首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   434366篇
  免费   28776篇
  国内免费   16090篇
电工技术   21655篇
技术理论   45篇
综合类   27147篇
化学工业   70094篇
金属工艺   25121篇
机械仪表   25203篇
建筑科学   29689篇
矿业工程   12159篇
能源动力   10714篇
轻工业   27405篇
水利工程   7949篇
石油天然气   23705篇
武器工业   2795篇
无线电   47328篇
一般工业技术   54251篇
冶金工业   20958篇
原子能技术   3869篇
自动化技术   69145篇
  2024年   1473篇
  2023年   5603篇
  2022年   9928篇
  2021年   13926篇
  2020年   10472篇
  2019年   8576篇
  2018年   22775篇
  2017年   23114篇
  2016年   19174篇
  2015年   14421篇
  2014年   17686篇
  2013年   21094篇
  2012年   25603篇
  2011年   33915篇
  2010年   29873篇
  2009年   26126篇
  2008年   26950篇
  2007年   27066篇
  2006年   20167篇
  2005年   18772篇
  2004年   13023篇
  2003年   11800篇
  2002年   10416篇
  2001年   8904篇
  2000年   8923篇
  1999年   9448篇
  1998年   7235篇
  1997年   6166篇
  1996年   5862篇
  1995年   4797篇
  1994年   3902篇
  1993年   2633篇
  1992年   2084篇
  1991年   1592篇
  1990年   1235篇
  1989年   1000篇
  1988年   842篇
  1987年   526篇
  1986年   413篇
  1985年   260篇
  1984年   208篇
  1983年   166篇
  1982年   128篇
  1981年   76篇
  1980年   96篇
  1968年   46篇
  1966年   45篇
  1965年   45篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
VerifyThis 2015     
VerifyThis 2015 was a one-day program verification competition which took place on April 12th, 2015 in London, UK, as part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2015). It was the fourth instalment in the VerifyThis competition series. This article provides an overview of the VerifyThis 2015 event, the challenges that were posed during the competition, and a high-level overview of the solutions to these challenges. It concludes with the results of the competition and some ideas and thoughts for future instalments of VerifyThis.  相似文献   
992.
With the progress of electronics technology, the development of civilian UAV (unmanned aerial vehicle) applications becomes possible. In addition, smartphones have rapidly gained popularity and become very important due to the simple operability and mobility. Hence, there is a need to have an easy and flexible way to control a UAV using such technology. In this study, a remote controller using an iOS device is developed for a quadrotor to enable remote control with easy operations. Four basic programs for obtaining compass information, controlling a gimbal, autopilot function for return, and video preview function are developed and implemented for an iOS device. The basic functionalities of the programs are evaluated and confirmed through experiments using a quadrotor and an iOS device.  相似文献   
993.
In this paper a novel Tensor-Based Image Segmentation Algorithm (TBISA) is presented, which is dedicated for segmentation of colour images. A purpose of TBISA is to distinguish specific objects based on their characteristics, i.e. shape, colour, texture, or a mixture of these features. All of those information are available in colour channel data. Nonetheless, performing image analysis on the pixel level using RGB values, does not allow to access information on texture which is hidden in relation between neighbouring pixels. Therefore, to take full advantage of all available information, we propose to incorporate the Structural Tensors as a feature extraction method. It forms enriched feature set which, apart from colour and intensity, conveys also information of texture. This set is next processed by different classification algorithms for image segmentation. Quality of TBISA is evaluated in a series of experiments carried on benchmark images. Obtained results prove that the proposed method allows accurate and fast image segmentation.  相似文献   
994.
The mental workload (MWL) classification is a critical problem for quantitative assessment and analysis of operator functional state in many safety-critical situations with indispensable human–machine cooperation. The MWL can be measured by psychophysiological signals. In this work, we propose a novel restricted Boltzmann machine (RBM) architecture for MWL classification. In relation to this architecture, we examine two main issues: the optimal structure of RBM and selection of the most important EEG channels (electrodes) for MWL classification. The trial-and-error and entropy-based pruning methods are compared for the RBM structure identification. The degree of importance of EEG channels is calculated from the weights in a well-trained network in order to select the most relevant channels for classification task. Extensive comparative results showed that the selected EEG channels lead to accurate MWL classification across subjects.  相似文献   
995.
