首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39901篇
  免费   3956篇
  国内免费   1906篇
电工技术   2450篇
技术理论   3篇
综合类   2679篇
化学工业   6548篇
金属工艺   2193篇
机械仪表   2415篇
建筑科学   2965篇
矿业工程   1132篇
能源动力   1117篇
轻工业   2620篇
水利工程   773篇
石油天然气   2509篇
武器工业   379篇
无线电   4898篇
一般工业技术   4741篇
冶金工业   1782篇
原子能技术   404篇
自动化技术   6155篇
  2024年   239篇
  2023年   827篇
  2022年   1511篇
  2021年   2050篇
  2020年   1519篇
  2019年   1146篇
  2018年   1364篇
  2017年   1424篇
  2016年   1176篇
  2015年   1669篇
  2014年   2152篇
  2013年   2407篇
  2012年   2721篇
  2011年   2938篇
  2010年   2610篇
  2009年   2180篇
  2008年   2316篇
  2007年   2074篇
  2006年   2007篇
  2005年   1741篇
  2004年   1135篇
  2003年   959篇
  2002年   927篇
  2001年   803篇
  2000年   797篇
  1999年   961篇
  1998年   756篇
  1997年   593篇
  1996年   564篇
  1995年   469篇
  1994年   389篇
  1993年   259篇
  1992年   237篇
  1991年   174篇
  1990年   128篇
  1989年   99篇
  1988年   86篇
  1987年   52篇
  1986年   47篇
  1985年   37篇
  1984年   31篇
  1983年   28篇
  1982年   23篇
  1981年   22篇
  1980年   23篇
  1979年   12篇
  1978年   12篇
  1977年   11篇
  1976年   8篇
  1973年   12篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
黄静  席博  李鹏  张帆  赵新杰 《计算机科学》2016,43(7):157-161
鉴于窃听攻击是对卫星网络实施各类高级攻击行为的基础,结合量子密码在未来卫星网络的应用趋势,提出了一种基于量子密码的卫星网络窃听攻击检测方法。首先,基于卫星网络节点在空间分布上的分层特点,构建了层簇式的卫星网络窃听攻击检测模型。实际检测过程中,相邻卫星节点检测到窃听攻击威胁时,将相关预警信息经簇首节点融合后通过安全信道传送到地面控制中心,随后再根据地面控制中心反馈的安全链路构建方案构建节点间的安全通信链路。最后,对方案的安全性及有效性进行了分析。相关成果可为进一步深入开展卫星网络安全防护技术研究打下一定的基础。  相似文献   
992.
杨帆  张小松  明勇 《计算机科学》2016,43(Z6):319-321, 347
为满足无线局域网中基于正交频分多址技术(OFDMA-WLAN)的多用户通信需求,提出了一种基于非合作博弈的资源分配策略,利用博弈论这一有效工具对无线网络服务质量的资源分配问题进行研究,同时将用户对信道质量的不同需求转化为多用户对不同信道资源分配的非合作博弈竞争问题。此外,还将纳什均衡问题(NEP)细分为数个变分不等式子问题,通过凸优化函数对这些子问题分别求解。数值分析结果表明,所提算法在资源分配的公平性和数据传输率方面达到了更好的折中。  相似文献   
993.
This work focuses on the identification of fractional commensurate order systems from non-uniformly sampled data. A novel scheme is proposed to solve such problem. In this scheme, the non-uniformly sampled data are first complemented by using fractional Laguerre generating functions. Then, the multivariable output error state space method is employed to identify the relevant system parameters. Moreover, an in-depth property analysis of the proposed scheme is provided. A numerical example is investigated to illustrate the effectiveness of the proposed method.  相似文献   
994.
995.
XGC1 and M3D-C 1 are two fusion plasma simulation codes being developed at Princeton Plasma Physics Laboratory. XGC1 uses the particle-in-cell method to simulate gyrokinetic neoclassical physics and turbulence (Chang et al. Phys Plasmas 16(5):056108, 2009; Ku et al. Nucl Fusion 49:115021, 2009; Admas et al. J Phys 180(1):012036, 2009). M3D-\(C^1\) solves the two-fluid resistive magnetohydrodynamic equations with the \(C^1\) finite elements (Jardin J comput phys 200(1):133–152, 2004; Jardin et al. J comput Phys 226(2):2146–2174, 2007; Ferraro and Jardin J comput Phys 228(20):7742–7770, 2009; Jardin J comput Phys 231(3):832–838, 2012; Jardin et al. Comput Sci Discov 5(1):014002, 2012; Ferraro et al. Sci Discov Adv Comput, 2012; Ferraro et al. International sherwood fusion theory conference, 2014). This paper presents the software tools and libraries that were combined to form the geometry and automatic meshing procedures for these codes. Specific consideration has been given to satisfy the mesh configuration and element shape quality constraints of XGC1 and M3D-\(C^1\).  相似文献   
996.
