首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   125180篇
  免费   3100篇
  国内免费   461篇
电工技术   1053篇
综合类   2347篇
化学工业   20967篇
金属工艺   5497篇
机械仪表   3848篇
建筑科学   3495篇
矿业工程   642篇
能源动力   2353篇
轻工业   11538篇
水利工程   1646篇
石油天然气   546篇
武器工业   3篇
无线电   10888篇
一般工业技术   22383篇
冶金工业   10550篇
原子能技术   480篇
自动化技术   30505篇
  2024年   85篇
  2023年   389篇
  2022年   826篇
  2021年   1296篇
  2020年   955篇
  2019年   1065篇
  2018年   15616篇
  2017年   14546篇
  2016年   11361篇
  2015年   1910篇
  2014年   1857篇
  2013年   3457篇
  2012年   5613篇
  2011年   11892篇
  2010年   10219篇
  2009年   7415篇
  2008年   8517篇
  2007年   9278篇
  2006年   1393篇
  2005年   2313篇
  2004年   2152篇
  2003年   2093篇
  2002年   1361篇
  2001年   704篇
  2000年   740篇
  1999年   687篇
  1998年   2831篇
  1997年   1809篇
  1996年   1243篇
  1995年   669篇
  1994年   559篇
  1993年   560篇
  1992年   195篇
  1991年   198篇
  1990年   130篇
  1989年   154篇
  1988年   166篇
  1987年   146篇
  1986年   115篇
  1985年   152篇
  1984年   114篇
  1983年   78篇
  1982年   88篇
  1981年   106篇
  1980年   108篇
  1977年   186篇
  1976年   368篇
  1973年   61篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
This paper describes a novel model for fetal heart rate (FHR) monitoring from single-lead mother?s abdomen ECG (AECG) measurements. This novel method is divided in two stages: the first step consists on a one-step wavelet-based preprocessing for simultaneous baseline and high-frequency noise suppression, while the second stage efficiently detects fetal QRS complexes allowing FHR monitoring. The presented structure has been simplified as much as possible, in order to reduce computational cost and thus enable possible custom hardware implementations. Moreover, the proposed scheme and its fixed-point modeling have been tested using real abdominal ECG signals, which allow the validation of the presented approach and provide high accuracy.  相似文献   
992.
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable.  相似文献   
993.
Forwarding data in scenarios where devices have sporadic connectivity is a challenge. An example scenario is a disaster area, where forwarding information generated in the incident location, like victims' medical data, to a coordination point is critical for quick, accurate and coordinated intervention. New applications are being developed based on mobile devices and wireless opportunistic networks as a solution to destroyed or overused communication networks. But the performance of opportunistic routing methods applied to emergency scenarios is unknown today. In this paper, we compare and contrast the efficiency of the most significant opportunistic routing protocols through simulations in realistic disaster scenarios in order to show how the different characteristics of an emergency scenario impact in the behaviour of each one of them.  相似文献   
994.
Both image compression based on color quantization and image segmentation are two typical tasks in the field of image processing. Several techniques based on splitting algorithms or cluster analyses have been proposed in the literature. Self-organizing maps have been also applied to these problems, although with some limitations due to the fixed network architecture and the lack of representation in hierarchical relations among data. In this paper, both problems are addressed using growing hierarchical self-organizing models. An advantage of these models is due to the hierarchical architecture, which is more flexible in the adaptation process to input data, reflecting inherent hierarchical relations among data. Comparative results are provided for image compression and image segmentation. Experimental results show that the proposed approach is promising for image processing, and the powerful of the hierarchical information provided by the proposed model.  相似文献   
995.
We introduce WSimply, a new framework for modelling and solving Weighted Constraint Satisfaction Problems (WCSP) using Satisfiability Modulo Theories (SMT) technology. In contrast to other well-known approaches designed for extensional representation of goods or no-goods, and with few declarative facilities, our approach aims to follow an intensional and declarative syntax style. In addition, our language has built-in support for some meta-constraints, such as priority and homogeneity, which allows the user to easily specify rich requirements on the desired solutions, such as preferences and fairness. We propose two alternative strategies for solving these WCSP instances using SMT. The first is the reformulation into Weighted SMT (WSMT) and the application of satisfiability test based algorithms from recent contributions in the Weighted Maximum Satisfiability field. The second one is the reformulation into an operation research-like style which involves an optimisation variable or objective function and the application of optimisation SMT solvers. We present experimental results of two well-known problems: the Nurse Rostering Problem (NRP) and a variant of the Balanced Academic Curriculum Problem (BACP), and provide some insights into the impact of the addition of meta-constraints on the quality of the solutions and the solving time.  相似文献   
996.
