首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5526篇
  免费   162篇
  国内免费   14篇
电工技术   131篇
综合类   6篇
化学工业   1098篇
金属工艺   138篇
机械仪表   97篇
建筑科学   139篇
矿业工程   27篇
能源动力   239篇
轻工业   291篇
水利工程   20篇
石油天然气   18篇
无线电   729篇
一般工业技术   1077篇
冶金工业   863篇
原子能技术   40篇
自动化技术   789篇
  2023年   46篇
  2022年   74篇
  2021年   125篇
  2020年   107篇
  2019年   104篇
  2018年   140篇
  2017年   136篇
  2016年   113篇
  2015年   93篇
  2014年   129篇
  2013年   357篇
  2012年   198篇
  2011年   266篇
  2010年   212篇
  2009年   213篇
  2008年   232篇
  2007年   191篇
  2006年   189篇
  2005年   185篇
  2004年   147篇
  2003年   130篇
  2002年   112篇
  2001年   112篇
  2000年   88篇
  1999年   97篇
  1998年   220篇
  1997年   161篇
  1996年   112篇
  1995年   80篇
  1994年   112篇
  1993年   106篇
  1992年   88篇
  1991年   67篇
  1990年   60篇
  1989年   48篇
  1988年   62篇
  1987年   54篇
  1986年   52篇
  1985年   73篇
  1984年   58篇
  1983年   48篇
  1982年   39篇
  1981年   49篇
  1980年   41篇
  1979年   38篇
  1978年   36篇
  1977年   45篇
  1976年   46篇
  1974年   33篇
  1973年   35篇
排序方式: 共有5702条查询结果,搜索用时 15 毫秒
111.

A novel image encryption framework is proposed in this article. A new chaotic map and a pseudorandom bit generator are proposed. Apart from this, a novel image encryption system is designed based on the proposed map and the proposed pseudorandom bit generator. These three are the major contributions of this work that makes a complete cryptosystem. The proposed new chaotic map is proposed which will be known as the ‘RCM map’ and its chaotic property is studied based on Devaney’s theory. The proposed pseudorandom bit generator is tested using the NIST test suite. The proposed method is simple to implement and does not involve any highly complex operations. Moreover, the proposed method is completely lossless, and therefore cent percent of data can be recovered from the encrypted image. The decryption process is also simple to implement i.e. just reverse of the encryption procedure. A scrambling algorithm is also proposed to further enhance the security of the overall system. The simulation, detailed analysis, and comparative studies of the proposed overall image encryption framework will help to understand the strengths and weaknesses of it. The experimental results are very promising and show the prospects of chaos theory and its usage in the field of data security.

  相似文献   
112.
Dutta  Joy  Roy  Sarbani 《Multimedia Tools and Applications》2021,80(13):19989-20018
Multimedia Tools and Applications - Indoor air pollutants e.g., Carbon dioxide (CO2), Particulate Matter(PM)2.5, PM10, Total Volatile Organic Compounds (TVOC), etc. have a serious impact on human...  相似文献   
113.

In the medical field, image segmentation is a paramount and challenging task. The head and vertebral column make up the central nervous system (CNS), which control all the paramount functions. These include thinking, speaking, and gestures. The uncontrolled growth in the CNS can affect a person’s thinking of communication or movement. The tumor is known as the uncontrolled growth of cells in brain. The tumor can be recognized by MRI image. Brain tumor detection is mostly affected with inaccurate classification. This proposed work designed a novel classification and segmentation algorithm for the brain tumor detection. The proposed system uses the Adaptive fuzzy deep neural network with frog leap optimization to detect normality and abnormality of the image. Accurate classification is achieved with error minimization strategy through our proposed method. Then, the abnormal image is segmented using adaptive flying squirrel algorithm and the size of the tumor is detected, which is used to find out the severity of the tumor. The proposed work is implemented in the MATLAB simulation platform. The proposed work Accuracy, sensitivity, specificity, false positive rate and false negative rate are 99.6%, 99.9%, 99.8%, 0.0043 and 0.543, respectively. The detection accuracy is better in our proposed system than the existing teaching and learning based algorithm, social group algorithm and deep neural network.

  相似文献   
114.
Information Systems Frontiers - Ransomware is a self-propagating malware encrypting file systems of the compromised computers to extort victims for financial gains. Hundreds of schools, hospitals,...  相似文献   
115.
116.

