首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   68651篇
  免费   5651篇
  国内免费   2973篇
电工技术   3890篇
技术理论   10篇
综合类   4547篇
化学工业   11518篇
金属工艺   3583篇
机械仪表   3886篇
建筑科学   5376篇
矿业工程   1823篇
能源动力   1915篇
轻工业   5303篇
水利工程   1288篇
石油天然气   3671篇
武器工业   526篇
无线电   8236篇
一般工业技术   8505篇
冶金工业   3415篇
原子能技术   715篇
自动化技术   9068篇
  2024年   310篇
  2023年   1175篇
  2022年   2085篇
  2021年   2871篇
  2020年   2243篇
  2019年   1781篇
  2018年   2045篇
  2017年   2132篇
  2016年   2086篇
  2015年   2676篇
  2014年   3337篇
  2013年   3889篇
  2012年   4300篇
  2011年   4705篇
  2010年   3880篇
  2009年   3706篇
  2008年   3679篇
  2007年   3440篇
  2006年   3275篇
  2005年   2855篇
  2004年   2134篇
  2003年   1888篇
  2002年   1733篇
  2001年   1547篇
  2000年   1690篇
  1999年   2009篇
  1998年   1711篇
  1997年   1395篇
  1996年   1379篇
  1995年   1146篇
  1994年   1004篇
  1993年   696篇
  1992年   544篇
  1991年   393篇
  1990年   340篇
  1989年   308篇
  1988年   219篇
  1987年   154篇
  1986年   110篇
  1985年   81篇
  1984年   62篇
  1983年   42篇
  1982年   52篇
  1981年   33篇
  1980年   34篇
  1979年   13篇
  1977年   9篇
  1976年   13篇
  1974年   11篇
  1973年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
基于光电传感器电路的迷宫机器人设计   总被引:1,自引:0,他引:1  
采用Freescale公司的MC9SDG128单片机进行控制,使用ROHM公司生产的发送接收一体化反射型光电传感器RPR220,设计了一种新型迷宫机器人.该迷宫机器人能够在程序中严格控制光电传感器的开关,同时用软件消除外界干扰,取得了很好的探测效果.  相似文献   
942.
943.
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely “two dimensional (2D) Palmprint Phasor”, the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme.  相似文献   
944.
Approximate closed‐form expression is derived for the scattering from dipole arrays based on the equivalent circuit theory. Then, a method is proposed for synthesis of dipole arrays to produce desired scattering pattern using genetic algorithm (GA). In the synthesis method, the element positions in an array are considered as the optimization parameter and the derived expression is used to evaluate the fitness function of GA. To assess the validity and efficiency of the proposed method, several linear dipole arrays are designed to obtain scattering pattern with low sidelobe level (SLL). A good agreement between the patterns calculated using the expression and simulated by FEKO validates the accuracy of the presented expression. In addition, the numerical results show that the maximum SLL of the scattering pattern is considerably reduced by optimization. © 2011 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2011.  相似文献   
945.
Three novel, super‐wideband antipodal slot antennas with different tuning stubs are studied and compared with each other. Smooth, half‐circular slot profile is used to improve the antennas' polarization purity and impedance bandwidth, and different tuning stubs are used to finely tune the antennas' radiation performance. As will be reported, low crosspolarization level, stable dipole‐like pattern, and flat gain performances can be obtained within an operation bandwidth of 6.3:1 by introducing a smooth antipodal slot structure and a cup‐shape tuning patch. © 2011 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2011.  相似文献   
946.
Due to the complicated blasting load, the diversified medium models and various constitutive relations of the rock mass, and a huge job for simulating blasting of multiple holes, it is very difficult and costly to simulate the blasting vibration accurately in numerical computation. This paper presents an equivalent simulation method so as to transform this complex dynamic problem into an approximate initial-boundary problem. The equivalent elastic boundary applied by the blasting load was developed for multiple holes according to the spatial distribution of rock damage around each blasthole. The equivalent mechanics process of the complex blasting load was performed through analysis of the expansion of the borehole volume, the growth of cracks, the movement of stemming and the outburst of detonation gases. In combination with the blasting excavation of the tailrace tunnel in the Pubugou Hydropower Station, particle vibration velocities in the surrounding rock at different distances from the explosion source were simulated by applying this equivalent method based on the dynamic finite element method. The comparison with field monitoring data indicates that this equivalent simulation method is applicable to predicting the far-field dynamic response of the ground subjected to blasting load, and the selection of rock mass properties near the equivalent elastic boundary has a significant impact on simulation results.  相似文献   
947.
The query rewriting plan generation over XML views has received wide attention recently. However, little work has been done on efficient evaluation of the query rewriting plans, which is not trivial since the plan may contain an exponential size of sub-plans. This paper investigates the reason for the potentially exponential number of sub-plans, and then proposes a new space-efficient form called ABCPlan (Plan with Automata Based Combinations) to equivalently represent the original query rewriting plan. ABCPlan contains a set of buckets containing suffix paths in the query tree and an automata to indicate the combination of the suffix paths from different buckets as valid query rewriting sub-plans. We also design an evaluation method called ABCScan, which constructs a unified evaluation tree for the ABCPlan and handles the evaluation tree in one scan of the XML view. In the evaluation, we introduce node existence automata to encode the structure of the sub-tree and convert the satisfaction of the ABCPlan into the intersection problem of deterministic finite automata. The experiments show that ABCPlan based method outperforms existing methods significantly in terms of scalability and efficiency.  相似文献   
948.
通过对影响锅炉效率的物理量的分析,建立了以神经网络表示主要物理量之间关系的锅炉燃烧系统模型,并采用遗传算法对模型进一步优化,从而实现了对锅炉燃烧的优化.仿真结果表明,通过调整锅炉燃烧系统优化模型参数,该模型能够同时满足锅炉燃烧效率和降低污染物排放的要求,从而实现锅炉的节能低污.  相似文献   
949.
遵循完整性、先进性和开放性的系统开发原则,系统采用VS.NET开发平台,利用微软最新的Silverlight 技术以及其核心的Deep Zoom图像处理技术,以电子海图为基础,设计实现了全新的海洋环境监测信息平台.该系统已成功应用于南通市海洋与渔业信息系统中,实际应用表明该系统运行稳定可靠,在行业中具有较好的应用推广价值.  相似文献   
950.
Mean shift(均值漂移)算法核函数窗口的带宽目前仍没有一个统一的确定标准.对整体图像根据Canny算子提取的边缘方向信息分成3类子图,一类是规则边缘子图,由规则边缘像素组成;第2类为非规则边缘子图,由边界方向变化剧烈的边缘像素组成;第3类是非边缘子图,由区域内部平坦区域和噪声区域组成.规则边缘子图和非边缘子图采用大窗口使区域内部更为平滑,并使噪声区域达到更高的抗噪性能,非规则边缘子图用小窗口可保持更高的边界精度.实验采用金属断口图像进行分割,结果表明,针对不同子图采用不同核函数带宽的方法使分割后的金属断口图像边界更准确,抗噪性能也更强.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号