首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   127551篇
  免费   10574篇
  国内免费   5836篇
电工技术   7400篇
技术理论   8篇
综合类   8757篇
化学工业   20917篇
金属工艺   7353篇
机械仪表   8538篇
建筑科学   10177篇
矿业工程   4045篇
能源动力   3499篇
轻工业   9534篇
水利工程   2286篇
石油天然气   8544篇
武器工业   1037篇
无线电   13808篇
一般工业技术   14374篇
冶金工业   6039篇
原子能技术   1345篇
自动化技术   16300篇
  2024年   573篇
  2023年   2166篇
  2022年   3901篇
  2021年   5265篇
  2020年   4120篇
  2019年   3311篇
  2018年   3655篇
  2017年   4101篇
  2016年   3803篇
  2015年   5181篇
  2014年   6388篇
  2013年   7585篇
  2012年   8347篇
  2011年   8916篇
  2010年   7860篇
  2009年   7473篇
  2008年   7403篇
  2007年   7070篇
  2006年   7130篇
  2005年   6184篇
  2004年   4062篇
  2003年   3676篇
  2002年   3530篇
  2001年   3115篇
  2000年   2930篇
  1999年   3093篇
  1998年   2446篇
  1997年   1996篇
  1996年   1917篇
  1995年   1610篇
  1994年   1310篇
  1993年   870篇
  1992年   740篇
  1991年   524篇
  1990年   420篇
  1989年   360篇
  1988年   259篇
  1987年   175篇
  1986年   137篇
  1985年   82篇
  1984年   57篇
  1983年   46篇
  1982年   44篇
  1981年   33篇
  1980年   31篇
  1979年   19篇
  1976年   7篇
  1973年   5篇
  1959年   5篇
  1951年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
随着电网的不断发展,技术的不断进步,变电站的防误闭锁装置也在不断的改进和完善,防止电气误操作已经成为电力自动化技术的一个重要分支,成为保障电力安全生产的一项重要措施,监控系统操作必须有防误闭锁系统的保证才能发挥其应有的作用。监控五防一体系统采用集成于监控系统的五防子模块形式,实现操作票及防误闭锁功能,并支持包括专业五防硬件厂商电脑钥匙的通讯接口,配合五防锁具,实现电气设备的防误闭锁。它是微机防误闭锁技术与监控系统的有机结合,真正的实现了资源共享。  相似文献   
992.
本文针对传统入侵检测技术难以适应无线传感器网络的动态性和资源有限等特点的问题,将人工免疫原理和多代理技术相结合,提出了一种适用于分簇式无线传感器网络的入侵检测机制(IMAIDM);给出了免疫Multi-Agent模型描述、Multi-Agent的功能定义以及相关算法。  相似文献   
993.
We are concerned in this paper with measuring health outcomes among the elderly in Zhejiang and Gansu provinces, China, and examining the relationships between different dimensions of health status and measures of socio-economic status (SES). We are CHARLS pilot data to document health conditions, using a very rich set of health indicators that include both self-reported measures and biomarkers. We also examine correlations between these health outcomes and two important indicators of socio-economic status (SES): education and log of per capita expenditure (log pce), our preferred measure of household resources. In general education tends to be positively correlated with better health outcomes, as it is in other countries. However, unmeasured community influences turn out to be highly important, much more so than one usually finds in other countries. While it is not yet clear which aspects of communities matter and why they matter, we set up an agenda for future research on this topic. We also find a large degree of under-diagnosis of hypertension, a major health problems that afflicts the aged. This implies that the current health system is not well prepared to address the rapid aging of the Chinese population, at least not in Gansu and Zhejiang.  相似文献   
994.
Ling  Lihua  Richard M.   《Automatica》2009,45(9):2134-2140
In this paper, we consider Kalman filtering over a packet-delaying network. Given the probability distribution of the delay, we can characterize the filter performance via a probabilistic approach. We assume that the estimator maintains a buffer of length D so that at each time k, the estimator is able to retrieve all available data packets up to time kD+1. Both the cases of sensor with and without necessary computation capability for filter updates are considered. When the sensor has no computation capability, for a given D, we give lower and upper bounds on the probability for which the estimation error covariance is within a prescribed bound. When the sensor has computation capability, we show that the previously derived lower and upper bounds are equal to each other. An approach for determining the minimum buffer length for a required performance in probability is given and an evaluation on the number of expected filter updates is provided. Examples are provided to demonstrate the theory developed in the paper.  相似文献   
995.
