首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   53805篇
  免费   4150篇
  国内免费   1970篇
电工技术   2681篇
技术理论   5篇
综合类   3408篇
化学工业   9596篇
金属工艺   2956篇
机械仪表   3197篇
建筑科学   4092篇
矿业工程   1434篇
能源动力   1393篇
轻工业   3320篇
水利工程   836篇
石油天然气   3532篇
武器工业   381篇
无线电   6061篇
一般工业技术   7020篇
冶金工业   2654篇
原子能技术   666篇
自动化技术   6693篇
  2024年   180篇
  2023年   792篇
  2022年   1232篇
  2021年   1896篇
  2020年   1485篇
  2019年   1264篇
  2018年   1451篇
  2017年   1679篇
  2016年   1440篇
  2015年   1921篇
  2014年   2425篇
  2013年   3050篇
  2012年   3215篇
  2011年   3543篇
  2010年   3006篇
  2009年   2804篇
  2008年   2810篇
  2007年   2652篇
  2006年   2892篇
  2005年   2705篇
  2004年   1782篇
  2003年   1576篇
  2002年   1463篇
  2001年   1262篇
  2000年   1524篇
  1999年   1722篇
  1998年   1399篇
  1997年   1250篇
  1996年   1165篇
  1995年   999篇
  1994年   780篇
  1993年   587篇
  1992年   462篇
  1991年   359篇
  1990年   278篇
  1989年   240篇
  1988年   197篇
  1987年   106篇
  1986年   92篇
  1985年   64篇
  1984年   34篇
  1983年   19篇
  1982年   41篇
  1981年   25篇
  1980年   20篇
  1979年   8篇
  1978年   4篇
  1977年   9篇
  1976年   6篇
  1970年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Advanced satellite tracking technologies provide biologists with long-term location sequence data to understand movement of wild birds then to find explicit correlation between dynamics of migratory birds and the spread of avian influenza. In this paper, we propose a hierarchical clustering algorithm based on a recursive grid partition and kernel density estimation (KDE) to hierarchically identify wild bird habitats with different densities. We hierarchically cluster the GPS data by taking into account the following observations: 1) the habitat variation on a variety of geospatial scales; 2) the spatial variation of the activity patterns of birds in different stages of the migration cycle. In addition, we measure the site fidelity of wild birds based on clustering. To assess effectiveness, we have evaluated our system using a large-scale GPS dataset collected from 59 birds over three years. As a result, our approach can identify the hierarchical habitats and distribution of wild birds more efficiently than several commonly used algorithms such as DBSCAN and DENCLUE.  相似文献   
992.
To prepare the coherent population trapping (CPT) states with rubidium and cesium, the commonly used atoms in CPT studies, a coherent bi-chromatic light field with frequency difference of several GHz is a basic requirement. With a 200 MHz center frequency acousto-optic modulator (AOM), we have realized bi-chromatic laser fields with several GHz frequency splits through high diffraction orders. We have experimentally studied the coherence between two frequency components of a bi-chromatic laser beam, which is composed of ±6 orders with frequency split of 3 GHz diffracted from the same laser beam, and the measured residual phase noise is Δφ(2)<0.019 rad(2). The bi-chromatic laser fields were used to prepare CPT states with (85)Rb and (87)Rb atoms, and high contrast CPT signals were obtained. For CPT states preparation, our study result shows that it is a feasible approach to generate the bi-chromatic light field with larger frequency splits through high diffraction orders of AOM.  相似文献   
993.
信息化时代要求信息公开和透明,这就对信息安全的管理提出了更高的要求。信息公开的安全性成为当今社会亟待解决的一大难题,网络安全的建设势在必行。为了更好地监督政府的工作就要进行信息公开,在政府信息公开的过程中一定要保证网络运行的安全。  相似文献   
994.
随着网络技术的不断发展,计算机技术在各领域得到了广泛的开发和利用.而远程监控系统因具有网络化和信息化以及直观方便的特点,被应用于许多领域,如远程协助、远程教学、远程办公等现代远程技术.本人将对计算机网络远程监控系统在代表性领域的应用以及前景情作了分析和研究.  相似文献   
995.
本文主要从Moodle平台的特点以及高职院校信息化教学中存在的问题展开,在做了详细的需求分析的前提下,对教学方案的实施效果和存在的问题进行了分析和总结,指出必须确立"教育的最终结果,就是培养一个独立的学习者"的目标,同时加强师生互动交流和自主学习能力建设,才能构建科学合理的符合网络教学规律的教学方案。  相似文献   
996.
