首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   55575篇
  免费   5101篇
  国内免费   2666篇
电工技术   3507篇
技术理论   8篇
综合类   3637篇
化学工业   9434篇
金属工艺   2939篇
机械仪表   3278篇
建筑科学   3983篇
矿业工程   1508篇
能源动力   1762篇
轻工业   3489篇
水利工程   1099篇
石油天然气   2834篇
武器工业   648篇
无线电   6952篇
一般工业技术   6794篇
冶金工业   2903篇
原子能技术   698篇
自动化技术   7869篇
  2024年   255篇
  2023年   910篇
  2022年   1809篇
  2021年   2470篇
  2020年   1834篇
  2019年   1529篇
  2018年   1702篇
  2017年   1810篇
  2016年   1627篇
  2015年   2279篇
  2014年   2711篇
  2013年   3439篇
  2012年   3576篇
  2011年   3786篇
  2010年   3323篇
  2009年   3231篇
  2008年   3114篇
  2007年   2944篇
  2006年   2975篇
  2005年   2469篇
  2004年   1855篇
  2003年   1616篇
  2002年   1672篇
  2001年   1531篇
  2000年   1316篇
  1999年   1334篇
  1998年   1162篇
  1997年   990篇
  1996年   800篇
  1995年   671篇
  1994年   495篇
  1993年   432篇
  1992年   329篇
  1991年   270篇
  1990年   183篇
  1989年   179篇
  1988年   144篇
  1987年   87篇
  1986年   88篇
  1985年   77篇
  1984年   33篇
  1983年   27篇
  1982年   37篇
  1981年   34篇
  1980年   23篇
  1979年   21篇
  1977年   16篇
  1976年   19篇
  1974年   13篇
  1973年   14篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
为了更加真实且实时地模拟运动中虚拟人恢复平衡的反应动作,提出一种针对受到外界作用力扰动的虚拟人平衡保持算法.首先通过虚拟人质心位移和速度来判断平衡性;然后借助生物力学的研究成果设计了具有人体特性的虚拟人运动受扰后的平衡保持方法,并用动力学进行模拟,驱动虚拟人完成平衡恢复.实验结果表明:该算法计算效率高,符合人体的生物力学特性,并且具有良好的交互性与较好的视觉效果,适用于虚拟人动画合成.  相似文献   
72.
Most conventional conference key agreement protocols have not been concerned with a practical situation. There may exist some malicious conferees who attempt to block conference initiation for some purposes, e.g. commercial, political or military benefit. Instances where conference must be launched immediately due to emergency, efficient detection of malicious behavior would be needed. Recently, Tzeng (IEEE Trans. Comput. 51(4):373–379, 2002) proposed a fault-tolerant conference key agreement protocol to address the issue where a conference key can be established among conferees even though malicious conferees exist. However, his protocol might be complex and inefficient during fault-detection. In the case where a malicious conferee exists and a fault-tolerant mechanism is launched, complicated interactions between conferees will be required. In this paper, we introduce a novel strategy, where any malicious conferee may be identified and removed from the conferee list without any interaction. With such a non-interactive fault-tolerance, conferences could be established and started efficiently. A complete example of our protocol will be given to describe the fascinating fault-tolerance. We analyse the security of our protocol regarding four aspects, i.e. correctness, fault-tolerance, active attack and passive attack. The comparisons of performance between our protocol and that of Tzeng are also shown. As a whole, the advantage of our protocol is superior to that of Tzeng under the situation where malicious conferees exist.
Chi-Sung LaihEmail:
  相似文献   
73.
随着设计理论和实践的发展,产品设计中越来越强调以用户为中心的体验式设计。本文应用用户研究和设计心理学的方法,通过研究人们在图书馆使用储物箱的活动,建立出用户心理和行为模型,从而提升用户使用过程中的体验和满意度。  相似文献   
74.
