首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58803篇
  免费   6133篇
  国内免费   3644篇
电工技术   3799篇
技术理论   1篇
综合类   4469篇
化学工业   9322篇
金属工艺   3288篇
机械仪表   3736篇
建筑科学   4112篇
矿业工程   1544篇
能源动力   1446篇
轻工业   6170篇
水利工程   1350篇
石油天然气   2303篇
武器工业   559篇
无线电   7034篇
一般工业技术   7008篇
冶金工业   2433篇
原子能技术   708篇
自动化技术   9298篇
  2024年   318篇
  2023年   970篇
  2022年   1887篇
  2021年   2470篇
  2020年   1924篇
  2019年   1661篇
  2018年   1873篇
  2017年   2019篇
  2016年   1956篇
  2015年   2587篇
  2014年   3256篇
  2013年   4010篇
  2012年   4497篇
  2011年   4908篇
  2010年   4393篇
  2009年   4296篇
  2008年   4114篇
  2007年   3863篇
  2006年   3484篇
  2005年   2905篇
  2004年   2066篇
  2003年   1633篇
  2002年   1591篇
  2001年   1337篇
  2000年   987篇
  1999年   770篇
  1998年   529篇
  1997年   412篇
  1996年   362篇
  1995年   263篇
  1994年   225篇
  1993年   196篇
  1992年   139篇
  1991年   127篇
  1990年   85篇
  1989年   76篇
  1988年   50篇
  1987年   47篇
  1986年   41篇
  1985年   25篇
  1984年   25篇
  1983年   23篇
  1982年   31篇
  1981年   14篇
  1980年   15篇
  1979年   21篇
  1978年   12篇
  1977年   14篇
  1976年   25篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
The present study investigates the impact of the experience of role playing a violent character in a video game on attitudes towards violent crimes and criminals. People who played the violent game were found to be more acceptable of crimes and criminals compared to people who did not play the violent game. More importantly, interaction effects were found such that people were more acceptable of crimes and criminals outside the game if the criminals were matched with the role they played in the game and the criminal actions were similar to the activities they perpetrated during the game. The results indicate that people’s virtual experience through role-playing games can influence their attitudes and judgments of similar real-life crimes, especially if the crimes are similar to what they conducted while playing games. Theoretical and practical implications are discussed.  相似文献   
62.
企业办公自动化系统的应用十分广泛,随着互联网的高速发展,WEB应用成为主流,OA系统在互联网上的延伸成为大趋势,本文阐述在WEB应用中如何保障数据和系统安全的手段和方法。  相似文献   
63.
Segmenting center of interests (COIs) from pictures is an important but highly challenging problem for researchers in computer vision and image processing. The capability of understanding the meanings of pictures by computers can lead to breakthroughs in a wide range of applications including Web image search and online picture-sharing communities. In this paper, a two-level strategy is presented, which consists of a rough segmentation stage and a fine segmentation stage. In the first level, a picture is partitioned into four regions by using a block clustering method based on color and texture features, and the COI within the picture is distinguished from the background according to the principles of photographic composition. This stage aims to determine the approximate region of the target. In the second level, a novel active contour model is established based on shape information and vector method, where the image energy is defined by a hue gradient and the external energy is generated from either a triangular inner force or a supplementary force. This stage tries to extract the boundary of the target accurately. Experimental results on photos downloaded from the Internet show the feasibility and effectiveness of the proposed method.  相似文献   
64.
In this paper, a single-iteration strategy is proposed for the design of a multi-loop PI controller to achieve the desired gain and phase margins for two-input and two-output (TITO) processes. To handle loop interactions, a TITO system is converted into two equivalent single loops with uncertainties drawn from interactions. The maximum uncertainty is estimated for the initial controller design in one loop and single-input and single-output (SISO) controller design is applied. This controller is substituted to other equivalent loop for design, and finally, the first loop controller is refined on knowledge of other loop controller. For SISO controller tuning, a new method is presented to determine the achievable gain and phase margins as well as the relevant controller parameters. Examples are given for illustration and comparison.  相似文献   
65.
混沌权值变异的Huffman树图像加密算法   总被引:1,自引:0,他引:1  
提出一种采用混沌权值变异的Huff man树的图像加密算法.此算法在熵编码过程中,以基本的Huffman树为标准,利用双耦合混沌序列1对DC系数进行树的结构未变异、路径值变异的加密;再利用双耦合混沌序列2对AC系数进行码字序号的加密.论文对算法进行了仿真,并对安全性、计算复杂度、压缩比性能进行了分析.实验结果表明,该算法基本上不影响压缩效率,且计算复杂度低、安全性高和实时性好,可用于网络上的图像服务.  相似文献   
66.
This paper presents a study on improving the traversability of a quadruped walking robot in 3D rough terrains. The key idea is to exploit body movement of the robot. The position and orientation of the robot are systematically adjusted and the possibility of finding a valid foothold for the next swing is maximized, which makes the robot have more chances to overcome the rough terrains. In addition, a foothold search algorithm that provides the valid foothold while maintaining a high traversability of the robot, is investigated and a gait selection algorithm is developed to help the robot avoid deadlock situations. To explain the algorithms, new concepts such as reachable area, stable area, potential search direction, and complementary kinematic margin are introduced, and the effectiveness of the algorithms is validated via simulations and experiments.  相似文献   
67.
A superhydrophobic micromesh covered with nanoprotrusions has been introduced and its applicability to a waterproof mobile phone speaker has been evaluated. The nanotextured superhydrophobic micromesh showed excellent water repellency, self-cleaning and waterproofing performances. In a waterproof speaker test using the fabricated nanotextured micromesh, the micromesh did not lose its waterproof function at 2 m water depth and did not form a remnant water film after being removed from the water. The packaged speaker showed almost the same sound quality before and after dipping at a 2 m water depth. These results demonstrate that the superhydrophobic nanotextured micromesh could be directly applicable for various products that need to resist water penetration, yet allow the transmission of gases and sound/light waves.  相似文献   
68.
69.
This paper is devoted to investigating inventory control problems under nonstationary and uncertain demand. A belief-rule-based inventory control (BRB-IC) method is developed, which can be applied in situations where demand and demand-forecast-error (DFE) do not follow certain stochastic distribution and forecasting demand is given in single-point or interval styles. The method can assist decision-making through a belief-rule structure that can be constructed, initialized and adjusted using both manager’s knowledge and operational data. An extended optimal base stock (EOBS) policy is proved for initializing the belief-rule-base (BRB), and a BRB-IC inference approach with interval inputs is proposed. A numerical example and a case study are examined to demonstrate potential applications of the BRB-IC method. These studies show that the belief-rule-based expert system is flexible and valid for inventory control. The case study also shows that the BRB-IC method can compensate DFE by training BRB using historical demand data for generating reliable ordering policy.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号