Automatic human face detection from video sequences is an important component of intelligent human computer interaction systems for video surveillance, face recognition, emotion recognition and face database management. This paper proposes an automatic and robust method to detect human faces from video sequences that combines feature extraction and face detection based on local normalization, Gabor wavelets transform and Adaboost algorithm. The key step and the main contribution of this work is the incorporation of a normalization technique based on local histograms with optimal adaptive correlation (OAC) technique to alleviate a common problem in conventional face detection methods: inconsistent performance due to sensitivity to variation illuminations such as local shadowing, noise and occlusion. The approach uses a cascade of classifiers to adopt a coarse-to-fine strategy for achieving higher detection rates with lower false positives. The experimental results demonstrate a significant performance improvement gains and achieved by local normalization over methods without normalizations in real video sequences with a wide range of facial variations in color, position, scale, and varying lighting conditions.  相似文献   
996.
Generalized honeycomb torus (GHT) is recognized as an attractive alternative to existing torus interconnection networks in parallel computing systems. Assume that m and d are integers with m ? 2 and d ? 8. This paper addresses the fault-tolerant hamiltonicity of GHT(m, 2d, d) with fault set F = {(w, y), (x, y)}, where w < x, w + y is even and x + y is odd. We show that such a faulty GHT is hamiltonian by presenting a systematic method for constructing a fault-free hamiltonian cycle. This result reveals another appealing feature of GHTs.  相似文献   
997.
This paper presents an interpolating ternary butterfly subdivision scheme for triangular meshes based on a 1–9 splitting operator. The regular rules are derived from a C2 interpolating subdivision curve, and the irregular rules are established through the Fourier analysis of the regular case. By analyzing the eigenstructures and characteristic maps, we show that the subdivision surfaces generated by this scheme is C1 continuous up to valence 100. In addition, the curvature of regular region is bounded. Finally we demonstrate the visual quality of our subdivision scheme with several examples.  相似文献   
998.
In this work, we consider a cognitive radio system with multiple primary channels and one secondary user, and then we introduce a channel-usage pattern model and some basic concepts in this system. Based on this system model and the basic concepts, we propose two opportunistic channel selection algorithms to optimize the throughput of the secondary user: minimum collision rate channel selection algorithm and minimum handoff rate channel selection algorithm. According to the two algorithms, we, respectively, present the channel selection scheme based on minimum collision rate algorithm (CSS-MCRA) and the channel selection scheme based on minimum handoff rate algorithm (CSS-MHRA) under the constraint that the collision probability is bounded below collision tolerable level. Theoretical analysis and simulation results both show that, on one hand, both CSS-MCRA scheme and CSS-MHRA can follow the constraint of collision tolerable level; on the other hand, the performance of CSS-MCRA scheme is better than that of CSS-MHRA scheme if handoff latency is zero or very low, while the performance of CSS-MHRA scheme is better than that of CSS-MCRA scheme if handoff latency is long enough.  相似文献   
999.
1000.
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of an underlying physical network. A well-routed message path in such systems may result in a long delay and excessive traffic due to the mismatch between logical and physical networks. In order to solve this problem, we present a family of Peer-exchange Routing Optimization Protocols (PROP) to reconstruct the overlay. It includes two policies: PROP-G for generic condition and PROP-O for optimized one. Both theoretical analysis and simulation experiments show that these two protocols greatly reduce the average latency of the overlay and achieve a better logical topology with low overhead. Their overall performance can be further improved if combined with other recent approaches. Specifically, PROP-G can be easily applied to both structured and unstructured systems without the loss of their primary characteristics, such as efficient routing and anonymity. PROP-O, on the other hand, is more efficient, especially in a heterogenous environment where nodes have different processing capabilities.
Edward ChanEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号