首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   52684篇
  免费   5259篇
  国内免费   3166篇
电工技术   3143篇
技术理论   1篇
综合类   3932篇
化学工业   7813篇
金属工艺   2831篇
机械仪表   3189篇
建筑科学   3473篇
矿业工程   1312篇
能源动力   1163篇
轻工业   5517篇
水利工程   1130篇
石油天然气   2012篇
武器工业   464篇
无线电   5814篇
一般工业技术   5668篇
冶金工业   4955篇
原子能技术   583篇
自动化技术   8109篇
  2024年   279篇
  2023年   816篇
  2022年   1587篇
  2021年   2058篇
  2020年   1569篇
  2019年   1365篇
  2018年   1551篇
  2017年   1675篇
  2016年   1603篇
  2015年   2178篇
  2014年   2730篇
  2013年   3316篇
  2012年   3791篇
  2011年   4214篇
  2010年   3820篇
  2009年   3748篇
  2008年   3594篇
  2007年   3363篇
  2006年   3080篇
  2005年   2551篇
  2004年   1829篇
  2003年   1410篇
  2002年   1327篇
  2001年   1114篇
  2000年   843篇
  1999年   729篇
  1998年   1273篇
  1997年   813篇
  1996年   583篇
  1995年   377篇
  1994年   324篇
  1993年   322篇
  1992年   134篇
  1991年   129篇
  1990年   100篇
  1989年   98篇
  1988年   91篇
  1987年   89篇
  1986年   60篇
  1985年   46篇
  1984年   11篇
  1983年   22篇
  1982年   31篇
  1981年   22篇
  1980年   45篇
  1979年   15篇
  1978年   21篇
  1977年   103篇
  1976年   228篇
  1975年   15篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
混沌权值变异的Huffman树图像加密算法   总被引:1,自引:0,他引:1  
提出一种采用混沌权值变异的Huff man树的图像加密算法.此算法在熵编码过程中,以基本的Huffman树为标准,利用双耦合混沌序列1对DC系数进行树的结构未变异、路径值变异的加密;再利用双耦合混沌序列2对AC系数进行码字序号的加密.论文对算法进行了仿真,并对安全性、计算复杂度、压缩比性能进行了分析.实验结果表明,该算法基本上不影响压缩效率,且计算复杂度低、安全性高和实时性好,可用于网络上的图像服务.  相似文献   
72.
A superhydrophobic micromesh covered with nanoprotrusions has been introduced and its applicability to a waterproof mobile phone speaker has been evaluated. The nanotextured superhydrophobic micromesh showed excellent water repellency, self-cleaning and waterproofing performances. In a waterproof speaker test using the fabricated nanotextured micromesh, the micromesh did not lose its waterproof function at 2 m water depth and did not form a remnant water film after being removed from the water. The packaged speaker showed almost the same sound quality before and after dipping at a 2 m water depth. These results demonstrate that the superhydrophobic nanotextured micromesh could be directly applicable for various products that need to resist water penetration, yet allow the transmission of gases and sound/light waves.  相似文献   
73.
74.
This paper is devoted to investigating inventory control problems under nonstationary and uncertain demand. A belief-rule-based inventory control (BRB-IC) method is developed, which can be applied in situations where demand and demand-forecast-error (DFE) do not follow certain stochastic distribution and forecasting demand is given in single-point or interval styles. The method can assist decision-making through a belief-rule structure that can be constructed, initialized and adjusted using both manager’s knowledge and operational data. An extended optimal base stock (EOBS) policy is proved for initializing the belief-rule-base (BRB), and a BRB-IC inference approach with interval inputs is proposed. A numerical example and a case study are examined to demonstrate potential applications of the BRB-IC method. These studies show that the belief-rule-based expert system is flexible and valid for inventory control. The case study also shows that the BRB-IC method can compensate DFE by training BRB using historical demand data for generating reliable ordering policy.  相似文献   
75.
76.
Large holes are unavoidably generated in depth image based rendering (DIBR) using a single color image and its associated depth map. Such holes are mainly caused by disocclusion, which occurs around the sharp depth discontinuities in the depth map. We propose a divide-and-conquer hole-filling method which refines the background depth pixels around the sharp depth discontinuities to address the disocclusion problem. Firstly, the disocclusion region is detected according to the degree of depth discontinuity, and the target area is marked as a binary mask. Then, the depth pixels located in the target area are modified by a linear interpolation process, whose pixel values decrease from the foreground depth value to the background depth value. Finally, in order to remove the isolated depth pixels, median filtering is adopted to refine the depth map. In these ways, disocclusion regions in the synthesized view are divided into several small holes after DIBR, and are easily filled by image inpainting. Experimental results demonstrate that the proposed method can effectively improve the quality of the synthesized view subjectively and objectively.  相似文献   
77.
In this work, we aim to discover real-world events from Flickr data by devising a three-stage event detection framework. In the first stage, a multimodal fusion (MF) model is designed to deal with the heterogeneous feature modalities possessed by the user-shared data, which is advantageous in computation complexity. In the second stage, a dual graph regularized non-negative matrix factorization (DGNMF) model is proposed to learn compact feature representations. DGNMF incorporates Laplacian regularization terms for the data graph and base graph into the objective, keeping the geometry structures underlying the data samples and dictionary bases simultaneously. In the third stage, hybrid clustering algorithms are applied seamlessly to discover event clusters. Extensive experiments conducted on the real-world dataset reveal the MF-DGNMF-based approaches outperform the baselines.  相似文献   
78.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed.  相似文献   
79.
We propose a new approximate numerical algorithm for the steady-state solution of general structured ergodic Markov models. The approximation uses a state-space encoding based on multiway decision diagrams and a transition rate encoding based on a new class of edge-valued decision diagrams. The new method retains the favorable properties of a previously proposed Kronecker-based approximation, while eliminating the need for a Kronecker-consistent model decomposition. Removing this restriction allows for a greater utilization of event locality, which facilitates the generation of both the state-space and the transition rate matrix, thus extends the applicability of this algorithm to larger and more complex models.  相似文献   
80.
基于Linux的实时音频与视频传输   总被引:1,自引:0,他引:1  
讨论了多媒体会议中音频与视频的传输特性、要求和协议标准。并给出了程序实现。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号