首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   629篇
  免费   31篇
电工技术   24篇
化学工业   102篇
金属工艺   16篇
机械仪表   26篇
建筑科学   36篇
能源动力   15篇
轻工业   86篇
水利工程   2篇
石油天然气   1篇
无线电   131篇
一般工业技术   104篇
冶金工业   68篇
原子能技术   4篇
自动化技术   45篇
  2024年   1篇
  2023年   10篇
  2022年   13篇
  2021年   6篇
  2020年   14篇
  2019年   10篇
  2018年   11篇
  2017年   14篇
  2016年   16篇
  2015年   21篇
  2014年   26篇
  2013年   31篇
  2012年   30篇
  2011年   28篇
  2010年   29篇
  2009年   35篇
  2008年   40篇
  2007年   32篇
  2006年   24篇
  2005年   28篇
  2004年   31篇
  2003年   30篇
  2002年   17篇
  2001年   13篇
  2000年   20篇
  1999年   24篇
  1998年   28篇
  1997年   21篇
  1996年   5篇
  1995年   7篇
  1994年   7篇
  1993年   5篇
  1992年   6篇
  1991年   2篇
  1990年   1篇
  1989年   4篇
  1988年   4篇
  1987年   3篇
  1985年   1篇
  1983年   1篇
  1981年   1篇
  1979年   2篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1969年   1篇
  1968年   1篇
排序方式: 共有660条查询结果,搜索用时 31 毫秒
151.
This standard for digital high-definition television has been submitted to the Federal Communications Commission for its approval. Based as it is on the MPEG-2 video compression and transport protocol, multiple transmission formats, Dolby AC-3 digital audio, and vestigial sideband digital modulation, this HDTV system will supply the home with superb images and spectacular sound while also, as part of the National Information Infrastructure (NII), relaying digital data. An HDTV system employing multiple transmission formats, digital compression, packetization, and modulation techniques is a marked advance over current world television standards such as NTSC, PAL, or SECAM  相似文献   
152.
153.
Fast Hartley transforms for image processing   总被引:1,自引:0,他引:1  
The fast Hartley transform (FHT) is used to transform two-dimensional image data. Because the Hartley transform is real-valued, it does not require complex operations. Both spectra and autocorrelations of two-dimensional ultrasound images of normal and abnormal livers were computed  相似文献   
154.
Lead‐free 0.77(Bi0.5Na0.5)TiO3–0.23Sr(Ti1?xFex)O3 (= 0, 0.04) (BNT–23STFx) was prepared using a conventional solid‐state reaction route. The effects of Fe‐modification on the chemical homogeneity from a μm scale perspective, the core‐shell domains structures, and the ferroelectric properties were investigated. The chemical homogeneity was analyzed using energy dispersive X‐ray mapping in scanning transmission electron microscopy mode, and the field‐dependent behaviors of strain and polarization were obtained to determine the ferroelectric properties. Substituting Fe3+ for Ti4+ resulted in completely different electrical behavior and properties, despite similar XRD patterns and microstructures. The Fe‐substitution promoted the mobility of Sr2+ ions in the BNT phase and, as a consequence, the chemical homogeneity increased and the core‐domains collapsed. Extending the ceramic processing, such as milling time and sintering time, affected domain distribution and compositional inhomogeneity, which led to a gradual transformation from ferroelectric to relaxor.  相似文献   
155.
In this paper the ultimate strength characteristics of dented steel plates under axial compressive loads are investigated using the ANSYS nonlinear finite element code. The effects of shape, size (depth, diameter), and location of the dent on the ultimate strength behavior of simply supported steel plates under axial thrust are studied. A closed-form formula for predicting the ultimate compressive strength of dented steel plates are empirically derived by curve fitting based on the computed results. The results and insights developed in the present study will be useful for damage tolerant design of steel plated structures with local denting.  相似文献   
156.
File entropy is one of the major indicators of crypto-ransomware because the encryption by ransomware increases the randomness of file contents. However, entropy-based ransomware detection has certain limitations; for example, when distinguishing ransomware-encrypted files from normal files with inherently high-level entropy, misclassification is very possible. In addition, the entropy evaluation cost for an entire file renders entropy-based detection impractical for large files. In this paper, we propose two indicators based on byte frequency for use in ransomware detection; these are termed EntropySA and DistSA, and both consider the interesting characteristics of certain file subareas termed "sample areas' (SAs). For an encrypted file, both the sampled area and the whole file exhibit high-level randomness, but for a plain file, the sampled area embeds informative structures such as a file header and thus exhibits relatively low-level randomness even though the entire file exhibits high-level randomness. EntropySA and DistSA use "byte frequency" and a variation of byte frequency, respectively, derived from sampled areas. Both indicators cause less overhead than other entropy-based detection methods, as experimentally proven using realistic ransomware samples. To evaluate the effectiveness and feasibility of our indicators, we also employ three expensive but elaborate classification models (neural network, support vector machine and threshold-based approaches). Using these models, our experimental indicators yielded an average F1-measure of 0.994 and an average detection rate of 99.46% for file encryption attacks by realistic ransomware samples.  相似文献   
157.
158.
We investigated theoretically and empirically a range of training schedules on tasks with three knowledge types: declarative, procedural, and perceptual-motor. We predicted performance for 6435 potential eight-block training schedules with ACT-R's declarative memory equations. Hybrid training schedules (schedules consisting of distributed and massed practice) were predicted to produce better performance than purely distributed or massed training schedules. The results of an empirical study (N = 40) testing four exemplar schedules indicated a more complex picture. There were no statistical differences among the groups in the declarative and procedural tasks. We also found that participants in the hybrid practice groups produced reliably better performance than ones in the distributed practice group for the perceptual-motor task – the results indicate training schedules with some spacing and some intensiveness may lead to better performance, particularly for perceptual-motor tasks, and that tasks with mixed types of knowledge might be better taught with a hybrid schedule.  相似文献   
159.
The static k-Nearest Neighbor (k-NN) method for localization has limitations in accuracy due to the fixed k value in the algorithm. To address this problem, and achieve better accuracy, we propose a new dynamic k-Nearest Neighbor (Dk-NN) method in which the optimal k value changes based on the topologies and distances of its nearest neighbors. The proposed method has been validated using the WLAN-fingerprint data sets collected at COEX, one of the largest convention centers in Seoul, Korea. The proposed method significantly reduced both the mean error distances and the standard deviations of location estimations, leading to a significant improvement in accuracy by ~ 23% compared to the cluster filtered k-NN (CFK) method, and ~ 17% compared to the k-NN (k = 1) method.  相似文献   
160.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号