首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8118篇
  免费   320篇
  国内免费   46篇
电工技术   74篇
综合类   20篇
化学工业   1653篇
金属工艺   124篇
机械仪表   222篇
建筑科学   156篇
矿业工程   4篇
能源动力   375篇
轻工业   569篇
水利工程   84篇
石油天然气   37篇
无线电   551篇
一般工业技术   1072篇
冶金工业   2544篇
原子能技术   83篇
自动化技术   916篇
  2024年   23篇
  2023年   113篇
  2022年   326篇
  2021年   398篇
  2020年   299篇
  2019年   329篇
  2018年   359篇
  2017年   296篇
  2016年   325篇
  2015年   197篇
  2014年   325篇
  2013年   534篇
  2012年   309篇
  2011年   313篇
  2010年   279篇
  2009年   246篇
  2008年   167篇
  2007年   146篇
  2006年   133篇
  2005年   98篇
  2004年   74篇
  2003年   75篇
  2002年   56篇
  2001年   42篇
  2000年   36篇
  1999年   91篇
  1998年   766篇
  1997年   447篇
  1996年   311篇
  1995年   191篇
  1994年   154篇
  1993年   154篇
  1992年   47篇
  1991年   50篇
  1990年   47篇
  1989年   63篇
  1988年   51篇
  1987年   52篇
  1986年   54篇
  1985年   51篇
  1984年   30篇
  1983年   32篇
  1982年   27篇
  1981年   27篇
  1980年   37篇
  1979年   13篇
  1978年   18篇
  1977年   77篇
  1976年   154篇
  1975年   13篇
排序方式: 共有8484条查询结果,搜索用时 12 毫秒
91.
Summary A new kind of organic-inorganic hybrid composite was prepared by means of the sol-gel process. The polymer employed was a mixed-isomer aromatic polyamide having good solubility and thermal stability. The silica constituting the inorganic phase was produced by the hydrolysis and condensation of tetramethoxysilane. The bonding between the phases involved aminophenyl-trimethoxysilane, in which the amino group can react with the phthaloyl chloride end-capped polymer, and the methoxysilane groups undergo hydrolysis. The composition of these composites was varied by changing the linear polymer chain length and relative amount of tetramethoxysilane. The gelation time was found to range from a few minutes to several days. Thermogravimetric analyses showed that decomposition starts at approximately 450 °C. Thin films cast from materials having a relatively high silica content were opaque and rigid, but those with low silica content were flexible and transparent.  相似文献   
92.
Cyclopropene fatty acids are constituents of seed lipids of various plants, including sources of edible fats, such as cottonseed and kapok. Physiological and toxicological properties of lipids containing cyclopropene acyl moieties are reviewed and the difficulties encountered in the elucidation of the structures of triacylglycerols containing cyclopropene acyl moieties are discussed. A novel method for the analysis of such triacylglycerols is presented.  相似文献   
93.
Limited bandwidth resources lead to a number of challenges especially for eHealth applications, which are communicated over IP and wireless networks. These multimedia services include high-resolution videos and have very large file sizes that require a high level of compression to overcome this limitation. Therefore, there is an acute demand for the research community to provide an efficient multimedia framework to encode medical videos with high quality specifically under the conditions of an error-prone environment. Both an affordable delivery framework and effective coding techniques are extremely desirable for the delivery of high-quality eHealth video applications for transmission over heterogeneous networks and devices. In this paper, we propose and demonstrate a multimedia framework to support eHealth applications, which has an improved coding scheme that uses an SVC-scalable extension of MPEC-4 AVC/H.264. Simulation results show that the proposed scheme achieves a significant improvement in terms of the PSNR-Y gain and reduces the picture quality degradation caused by artifacts and distortions, compared to the existing scheme.  相似文献   
94.
Recently, IS researchers have focused on the assessment of Web-based information system (WBIS) at the individual level as it highly contributes to the organizations’ employees. The evaluation and development of WBIS is significantly needed because the top management is in need of justifying their costly IT investment in terms of its impacts on employee performance. For this purpose, this study is primarily concerned with the development and validation of new multidimensional instrument, and also a theoretical framework for assessing the impacts of user interface quality, online communication quality, and user satisfaction on the effectiveness of Web employee portals. The effectiveness is assessed in terms of contextual performance. In a large-scale study, a sample of 384 United Nations Relief and Works Agency for Palestine Refugees respondents are gathered in order to validate and check the reliability of the adapted study instrument. The results of validity and reliability analysis provide enough confidence to proceed toward validating the proposed theoretical framework. The results of multiple-regression analysis indicate that there is a positive significant relationship between user interface quality, communication quality, user satisfaction, and effectiveness at significance level (sig. < 0.01). As another important point, the results of hierarchical regression showed that user satisfaction has a mediating role on the relationship between user interface quality, communication quality, and contextual employee performance. The findings and implications of this research are discussed. Finally, it is expected that this study would contribute to empirical studies in the fields of IS and user behavior assessment.  相似文献   
95.

