首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22841篇
  免费   2068篇
  国内免费   946篇
电工技术   1170篇
综合类   1606篇
化学工业   4413篇
金属工艺   1005篇
机械仪表   1047篇
建筑科学   1374篇
矿业工程   427篇
能源动力   570篇
轻工业   3551篇
水利工程   495篇
石油天然气   725篇
武器工业   136篇
无线电   1967篇
一般工业技术   2473篇
冶金工业   750篇
原子能技术   202篇
自动化技术   3944篇
  2024年   99篇
  2023年   331篇
  2022年   860篇
  2021年   1035篇
  2020年   823篇
  2019年   664篇
  2018年   732篇
  2017年   819篇
  2016年   742篇
  2015年   1093篇
  2014年   1433篇
  2013年   1735篇
  2012年   2008篇
  2011年   2136篇
  2010年   1820篇
  2009年   1734篇
  2008年   1602篇
  2007年   1501篇
  2006年   1187篇
  2005年   878篇
  2004年   586篇
  2003年   419篇
  2002年   342篇
  2001年   243篇
  2000年   189篇
  1999年   147篇
  1998年   119篇
  1997年   96篇
  1996年   76篇
  1995年   60篇
  1994年   45篇
  1993年   41篇
  1992年   34篇
  1991年   27篇
  1990年   25篇
  1989年   20篇
  1988年   16篇
  1987年   22篇
  1986年   19篇
  1985年   19篇
  1984年   10篇
  1983年   9篇
  1982年   5篇
  1981年   11篇
  1980年   6篇
  1979年   4篇
  1978年   4篇
  1977年   3篇
  1976年   13篇
  1966年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
Over the last two decades, Collaborative Systems have become increasingly popular thanks to the many advances made in networks, communications and software tools. Within this field, Collaborative Modeling Systems apply the collaborative paradigm to the construction of (often visual) models, where users build diagrams from building blocks and the relationships between them. In these kinds of applications, the work is usually arranged into sessions, with the definition of some kind of time organization between those sessions. This organization is known as a collaboration protocol. Unfortunately, it is not usually easy to define these protocols, and many applications do not allow users to make any use of them.In an effort to overcome these difficulties, in this paper we propose a visual language for defining collaboration protocols for these systems. As such, in our language, sessions, artifacts and the transformations between them can be specified visually, and different coordination relationships (such as fork and join) can be defined. The visual language is included in a development method for collaborative systems that take advantage of the Eclipse platform in order to develop model-driven graphical editors that are enhanced with collaboration capabilities.  相似文献   
92.
While search engines have been a successful tool to search text information, image search systems still face challenges. The keyword-based query paradigm used to search in image collection systems, which has been successful in text retrieval, may not be useful in scenarios where the user does not have the precise way to express a visual query. Image collection exploration is a new paradigm where users interact with the image collection to discover useful and relevant pictures. This paper proposes a framework for the construction of an image collection exploration system based on kernel methods, which offers a mathematically strong basis to address each stage of an image collection exploration system: image representation, summarization, visualization and interaction. In particular, our approach emphasizes a semantic representation of images using kernel functions, which can be seamlessly harnessed across all system components. Experiments were conducted with real users to verify the effectiveness and efficiency of the proposed strategy.  相似文献   
93.
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable.  相似文献   
94.
淮北平原主要农作物涝渍灾害 损失评估研究   总被引:3,自引:0,他引:3  
针对淮北平原除涝减灾综合治理与规划中缺乏主要农作物受涝损失调查与评估基础资料的实 际问题,于2010年9月初区域降雨成灾之际,对受涝区进行主要农作物受涝经济损失调查。依据实 地调研成果,通过综合统计分析推求了不同耕地类型不同暴雨强度下的受涝损失率,在此基础上实现 了对淮北平原受涝经济损失的合理评估。  相似文献   
95.
A novel gray-level image encryption/decryption scheme is proposed, which is based on quantum Fourier transform and double random-phase encoding technique. The biggest contribution of our work lies in that it is the first time that the double random-phase encoding technique is generalized to quantum scenarios. As the encryption keys, two phase coding operations are applied in the quantum image spatial domain and the Fourier transform domain respectively. Only applying the correct keys, the original image can be retrieved successfully. Because all operations in quantum computation must be invertible, decryption is the inverse of the encryption process. A detailed theoretical analysis is given to clarify its robustness, computational complexity and advantages over its classical counterparts. It paves the way for introducing more optical information processing techniques into quantum scenarios.  相似文献   
96.
Cloud computing is posing several challenges, such as security, fault tolerance, access interface singularity, and network constraints, both in terms of latency and bandwidth. In this scenario, the performance of communications depends both on the network fabric and its efficient support in virtualized environments, which ultimately determines the overall system performance. To solve the current network constraints in cloud services, their providers are deploying high-speed networks, such as 10 Gigabit Ethernet. This paper presents an evaluation of high-performance computing message-passing middleware on a cloud computing infrastructure, Amazon EC2 cluster compute instances, equipped with 10 Gigabit Ethernet. The analysis of the experimental results, confronted with a similar testbed, has shown the significant impact that virtualized environments still have on communication performance, which demands more efficient communication middleware support to get over the current cloud network limitations.  相似文献   
97.
张娟  徐德  张正涛  张文生 《控制工程》2013,20(2):250-253
针对特定夹持器和环形物,基于搭建的微装配实验平台,提出了一种显微视觉引导下,夹持器相对于环形物的趋近运动控制策略.在垂直显微视觉引导下,基于夹持器和环形物的几何先验知识,实现了夹持器和环形物的多几何特征提取,从而实现了二者相对位置检测,并且根据夹持器头的几何先验知识及显微视觉检测结果,实现了对夹持器头的持续跟踪.在视觉信息反馈下,采用变结构控制器控制夹持器的运动,实现了对夹持器的快速稳定运动控制.实验结果验证了该运动控制策略的有效性.  相似文献   
98.
通过分析总结国际石油数据模型标准POSC模型的业务域和业务流程的划分方法和描述方法,结合国内油田企业业务特点,以测井解释等业务为例研究其中的油田业务分析与建模方法。  相似文献   
99.
本文在分析软件过程中缺陷类型、缺陷注入、缺陷识别的基础上,对传统缺陷管理流程进行改进,增加了缺陷排除有效性的度量方法;然后提出一种实用的软件缺陷管理流程,建立了一个以软件缺陷生命周期为基础的度量模型,并给出了相应的缺陷矩阵度量方法;最后把该缺陷管理流程和度量方法应用在某公司的两个软件项目中,对各阶段的缺陷进行了度量,经实践和数据分析得出,运用此缺陷管理流程和度量方法可以为开发团队设定具体阶段目标和质量计划提供数据基础,为过程控制、过程评价、持续改进等提供量化管理的基础,表明本文改进后的缺陷管理流程和度量方法模型是有效的。  相似文献   
100.
提出了一种基于区域分割的图像融合方法.首先,通过对原图像进行小波分解得到其近似子图和细节子图,对细节子图运用分水岭分割法获得每一层的分割子图用于引导融合过程.然后在分割区域中对原图像小波系数的活动水平及匹配度进行度量,并在组合细节子图系数和近似子图系数的过程中分别采用最大值法则和加权平均法则.最后,通过逆小波变换得到最...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号