首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8976篇
  免费   1000篇
  国内免费   289篇
电工技术   414篇
技术理论   1篇
综合类   275篇
化学工业   1967篇
金属工艺   459篇
机械仪表   635篇
建筑科学   345篇
矿业工程   219篇
能源动力   384篇
轻工业   680篇
水利工程   116篇
石油天然气   325篇
武器工业   69篇
无线电   1266篇
一般工业技术   1580篇
冶金工业   344篇
原子能技术   106篇
自动化技术   1080篇
  2024年   64篇
  2023年   163篇
  2022年   291篇
  2021年   474篇
  2020年   392篇
  2019年   330篇
  2018年   316篇
  2017年   354篇
  2016年   345篇
  2015年   404篇
  2014年   494篇
  2013年   593篇
  2012年   634篇
  2011年   675篇
  2010年   554篇
  2009年   522篇
  2008年   518篇
  2007年   349篇
  2006年   352篇
  2005年   348篇
  2004年   278篇
  2003年   257篇
  2002年   197篇
  2001年   191篇
  2000年   164篇
  1999年   189篇
  1998年   143篇
  1997年   129篇
  1996年   115篇
  1995年   74篇
  1994年   90篇
  1993年   40篇
  1992年   42篇
  1991年   45篇
  1990年   28篇
  1989年   28篇
  1988年   11篇
  1987年   10篇
  1986年   6篇
  1985年   6篇
  1984年   10篇
  1983年   9篇
  1982年   5篇
  1981年   5篇
  1979年   4篇
  1978年   4篇
  1977年   3篇
  1973年   3篇
  1972年   2篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
102.
数据频度分析是Excel的重要功能之一,Excel对学生成绩频度分析有四种方法:COUNTIF函数、COUNTIFS函数、FRE-QUENCY函数和数据透视表。四种方法均能方便快捷的完成对成绩数据的频度分析,完美高效地解决成绩统计问题。  相似文献   
103.
针对应用型本科院校对学生动手能力要求高,但学生学习"数据结构"课程觉得枯燥无味、难以理解的情况,对课堂教学和课后实训两方面改革进行了探讨。  相似文献   
104.
鉴于现行水工钢闸门安全检测评估中许多评价指标带有经验性和不完整性,缺乏完整的评估体系和理论支持,在水工钢闸门现有理论成果和现行国家有关标准基础上,建立多层次综合评估模型,对水工钢闸门进行模糊综合评估,并将该模型得到的结果与传统结果对比分析。所得成果可为相关研究提供参考。  相似文献   
105.
本文首先介绍了关联规则挖掘经典算法——Apriori,并结合旅游线路推荐的特点,提出了Apriori算法在旅游线路推荐系统中应用的具体思路,最后,提出了一个基于apriori算法的旅游线路推荐系统模型。  相似文献   
106.
Through the rapid spread of smartphones, users have access to many types of applications similar to those on desktop computer systems. Smartphone applications using augmented reality (AR) technology make use of users' location information. As AR applications will require new evaluation methods, improved usability and user convenience should be developed. The purpose of the current study is to develop usability principles for the development and evaluation of smartphone applications using AR technology. We develop usability principles for smartphone AR applications by analyzing existing research about heuristic evaluation methods, design principles for AR systems, guidelines for handheld mobile device interfaces, and usability principles for the tangible user interface. We conducted a heuristic evaluation for three popularly used smartphone AR applications to identify usability problems. We suggested new design guidelines to solve the identified problems. Then, we developed an improved AR application prototype of an Android-based smartphone, which later was conducted a usability testing to validate the effects of usability principles.  相似文献   
107.
The pixel labeling problems in computer vision are often formulated as energy minimization tasks. Algorithms such as graph cuts and belief propagation are prominent; however, they are only applicable for specific energy forms. For general optimization, Markov Chain Monte Carlo (MCMC) based simulated annealing can estimate the minima states very slowly.This paper presents a sampling paradigm for faster optimization. First, in contrast to previous MCMCs, the role of detailed balance constraint is eliminated. The reversible Markov chain jumps are essential for sampling an arbitrary posterior distribution, but they are not essential for optimization tasks. This allows a computationally simple window cluster sample. Second, the proposal states are generated from combined sets of local minima which achieve a substantial increase in speed compared to uniformly labeled cluster proposals. Third, under the coarse-to-fine strategy, the maximum window size variable is incorporated along with the temperature variable during simulated annealing. The proposed window annealing is experimentally shown to be many times faster and capable of finding lower energy compared to the previous Gibbs and Swendsen-Wang cut (SW-cut) sampler. In addition, the proposed method is compared with other deterministic algorithms like graph cut, belief propagation, and spectral method in their own specific energy forms. Window annealing displays competitive performance in all domains.  相似文献   
108.
This paper proposes a novel object-based home network middleware for supporting the interoperability among home devices and smart grid devices. This middleware provides various types of abstract objects for flexible representation of heterogeneous home devices, which are classified based on their characteristics. It is also flexible enough to allow addition of new protocols and message conversion between different protocols through an abstraction layer, which are not supported by existing home network middlewares so that various protocols can be supported. As a result, it can be utilized to provide the interoperability among a variety of devices from sensors to typical home appliances as well as smart grid devices such as a home electric generator and a battery, which adopt different protocols. In order to demonstrate that home devices and smart grid devices are interoperable through the proposed middleware, we implement applications based on the middleware on a target platform consisting of embedded boards, sensors and laptops for emulation purposes of a home network. According to our emulation, this middleware can provide efficient interoperability among home devices and smart grid devices for future energy efficient home.  相似文献   
109.
江西袁河流域水环境容量分配研究   总被引:1,自引:1,他引:0  
为研究袁河流域的水环境容量,根据流域实际情况,选择沿河各县的总人口、GDP、排污量和水资源量进行水环境容量分配。对初始水环境容量采用基尼系数法对分配结果进行公平性评估,并与估算环境容量值进行比较,最终,取值小者确定流域容量分配方案。结果表明:各方案指标的基尼系数值均小于0.20,分配结果均较公平;经济为主要影响因素的方案d为最优方案;芦溪县与宜春市的最终分配量均为环境容量值,分别为3 896,10 245 t/a;新余市为可分配的容量值30 596 t/a。  相似文献   
110.
A scheme is presented to implement bidirectional controlled quantum teleportation (QT) by using a five-qubit entangled state as a quantum channel, where Alice may transmit an arbitrary single qubit state called qubit A to Bob and at the same time, Bob may also transmit an arbitrary single qubit state called qubit B to Alice via the control of the supervisor Charlie. Based on our channel, we explicitly show how the bidirectional controlled QT protocol works. By using this bidirectional controlled teleportation, espcially, a bidirectional controlled quantum secure direct communication (QSDC) protocol, i.e., the so-called controlled quantum dialogue, is further investigated. Under the situation of insuring the security of the quantum channel, Alice (Bob) encodes a secret message directly on a sequence of qubit states and transmits them to Bob (Alice) supervised by Charlie. Especially, the qubits carrying the secret message do not need to be transmitted in quantum channel. At last, we show this QSDC scheme may be determinate and secure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号