首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13363篇
  免费   1346篇
  国内免费   686篇
电工技术   973篇
综合类   761篇
化学工业   1966篇
金属工艺   1008篇
机械仪表   809篇
建筑科学   1002篇
矿业工程   550篇
能源动力   314篇
轻工业   766篇
水利工程   315篇
石油天然气   1285篇
武器工业   102篇
无线电   1544篇
一般工业技术   1569篇
冶金工业   604篇
原子能技术   112篇
自动化技术   1715篇
  2024年   101篇
  2023年   305篇
  2022年   619篇
  2021年   780篇
  2020年   578篇
  2019年   465篇
  2018年   497篇
  2017年   523篇
  2016年   475篇
  2015年   646篇
  2014年   765篇
  2013年   919篇
  2012年   894篇
  2011年   937篇
  2010年   848篇
  2009年   760篇
  2008年   694篇
  2007年   728篇
  2006年   676篇
  2005年   544篇
  2004年   364篇
  2003年   312篇
  2002年   269篇
  2001年   229篇
  2000年   220篇
  1999年   256篇
  1998年   197篇
  1997年   157篇
  1996年   146篇
  1995年   124篇
  1994年   108篇
  1993年   69篇
  1992年   53篇
  1991年   40篇
  1990年   22篇
  1989年   21篇
  1988年   15篇
  1987年   7篇
  1986年   10篇
  1985年   7篇
  1984年   2篇
  1983年   2篇
  1982年   4篇
  1980年   3篇
  1977年   1篇
  1976年   1篇
  1959年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
41.
Bioglass (BG) possesses excellent bioactivity and has been widely used in the manufacture of biomaterials. In this study, a composite with different surface bioactivity was fabricated via in situ melting polymerization by incorporating BG and poly(amino acid) (PAA) at a suitable ratio. The structure of the composite was characterized by Fourier transform infrared spectroscopy and XRD. The compressive strength of the BG/PAA composites was 139 MPa (BG:PAA = 30:70). The BG/PAA composites were degradable, and higher BG in composite showed higher weight loss after 4 weeks of incubation in simulated body fluid. In addition, the BG/PAA composite maintained adequate residual compressive strength during the degradation period. The SEM results showed the differences in surface bioactivities of the composites directly, and 30BG/PAA composite showed thicker apatite layer and higher Ca/p than 15BG/PAA. in vitro MG-63 cell culture experiments showed that the composite was noncytotoxic and thus allows cells to adhere, proliferate, and differentiate. This indicates that the composite has good biocompatibility. The implantations in the bone defects of rabbits for 4 and 12 weeks were studied. The composites had good biocompatibility and were capable of guiding new bone formation without causing any inflammation. The composite may be successfully used in the development of bone implants.  相似文献   
42.
对Al-Cu合金中α-Al及Al2Cu生长行为的探讨   总被引:1,自引:0,他引:1  
研究了Al-Cu合金中α-Al和Al2Cu的生长行为,分析了初生α-Al及初生Al2Cu作为共晶核心形核的能力.结果发现,在过共晶组织中,初生相Al2Cu形貌大部分有明显的拐角,观察其平面有的呈矩形,呈现小面生长特性.而α-Al与Al2Cu共晶生长时,Al2Cu择优生长特征削弱,与α-Al耦合生长呈现非小面-非小面生长,表明Al2Cu在不同的生长阶段表现出的生长行为不同.在亚共晶组织中,初生相α-Al周围形成离异共晶的Al2Cu,而过共晶组织中初生相Al2Cu周围没有离异共晶的α-Al,表明初生相Al2Cu作为共晶层片核心的能力比初生相α-Al作为共晶层片核心的能力强.  相似文献   
43.
熊伟  王海涛  狄海涛  王祖温 《机床与液压》2007,35(8):142-144,190
介绍了基于梯形图设计方法的全气动装弹机械手的设计,重点探讨了在设计中考虑气缸运行位置检测、手动及自动切换、急停处理等实用问题.采用两位三通阀扩充方法来解决单一行程阀多次切换分区条件的难题,利用梭阀实现手动和自动操作的配合,通过增加一个中继阀来实现急停处理.  相似文献   
44.
根据目前视频监控需求,采用ARM11处理器与Linux操作系统相结合的方式,提出了一种基于B/S架构的远程网络视频监控方案。使用V4L2进行视频图像采集,选择H.264压缩标准,通过硬件多格式编码器MFC完成视频硬件压缩。运用RTP流媒体传输技术实现视频数据的打包传输,客户端通过安装Active X控件完成视频图像的显示,最终实现网络视频监控功能。  相似文献   
45.
