首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5842篇
  免费   319篇
  国内免费   55篇
电工技术   81篇
综合类   13篇
化学工业   1206篇
金属工艺   130篇
机械仪表   174篇
建筑科学   139篇
矿业工程   29篇
能源动力   318篇
轻工业   505篇
水利工程   60篇
石油天然气   42篇
无线电   670篇
一般工业技术   1304篇
冶金工业   550篇
原子能技术   67篇
自动化技术   928篇
  2024年   24篇
  2023年   126篇
  2022年   306篇
  2021年   468篇
  2020年   281篇
  2019年   311篇
  2018年   334篇
  2017年   278篇
  2016年   279篇
  2015年   184篇
  2014年   233篇
  2013年   462篇
  2012年   279篇
  2011年   306篇
  2010年   206篇
  2009年   173篇
  2008年   165篇
  2007年   142篇
  2006年   127篇
  2005年   91篇
  2004年   68篇
  2003年   82篇
  2002年   61篇
  2001年   53篇
  2000年   50篇
  1999年   65篇
  1998年   154篇
  1997年   129篇
  1996年   100篇
  1995年   73篇
  1994年   61篇
  1993年   57篇
  1992年   38篇
  1991年   44篇
  1990年   35篇
  1989年   31篇
  1988年   25篇
  1987年   30篇
  1986年   34篇
  1985年   33篇
  1984年   27篇
  1983年   30篇
  1982年   13篇
  1981年   15篇
  1980年   11篇
  1978年   18篇
  1977年   17篇
  1976年   23篇
  1973年   8篇
  1972年   8篇
排序方式: 共有6216条查询结果,搜索用时 0 毫秒
71.
Olfactory responses of the cereal stemborer parasitoid Cotesia sesamiae to volatiles emitted by gramineous host and nonhost plants of the stemborers were studied in a Y-tube olfactometer. The host plants were maize (Zea mays) and sorghum ( Sorghum bicolor), while the nonhost plant was molasses grass (Melinis minutiflora). In single-choice tests, females of C. sesamiae chose volatiles from infested and uninfested host plants and molasses grass over volatiles from the control (soil). In dual-choice tests, the wasp preferred volatiles from infested host plants to those from uninfested host plants. There was no discrimination between molasses grass volatiles and those of uninfested maize, uninfested sorghum, or infested maize. The wasp preferred sorghum volatiles over maize. Combining uninfested maize or sorghum with molasses grass did not make volatiles from the combination more attractive as compared to only uninfested host plants. Infested maize alone was as attractive as when combined with molasses grass. Infested sorghum was preferred over its combination with molasses grass. Local growth conditions of the molasses grasses influenced attractiveness to the parasitoids. Volatiles from Thika molasses grass were attractive, while those from Mbita molasses grass were not. Growing the Thika molasses grass in Mbita rendered it unattractive and vice versa with the Mbita molasses grass. This is a case of the same genotype expressing different phenotypes due to environmental factors.  相似文献   
72.

The present article introduced a novel idea for information hiding namely steganography. We have used new notions for the construction of the nonlinear component for block cipher based on inverse LA-semigroups. This nonlinear component fundamentally provides confidentiality in the proposed steganographic algorithm. The construction of the algorithm is fundamentally twofold. Firstly, we have constructed a novel scheme to design confusion component namely substitution box (S-box). Secondly, we have utilized the anticipated nonlinear component in digital steganography. The suggested algorithm is tested for different standard digital images. The authentication of the proposed algorithm is confirmed through statistical analysis.

  相似文献   
73.

Most schemes exhibit low robustness due to LSB’s (Least Significant Bit) and MSB’s (Most Significant Bit) based information hiding in the cover image. However, most of these IW schemes have low imperceptibility as the cover image distortion reveals to the attacker due to information hiding in MSB’s. In this paper, a hybrid image watermarking scheme is proposed based on integrating Robust Principal Component Analysis (R-PCA), Discrete Tchebichef Transform (DTT), and Singular Value Decomposition (SVD). A grayscale watermark image is twisted/scrambled using a 2D Discrete Hyper-chaotic Encryption System (2D-DHCES) to boost up the robustness/heftiness and security. The original cover image is crumbled into sparse components using R-PCA and using DTT the substantial component is additionally decomposed and the watermark will be embedded in the cover image using SVD processing. In DTT, scarcer coefficients hold the utmost energy, also provide an optimum sparse depiction of the substantial image edges and features that supports proficient retrieval of the watermark image even after unadorned image distortion based channel attacks. The imperceptibility and robustness of the proposed method are corroborated against a variety of signal processing channel attacks (salt and pepper noise, multi-directional shearing, cropping, and frequency filtering, etc.). The visual and quantifiable outcomes reveal that the proposed image watermarking scheme is much effective and delivers high forbearance against several image processing and geometric attacks.

