首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7784篇
  免费   353篇
  国内免费   48篇
电工技术   216篇
综合类   20篇
化学工业   1672篇
金属工艺   165篇
机械仪表   186篇
建筑科学   239篇
矿业工程   8篇
能源动力   523篇
轻工业   767篇
水利工程   90篇
石油天然气   155篇
武器工业   4篇
无线电   957篇
一般工业技术   1372篇
冶金工业   455篇
原子能技术   80篇
自动化技术   1276篇
  2024年   20篇
  2023年   182篇
  2022年   432篇
  2021年   532篇
  2020年   377篇
  2019年   375篇
  2018年   491篇
  2017年   344篇
  2016年   384篇
  2015年   237篇
  2014年   359篇
  2013年   600篇
  2012年   395篇
  2011年   451篇
  2010年   287篇
  2009年   245篇
  2008年   228篇
  2007年   210篇
  2006年   179篇
  2005年   157篇
  2004年   128篇
  2003年   110篇
  2002年   122篇
  2001年   62篇
  2000年   68篇
  1999年   77篇
  1998年   125篇
  1997年   108篇
  1996年   75篇
  1995年   79篇
  1994年   52篇
  1993年   50篇
  1992年   41篇
  1991年   23篇
  1990年   28篇
  1989年   42篇
  1988年   46篇
  1987年   28篇
  1986年   28篇
  1985年   42篇
  1984年   50篇
  1983年   43篇
  1982年   26篇
  1981年   21篇
  1980年   28篇
  1979年   23篇
  1978年   18篇
  1977年   21篇
  1976年   30篇
  1974年   16篇
排序方式: 共有8185条查询结果,搜索用时 0 毫秒
41.
This work presents four mathematical remarks concluded from the mathematical analysis for the interrelationships between the dependent and independent variables that control the measures: perimeter, floor area, walls surface area and total surface area in the regular forms that have a given volume. Such forms include prismatic and pyramidal forms. The work consists of four parts, of which this first part presents the remarks of the isosceles triangular right prism. The first remark examines the effect of θ, the angle of the triangular base, on the total surface area. The second remark calculates the minimum total surface area in two cases, depending on whether angle θ is constant or variable. The third remark calculates the walls ratio and the critical walls ratio. The last remark studies the required conditions for the numerical equality in two cases, where the perimeter is equal to the area, and where the total surface area is equal to the volume.  相似文献   
42.
Indium tin oxide‐coated thin films (200 nm) are deposited on glass substrates by using R.f. sputtering technique. Here, we investigate the influence of new technique of treatment, which is called as “oil thermal annealing” on the nano‐structured indium tin oxide thin films at fixed temperature (150 °C) which improves adhesion strength, electrical conductivity and optical properties (transmittance) of the films. Oil thermal annealing is used to reduce inherent defects that may be introduced during the prepared thin film and cooling processes. Proposed technique is highly suitable for liquid crystal displays, solar cells and organic light emitting diodes, and many other display‐related applications.  相似文献   
43.
The stoichiometric association constants, K, the thermodynamic association constant, KA, and the other thermodynamic parameters such as ΔS°, ΔH° and ΔG° for the association between each of the Ca and Mg ions with benzoate, o-toloate, o-chlorobenzoate and salycylate have been determined at 25°C, 35°C and 45°C in aqueous media. Ion-selective electrode technique has been used in the measurements of Ca and Mg ion activitiesThe trend of association behavior of both Ca and Mg aromatic salts could not be explained on the basis of pKa of the mother organic acids but could be explained based on the trend of Hammet function σ of these salts themselves relative to the corresponding benzoate salt.  相似文献   
44.
Multimedia Tools and Applications - Nowadays, web users frequently explore multimedia contents to satisfy their information needs. The exploration approaches usually provide linear interaction...  相似文献   
45.

Security threats are crucial challenges that deter Mixed reality (MR) communication in medical telepresence. This research aims to improve the security by reducing the chances of types of various attacks occurring during the real-time data transmission in surgical telepresence as well as reduce the time of the cryptographic algorithm and keep the quality of the media used. The proposed model consists of an enhanced RC6 algorithm in combination. Dynamic keys are generated from the RC6 algorithm mixed with RC4 to create dynamic S-box and permutation table, preventing various known attacks during the real-time data transmission. For every next session, a new key is created, avoiding possible reuse of the same key from the attacker. The results obtained from our proposed system are showing better performance compared to the state of art. The resistance to the tested attacks is measured throughout the entropy, Pick to Signal Noise Ratio (PSNR) is decreased for the encrypted image than the state of art, structural similarity index (SSIM) closer to zero. The execution time of the algorithm is decreased for an average of 20%. The proposed system is focusing on preventing the brute force attack occurred during the surgical telepresence data transmission. The paper proposes a framework that enhances the security related to data transmission during surgeries with acceptable performance.