We address the issue of deforming an image of a source object to that of a target. Previous works including barycentric coordinates and functional maps can hardly enforce shape consistency, especially for the objects with complex nested shape components. We leverage the conformal welding theory that maps 2D shapes (planar contours) to the automorphisms of the unit circle, named shape signatures. Conformal welding enables us to apply the Laplacian constraint to deformations in the signature space (or unit circle domain), which renders efficiency and flexibility. Additionally, we are able to fully reconstruct complex shape contours from deformed signatures, and hence generate the morphed images for target shapes. The experiments on complex shape contours and facial images, where multiple components exist, validate the effectiveness of the proposed approach.  相似文献   
997.
The Micro-Electro-Mechanical System Coriolis mass flow sensor uses a kind of in-plane comb-shaped capacitor to detect the vibration of tube containing the micro flow information. This paper takes the deflection of the micro tube caused by Coriolis force into account and models the in-plane comb-shaped capacitor of the sensor based on the electrostatic field method. Then the modulation and demodulation of the output capacitive signals are described in detail. The theoretical waveforms obtained by substituting the actual parameters into the models are consistent with the accepted conformal mapping method and match with the sampling signals, which attest the two models. According to the actual flow calibration experiment and the preliminary phase shift calculation, the measurement accuracy of the micro flow sensor reaches ±1.5 % with the repeatability of 0.75 % within 0–1.2 g/h flow range.  相似文献   
998.
云计算作为一种新型的服务模式,近年来受到各个企业的青睐.虽有云有三种部署模式,企业可以自己选择部署方式,但是云中数据存储和传输安全还是企业最为担心的.因此,运用了一种基于属性的控制策略方法(Attribute Based Access Control, ABAC)来保证只有授权用户才有权限来操作云中的数据.另外运用粗糙集属性约简的方法来减除冗余属性保留权威属性减少策略冲突问题的出现,加快访问时间.  相似文献   
999.
Large holes are unavoidably generated in depth image based rendering (DIBR) using a single color image and its associated depth map. Such holes are mainly caused by disocclusion, which occurs around the sharp depth discontinuities in the depth map. We propose a divide-and-conquer hole-filling method which refines the background depth pixels around the sharp depth discontinuities to address the disocclusion problem. Firstly, the disocclusion region is detected according to the degree of depth discontinuity, and the target area is marked as a binary mask. Then, the depth pixels located in the target area are modified by a linear interpolation process, whose pixel values decrease from the foreground depth value to the background depth value. Finally, in order to remove the isolated depth pixels, median filtering is adopted to refine the depth map. In these ways, disocclusion regions in the synthesized view are divided into several small holes after DIBR, and are easily filled by image inpainting. Experimental results demonstrate that the proposed method can effectively improve the quality of the synthesized view subjectively and objectively.  相似文献   
1000.
As a critical technique to raise coding efficiency in H.265/HEVC (H.265/High Efficiency Video Coding), the number of prediction modes for intra coding is much larger than that in H.264/AVC. However, the large number of prediction modes also leads to high complexity. In this paper, an AR (Auto Regression) based fast mode decision method for H.265/HEVC intra coding is proposed, including an AR based fast mode selection and an MPM (Most Probable Mode) joint fast mode selection method. Considering the correlation between SATD (Sum of Absolute Transformed Differences) cost and RD (Rate-Distortion) cost, we establish a selective function controlled by an adaptive parameter which is acquired by an AR model. According to the distribution of the SATD cost, the selective function can decide which modes can be discarded and which modes can be used for the FMD (Fine Mode Decision). In addition, in order to further reduce the number of candidate modes for FMD, an MPM joint fast mode selection method is presented based on the relationship between MPMs and candidate modes. Experimental results show that just in PU layer, the proposed AR based fast intra mode decision method can save encoding time by 32 % with negligible coding loss in all-intra main configuration compared to the intra mode decision of HM13.0.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号