Rotman lenses are used to obtain multiple beams from a single array. Although the beams produced by the feed antennas at focal points have no path length errors, the beams produced by feed antennas at off focal points may have large path length errors. These path length errors cause deterioration in the multiple beams. In this article, two novel methods are introduced to obtain feed curves which reduce the path length errors of off focal feed points significantly, compared with the commonly used circular and elliptical feed curves. The first method obtains feed curve points based on having zero path length error at three chosen points of the radiating array for each beam direction. The second method uses the particle swarm optimization method for obtaining optimum feed points for each beam direction. The results show that there is a very significant drop in the level of the maximum path length errors (in the order of about 1:4). © 2012 Wiley Periodicals, Inc. Int J RF and Microwave CAE 23: 634–638, 2013.  相似文献   
997.
As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available.  相似文献   
998.
Real-world applications of multivariate data analysis often stumble upon the barrier of interpretability. Simple data analysis methods are usually easy to interpret, but they risk providing poor data models. More involved methods may instead yield faithful data models, but limited interpretability. This is the case of linear and nonlinear methods for multivariate data visualization through dimensionality reduction. Even though the latter have provided some of the most exciting visualization developments, their practicality is hindered by the difficulty of explaining them in an intuitive manner. The interpretability, and therefore the practical applicability, of data visualization through nonlinear dimensionality reduction (NLDR) methods would improve if, first, we could accurately calculate the distortion introduced by these methods in the visual representation and, second, if we could faithfully reintroduce this distortion into such representation. In this paper, we describe a technique for the reintroduction of the distortion into the visualization space of NLDR models. It is based on the concept of density-equalizing maps, or cartograms, recently developed for the representation of geographic information. We illustrate it using Generative Topographic Mapping (GTM), a nonlinear manifold learning method that can provide both multivariate data visualization and a measure of the local distortion that the model generates. Although illustrated here with GTM, it could easily be extended to other NLDR visualization methods, provided a local distortion measure could be calculated. It could also serve as a guiding tool for interactive data visualization.  相似文献   
999.
This work presents a service oriented architecture for evolutionary algorithms, and an implementation of this architecture using a specific technology (called OSGiLiath). Service oriented architecture is a computational paradigm where users interact using services to increase the integration between systems. The presented abstract architecture is formed by loosely coupled, highly configurable and language-independent services. As an example of an implementation of this architecture, a complete process development using a specific service oriented technology is explained. With this implementation, less effort than classical development in integration, distribution mechanisms and execution time management has been attained. In addition, steps, ideas, advantages and disadvantages, and guidelines to create service oriented evolutionary algorithms are presented. Using existing software, or from scratch, researchers can create services to increase the interoperability in this area.  相似文献   
1000.
The concentrations of polycyclic aromatic hydrocarbons (PAHS) in water and sediments of seven wet detention ponds receiving urban stormwater were investigated. The ponds comprised traditional wet detention ponds with a permanent wet volume and a storage volume as well as ponds that were expanded with sand filters and other means to improve the removal of micropollutants. The concentrations of sigmaPAH in the sediments varied between 6 +/- 5 and 2,222 +/- 603 ng g(-1) dry weight (mean +/- standard deviation), and were highest in the ponds with lower pond volume per catchment area and did not clearly reflect different activities in the catchments. In general, the concentrations of PAHS in the sediments decreased from inlet to outlet, especially in the systems with good conditions for sedimentation such as systems with flow perpendicular sand dikes and extensive submerged vegetation. High molecular weight PAHs were predominant in the sediments indicating the pyrogenic origin of the PAHS. There was no correlation between PAH species concentrations in water or sediments and their hydrophobicity (log K(ow)). PAH concentrations in water fluctuated in response to intensity and frequency of rain events, whereas concentrations in the sediments integrated the pollutant load over time. Pond systems expanded with sand filters and other technologies to enhance removal of micropollutants consistently had concentrations of PAHS in the effluents below the detection level.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号