首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11436篇
  免费   486篇
  国内免费   26篇
电工技术   108篇
综合类   5篇
化学工业   2196篇
金属工艺   162篇
机械仪表   231篇
建筑科学   703篇
矿业工程   27篇
能源动力   372篇
轻工业   1021篇
水利工程   122篇
石油天然气   32篇
无线电   906篇
一般工业技术   2200篇
冶金工业   1860篇
原子能技术   62篇
自动化技术   1941篇
  2023年   85篇
  2022年   154篇
  2021年   241篇
  2020年   200篇
  2019年   237篇
  2018年   253篇
  2017年   251篇
  2016年   287篇
  2015年   242篇
  2014年   369篇
  2013年   730篇
  2012年   606篇
  2011年   861篇
  2010年   554篇
  2009年   507篇
  2008年   638篇
  2007年   577篇
  2006年   491篇
  2005年   433篇
  2004年   369篇
  2003年   351篇
  2002年   323篇
  2001年   192篇
  2000年   191篇
  1999年   180篇
  1998年   288篇
  1997年   261篇
  1996年   202篇
  1995年   155篇
  1994年   131篇
  1993年   114篇
  1992年   101篇
  1991年   81篇
  1990年   95篇
  1989年   78篇
  1988年   62篇
  1987年   74篇
  1986年   74篇
  1985年   80篇
  1984年   79篇
  1983年   80篇
  1982年   68篇
  1981年   58篇
  1980年   61篇
  1979年   53篇
  1978年   42篇
  1977年   59篇
  1976年   65篇
  1975年   36篇
  1974年   32篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.  相似文献   
42.
An examination into the effects of carried military equipment on the performance of two tactical combat movement simulations was conducted. Nineteen Airfield Defence Guards performed a break contact (five 30-m sprints) and a fire and movement simulation (16 6-m bounds) in five load conditions (10–30 kg). Heavier loads significantly increased movement duration on the break contact (0.8%/kg load) and fire and movement (1.1%/kg). Performance deterioration was observed from the beginning to the end of the series of movements (bounds or sprints) with deterioration becoming significantly greater in heavier load conditions. Inter-individual variation between slower and faster participants showed a range in load effects; 0.6, 0.8%/kg for fast and 1.0, 1.4%/kg for slow (break contact, fire and movement, respectively). Velocity profiles revealed that the initial acceleration and peak velocity were the primary determinants of performance. As the duration of these tactical combat movements reflects periods of heightened vulnerability, these findings highlight important implications for commanders.

Practitioner Summary: Increasing amounts of carried military equipment impairs the performance of tactical combat movements. Examination of inter-individual variation in velocity profiles identified that the initial acceleration and the peak velocity achieved during sprints and bounds are key determinants of overall performance.  相似文献   

43.
Yin  Zhaoxia  Abel  Andrew  Tang  Jin  Zhang  Xinpeng  Luo  Bin 《Multimedia Tools and Applications》2017,76(3):3899-3920
Multimedia Tools and Applications - In recent years there has been significant interest in reversible data hiding, and also in particular, reversible data hiding in encrypted images (RDH-EI). This...  相似文献   
44.
We extend the traditional notion of passivity to a forced system whose equilibrium is dependent on the control input by defining equilibrium-independent passivity, a system property characterized by a dissipation inequality centered at an arbitrary equilibrium point. We provide a necessary input/output condition which can be tested for systems of arbitrary dimension and sufficient conditions to certify this property for scalar systems. An example from network stability analysis is presented which demonstrates the utility of this new definition. We then proceed to numerical certification of equilibrium-independent passivity using sum-of-squares programming. Finally, through numerical examples we show that equilibrium-independent passivity is less restrictive than incremental passivity.  相似文献   
45.