提出了一种新型大规模阵列水声信号采集系统设计方法。该设计基于数据流驱动设计思想,利用FPGA实现了高速LINK口,同时在数据传输中采用独特的两级缓冲结构,因而系统拓扑结构灵活,数据吞吐率高,同时具备同步性能好,扩展性强的特点。  相似文献   
75.
Wong KW  Cheng LM 《Applied optics》1994,33(11):2134-2139
We propose performing space-variant optical logic operations in a space-invariant optical system by selectively assigning encoding states that are operation dependent. With this method, encoders using liquid-crystal cells and liquid-crystal light valves to perform space-variant encoding for all 16 Boolean functions are designed. Multiple-instruction-multiple-data processing can then be realized in optical logic systems.  相似文献   
76.
本文简要叙述了刘家峡电厂水轮机增容改造中的水力研究、结构设计、中间试验、材料选择以及制造工艺等方面内容,并探讨了减轻泥砂磨蚀的措施。该水轮机的增容改造经验对含泥砂河流水轮机的设计与改造是有益的。  相似文献   
77.
Organic redox-active materials are promising electrode candidates for lithium-ion batteries by virtue of their designable structure and cost-effectiveness. However, their poor electrical conductivity and high solubility in organic electrolytes limit the device's performance and practical applications. Herein, the π-conjugated nitrogen-containing heteroaromatic molecule hexaazatriphenylene (HATN) is strategically embedded with redox-active centers in the skeleton of a Cu-based 2D conductive metal–organic framework (2D c-MOF) to optimize the lithium (Li) storage performance of organic electrodes, which delivers improved specific capacity (763 mAh g−1 at 300 mA g−1), long-term cycling stability (≈90% capacity retention after 600 cycles at 300 mA g−1), and excellent rate performance. The correlation of experimental and computational results confirms that this high Li storage performance derives from the maximum number of active sites (CN sites in the HATN unit and CO sites in the CuO4 unit), favorable electrical conductivity, and efficient mass transfer channels. This strategy of integrating multiple redox-active moieties into the 2D c-MOF opens up a new avenue for the design of high-performance electrode materials.  相似文献   
78.
Li-rich layered oxides (LLOs) have been considered as the most promising cathode materials for achieving high energy density Li-ion batteries. However, they suffer from continuous voltage decay during cycling, which seriously shortens the lifespan of the battery in practical applications. This review comprehensively elaborates and summarizes the state-of-the-art of the research in this field. It is started from the proposed mechanism of voltage decay that refers to the phase transition, microscopic defects, and oxygen redox or release. Furthermore, several strategies to mitigate the voltage decay of LLOs from different scales, such as surface modification, elemental doping, regulation of components, control of defect, and morphology design are summarized. Finally, a systematic outlook on the real root of voltage decay is provided, and more importantly, a potential solution to voltage recovery from electrochemistry. Based on this progress, some effective strategies with multiple scales will be feasible to create the conditions for their commercialization in the future.  相似文献   
79.
80.
Chen  Ailin  Yang  Pin  Cheng  Pengsen 《The Journal of supercomputing》2022,78(2):2744-2771

The rumors, advertisements and malicious links are spread in social networks by social spammers, which affect users’ normal access to social networks and cause security problems. Most methods aim to detect social spammers by various features, such as content features, behavior features and relationship graph features, which rely on a large-scale labeled data. However, labeled data are lacking for training in real world, and manual annotating is time-consuming and labor-intensive. To solve this problem, we propose a novel method which combines active learning algorithm with co-training algorithm to make full use of unlabeled data. In co-training, user features are divided into two views without overlap. Classifiers are trained iteratively with labeled instances and the most confident unlabeled instances with pseudo-labels. In active learning, the most representative and uncertain instances are selected and annotated with real labels to extend labeled dataset. Experimental results on the Twitter and Apontador datasets show that our method can effectively detect social spammers in the case of limited labeled data.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号