  相似文献   
74.
International Journal of Control, Automation and Systems - The fault and disturbances estimation has an important role in the modern traction railway system. This paper proposes a unique method for...  相似文献   
75.
Highly porous free-standing co-poly(vinylidene fluoride)/modacrylic/SiO2 nanofibrous membrane was developed using electrically-assisted solution blow spinning method. The performance and the potential of the membrane as a lithium-ion battery separator were investigated. The addition of modacrylic enhanced the solution spinnability that resulted in defect-free membranes. Moreover, the presence of modacrylic enhanced the dimensional and thermal stabilities, while the addition of hydrophilic SiO2 nanoparticle enhanced both mechanical property and ionic conductivity. Combustion test results illustrated that the presence of modacrylic provide flame retarding property over a set of different polymeric-based membranes. Electrochemical performance results showed that the developed membrane can increase the battery capacity compared with the commercial separator.  相似文献   
76.
In this study, glass fiber/epoxy composites were interfacially tailored by introducing polyamidoamine (PAM) dendrimer functionalized graphene oxide (GO) into epoxy matrix. Two different composites each containing varying loading fraction (0.5, 1.0, and 1.5 wt%) of GO and GO-PAM were fabricated via hot press processing. Composites were evaluated for interlaminar shear strength (ILSS), dynamic mechanical properties and thermal conductivity. The inclusion of 1.5 wt% GO-PAM resulted ~57.3%, ~42.7%, and ~54% enhancement in ILSS, storage modulus and thermal conductivity, respectively. Almost, ~71% reduction in coefficient of thermal expansion was also observed at same GO-PAM loading. Moreover, higher glass transition temperature was observed with GO-PAM addition. GO-PAM substantially improved fiber/matrix interfacial adhesion, which was witnessed through scanning electron microscopy. The enhanced thermo-mechanical performance was attributed to interfacial covalent interactions engendered by ring opening reaction between epoxy and amine moieties of PAM dendrimers. These multiscale composites with extraordinary functional properties can outperform conventional counterparts with improved reliability and performance.  相似文献   
77.
Low-pressure plasma spraying under an argon atmosphere was employed to deposit molybdenum and tungsten coatings on different metallic, ceramic, and composite substrates. Molybdenum coatings ob-tained through this technique presented a homogeneous structure with an average porosity of about 17 %. These coatings exhibited adhesion greater than 40 MPa on molybdenum and grey cast iron (FT25) substrates. No adhesion was observed on an A1N surface regardless of the preheating temperature and/or surface preparation. Adhesion on AIN-Mo (AM25) composite substrate, containing 25 % dispersed metal-lic phase by volume, showed intermediate results. Tungsten coatings exhibited porosity between 10 to 12% and a typical lamellar structure. The adhesion of tungsten coatings on molybdenum and FT25 sub-strates was around 40 MPa.  相似文献   
78.
In this paper, a new class of additive codes which is referred to as ?2 ?2[u]-additive codes is introduced. This is a generalization towards another direction of recently introduced ?2 ?4-additive codes [J. Borges, C. Fernández-Córdoba, J. Pujol, J. Rif´a, and M. Villanueva, ?2 ?4-linear codes: Generator matrices and duality, Designs Codes Cryptogr. 54(2) (2010), pp. 167–179]. ?2 ?4-additive codes have shown to provide a promising class of codes with their algebraic structure and applications such as steganography. The standard generator matrices are established and by introducing orthogonality the parity-check matrices are also obtained. A MacWilliams-type identity that relates the weight enumerator of a code with its dual is proved. Furthermore, a Gray map that maps these codes to binary codes is defined and some examples of optimal codes which are the binary Gray images of ?2 ?2[u]-additive codes are presented.  相似文献   
79.
Cloud computing is an emerging technology in which information technology resources are virtualized to users in a set of computing resources on a pay‐per‐use basis. It is seen as an effective infrastructure for high performance applications. Divisible load applications occur in many scientific and engineering applications. However, dividing an application and deploying it in a cloud computing environment face challenges to obtain an optimal performance due to the overheads introduced by the cloud virtualization and the supporting cloud middleware. Therefore, we provide results of series of extensive experiments in scheduling divisible load application in a Cloud environment to decrease the overall application execution time considering the cloud networking and computing capacities presented to the application's user. We experiment with real applications within the Amazon cloud computing environment. Our extensive experiments analyze the reasons of the discrepancies between a theoretical model and the reality and propose adequate solutions. These discrepancies are due to three factors: the network behavior, the application behavior and the cloud computing virtualization. Our results show that applying the algorithm result in a maximum ratio of 1.41 of the measured normalized makespan versus the ideal makespan for application in which the communication to computation ratio is big. They show that the algorithm is effective for those applications in a heterogeneous setting reaching a ratio of 1.28 for large data sets. For application following the ensemble clustering model in which the computation to communication ratio is big and variable, we obtained a maximum ratio of 4.7 for large data set and a ratio of 2.11 for small data set. Applying the algorithm also results in an important speedup. These results are revealing for the type of applications we consider under experiments. The experiments also reveal the impact of the choice of the platforms provided by Amazon on the performance of the applications under study. Considering the emergence of cloud computing for high performance applications, the results in this paper can be widely adopted by cloud computing developers. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
80.
Use Case modeling is a popular technique for documenting functional requirements of software systems. Refactoring is the process of enhancing the structure of a software artifact without changing its intended behavior. Refactoring, which was first introduced for source code, has been extended for use case models. Antipatterns are low quality solutions to commonly occurring design problems. The presence of antipatterns in a use case model is likely to propagate defects to other software artifacts. Therefore, detection and refactoring of antipatterns in use case models is crucial for ensuring the overall quality of a software system. Model transformation can greatly ease several software development activities including model refactoring. In this paper, a model transformation approach is proposed for improving the quality of use case models. Model transformations which can detect antipattern instances in a given use case model, and refactor them appropriately are defined and implemented. The practicability of the approach is demonstrated by applying it on a case study that pertains to biodiversity database system. The results show that model transformations can efficiently improve quality of use case models by saving time and effort.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号