首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18171篇
  免费   1073篇
  国内免费   39篇
电工技术   105篇
综合类   115篇
化学工业   4945篇
金属工艺   372篇
机械仪表   288篇
建筑科学   535篇
矿业工程   46篇
能源动力   557篇
轻工业   4006篇
水利工程   146篇
石油天然气   148篇
武器工业   1篇
无线电   704篇
一般工业技术   2346篇
冶金工业   2810篇
原子能技术   98篇
自动化技术   2061篇
  2024年   38篇
  2023年   158篇
  2022年   653篇
  2021年   785篇
  2020年   455篇
  2019年   521篇
  2018年   609篇
  2017年   617篇
  2016年   664篇
  2015年   505篇
  2014年   774篇
  2013年   1327篇
  2012年   1153篇
  2011年   1268篇
  2010年   953篇
  2009年   891篇
  2008年   785篇
  2007年   672篇
  2006年   531篇
  2005年   458篇
  2004年   398篇
  2003年   417篇
  2002年   326篇
  2001年   254篇
  2000年   205篇
  1999年   248篇
  1998年   982篇
  1997年   633篇
  1996年   434篇
  1995年   257篇
  1994年   221篇
  1993年   185篇
  1992年   75篇
  1991年   54篇
  1990年   55篇
  1989年   58篇
  1988年   68篇
  1987年   62篇
  1986年   38篇
  1985年   55篇
  1984年   29篇
  1983年   30篇
  1982年   30篇
  1981年   31篇
  1980年   46篇
  1979年   18篇
  1978年   23篇
  1977年   53篇
  1976年   115篇
  1973年   14篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
Neural Computing and Applications - In this paper, we present the novel Deep-MEG approach in which image-based representations of magnetoencephalography (MEG) data are combined with ensemble...  相似文献   
92.
Software Quality Journal - Energy consumption of software has been becoming increasingly significant, since it can vary according to how the software has been developed. In recent years, developers...  相似文献   
93.
Conventional constant false alarm rate (CFAR) methods use a fixed number of cells to estimate the background variance. For homogeneous environments, it is desirable to increase the number of cells, at the cost of increased computation and memory requirements, in order to improve the estimation performance. For nonhomogeneous environments, it is desirable to use less number of cells in order to reduce the number of false alarms around the clutter edges. In this work, we present a solution with two exponential smoothers (first order IIR filters) having different time-constants to leverage the conflicting requirements of homogeneous and nonhomogeneous environments. The system is designed to use the filter having the large time-constant in homogeneous environments and to promptly switch to the filter having the small time constant once a clutter edge is encountered. The main advantages of proposed Switching IIR CFAR method are computational simplicity, small memory requirement (in comparison to windowing based methods) and its good performance in homogeneous environments (due to the large time-constant smoother) and rapid adaptation to clutter edges (due to the small time-constant smoother).  相似文献   
94.
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments.  相似文献   
95.
We focus on two aspects of the face recognition, feature extraction and classification. We propose a two component system, introducing Lattice Independent Component Analysis (LICA) for feature extraction and Extreme Learning Machines (ELM) for classification. In previous works we have proposed LICA for a variety of image processing tasks. The first step of LICA is to identify strong lattice independent components from the data. In the second step, the set of strong lattice independent vector are used for linear unmixing of the data, obtaining a vector of abundance coefficients. The resulting abundance values are used as features for classification, specifically for face recognition. Extreme Learning Machines are accurate and fast-learning innovative classification methods based on the random generation of the input-to-hidden-units weights followed by the resolution of the linear equations to obtain the hidden-to-output weights. The LICA-ELM system has been tested against state-of-the-art feature extraction methods and classifiers, outperforming them when performing cross-validation on four large unbalanced face databases.  相似文献   
96.
