首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   395311篇
  免费   23236篇
  国内免费   7245篇
电工技术   17924篇
技术理论   41篇
综合类   19866篇
化学工业   63467篇
金属工艺   23050篇
机械仪表   22867篇
建筑科学   25810篇
矿业工程   10402篇
能源动力   9910篇
轻工业   21489篇
水利工程   6272篇
石油天然气   21694篇
武器工业   2313篇
无线电   43717篇
一般工业技术   53238篇
冶金工业   18226篇
原子能技术   3798篇
自动化技术   61708篇
  2025年   648篇
  2024年   6892篇
  2023年   6308篇
  2022年   8839篇
  2021年   12732篇
  2020年   10650篇
  2019年   9070篇
  2018年   22086篇
  2017年   22152篇
  2016年   18226篇
  2015年   12577篇
  2014年   14862篇
  2013年   17314篇
  2012年   21223篇
  2011年   28758篇
  2010年   24949篇
  2009年   21422篇
  2008年   22190篇
  2007年   22931篇
  2006年   16532篇
  2005年   15693篇
  2004年   10360篇
  2003年   9256篇
  2002年   7998篇
  2001年   6729篇
  2000年   7441篇
  1999年   8796篇
  1998年   7073篇
  1997年   5975篇
  1996年   5609篇
  1995年   4587篇
  1994年   3819篇
  1993年   2681篇
  1992年   2198篇
  1991年   1663篇
  1990年   1196篇
  1989年   957篇
  1988年   791篇
  1987年   541篇
  1986年   400篇
  1985年   286篇
  1984年   210篇
  1983年   135篇
  1982年   145篇
  1981年   103篇
  1980年   82篇
  1968年   43篇
  1965年   46篇
  1955年   66篇
  1954年   70篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
在分析CVMS操作系统软硬件支持的基础上,提出了国产中西文终端GW220,CJ4010,HZ200A等作为VAX计算机终端时进入和使用CVMS操作系统的一种方法;比较了EDIT和HEDT两个编辑命令使用的异同;最后,通过建立LOGIN,COM命令过程,提出了进入CVMS系统更为方便的方法。  相似文献   
992.
根据实验所测有关电解质溶液的活度系数,确定其数学模型为γ=e~(a bm cm~2 d/m)。利用最小二乘法建立了1∶1型电解质活度系数与浓度之间的函数关系式,从而通过此关系式可对任意浓度下1∶1型电解质的活度系数进行预测,其相对误差不超过2.6%。  相似文献   
993.
设备诊断系统的建立及应用   总被引:1,自引:0,他引:1  
介绍了一套设备诊断系统的基本构成,通过实例证明了系统的可行性;展示了实施设备状态监测和故障诊断这种先进设备管理维修方式良好的发展前景.  相似文献   
994.
995.
Based on an improved \(H_\infty \) performance index, the method of designing a reliable adaptive \(H_\infty \) controller with quantized state is addressed for the time-varying delayed system in this paper. On the basis of online estimates of actuator faults, the controller parameters are updated automatically to compensate the influence of actuator faults on the system while the desired improved \(H_\infty \) performance is preserved. A Lyapunov function candidate is constructed to prove that the closed-loop system is asymptotically stable. And the existing sufficient conditions of the controller are proved to be less conservative. The gains of the controller and the parameters of the adaptive law are co-designed and obtained in terms of solutions to a set of linear matrix inequalities. Finally, two numerical examples are given to illustrate that the proposed method is more effective than the previous methods for time-varying delayed systems.  相似文献   
996.
Whereas the present practice of designing matching networks for antennas is limited to conventional topologies, requiring a significant amount of domain knowledge, evolutionary algorithms can be used for automatically identifying unconventional designs that are more effective than would otherwise be developed. In this work, an automatic method to design lossless matching networks driven by an evolutionary algorithm (EA) that considers the sensitivities of the network parameters during the synthesis process is presented. To this end, a closed-form expression for the transducer power gain (TPG) sensitivity with respect to the component values is employed in such a way that the effects of the components tolerance on the matching network performance can easily be quantified. A 3D data structure based on the adjacency matrix is conveniently used to represent any type of network topologies. The proposed EA employs a novel set of topology variation operators, tailored for changing the circuit topology, and an association step, with the aim of reducing the number of nodes of the matching circuit. The efficiency of the proposed EA is tested in the synthesis of an impedance matching network for a VHF monopole whip antenna. This study’s results indicate a matching bandwidth improvement, a more uniformly distributed TPG along the operation frequency band and a more stable TPG regarding the components tolerance compared to the results obtained by previous approaches.  相似文献   
997.
