首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   91694篇
  免费   7622篇
  国内免费   4085篇
电工技术   5693篇
技术理论   2篇
综合类   5777篇
化学工业   14015篇
金属工艺   4957篇
机械仪表   5215篇
建筑科学   6721篇
矿业工程   1854篇
能源动力   2647篇
轻工业   7088篇
水利工程   1811篇
石油天然气   3878篇
武器工业   675篇
无线电   12041篇
一般工业技术   11655篇
冶金工业   5643篇
原子能技术   1029篇
自动化技术   12700篇
  2024年   370篇
  2023年   1371篇
  2022年   2574篇
  2021年   3570篇
  2020年   2502篇
  2019年   2107篇
  2018年   2358篇
  2017年   2802篇
  2016年   2455篇
  2015年   3396篇
  2014年   4445篇
  2013年   5666篇
  2012年   6040篇
  2011年   6751篇
  2010年   5857篇
  2009年   5649篇
  2008年   5585篇
  2007年   5347篇
  2006年   5124篇
  2005年   4179篇
  2004年   2844篇
  2003年   2349篇
  2002年   2370篇
  2001年   2025篇
  2000年   1913篇
  1999年   1969篇
  1998年   2161篇
  1997年   1757篇
  1996年   1535篇
  1995年   1239篇
  1994年   970篇
  1993年   823篇
  1992年   614篇
  1991年   468篇
  1990年   396篇
  1989年   309篇
  1988年   269篇
  1987年   189篇
  1986年   160篇
  1985年   147篇
  1984年   100篇
  1983年   78篇
  1982年   74篇
  1981年   61篇
  1980年   63篇
  1979年   35篇
  1978年   34篇
  1977年   55篇
  1976年   126篇
  1973年   21篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
介绍了MIMO系统无线信道研究的现状,对现阶段的MIMO信道建模方法进行了分析和比较,提出了自由真实空间内的MIMO信道实时测量系统方案,该系统采用USRP平台,能实时地测量真实空间通信信道传输性能,并对信道数据进行存储分析,该系统成本低,为真实MIMO信道研究提供了基础.  相似文献   
992.
For the issues of large space and storage security of multimedia files, we analyzed the impact of access control and cloud storage on multimedia file, and proposed a mixed security cloud storage framework based on Internet of Things. This paper introduced the concept of multimedia protection into the method based on role access control. Moreover, we also adopted a scheme based on the combination of multimedia data state and role access control. At the same time, all input and output devices were connected to this system. Internet of Things is used to judge whether circuits are connected and whether the devices are normally operated, so as to improve the access efficiency. On this basis, we also described in detail the complete process of registration, role assignment, multimedia file owner’s request for data encryption, and user login and access to multimedia file. According to the result, this scheme can be used to resist the known attacks. It guarantees security of multimedia files.  相似文献   
993.
994.
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices.  相似文献   
995.
Copy move forgery detection (CMFD) is one of the most active subtopic in forgery scheme. The methods of CMFD are divided into to block-based method and keypoint-based method in general. Compared with keypoint-based method, block-based method can detect undetectable detail without morphology segmentation. But many block-based methods detect the plain copy-move forgeries only. They have been incompetent to detect the post-processing operations such as various geometrical distortions, and then fail to detect the forgery regions accurately. Therefore, this paper presents an improved block-based efficient method for CMFD. Firstly, after pre-processing, an auxiliary overlapped circular block is presented to divide the forged image into overlapped circular blocks. The local and inner image feature is extracted by the Discrete Radial Harmonic Fourier Moments (DRHFMs) with the overlapped circular block from the suspicious image. Then, the similar feature vectors of blocks are searched by 2 Nearest Neighbors (2NN) test. Euclidean distance and correlation coefficient is employed to filter these features and then remove the false matches. Morphologic operation is employed to delete the isolated pixels. A series of experiments are done to analyze the performance for CMFD. Experimental results show that the new DRHFMs can obtain outstanding performance even under image geometrical distortions.  相似文献   
996.
Multimedia Tools and Applications - Hashing is a binary-code encoding method which tries to preserve the neighborhood structures in the original feature space, in order to realize efficient...  相似文献   
997.
Lu  Zhao  Lin  Yu-Ru  Huang  Xiaoxia  Xiong  Naixue  Fang  Zhijun 《Multimedia Tools and Applications》2017,76(8):10855-10879
Multimedia Tools and Applications - Nowadays, microblogging has become popular, with hundreds of millions of short messages being posted and shared every minute on a variety of topics in social...  相似文献   
998.
Multimedia Tools and Applications - Reversible data hiding based on prediction methods is a data hiding technique wherein secret bits can be efficiently hidden into cover images. In this paper, we...  相似文献   
999.
Multimedia Tools and Applications - A novel scheme for non-rigid video object tracking using segment-based object candidates is proposed in this paper. Rather than using a conventional bounding...  相似文献   
1000.
The objective of this study is to identify the financial statement fraud factors and rank the relative importance. First, this study reviews the previous studies to identify the possible fraud indicators. Expert questionnaires are distributed next. After questionnaires are collected, Lawshe’s approach is employed to eliminate these factors whose CVR (content validity ratio) values do not meet the criteria. Further, the remaining 32 factors are reviewed by experts to be the measurements suitable for the assessment of fraud detection. The Analytic Hierarchy Process (AHP) is utilized to determine the relative weights of the individual items. The result of AHP shows that the most important dimension is Pressure/Incentive and the least one is Attitude/rationalization. In addition, the top five important measurements are “Poor performance”, “The need for external financing”, “Financial distress”, “Insufficient board oversight”, and “Competition or market saturation”. The result provides a significant advantage to auditors and managers in enhancing the efficiency of fraud detection and critical evaluation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号