首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20635篇
  免费   1914篇
  国内免费   946篇
电工技术   1320篇
综合类   1326篇
化学工业   3179篇
金属工艺   1335篇
机械仪表   1382篇
建筑科学   1617篇
矿业工程   712篇
能源动力   487篇
轻工业   1605篇
水利工程   404篇
石油天然气   1383篇
武器工业   206篇
无线电   2301篇
一般工业技术   2370篇
冶金工业   1006篇
原子能技术   170篇
自动化技术   2692篇
  2024年   119篇
  2023年   364篇
  2022年   657篇
  2021年   894篇
  2020年   686篇
  2019年   558篇
  2018年   599篇
  2017年   711篇
  2016年   573篇
  2015年   841篇
  2014年   1051篇
  2013年   1229篇
  2012年   1342篇
  2011年   1410篇
  2010年   1293篇
  2009年   1211篇
  2008年   1158篇
  2007年   1119篇
  2006年   1255篇
  2005年   1081篇
  2004年   701篇
  2003年   634篇
  2002年   597篇
  2001年   471篇
  2000年   450篇
  1999年   462篇
  1998年   406篇
  1997年   344篇
  1996年   289篇
  1995年   249篇
  1994年   197篇
  1993年   123篇
  1992年   95篇
  1991年   70篇
  1990年   61篇
  1989年   58篇
  1988年   46篇
  1987年   22篇
  1986年   19篇
  1985年   10篇
  1984年   10篇
  1983年   9篇
  1982年   9篇
  1981年   6篇
  1980年   4篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
基于自组织神经网络的实时统计特征抽取方法   总被引:3,自引:0,他引:3  
应用人工神经网络讨论统计了特征抽取的原理,提出了相应的抽取方法。该方法具有实时性,容错性,高数据压缩率和良好的特征分辨率。通过计算机仿真和桥梁索力状态的实例计算分析证实了该技术具有广泛的应用价值。  相似文献   
62.
The copolymer from D ,L -lactide and poly(tetramethyene ether glycol) (PTMG) was prepared in bulk with an isotributyl aluminum–water–phosphoric acid complex catalyst as the initiator and characterized by H-NMR, GPC, and DSC. The effects of the temperature and the amount of PTMG on the polymerization rate and the molecular weight of copolymers were studied. The behavior of the degradation and delivery rate of Levonorgestrel microspheres in vitro was observed. The results show that the degradation and the delivery rate can be controlled by adjusting the molar rate of hydrophilic and hydrophobic segments of the copolymer © 1995 John Wiley & Sons, Inc.  相似文献   
63.
SL Xiong  ZP Fang  XY Zeng 《Canadian Metallurgical Quarterly》1994,19(4):233-4, inside backcover
Six compounds were isolated from the fruits of Luffa cylindrica. They were identified as lucyosides C, E, F, H, a mixture of alpha-spinasterol and stigmasta-7,22,25-trien-3 beta-OH and a mixture of alpha-spinasteryl glucoside and delta 7,22,25-stigmasteryl-beta-D-glucoside by means of chemical evidence and spectral analysis.  相似文献   
64.
通过北京城区11条河流30个点位沉水植物及水环境因子调查,对沉水物物种分布、生态位特征及与水环境因子相互关系进行了研究,结果表明:北京城区河流均有沉水植物分布,春季优势种为菹草、穗花狐尾藻和篦齿眼子菜,夏季为金鱼藻、狐尾藻、篦齿眼子菜、黑藻、苦草及菹草.水深为影响城区河流沉水植物种类数量的重要因子,菹草为春季沉水植物管理关键物种.研究城区河流沉水植物分布特征及与水环境因子的关系,对北京市河流水生态环境的管理和持续改善具有重要的参考和指导意义.  相似文献   
65.
Bai  Qingchun  Wei  Kai  Zhou  Jie  Xiong  Chao  Wu  Yuanbin  Lin  Xin  He  Liang 《The Journal of supercomputing》2021,77(9):9474-9493
The Journal of Supercomputing - Sentiment analysis in Danmaku video interaction aims at measuring public mood in respect of the video, which is helpful for the potential applications in behavioral...  相似文献   
66.
Li  Hongjian  Wei  Yaojun  Xiong  Yu  Ma  Enjie  Tian  Wenhong 《The Journal of supercomputing》2021,77(10):11575-11596
The Journal of Supercomputing - With the fast growth of big data applications, it has brought about a huge increase in the energy consumption for big data processing in Cloud data centers. In this...  相似文献   
67.
International Journal of Computer Vision - Nowadays, how to effectively evaluate visual properties has become a popular topic for fine-grained visual comprehension. In this paper we study the...  相似文献   
68.
With the advent of Next Generation Network (NGN), services that are currently provided by multiple specific network-centric architectures. NGN provides AAA (Anytime, Anywhere and Always on) access to users from different service providers with consistent and ubiquitous provision of services as necessary. This special issue of NGN includes pervasive, grid, and peer-to-peer computing to provide computing and communication services at anytime and anywhere. In fact, the application of NGN includes digital image processing, multimedia systems/services, and so on. Here we focus on the digital image processing technology in NGN environments. Low-contrast structure and heavy noise in NGN environments can be found in many kinds of digital images, which makes the images vague and uncertainly, especially in x-ray images. As result, some useful tiny characteristic are weakened—which are difficult to distinguish even by naked eyes. Based on the combination of no-linear grad-contrast operator and multi-resolution wavelet analysis, a kind of image enhancement processing algorithm for useful tiny characters is presented. The algorithm can enhance the tiny characters while confine amplifying noise. The analysis of the results shows that local regions of the image are enhanced by using the concept of the grad contrast to make image clearer adaptively. Experiments were conducted on real pictures, and the results show that the algorithm is flexible and convenient.  相似文献   
69.
Given a directed graph, the problem of blackhole mining is to identify groups of nodes, called blackhole patterns, in a way such that the average in-weight of this group is significantly larger than the average out-weight of the same group. The problem of finding volcano patterns is a dual problem of mining blackhole patterns. Therefore, we focus on discovering the blackhole patterns. Indeed, in this article, we develop a generalized blackhole mining framework. Specifically, we first design two pruning schemes for reducing the computational cost by reducing both the number of candidate patterns and the average computation cost for each candidate pattern. The first pruning scheme is to exploit the concept of combination dominance to reduce the exponential growth search space. Based on this pruning approach, we develop the gBlackhole algorithm. Instead, the second pruning scheme is an approximate approach, named approxBlackhole, which can strike a balance between the efficiency and the completeness of blackhole mining. Finally, experimental results on real-world data show that the performance of approxBlackhole can be several orders of magnitude faster than gBlackhole, and both of them have huge computational advantages over the brute-force approach. Also, we show that the blackhole mining algorithm can be used to capture some suspicious financial fraud patterns.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号