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

  相似文献   
96.

Security threats are crucial challenges that deter Mixed reality (MR) communication in medical telepresence. This research aims to improve the security by reducing the chances of types of various attacks occurring during the real-time data transmission in surgical telepresence as well as reduce the time of the cryptographic algorithm and keep the quality of the media used. The proposed model consists of an enhanced RC6 algorithm in combination. Dynamic keys are generated from the RC6 algorithm mixed with RC4 to create dynamic S-box and permutation table, preventing various known attacks during the real-time data transmission. For every next session, a new key is created, avoiding possible reuse of the same key from the attacker. The results obtained from our proposed system are showing better performance compared to the state of art. The resistance to the tested attacks is measured throughout the entropy, Pick to Signal Noise Ratio (PSNR) is decreased for the encrypted image than the state of art, structural similarity index (SSIM) closer to zero. The execution time of the algorithm is decreased for an average of 20%. The proposed system is focusing on preventing the brute force attack occurred during the surgical telepresence data transmission. The paper proposes a framework that enhances the security related to data transmission during surgeries with acceptable performance.

  相似文献   
97.
In this paper, three new Gramians are introduced namely ‐ limited‐time interval impulse response Gramians (LTIRG), generalized limited‐time Gramians (GLTG) and generalized limited‐time impulse response Gramians (GLTIRG). GLTG and GLTIRG are applicable to both unstable systems and also to systems which have eigenvalues of opposite polarities and equal magnitude. The concept of these Gramians is utilized to develop model reduction algorithms for linear time‐invariant continuous‐time single‐input single‐output (SISO) systems. In the cases of GLTIRG and GLTG based model reduction, the standard time‐limited Gramians are generalized to be applied to unstable systems by transforming the original system into a new system which requires the solution of two Riccati equations. Two numerical examples are included to illustrate the proposed methods. The results are also compared with standard techniques.  相似文献   
98.
An off-line handwriting recognition (OFHR) system is a computerized system that is capable of intelligently converting human handwritten data extracted from scanned paper documents into an equivalent text format. This paper studies a proposed OFHR for Malaysian bank cheques written in the Malay language. The proposed system comprised of three components, namely a character recognition system (CRS), a hybrid decision system and lexical word classification system. Two types of feature extraction techniques have been used in the system, namely statistical and geometrical. Experiments show that the statistical feature is reliable, accessible and offers results that are more accurate. The CRS in this system was implemented using two individual classifiers, namely an adaptive multilayer feed-forward back-propagation neural network and support vector machine. The results of this study are very promising and could generalize to the entire Malay lexical dictionary in future work toward scaled-up applications.  相似文献   
99.
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement, which is an essential concern in many secure data applications. In this paper, an efficient chaos-based image encryption scheme with higher key space is presented. Even with a single round of encryption, a significantly larger key space can be achieved. The proposed scheme removes correlation among image pixels via random chaotic sequences, simply by XOR and addition operations. In order to resist against numerous attacks, we apply the affine transformation to get the final ciphertext image. The security of the proposed scheme is proved through histogram, contrast, PSNR, entropy, correlation, key space, key sensitivity and differential attack analysis. Many significant properties of chaotic maps, sensitivity to initial condition and control parameters, structure and attack complexity, make the anticipated scheme very reliable, practical and robust in various secure communication applications.  相似文献   
100.
Due to limited radio range and mobility of nodes in mobile ad hoc networks (MANETs), the network partitioning and merging could occur frequently. When structured peer-to-peer (P2P) overlays are running over MANETs, then network partition in the physical network can also cause network partition at the overlay layer. Existing approaches for structured P2P overlay over MANETs do not detect network partition at the overlay layer. This paper proposes a cross-layer approach to detect network partition at the overlay layer for structured P2P overlay over MANETs. Simulation results show that the proposed approach is highly effective and efficient in terms of routing overhead, success ratio and false-negative ratio.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号