This paper presents a novel filtering technique based on sample adaptive offset (SAO) in H.265/high-efficiency video coding (HEVC) for reduction in the temporal flickering artifacts and improving the coding performance. SAO is a newly introduced technique for in-loop filtering in H.265/HEVC, which derives the offsets independently for each frame in the spatial domain without considering temporal frame correlation. As a result, the temporal distortion artifacts which will have a negative effect on the subjective quality, such as flickering artifacts, cannot be effectively addressed. In this paper, the rate-distortion optimization of the newly developed SAO method, referred to as Inter-SAO, is performed on the residual samples between adjacent frames. Inter-SAO and SAO in the reference software of H.265/HEVC (i.e., the test model HM) are then combined to form the novel in-loop filter-based method, denoted as 3D-SAO filtering method, where both spatial information and temporal information are effectively utilized to reduce the overall distortion in reconstructed videos. Compared with the SAO in HM, 3D-SAO has demonstrated its advanced performance for flickering artifacts suppression. Furthermore, 3D-SAO improves the coding efficiency compared with the SAO in HM with a performance gain of up to 0.91 dB in \(\Delta PSNR\), 1.74 dB in \(\Delta PSPNR\) and 7.33 % in BD-rate reduction.  相似文献   
998.
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal state of a party in a protocol without probing its internal secret state. However, when transactions are concurrent, say over the Internet, with players possessing public keys (as is common in cryptography), assuring that entities “know” what they claim to know, where adversaries may be well coordinated across different transactions, turns out to be much more subtle and in need of re-examination. In such settings, mixing the public-key structure as part of the language and statements is a natural adversarial strategy. Here, we investigate how to formally treat knowledge possession by parties interacting concurrently in the public-key model. More technically, we look into the relative power of the notion of “concurrent knowledge extraction” (CKE) for concurrent zero knowledge (CZK) in the bare public-key (BPK) model, where the language and statements being proved can be dynamically and adaptively chosen by the prover and may be possibly based on verifiers’ public keys. By concrete attacks against some existing natural protocols, we first show that concurrent soundness and normal arguments of knowledge do not guarantee concurrent verifier security in the public-key setting. Here, roughly speaking, concurrent verifier security says that the malicious concurrent prover should “know" all the witnesses to all the possibly public-key-related statements adaptively chosen and successfully proved in the concurrent sessions. These concrete attacks serve as a good motivation for understanding “possession of knowledge” for concurrent transactions with registered public keys, i.e., the subtleties of concurrent knowledge extraction in the public-key model. This motivates us to introduce and formalize the notion of CKE, along with clarifications of various subtleties. Two implementations are then presented for constant-round concurrently knowledge extractable concurrent zero-knowledge (CZK–CKE) argument for \(\mathcal {NP}\) in the BPK model: One protocol is generic and based on standard polynomial-time assumptions, whereas the other protocol is computationally efficient and employs complexity leveraging in a novel way. Both protocols can be practically instantiated for some specific number-theoretic languages without going through general \(\mathcal {NP}\)-reductions. Of independent interest are the discussions about the subtleties surrounding the fundamental structure of Feige–Shamir zero knowledge in the BPK model.  相似文献   
999.
1000.
As numerous faults exist in practical analog circuits, new challenges arise in the field of diagnosis with large-scale target faults as well as fault features. To address this issue, firstly, an ambiguity model is built to measure the distinguishability between two faults. Then, the optimal fault features are obtained by analyzing the response curves of the circuit under test (CUT) to minimize the ambiguities among the faults. Finally, comparisons are made among three classification methods, including the maximum likelihood classifier (MLC), artificial neural networks (ANNs) and support vector machine (SVM), to demonstrate their own diagnostic abilities for practical use. Two examples are illustrated, and taking advantage of an automated implementation framework, 92 faults in total are examined in the second example. The experimental results show that good diagnostic performances can be obtained with the proposed method. However, when a practical case is encountered, the ANNs method may fail due to its high time and space complexity, while the MLC and SVM methods are still applicable.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号