首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   92026篇
  免费   7679篇
  国内免费   4088篇
电工技术   5713篇
技术理论   2篇
综合类   5782篇
化学工业   14199篇
金属工艺   4992篇
机械仪表   5255篇
建筑科学   6842篇
矿业工程   1857篇
能源动力   2698篇
轻工业   7202篇
水利工程   1825篇
石油天然气   3881篇
武器工业   675篇
无线电   12212篇
一般工业技术   11836篇
冶金工业   4707篇
原子能技术   1036篇
自动化技术   13079篇
  2024年   372篇
  2023年   1383篇
  2022年   2589篇
  2021年   3600篇
  2020年   2526篇
  2019年   2123篇
  2018年   2397篇
  2017年   2831篇
  2016年   2505篇
  2015年   3438篇
  2014年   4488篇
  2013年   5776篇
  2012年   6122篇
  2011年   6826篇
  2010年   5940篇
  2009年   5720篇
  2008年   5652篇
  2007年   5439篇
  2006年   5196篇
  2005年   4226篇
  2004年   2893篇
  2003年   2411篇
  2002年   2399篇
  2001年   2048篇
  2000年   1942篇
  1999年   1962篇
  1998年   1846篇
  1997年   1588篇
  1996年   1433篇
  1995年   1195篇
  1994年   934篇
  1993年   774篇
  1992年   626篇
  1991年   476篇
  1990年   395篇
  1989年   306篇
  1988年   258篇
  1987年   186篇
  1986年   153篇
  1985年   148篇
  1984年   106篇
  1983年   79篇
  1982年   72篇
  1981年   62篇
  1980年   56篇
  1979年   39篇
  1978年   34篇
  1977年   35篇
  1976年   57篇
  1973年   21篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
711.
Copy move forgery detection (CMFD) is one of the most active subtopic in forgery scheme. The methods of CMFD are divided into to block-based method and keypoint-based method in general. Compared with keypoint-based method, block-based method can detect undetectable detail without morphology segmentation. But many block-based methods detect the plain copy-move forgeries only. They have been incompetent to detect the post-processing operations such as various geometrical distortions, and then fail to detect the forgery regions accurately. Therefore, this paper presents an improved block-based efficient method for CMFD. Firstly, after pre-processing, an auxiliary overlapped circular block is presented to divide the forged image into overlapped circular blocks. The local and inner image feature is extracted by the Discrete Radial Harmonic Fourier Moments (DRHFMs) with the overlapped circular block from the suspicious image. Then, the similar feature vectors of blocks are searched by 2 Nearest Neighbors (2NN) test. Euclidean distance and correlation coefficient is employed to filter these features and then remove the false matches. Morphologic operation is employed to delete the isolated pixels. A series of experiments are done to analyze the performance for CMFD. Experimental results show that the new DRHFMs can obtain outstanding performance even under image geometrical distortions.  相似文献   
712.
Multimedia Tools and Applications - Hashing is a binary-code encoding method which tries to preserve the neighborhood structures in the original feature space, in order to realize efficient...  相似文献   
713.
Lu  Zhao  Lin  Yu-Ru  Huang  Xiaoxia  Xiong  Naixue  Fang  Zhijun 《Multimedia Tools and Applications》2017,76(8):10855-10879
Multimedia Tools and Applications - Nowadays, microblogging has become popular, with hundreds of millions of short messages being posted and shared every minute on a variety of topics in social...  相似文献   
714.
Multimedia Tools and Applications - Reversible data hiding based on prediction methods is a data hiding technique wherein secret bits can be efficiently hidden into cover images. In this paper, we...  相似文献   
715.
Multimedia Tools and Applications - A novel scheme for non-rigid video object tracking using segment-based object candidates is proposed in this paper. Rather than using a conventional bounding...  相似文献   
716.
The objective of this study is to identify the financial statement fraud factors and rank the relative importance. First, this study reviews the previous studies to identify the possible fraud indicators. Expert questionnaires are distributed next. After questionnaires are collected, Lawshe’s approach is employed to eliminate these factors whose CVR (content validity ratio) values do not meet the criteria. Further, the remaining 32 factors are reviewed by experts to be the measurements suitable for the assessment of fraud detection. The Analytic Hierarchy Process (AHP) is utilized to determine the relative weights of the individual items. The result of AHP shows that the most important dimension is Pressure/Incentive and the least one is Attitude/rationalization. In addition, the top five important measurements are “Poor performance”, “The need for external financing”, “Financial distress”, “Insufficient board oversight”, and “Competition or market saturation”. The result provides a significant advantage to auditors and managers in enhancing the efficiency of fraud detection and critical evaluation.  相似文献   
717.
The rapid growth in consumer adoption of wearable devices has garnered the attention of both practitioners and academia. Competition in the wearable device market is both substantial and complicated. In this study, we investigate the impact of network externality on wearable device competition in a two-dimensional product differentiation model. We consider a market that has a broad array of products (horizontal differentiation) and various quality levels (vertical differentiation). We study two types of network externalities according to the product compatibility in two types of market structures. Our model indicates that firm profits are decreased by network externalities in horizontal dominance. Network externality also increases (decreases) the higher-quality (lower-quality) firm’s profit in vertical dominance. Moreover, firms should ensure that their products are incompatible with those of rivals when network externality is large, and they should release compatible products when network externality is small in horizontal dominance. Firms should always ensure that their products are compatible with those of competitors in vertical dominance.  相似文献   
718.
A nonlinear theoretical model for electrostatically actuated microcantilevers containing internal fluid flow is developed in the present study, which takes into account the geometric and electrostatic nonlinearities. A four-degree-of-freedom and eight-dimensional analytical modeling is presented for investigating the stability mechanism and nonlinear dynamic responses near and away from the instability boundaries of the fluid-loaded cantilevered microbeam system. Firstly, the reliability of the theoretical model is examined by comparing the present results with previous experimental and numerical results. It is found that, with the increase in flow velocity, flutter instability, pull-in instability and the combination of both can occur in this dynamical system. It is also found that the instability boundary depends on the initial conditions significantly when the internal fluid is at low flow rate. Nextly, the phase portraits and time histories of the microbeam’s oscillations and bifurcation diagrams are established to show the existence of periodic, chaotic divergence and transient periodic-like motions.  相似文献   
719.
软件缺陷预测能够提高软件开发和测试的效率,保障软件质量。无监督缺陷预测方法具有不需要标签数据的特点,从而能够快速应用于工程实践中。提出了基于概率的无监督缺陷预测方法—PCLA,将度量元值与阈值的差值映射为概率,使用概率评估类存在缺陷的可能性,然后再通过聚类和标记来完成缺陷预测,以解决现有无监督方法直接根据阈值判断时对阈值比较敏感而引起的信息丢失问题。将PCLA方法应用在NetGen和Relink两组数据集,共7个软件项目上,实验结果表明PCLA方法在查全率、查准率、F-measure上相对现有无监督方法分别平均提升4.1%、2.52%、3.14%。  相似文献   
720.
This study integrates perceived enjoyment and cyberloafing with the unified theory of acceptance and use of technology (UTAUT) and uses a modified UTAUT model to investigate the behavioral intention and user behavior of access internet device users. The research results show that perceived enjoyment can be used as the antecedence variable of performance expectancy (PE) and effort expectancy (EE). In addition, PE, EE, and social influence will all lead to the occurrence of cyberloafing behavior and increased internet browsing time; however, the hypothesis of the moderator is not fully supported. The results can be provided as reference for subsequent researchers to re-modify the model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号