首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33125篇
  免费   3128篇
  国内免费   1618篇
电工技术   2038篇
综合类   2523篇
化学工业   5268篇
金属工艺   1695篇
机械仪表   1859篇
建筑科学   2510篇
矿业工程   789篇
能源动力   758篇
轻工业   3465篇
水利工程   709篇
石油天然气   1429篇
武器工业   215篇
无线电   3633篇
一般工业技术   3928篇
冶金工业   1474篇
原子能技术   398篇
自动化技术   5180篇
  2024年   205篇
  2023年   686篇
  2022年   1195篇
  2021年   1513篇
  2020年   1220篇
  2019年   1023篇
  2018年   1106篇
  2017年   1319篇
  2016年   1150篇
  2015年   1539篇
  2014年   1867篇
  2013年   2207篇
  2012年   2438篇
  2011年   2552篇
  2010年   2182篇
  2009年   2084篇
  2008年   2075篇
  2007年   1823篇
  2006年   1780篇
  2005年   1490篇
  2004年   987篇
  2003年   751篇
  2002年   644篇
  2001年   533篇
  2000年   522篇
  1999年   513篇
  1998年   403篇
  1997年   360篇
  1996年   311篇
  1995年   241篇
  1994年   210篇
  1993年   169篇
  1992年   147篇
  1991年   91篇
  1990年   109篇
  1989年   50篇
  1988年   56篇
  1987年   43篇
  1986年   42篇
  1985年   19篇
  1984年   29篇
  1983年   23篇
  1982年   21篇
  1981年   12篇
  1980年   26篇
  1979年   18篇
  1978年   10篇
  1977年   10篇
  1974年   9篇
  1973年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Recent inpainting techniques usually require human interactions which are labor intensive and dependent on the user experiences. In this paper, we introduce an automatic inpainting technique to remove undesired fence-like structures from images. Specifically, the proposed technique works on the RGBD images which have recently become cheaper and easier to obtain using the Microsoft Kinect. The basic idea is to segment and remove the undesired fence-like structures by using both depth and color information, and then adapt an existing inpainting algorithm to fill the holes resulting from the structure removal. We found that it is difficult to achieve a satisfactory segmentation of such structures by only using the depth channel. In this paper, we use the depth information to help identify a set of foreground and background strokes, with which we apply a graph-cut algorithm on the color channels to obtain a more accurate segmentation for inpainting. We demonstrate the effectiveness of the proposed technique by experiments on a set of Kinect images.  相似文献   
82.
This paper presents a data-driven modeling and optimization method for cavity filters, according to a limited amount of measurement data. In the method, a model that reveals the effect of mechanical structure on electrical performance of cavity filters is firstly developed by an improved algorithm, which can increase the modeling accuracy of small data set by incorporating multi-kernel and prior knowledge into the framework of linear programming support vector regression. Then, an approach to optimize the structure of cavity filters is formulated by using the developed data-based model, and the obtained results can assist the fabrication of the same filter in the future. Some experiments from a synthetic example and a practical application of cavity filter have been carried out, and the experimental results confirm the effectiveness of the method. The model is particularly suited to a computer-aided manufacturing of volume-producing filters, and the proposed algorithm shows great potential in some applications where the experimental data are very few and the prior knowledge is available.  相似文献   
83.
The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. In this paper, we first present a general framework for searching on error-tolerant keywords. Then we propose a concrete scheme, based on a fuzzy extractor, which is proved secure against an adaptive adversary under well-defined security definition. The scheme is suitable for all similarity metrics including Hamming distance, edit distance, and set difference. It does not require the user to construct or store anything in advance, other than the key used to calculate the trapdoor of keywords and the key to encrypt data documents. Thus, our scheme tremendously eases the users' burden. What is more, our scheme is able to transform the servers' searching for error-tolerant keywords on ciphertexts to the searching for exact keywords on plaintexts. The server can use any existing approaches of exact keywords search to search plaintexts on an index table.  相似文献   
84.
