dynamics and gives a measure of the robustness of the protocols to the communication time-delays. By employing a frequency domain method, it is proven that the forced consensus is achieved asymptotically for appropriate time-delay if the network is connected. Particularly, the maximum fixed time-delay that can be tolerated by the network is found. The forced consensus protocols are distributed in the sense that each agent only needs information from its neighboring agents, which reduces the complexity of connections between agents significantly. Numerical simulation results are provided to demonstrate the effectiveness and the sharpness of the theoretical results.  相似文献   
997.
Modeling MODIS LAI time series using three statistical methods   总被引:2,自引:0,他引:2  
Leaf Area Index (LAI) is one of the most important variables characterizing land surface vegetation and dynamics. Many satellite data, such as the Moderate Resolution Imaging Spectroradiometer (MODIS), have been used to generate LAI products. It is important to characterize their spatial and temporal variations by developing mathematical models from these products. In this study, we aim to model MODIS LAI time series and further predict its future values by decomposing the LAI time series of each pixel into several components: trend, intra-annual variations, seasonal cycle, and stochastic stationary or irregular parts. Three such models that can characterize the non-stationary time series data and predict the future values are explored, including Dynamic Harmonics Regression (DHR), STL (Seasonal-Trend Decomposition Procedure based on Loess), and Seasonal ARIMA (AutoRegressive Intergrated Moving Average) (SARIMA). The preliminary results using six years (2001-2006) of the MODIS LAI product indicate that all these methods are effective to model LAI time series and predict 2007 LAI values reasonably well. The SARIMA model gives the best prediction, DHR produces the smoothest curve, and STL is more sensitive to noise in the data. These methods work best for land cover types with pronounced seasonal variations.  相似文献   
998.
Internet用户的日益增加,给Web服务器和网络带来了巨大的压力。了解Web站点以及网络性能状态已是网管员们非常关注的问题。要发现并解决这些问题主要是采用网页抽取与网络测量技术。在比较分析了Web特征信息及各种网络测量工具优缺点的基础上,设计并实现了一个用于Web测试与网络瓶颈分析的系统,从而为网管员们分析网站和网络故障提供了有效的参考信息。  相似文献   
999.
本文通过对黑客起源及其文化的认识来分析黑客技术的发展,同时也针对当前一些主要的黑客攻击手段提出了防御的对策。  相似文献   
1000.
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号