With the advent of the powerful editing software and sophisticated digital cameras, it is now possible to manipulate images. Copy-move is one of the most common methods for image manipulation. Several methods have been proposed to detect and locate the tampered regions, while many methods failed when the copied region undergone some geometric transformations before being pasted, because of the de-synchronization in the searching procedure. This paper presents an efficient technique for detecting the copy-move forgery under geometric transforms. Firstly, the forged image is divided into overlapping circular blocks, and Polar Complex Exponential Transform (PCET) is employed to each block to extract the invariant features, thus, the PCET kernels represent each block. Secondly, the Approximate Nearest Neighbor (ANN) Searching Problem is used for identifying the potential similar blocks by means of locality sensitive hashing (LSH). In order to make the algorithm more robust, morphological operations are applied to remove the wrong similar blocks. Experimental results show that our proposed technique is robust to geometric transformations with low computational complexity.  相似文献   
46.
Zhang  Ke  Jia  Haitao  Lv  Haibin 《Multimedia Tools and Applications》2016,75(24):17593-17615

Smart transportation has a significantly impact on city management and city planning, which has received extensive attentions from academic and industrial communities. Different from omni-directional sensing system, as a directional sensing system, the multimedia-directional sensor network holds the special coverage scheme, which is usually used for smart cities, smart transportation, and harsh environment surveillance, for instance, nuclear-pollution regions where are inhospitable for people. This paper advances Virtual Stream Artificial Fish-swarm based Coverage-Enhancing Algorithm (VSAFCEA) as a coverage-enhancing means in multimedia directional sensor networks. Firstly, a concept of virtual streams, based on traditional artificial fish-swarm algorithm, is proposed. Then, the traditional behaviors of fishes in artificial fish-swarm algorithm are modified and expanded with several new behaviors. Finally, the presented VSAFCEA is adopted for coverage-enhancing issue in the situation of directional sensor networks with rotational direction-adjustable model. With a sequence of steps of artificial fishes in virtual stream, the presented VSAFCEA can figure out the approximation to the highest area coverage rate. Based on comparison of these simulation results (results of presented VSAFCEA and that of other typical coverage-enhancing ways in directional sensor networks), the conclusion can be drawn that VSAFCEA could attain higher area coverage rate of directional sensor networks with fewer iterative computing times.

  相似文献   
47.
In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.  相似文献   
48.
With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sensor nodes that are in a normal status. Currently, two kinds of approaches exist to identify the substitute sensor nodes: the most common approach is to prepare redundancy nodes, though the involved tasks such as maintaining redundancy nodes, i.e., relocating the new node, lead to an extra burden on the wireless sensor networks. More recently, other approaches without using redundancy nodes are emerging, and they merely select the substitute nodes in a sensor node’s perspective i.e., migrating the service of faulty node to it’s nearest sensor node, though usually neglecting the requirements of the application level. Even a few work consider the need of the application level, they perform at packets granularity and don’t fit well at service granularity. In this paper, we aim to remove these limitations in the wireless sensor network with the service-oriented architecture. Instead of deploying redundancy nodes, the proposed mechanism replaces the faulty sensor node with consideration of the similarity on the application level, as well as on the sensor level. On the application level, we apply the Bloom Filter for its high efficiency and low space costs. While on the sensor level, we design an objective solution via the coefficient of a variation as an evaluation for choosing the substitute on the sensor level.  相似文献   
49.
在数据采集系统中,按需采集是平衡数据数量、提高数据质量的有效手段。本文所提出的自适应数据采集算法是基于有限采样点的一元线性回归拟合,通过实时地对采集到的数据进行分析,不断修正采样周期,使得采样周期能够快速、准确地适应被测对象的动态变化。MATLAB软件仿真表明,本方法对于被测量加速变化具有较强的动态捕捉能力,能够在降低平均采样频率的前提下减小采样失真度,且与同类方法相比失真度低,稳定性高,是测控系统中实时数据采集的一种较好的代替方案。  相似文献   
50.
介绍了GSM短消息中的PDU编码方式和基本AT指令,对SIM卡中的短消息存储顺序作出说明。重点介绍了在嵌入式应用中,利用查询方式和中断方式收发GSM短消息的两种基本方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号