The aim of this work is to develop an Internet and fuzzy based control and data acquisition system for an industrial process plant which can ensure remote running and fuzzy control of a cement factory. Cases studies of the proposed system application in three cement factories in Algeria, SCAEK (Setif), SCIMAT (Batna), and SCT (Tebessa), are discussed. The remote process control consists of alarms generated during running of the processes while maintaining and synchronizing different regulation loops thus ensuring automatic running of processes smoothly. In addition, fuzzy control of the kiln and the other two mills ensures that the system is operational at all times with minimal downtime. The process control system contains different operator station (OP), alarms table and a provision to monitor trends analysis. The operator can execute any operation according to his authorised access assigned by the system administrator using user administration tool. The Internet technology is used for human security by avoiding all times presence of operators at site for maintenance. Further, in case of a breakdown, the problem would be remotely diagnosed and resolved avoiding requirement of an expert on site thus eliminating traveling cost, security risks, visa formalities, etc. These trips are difficult to organize (costs, visas, risks). So the enterprise can reduce downtimes and travel costs. In order to realize a process control system guided by operators in the main control room or through Internet, the process control is based on programming in PCS 7 utilizing Cemat library and Fuzzy Control++ Siemens tools.  相似文献   
996.
We present a refined entanglement concentration protocol (ECP) for an arbitrary unknown less-entangled four-electron-spin cluster state by exploring the optical selection rules derived from the quantum-dot spins in one-sided optical microcavities. In our ECP, the parties obtain not only the four-electron-spin systems in the partial entanglement with two unknown parameters, but also the less-entangled two-electron-spin systems in the first step. Utilizing the above preserved systems as the resource for the second step of our ECP, the parties can obtain a standard cluster state by keeping the robust odd-parity instances with two parity-check gates. Meanwhile, the systems in the rest three instances can be used as the resource in the next round of our ECP. The success probability of our ECP is largely increased by iteration of the ECP process. Moreover, all the coefficients of our ECP are unknown for the parties without assistance of extra single electron-spin, so our ECP maybe has good applications in quantum communication network in the future.  相似文献   
997.
Quantum cheques could be a forgery-free way to make transaction in a quantum networked banking system with perfect security against any no-signalling adversary. Here, we demonstrate the implementation of quantum cheque, proposed by Moulick and Panigrahi (Quantum Inf Process 15:2475–2486, 2016), using the five-qubit IBM quantum computer. Appropriate single qubit, CNOT and Fredkin gates are used in an optimized configuration. The accuracy of implementation is checked and verified through quantum state tomography by comparing results from the theoretical and experimental density matrices.  相似文献   
998.
A long-standing aim of quantum information research is to understand what gives quantum computers their advantage. This requires separating problems that need genuinely quantum resources from those for which classical resources are enough. Two examples of quantum speed-up are the Deutsch–Jozsa and Simon’s problem, both efficiently solvable on a quantum Turing machine, and both believed to lack efficient classical solutions. Here we present a framework that can simulate both quantum algorithms efficiently, solving the Deutsch–Jozsa problem with probability 1 using only one oracle query, and Simon’s problem using linearly many oracle queries, just as expected of an ideal quantum computer. The presented simulation framework is in turn efficiently simulatable in a classical probabilistic Turing machine. This shows that the Deutsch–Jozsa and Simon’s problem do not require any genuinely quantum resources, and that the quantum algorithms show no speed-up when compared with their corresponding classical simulation. Finally, this gives insight into what properties are needed in the two algorithms and calls for further study of oracle separation between quantum and classical computation.  相似文献   
999.
Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold.  相似文献   
1000.
International Journal of Control, Automation and Systems - This brief paper studies the stationary consensus of multiple Euler-Lagrange systems with nonlinear protocols. Two consensus protocols are...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号