A new signal analysis method, known as Lv distribution (LVD), has been reported recently to provide improved estimation accuracy of centroid frequency and chirp rate. In this paper, performances of the LVD on signal concentration, detection, representation errors and computational complexity are discussed and compared with polynomial Fourier transform (PFT) and fractional Fourier transform (FrFT). Based on the results of our theoretical analysis and Monte Carlo simulations, it is shown that the LVD achieves desirable performance improvement compared with those achieved by other methods. By using the accurate estimation of chirp rate provided by the LVD, the performance of local polynomial periodogram (LPP) is investigated. Comparisons with other time–frequency representations, such as the inverse LVD (ILVD) and the PFT-based LPP, are made on signal concentration in the time–frequency domain.  相似文献   
997.
Reversible watermarking can be applied to the protection for important digital media, such as medical and military image, it allows the watermark to be extracted and the original image to be restored completely, but reversible watermarking with stronger robustness is seldom discussed in existing literature. In this paper, a novel reversible watermarking algorithm based on chaotic system is proposed; chaotic system is not only used to search space of reversibility of the scheme, but also used to randomly select the position of watermarking embedding. Consequently, the proposed scheme achieves larger threshold space of reversibility and better performance of security. For some specific thresholds, the proposed algorithm is not only reversible, but also has stronger robustness against image compression. The experimental results show that the ergodicity and sensitivity to initial values of chaotic system play an important role in reversible watermarking algorithm, and the proposed scheme can achieve balance between reversibility and robustness with the help of chaotic system.  相似文献   
998.
This paper presents an improved Euclidean Ricci flow method for spherical parameterization. We subsequently invent a scale space processing built upon Ricci energy to extract robust surface features for accurate surface registration. Since our method is based on the proposed Euclidean Ricci flow, it inherits the properties of Ricci flow such as conformality, robustness and intrinsicalness, facilitating efficient and effective surface mapping. Compared with other surface registration methods using curvature or sulci pattern, our method demonstrates a significant improvement for surface registration. In addition, Ricci energy can capture local differences for surface analysis as shown in the experiments and applications.  相似文献   
999.
Network watermarking schemes have been proposed to trace secret network attack flows transferred through stepping stones as well as anonymous channels. However, most existing network flow watermark detection techniques focus on a fixed sample size of network data to achieve the required accuracy. Irrespective of the uncertainty or information content of successive observations, such detection techniques will result in low efficiency of watermark detection. We herein propose a novel sequential watermark detection model (SWDM) supporting three sequential detectors for efficient traceback of network attack flows. By exploiting the sequential probability ratio test approach, we first propose the intuitive paired-intervals-based optimum watermark detector (POWD) and the single-interval-based optimum watermark detector (SOWD) under the assumption of known parameters of the observed attack flow. We then propose the sequential sign watermark detector (SSWD) that operates on two-level quantized observations for nonparametric watermark detection. Based on our SWDM model, a statistical analysis of sequential detectors, with no assumptions or limitations concerning the distribution of the timing of packets, proves their effectiveness despite traffic timing perturbations. The experiments using a large number of synthetically-generated SSH traffic flows demonstrate that there is a significant advantage in using our sequential watermark detectors based on the proposed SWDM model over the existing fixed sample size watermark detector (FSWD). Compared to the FSWD detector, the POWD detector achieves almost 28% savings in the average number of packets. Especially, given the required probability of detection errors, the SOWD detector and the SSWD detector can achieve almost 47% and 29% savings, respectively, in the average number of required packets, thus resulting in not only guaranteed rates of detection errors but also high efficiency of flow traceback.  相似文献   
1000.
The scarcity of IPv4 makes IPv6 deployment critical for all network-based applications. However, the big issue of IPv6 is that we lack real applications that are based on IPv6. The application demands for flexibility, availability and management are hard to be met by the current network. Hence, it has become extremely urgent how IPv6 network can be tailored to meet the application specified requirements. In order to address the need, we propose IPv6 virtual network architecture (VNET6) to help to accelerate the momentum of IPv6 deployment. VNET6 differs from other proposed architectures. It supports incremental network evolution with the virtual collaboration environment, which has distinct features including flexible service provision, reliable service entity, end-to-end flow management and ubiquitous access. The collaboration mode provides the bidirectional interaction between applications and networks via intent-based interfaces. IPv6 provides feasibility for the deployment of the virtual environment and the IPv6 critical protocols are employed in VNET6. Our initial prototype study and comparative analysis demonstrate that VNET6 can be adapted to meet the specific application requirements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号