The IEEE 802.3az standard provides a new low power mode that Ethernet network interfaces can use to save energy when there is no traffic to transmit. Simultaneously with the final standard approval, several algorithms were proposed to govern the physical interface state transition between the normal active mode and the new low power mode. In fact, the standard leaves this sleeping algorithm unspecified to spur competition among different vendors and achieve the greatest energy savings. In this paper, we try to bring some light to the most well known sleeping algorithms, providing mathematical models for the expected energy savings and the average packet delay inflicted on outgoing traffic. We will then use the models to derive optimum configuration parameters for them under given efficiency constraints.  相似文献   
97.
Kinematic redundancy occurs when a manipulator possesses more degrees of freedom than those required to execute a given task. Several kinematic techniques for redundant manipulators control the gripper through the pseudo-inverse of the Jacobian, but lead to a kind of chaotic inner motion with unpredictable arm configurations. Such algorithms are not easy to adapt to optimization schemes and, moreover, often there are multiple optimization objectives that can conflict between them. Unlike single optimization, where one attempts to find the best solution, in multi-objective optimization there is no single solution that is optimum with respect to all indices. Therefore, trajectory planning of redundant robots remains an important area of research and more efficient optimization algorithms are needed. This paper presents a new technique to solve the inverse kinematics of redundant manipulators, using a multi-objective genetic algorithm. This scheme combines the closed-loop pseudo-inverse method with a multi-objective genetic algorithm to control the joint positions. Simulations for manipulators with three or four rotational joints, considering the optimization of two objectives in a workspace without and with obstacles are developed. The results reveal that it is possible to choose several solutions from the Pareto optimal front according to the importance of each individual objective.  相似文献   
98.
The perovskite-type oxide PrCoO3 has been studied by means of X-ray photoelectron spectroscopy (XPS), reduction in H2 and X-ray diffraction. Two types of oxygen were detected: lattice oxygen (binding energy = 528.4 eV) and adsorbed oxygen (binding energy = 530.9 eV). The increase in relative intensity of the peak corresponding to the latter species after reduction of PrCo03 to 3e per molecule is assigned to the formation of hydroxyl groups. Temperature-programmed reduction (TPR) results showed two reduction steps: to 1 e per molecule (Co3.1 Co2+) at 475 to 635 K, and to 3e per molecule (Co21 Co0) at 725 to 815 K. Reduction in the first and second steps occurs according to the contracting sphere model and the nucleation mechanism, respectively. Reduction of Co3+ to Co2+ causes minimal structural changes in the perovskite. Reduction to 3e per molecule yielded Pr2O3 and metallic cobalt. After this reduction and reoxidation at 973 K, the perovskite structure was regained. By XPS and TPR it was shown that PrCo03 is more easily reducible than LaCo03. It is concluded that the cation in the A position of the structure plays a significant role in the bulk and surface properties of LnCo03 (Ln, lanthanide elements) oxides.  相似文献   
99.
The different groups and/or classes among phenolic acids and aldehydes identified during the elaboration process of "fino" sherry wine have been studied. The study was carried out using different processes during the elaboration of the wine and we have attempted to establish whether the different treatments of the grape affect these groupings. The study was undertaken by means of cluster and multifactorial analysis on the data obtained by the quantitative determination of phenolic acids and aldehydes during vinification and in experiments carried out on the grape under different mechanical treatments. The analysis of phenolic acids and aldehydes was done with HPLC, using a C-18 mu-Bondapak and a stepwise composite gradient. The samples were previously extracted with ethylic ether.  相似文献   
100.
The conditions for current oscillations in austenitic stainless steel (AISI Type 303) in 1M H2SO4 containing Cl? ions are given. The periodic oscillations are produced in a close potential range determined at the active-passive transition region. It requires a non-homogeneous distribution of inclusions and carbides at the metal surface and a concentration range of Cl? ion where active and passive areas coexist on the metal surface. The constraints at the surface determining these two regions are related to the Cl? ion competitive adsorption and the local accumulation of corrosion products. Electrochemical data and SEM observations are correlated.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号