首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14849篇
  免费   887篇
  国内免费   278篇
电工技术   474篇
综合类   368篇
化学工业   2035篇
金属工艺   498篇
机械仪表   624篇
建筑科学   803篇
矿业工程   144篇
能源动力   428篇
轻工业   975篇
水利工程   128篇
石油天然气   179篇
武器工业   26篇
无线电   2963篇
一般工业技术   2077篇
冶金工业   1885篇
原子能技术   154篇
自动化技术   2253篇
  2023年   150篇
  2022年   296篇
  2021年   402篇
  2020年   288篇
  2019年   237篇
  2018年   314篇
  2017年   288篇
  2016年   373篇
  2015年   386篇
  2014年   523篇
  2013年   862篇
  2012年   814篇
  2011年   877篇
  2010年   646篇
  2009年   759篇
  2008年   769篇
  2007年   737篇
  2006年   710篇
  2005年   579篇
  2004年   479篇
  2003年   491篇
  2002年   414篇
  2001年   374篇
  2000年   311篇
  1999年   343篇
  1998年   708篇
  1997年   460篇
  1996年   352篇
  1995年   295篇
  1994年   193篇
  1993年   222篇
  1992年   151篇
  1991年   136篇
  1990年   111篇
  1989年   112篇
  1988年   100篇
  1987年   67篇
  1986年   62篇
  1985年   81篇
  1984年   48篇
  1983年   43篇
  1982年   50篇
  1981年   51篇
  1980年   45篇
  1979年   39篇
  1978年   27篇
  1977年   37篇
  1976年   63篇
  1974年   23篇
  1973年   27篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required  相似文献   
52.
Multichannel security protocols transmit messages over multiple communication channels, taking into account each channel's security properties. Our first intentional use of these protocols goes back to a 1999 article that proposed physical contact for imprinting as opposed to the wireless channel used in subsequent operations. Only later did we understand three key points. First, explicit use of multiple channels in the same protocol can offer significant advantages for both security and usability. Second, explicitly stating the properties of the channel on which each protocol message is transmitted is useful for understanding one's own protocol in greater depth and therefore for addressing subtle vulnerabilities early on. Third, multichannel protocols existed long before we recognized them as such - think of the courier handcuffed to the briefcase carrying the code book that will later protect postal or telegraphic traffic. The paper presents a security protocol that exploit additional transmissions over lower-capacity channels, typically found in ubicomp environments, that offer a different combination of security properties.  相似文献   
53.
54.
Analysis and synthesis of on-chip spiral inductors   总被引:3,自引:0,他引:3  
This paper presents a physically based compact model for estimating high-frequency performance of spiral inductors. The model accurately accounts for skin and proximity effects in the metal conductors as well as eddy current losses in the substrate. The model shows excellent agreement with measured data mostly within 10% across a variety of inductor geometries and substrate dopings up to 20 GHz. A web-based spiral inductor synthesis and analysis tool COILS, which makes use of the compact models, is presented. An optimization algorithm using binary searches speeds up the synthesis of inductor designs.  相似文献   
55.
56.
提出一种金属圆锥弹簧与橡胶圆锥弹簧复合而成的弹簧.分析表明:它可以应用于弹性耦合激励振动筛和座式直线振动筛。  相似文献   
57.
Performance model of interactive video-on-demand systems   总被引:5,自引:0,他引:5  
An interactive video-on-demand (VoD) system allows users to access video services, such as movies, electronic encyclopedia, interactive games, and educational videos from video servers on a broadband network. This paper develops a performance evaluation tool for the system design. In particular, a user activity model is developed to describe the usage of system resources, i.e., network bandwidth and video server usage, by a user as it interacts with the service. In addition, we allow batching of user requests, and the effect of such batching is captured in a batching model. Our proposed queueing model integrates both the user activity and the batching model. This model can be used to determine the requirements of network bandwidth and video server and, hence, the trade-off in communication and storage costs for different system resource configurations  相似文献   
58.
59.
Associative-memory neural networks with adaptive weighted outer-product learning are proposed in this paper. For the correct recall of a fundamental memory (FM), a corresponding learning weight is attached and a parameter called signal-to-noise-ratio-gain (SNRG) is devised. The sufficient conditions for the learning weights and the SNRG's are derived. It is found both empirically and theoretically that the SNRG's have their own threshold values for correct recalls of the corresponding FM's. Based on the gradient-descent approach, several algorithms are constructed to adaptively find the optimal learning weights with reference to global- or local-error measure.  相似文献   
60.
A genetic algorithm for multiple molecular sequence alignment   总被引:1,自引:0,他引:1  
MOTIVATION: Multiple molecular sequence alignment is among the most important and most challenging tasks in computational biology. The currently used alignment techniques are characterized by great computational complexity, which prevents their wider use. This research is aimed at developing a new technique for efficient multiple sequence alignment. APPROACH: The new method is based on genetic algorithms. Genetic algorithms are stochastic approaches for efficient and robust searching. By converting biomolecular sequence alignment into a problem of searching for optimal or near-optimal points in an 'alignment space', a genetic algorithm can be used to find good alignments very efficiently. RESULTS: Experiments on real data sets have shown that the average computing time of this technique may be two or three orders lower than that of a technique based on pairwise dynamic programming, while the alignment qualities are very similar. AVAILABILITY: A C program on UNIX has been written to implement the technique. It is available on request from the authors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号