  相似文献   
46.

Most schemes exhibit low robustness due to LSB’s (Least Significant Bit) and MSB’s (Most Significant Bit) based information hiding in the cover image. However, most of these IW schemes have low imperceptibility as the cover image distortion reveals to the attacker due to information hiding in MSB’s. In this paper, a hybrid image watermarking scheme is proposed based on integrating Robust Principal Component Analysis (R-PCA), Discrete Tchebichef Transform (DTT), and Singular Value Decomposition (SVD). A grayscale watermark image is twisted/scrambled using a 2D Discrete Hyper-chaotic Encryption System (2D-DHCES) to boost up the robustness/heftiness and security. The original cover image is crumbled into sparse components using R-PCA and using DTT the substantial component is additionally decomposed and the watermark will be embedded in the cover image using SVD processing. In DTT, scarcer coefficients hold the utmost energy, also provide an optimum sparse depiction of the substantial image edges and features that supports proficient retrieval of the watermark image even after unadorned image distortion based channel attacks. The imperceptibility and robustness of the proposed method are corroborated against a variety of signal processing channel attacks (salt and pepper noise, multi-directional shearing, cropping, and frequency filtering, etc.). The visual and quantifiable outcomes reveal that the proposed image watermarking scheme is much effective and delivers high forbearance against several image processing and geometric attacks.

  相似文献   
47.
This paper deals with state estimation problem for uncertain continuous‐time systems. A numerical treatment is proposed for designing interval observers that ensures guaranteed upper and lower bounds on the estimated states. In order to take into account possible perturbations on the system and its outputs, a new type of interval observers is introduced. Such interval observers consist of two coupled general Luenberger‐type observers that involve dilatation functions. In addition, we provide an optimality criterion in order to find optimal interval observers that lead to tight interval error estimation. The proposed existence and optimality conditions are expressed in terms of linear programming. Also, some illustrative examples are given. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
48.
Many recent software engineering papers have examined duplicate issue reports. Thus far, duplicate reports have been considered a hindrance to developers and a drain on their resources. As a result, prior research in this area focuses on proposing automated approaches to accurately identify duplicate reports. However, there exists no studies that attempt to quantify the actual effort that is spent on identifying duplicate issue reports. In this paper, we empirically examine the effort that is needed for manually identifying duplicate reports in four open source projects, i.e., Firefox, SeaMonkey, Bugzilla and Eclipse-Platform. Our results show that: (i) More than 50 % of the duplicate reports are identified within half a day. Most of the duplicate reports are identified without any discussion and with the involvement of very few people; (ii) A classification model built using a set of factors that are extracted from duplicate issue reports classifies duplicates according to the effort that is needed to identify them with a precision of 0.60 to 0.77, a recall of 0.23 to 0.96, and an ROC area of 0.68 to 0.80; and (iii) Factors that capture the developer awareness of the duplicate issue’s peers (i.e., other duplicates of that issue) and textual similarity of a new report to prior reports are the most influential factors in our models. Our findings highlight the need for effort-aware evaluation of approaches that identify duplicate issue reports, since the identification of a considerable amount of duplicate reports (over 50 %) appear to be a relatively trivial task for developers. To better assist developers, research on identifying duplicate issue reports should put greater emphasis on assisting developers in identifying effort-consuming duplicate issues.  相似文献   
49.
Reuse of software components, either closed or open source, is considered to be one of the most important best practices in software engineering, since it reduces development cost and improves software quality. However, since reused components are (by definition) generic, they need to be customized and integrated into a specific system before they can be useful. Since this integration is system-specific, the integration effort is non-negligible and increases maintenance costs, especially if more than one component needs to be integrated. This paper performs an empirical study of multi-component integration in the context of three successful open source distributions (Debian, Ubuntu and FreeBSD). Such distributions integrate thousands of open source components with an operating system kernel to deliver a coherent software product to millions of users worldwide. We empirically identified seven major integration activities performed by the maintainers of these distributions, documented how these activities are being performed by the maintainers, then evaluated and refined the identified activities with input from six maintainers of the three studied distributions. The documented activities provide a common vocabulary for component integration in open source distributions and outline a roadmap for future research on software integration.  相似文献   
50.
In this study, we wanted to discriminate between two groups of people. The database used in this study contains 20 patients with Parkinson’s disease and 20 healthy people. Three types of sustained vowels (/a/, /o/ and /u/) were recorded from each participant and then the analyses were done on these voice samples. Firstly, an initial feature vector extracted from time, frequency and cepstral domains. Then we used linear and nonlinear feature extraction techniques, principal component analysis (PCA), and nonlinear PCA. These techniques reduce the number of parameters and choose the most effective acoustic features used for classification. Support vector machine with its different kernel was used for classification. We obtained an accuracy up to 87.50 % for discrimination between PD patients and healthy people.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号