In incremental software development (ISD) functionalities are delivered incrementally and requirements keep on evolving across iterations. The requirements evolution involves the addition of new dependencies and conflicts among functional and non-functional requirements along with changes in priorities and dependency weights. This, in turn, demands refactoring the order of development of system components to minimize the impact of these changes. Neglecting the non-functional constraints in the software development process exposes it to risks that may accumulate across several iterations. In this research work, we propose a risk management framework for ISD processes that provides an estimate of risk exposure for the project when functional features are frozen while ignoring the associations with non-functional requirements. Our framework proposes suitable risk reduction strategies that work in tandem with the risk assessment module. We also provide a tool interface for our risk management framework.

  相似文献   
117.
The objective of the present work was to determine the dynamic hardness of WC-Co coatings from the dynamic hardness of the coating substrate system. It was also the purpose of this work to evaluate the influence of coating composition, coating thickness, and substrate materials on the dynamic hardness of the coating. To achieve the above-mentioned objectives, WC-12%Co and WC-17%Co coatings were deposited by detonation spraying on three different substrate materials: mild steel, commercially pure (CP) aluminum, and CP titanium. The dynamic hardness of the coating/substrate composite was evaluated by a drop weight system. The dynamic hardness of the coating independent of the substrate was determined from the dynamic hardness of the coating/substrate composite.  相似文献   
118.
The oxidation behavior of a normalized 2.25Cr-1Mo steel tempered previously for 10 hr at different temperatures between 873 and 1023 K has been studied up to a maximum duration of 1000 hr in air at 773–973 K. The oxidation resistance of the steel was found to decrease significantly with the temperature of tempering. Tempering of this steel is reported to cause microstructural changes involving precipitation of Cr as carbides and a decrease in the effective (free) Cr contents, that could influence the oxidation resistance of the Cr-containing alloys. Relative compositions across the thickness of the oxide scales, as analyzed by SEM/EDX and SIMS, suggest that a less Cr-rich (and less protective) and thicker scale on the steel formed because previous tempering caused extensive depletion of free Cr.  相似文献   
119.
The contact areas between Cu and Ta of a Cu interconnect can be susceptible to galvanic corrosion during chemical mechanical planarization (CMP) in polishing slurries capable of supporting ionic conduction. In the present work, we probe this effect at a partially Cu-covered Ta disk, by combining electrochemical impedance spectroscopy with potentiodynamic polarization and galvanic current measurements in two slurry solutions commonly used in CMP of Ta and Cu. The results of these measurements are compared with those for a Cu disk and a (Cu-free) Ta disk. The impedance data for the Cu-decorated Ta sample show negative impedance values at certain regions of the impedance spectra, whereas the individual Cu and Ta electrodes are free of this effect. The results are examined and explained from considerations of galvanic corrosion at the Ta/Cu bordering regions in contact with the slurry liquid.  相似文献   
120.
Oxidation kinetics of copper in the temperature range of 973–1173 K atP O 2=21.27 kPa exhibit enhancement and deceleration in the rates with changing polarity compared to normal oxidation under interrupted mode of directcurrent application. These conditions are achieved by connecting the oxidizing copper covered with an initially formed thin oxide film to the positive and negative terminal of a dc source, respectively. However, the influence of direction of the current is found to be opposite under uninterrupted mode of impressed current flow in the same temperature range. The effect of short-circuiting the metal to the outer oxide/air interface on the reaction kinetics is also reported. The rate of oxide-scale growth under normal condition, and two different modes of current applications as well as with shorting circuitry attachment conform to the parabolic growth law. The results pertaining to the two different modes of impressed current have been discussed considering both the phenomena of electrolysis of the oxide electrolyte and the polarization at the two phase boundaries. The enhancement and the reduction in rates under uninterrupted impressed current conditions are explained on the basis of increased and decreased average defect concentrations, respectively, within the oxide layer. The acceleration and deceleration in the rates under interrupted mode of current flow have been explained in the light of sustenance of a steeper and flatter electrochemical-potential gradient of defects, respectively, across the growing-oxide layer. The possible different responses of the metal/oxide and oxide/air interfaces to the impressed current brought into play by two different modes of current application, have enabled to display a better insight on the mechanistic aspects of scale growth under the influence of an externally applied current.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号