A new method of estimating per-pixel atmospheric column water vapor (ACWV) and potential differences in the reported band center wavelengths of the HyMap sensor has been developed. The new method uses variations of a second order derivative algorithm (SODA) to assess the impact of atmospheric residual features on calculated surface reflectance spectra after atmospheric compensation. The SODA method provides an alternative to the current band ratio techniques of ACWV estimation and also allows the same form of algorithm to be used for the estimation of possible band shifts. A comparison of in-situ measured surface reflectance at two field sites in Western Australia demonstrates improvement in the resulting spectra when post-flight updates are made to the reported HyMap band center wavelengths and applied during the atmospheric compensation process. The same SODA methodology was varied to estimate the ACWV on a per-pixel basis and found to significantly reduce the appearance of the underlying surface structure on the resulting ACWV images as well as improve the overall accuracy of the estimation. The ACWV estimated from the HyMap imagery at the two field sites was found to agree with in-situ atmospheric ACWV measurements to within 2% and represented a two fold increase in accuracy over a 3 band ratio Continuum Interpolated Band Ratio (CIBR) technique of ACWV estimation.  相似文献   
46.
We propose a new approximate numerical algorithm for the steady-state solution of general structured ergodic Markov models. The approximation uses a state-space encoding based on multiway decision diagrams and a transition rate encoding based on a new class of edge-valued decision diagrams. The new method retains the favorable properties of a previously proposed Kronecker-based approximation, while eliminating the need for a Kronecker-consistent model decomposition. Removing this restriction allows for a greater utilization of event locality, which facilitates the generation of both the state-space and the transition rate matrix, thus extends the applicability of this algorithm to larger and more complex models.  相似文献   
47.
We give the first algorithm that is both query-efficient and time-efficient for testing whether an unknown function f:{0,1} n →{−1,1} is an s-sparse GF(2) polynomial versus ε-far from every such polynomial. Our algorithm makes poly(s,1/ε) black-box queries to f and runs in time n⋅poly(s,1/ε). The only previous algorithm for this testing problem (Diakonikolas et al. in Proceedings of the 48th Annual Symposium on Foundations of Computer Science, FOCS, pp. 549–558, 2007) used poly(s,1/ε) queries, but had running time exponential in s and super-polynomial in 1/ε.  相似文献   
48.
We consider the following problem: Given a finite set of straight line segments in the plane, find a set of points of minimum size, so that every segment contains at least one point in the set. This problem can be interpreted as looking for a minimum number of locations of policemen, guards, cameras or other sensors, that can observe a network of streets, corridors, tunnels, tubes, etc. We show that the problem is strongly NP-complete even for a set of segments with a cubic graph structure, but in P for tree structures.  相似文献   
49.
With recent advances in the measurement technology for allsky astrophysical imaging, our view of the sky is no longer limited to the tiny visible spectral range over the 2D Celestial sphere. We now can access a third dimension corresponding to a broad electromagnetic spectrum with a wide range of allsky surveys; these surveys span frequency bands including long wavelength radio, microwaves, very short X-rays, and gamma rays. These advances motivate us to study and examine multiwavelength visualization techniques to maximize our capabilities to visualize and exploit these informative image data sets. In this work, we begin with the processing of the data themselves, uniformizing the representations and units of raw data obtained from varied detector sources. Then we apply tools to map, convert, color-code, and format the multiwavelength data in forms useful for applications. We explore different visual representations for displaying the data, including such methods as textured image stacks, the horseshoe representation, and GPU-based volume visualization. A family of visual tools and analysis methods is introduced to explore the data, including interactive data mapping on the graphics processing unit (GPU), the mini-map explorer, and GPU-based interactive feature analysis.  相似文献   
50.
This paper contextualises, describes and discusses a student project which takes a particular exploratory approach to using mathematical surface definition as a language and vehicle for co-rational design co-authorship for architecture and engineering. The project has two authors, one from an architectural and one from an engineering educational background. It investigates the metaphorical and operational role of mathematics in the design process and outcomes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号