首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2972篇
  免费   75篇
  国内免费   3篇
电工技术   36篇
综合类   3篇
化学工业   623篇
金属工艺   34篇
机械仪表   34篇
建筑科学   197篇
矿业工程   21篇
能源动力   62篇
轻工业   159篇
水利工程   27篇
石油天然气   48篇
无线电   170篇
一般工业技术   384篇
冶金工业   815篇
原子能技术   19篇
自动化技术   418篇
  2021年   34篇
  2020年   20篇
  2019年   34篇
  2018年   36篇
  2017年   54篇
  2016年   48篇
  2015年   42篇
  2014年   42篇
  2013年   179篇
  2012年   71篇
  2011年   104篇
  2010年   83篇
  2009年   93篇
  2008年   105篇
  2007年   109篇
  2006年   95篇
  2005年   110篇
  2004年   74篇
  2003年   96篇
  2002年   68篇
  2001年   74篇
  2000年   51篇
  1999年   64篇
  1998年   97篇
  1997年   65篇
  1996年   69篇
  1995年   45篇
  1994年   40篇
  1993年   40篇
  1992年   38篇
  1991年   32篇
  1990年   53篇
  1989年   46篇
  1988年   47篇
  1987年   52篇
  1986年   35篇
  1985年   49篇
  1984年   39篇
  1983年   35篇
  1982年   37篇
  1981年   32篇
  1980年   26篇
  1979年   34篇
  1978年   34篇
  1977年   30篇
  1976年   49篇
  1975年   30篇
  1974年   32篇
  1973年   42篇
  1972年   23篇
排序方式: 共有3050条查询结果,搜索用时 156 毫秒
71.
While OLEDs have struggled to find a niche lighting application that can fully take advantage of their unique form factors as thin, flexible, lightweight and uniformly large‐area luminaire, photomedical researchers have been in search of low‐cost, effective illumination devices with such form factors that could facilitate widespread clinical applications of photodynamic therapy (PDT) or photobiomodulation (PBM). Although existing OLEDs with either fluorescent or phosphorescent emitters cannot achieve the required high power density at the right wavelength windows for photomedicine, the recently developed ultrabright and efficient deep red quantum dot light emitting devices (QLEDs) can nicely fit into this niche. Here, we report for the first time the in‐vitro study to demonstrate that this QLED‐based photomedical approach could increase cell metabolism over control systems for PBM and kill cancerous cells efficiently for PDT. The perspective of developing wavelength‐specific, flexible QLEDs for two critical photomedical fields (wound repair and cancer treatment) will be presented with their potential impacts summarized. The work promises to generate flexible QLED‐based light sources that could enable the widespread use and clinical acceptance of photomedical strategies including PDT and PBM.  相似文献   
72.
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices.  相似文献   
73.
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme.  相似文献   
74.
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems.  相似文献   
75.
Spacecraft formation reconfiguration with collision avoidance   总被引:1,自引:0,他引:1  
In this paper we present a behavioral control solution for reconfiguration of a spacecraft formation using the Null-Space Based (NSB) concept. The solution is task based, and aims to reconfigure and maintain a rigid formation while avoiding collisions between spacecraft. A model of relative translation is derived, together with a passivity-based sliding surface controller which globally stabilizes the equilibrium point of the closed-loop system. The NSB control method is implemented by giving each task different priorities and then calculating desired velocity and a Jacobian matrix for each spacecraft and each task. The velocity vector for each task is then projected into the null-space for higher prioritized tasks to remove conflicting velocity components. Simulation results are presented, showing that each spacecraft moves into the predefined formation without breaking any rules for the higher priority tasks, and all collisions are avoided.  相似文献   
76.
The use of formal methods for analyzing and synthesizing a controller for a multi-train multi-track railway system is discussed. The research was motivated by a case study involving the Bay Area Rapid Transit (BART) system. The overall goal is to design a train acceleration control function that enables trains to be safely placed but also increases system throughput. The use of a modeling language for specifying safety properties and a control function is illustrated. The program transformation methodology supported in the HATS system is employed to generate an efficient implementation from a high-level specification of a controller. This implementation can then be used to simulate the controller behavior, thus further enhancing confidence in the design. Properties of optimization transformations can be verified using an rewrite-rule based induction theorem prover Rewrite Rule Laboratory (RRL).  相似文献   
77.
78.
Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. Among a number of k-anonymisation schemes, local recoding methods are promising for minimising the distortion of a k-anonymity view. This paper addresses two major issues in local recoding k-anonymisation in attribute hierarchical taxonomies. Firstly, we define a proper distance metric to achieve local recoding generalisation with small distortion. Secondly, we propose a means to control the inconsistency of attribute domains in a generalised view by local recoding. We show experimentally that our proposed local recoding method based on the proposed distance metric produces higher quality k-anonymity tables in three quality measures than a global recoding anonymisation method, Incognito, and a multidimensional recoding anonymisation method, Multi. The proposed inconsistency handling method is able to balance distortion and consistency of a generalised view.  相似文献   
79.
Recently, a powerful two-phase method for restoring images corrupted with high level impulse noise has been developed. The main drawback of the method is the computational efficiency of the second phase which requires the minimization of a non-smooth objective functional. However, it was pointed out in (Chan et al. in Proc. ICIP 2005, pp. 125–128) that the non-smooth data-fitting term in the functional can be deleted since the restoration in the second phase is applied to noisy pixels only. In this paper, we study the analytic properties of the resulting new functional ℱ. We show that ℱ, which is defined in terms of edge-preserving potential functions φ α , inherits many nice properties from φ α , including the first and second order Lipschitz continuity, strong convexity, and positive definiteness of its Hessian. Moreover, we use these results to establish the convergence of optimization methods applied to ℱ. In particular, we prove the global convergence of some conjugate gradient-type methods and of a recently proposed low complexity quasi-Newton algorithm. Numerical experiments are given to illustrate the convergence and efficiency of the two methods.
Carmine Di FioreEmail:
  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号