为提高重点建设项目的管理水平和工作效率,在详细分析重点建设项目的业务流程和用户需求的基础上,提出基于Web的重点建设项目信息管理系统。该系统采用典型的三层体系架构,具有较强的可扩展性和灵活性。通过该系统对重点建设项目信息科学管理,可以有效克服传统管理方式的弊端,极大地提高重点建设项目信息管理工作的效率。  相似文献   
85.
Terpolymers based on N‐isopropylacrylamide, sodium 2‐acrylamido‐2‐methyl‐propanesulfonate, and Ntert‐butylacrylamide were synthesized by free‐radical copolymerization with 2,2′‐azobisisobutyronitrile as an initiator. The lower critical solution temperatures (LCSTs) of the linear polymer aqueous solutions were determined by the measurement of the transmittance on UV at different temperatures. The influence of the polymer concentration, polymer composition, and ionic strength on the LCSTs of the linear polymers was investigated. The LCST decreased with increases in the hydrophobic monomer Ntert‐butylacrylamide, polymer concentration, and ionic strength. The phase transition became sharp when the polymer concentration and ionic strength increased. Meanwhile, the crosslinked hydrogels were prepared with the same recipe used for the linear terpolymers, but a crosslinker was added to the reaction system. The swelling ratios of the hydrogels at various temperatures and salt solutions were determined. The hydrogels possessed both high swelling ratios and thermosensitivity. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci 2007  相似文献   
86.
邹春玉 《煤化工》2004,32(2):47-48,55
介绍了在PKM气化炉中弱粘结性双阳煤的试烧情况,并给出了主要工艺参数控制范围。试烧结果表明:依兰煤中配入50%双阳煤,汽氧比6.0:1时,气化炉工况良好。  相似文献   
87.
以大康河综合整治工程为背景对河道生态化整治进行研究,对工程涉及的防洪、水质、景观等基本现状进行评价,提出了生态治理的指导思想,并具体介绍了防洪、水质、景观等综合治理措施,通过对大康河的综合整治,使得工程既能满足防洪要求又能实现良好的生态景观效果。  相似文献   
88.
4D Video Textures (4DVT) introduce a novel representation for rendering video‐realistic interactive character animation from a database of 4D actor performance captured in a multiple camera studio. 4D performance capture reconstructs dynamic shape and appearance over time but is limited to free‐viewpoint video replay of the same motion. Interactive animation from 4D performance capture has so far been limited to surface shape only. 4DVT is the final piece in the puzzle enabling video‐realistic interactive animation through two contributions: a layered view‐dependent texture map representation which supports efficient storage, transmission and rendering from multiple view video capture; and a rendering approach that combines multiple 4DVT sequences in a parametric motion space, maintaining video quality rendering of dynamic surface appearance whilst allowing high‐level interactive control of character motion and viewpoint. 4DVT is demonstrated for multiple characters and evaluated both quantitatively and through a user‐study which confirms that the visual quality of captured video is maintained. The 4DVT representation achieves >90% reduction in size and halves the rendering cost.  相似文献   
89.
We present an interactive method for mesh segmentation that is inspired by the classical live‐wire interaction for image segmentation. The core contribution of the work is the definition and computation of wires on surfaces that are likely to lie at segment boundaries. We define wires as geodesics in a new tensor‐based anisotropic metric, which improves upon previous metrics in stability and feature‐awareness. We further introduce a simple but effective mesh embedding approach that allows geodesic paths in an anisotropic path to be computed efficiently using existing algorithms designed for Euclidean geodesics. Our tool is particularly suited for delineating segmentation boundaries that are aligned with features or curvature directions, and we demonstrate its use in creating artist‐guided segmentations.  相似文献   
90.
Ideological groups use the Internet to deliver their messages unhindered by the constraints of traditional media. We examined how ideological groups promote their worldview through their websites. Using the elaboration likelihood model (ELM), this research used trained coders to examine the websites of nonideological groups (n = 37), nonviolent ideological groups (n = 36), and violent ideological groups (n = 32) for credibility, persuasion processing cues, and interactivity factors. Results of this study found that the websites of violent ideological groups use more fear appeals, were less interactive, and were the least credible of the 3 groups. All 3 groups used more central cues than peripheral suggesting they focused on evidence for their arguments rather than emotion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号