首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9623篇
  免费   692篇
  国内免费   306篇
电工技术   361篇
综合类   382篇
化学工业   1576篇
金属工艺   522篇
机械仪表   614篇
建筑科学   501篇
矿业工程   171篇
能源动力   313篇
轻工业   458篇
水利工程   149篇
石油天然气   298篇
武器工业   30篇
无线电   1433篇
一般工业技术   1566篇
冶金工业   885篇
原子能技术   92篇
自动化技术   1270篇
  2024年   42篇
  2023年   131篇
  2022年   250篇
  2021年   332篇
  2020年   266篇
  2019年   271篇
  2018年   264篇
  2017年   260篇
  2016年   256篇
  2015年   343篇
  2014年   407篇
  2013年   592篇
  2012年   546篇
  2011年   592篇
  2010年   491篇
  2009年   515篇
  2008年   460篇
  2007年   455篇
  2006年   413篇
  2005年   397篇
  2004年   271篇
  2003年   267篇
  2002年   258篇
  2001年   249篇
  2000年   211篇
  1999年   260篇
  1998年   268篇
  1997年   217篇
  1996年   181篇
  1995年   162篇
  1994年   135篇
  1993年   105篇
  1992年   94篇
  1991年   80篇
  1990年   62篇
  1989年   67篇
  1988年   58篇
  1987年   46篇
  1986年   38篇
  1985年   42篇
  1984年   31篇
  1983年   22篇
  1982年   35篇
  1981年   26篇
  1980年   17篇
  1979年   14篇
  1977年   20篇
  1976年   19篇
  1974年   19篇
  1973年   14篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
The applicability of the rapid iodide migration test was systematically studied. Comparative experimental tests of different test conditions, including several external voltages, test durations, concrete ages and mixing proportions, were carried out to make clear the transport behaviors of iodide under parallel electric fields. Numerical simulations were also done using the finite element method to found the correlation between chloride and iodide transport behaviors. The test and numerical results show that the chloride transport behaviors of RIM and RCM tests have a good correlation under the several conditions used in the present paper. Moreover, the influence of external conditions (external voltages, test durations) on the test results is small. Thus, it can be concluded that the RIM method is available to determine the chloride penetration resistance of the chloride-eroded structural concrete.  相似文献   
22.
云计算应用正以势如破竹的态势进入到教育领域,云计算的推广有利于教育资源的共建共享,方便师生快捷地获取所需资源和服务,更高效地开展学习和科研工作.分析了现有网络资源的具体实际情况,利用云计算技术,探究资源整合的有效方式,整合校园网资源,探索适合于教师教学与科研、学生学习与成长,以及学校提升社会服务能力的校园私有云服务模式.  相似文献   
23.
根据风力发电技术产业的特点,构建改进层次分析与模糊一致矩阵相结合的方案决策数学模型,该模型既可以减少确定判断矩阵的盲目性,又可以避开评价体系中各等级间的隶属度确定问题,使评价结果更加可靠,适合于信息尚不完整、受主观因素影响较强的评价。实例验证了这一模型的合理性、可行性和有效性,具有实用价值。  相似文献   
24.
针对片状颗粒厚度检测的实际需求,结合机器视觉、图像处理和嵌入式技术,设计与实现了一套基于高性能ARM11的微片状颗粒厚度检测系统。该系统以QT和S3C6410为软硬件平台,提出了利用轮廓提取和最小矩形边界框相结合的方法计算片状颗粒厚度。结果表明,该检测系统具有处理速度快,测量精度高和成本低廉等优点,满足了对颗粒厚度测量的需求。  相似文献   
25.
The optimized copyright protection system with genetic watermarking   总被引:1,自引:0,他引:1  
Applications for robust watermarking is one of the major branches in digital rights management (DRM) systems and related researches. Based on existing experiences to evaluate the applicability of robust watermarking, it is generally agreed that three parameters or requirements, including the quality of watermarked contents, the survivability of extracted watermark after deliberate or unintentional attacks, and the number of bits embedded, need to be considered. However, performances relating to these three parameters conflict with each other, and the trade off must be searched for. In this paper, we take all the three requirements into consideration, and add the flexibility to meet the specific design in implementation. With the aid of genetic algorithm, we design an applicable system that would obtain the good quality, acceptable survivability, and reasonable capacity after watermarking. Simulation results present the effectiveness in practical implementation and possible application of the proposed algorithm.  相似文献   
26.
With today’s global digital environment, the Internet is readily accessible anytime from everywhere, so does the digital image manipulation software; thus, digital data is easy to be tampered without notice. Under this circumstance, integrity verification has become an important issue in the digital world. The aim of this paper is to present an in-depth review and analysis on the methods of detecting image tampering. We introduce the notion of content-based image authentication and the features required to design an effective authentication scheme. We review major algorithms and frequently used security mechanisms found in the open literature. We also analyze and discuss the performance trade-offs and related security issues among existing technologies.  相似文献   
27.
基于LDA模型的新闻话题的演化   总被引:1,自引:0,他引:1  
新闻话题及演化的研究可以帮助人们快速了解和获取新闻内容。提出了一种挖掘新闻话题随时间变化的方法,通过话题抽取和话题关联实现话题的演化。首先应用LDA(Latent Dirichlet Allocation Model)对不同时间段的文集进行话题的自动抽取,话题数目在不同时间段是可变的;计算相邻时间段中任意两个话题的分布距离实现话题的关联。实验结果证明该方法不但可以描述同一个话题随时间的演化过程,还可以描述话题内容随时间的变化,反映了话题(或子话题)之间多对多的演化关系。  相似文献   
28.
This paper presents a general method to formulate monotonically convergent algorithms for identifying optimal control fields to manipulate quantum dynamics phenomena beyond the linear dipole interaction. The method, facilitated by a field-dependent dipole moment operator, is based on an integral equation of the first kind arising from the Heisenberg equation of motion for tracking a time-dependent, dynamical invariant observable associated with a reference control field.  相似文献   
29.
The pole-sensitivity approach is employed to investigate the stability issue of the discrete-time control system, where a digital controller implemented with finite word length (FWL), is used. A stability related measure is derived, which is more accurate in estimating the closed-loop stability robustness of an FWL implemented controller than some existing measures for the pole-sensitivity analysis. This improved stability measure thus provides a better criterion to find the optimal realizations for a generic controller structure that includes output-feedback and observer-based controllers. A numerical example is used to verify the theoretical analysis and to illustrate the design procedure  相似文献   
30.
For the problem of classifying an element (e.g., an unknown pattern) into one of two given categories where the associated observables are distributed according to one of two known multivariate normal populations having a common covariance matrix, it is shown that the minimum Bayes risk is a strict monotonic function of certain separability or statistical distance measures regardless of the a priori probabilities and the assigned loss function. However, for the associated conditional expected losses, strict monotonicity holds, if and only if a certain condition dependent on these probabilities and the given loss function is satisfied. These results remain valid for classification problems in which the observable can be transformed by a one-to-one differentiable mapping to normality.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号