首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62482篇
  免费   6794篇
  国内免费   4119篇
电工技术   5475篇
技术理论   3篇
综合类   5292篇
化学工业   8856篇
金属工艺   3742篇
机械仪表   4219篇
建筑科学   5345篇
矿业工程   1655篇
能源动力   1814篇
轻工业   4803篇
水利工程   1502篇
石油天然气   2691篇
武器工业   700篇
无线电   7768篇
一般工业技术   6912篇
冶金工业   2173篇
原子能技术   830篇
自动化技术   9615篇
  2024年   373篇
  2023年   1097篇
  2022年   2167篇
  2021年   2987篇
  2020年   2254篇
  2019年   1725篇
  2018年   1779篇
  2017年   2071篇
  2016年   1922篇
  2015年   2691篇
  2014年   3341篇
  2013年   3934篇
  2012年   4729篇
  2011年   4893篇
  2010年   4422篇
  2009年   4351篇
  2008年   4391篇
  2007年   3936篇
  2006年   3719篇
  2005年   2976篇
  2004年   2141篇
  2003年   1859篇
  2002年   2164篇
  2001年   1907篇
  2000年   1428篇
  1999年   1015篇
  1998年   646篇
  1997年   537篇
  1996年   437篇
  1995年   352篇
  1994年   270篇
  1993年   194篇
  1992年   172篇
  1991年   126篇
  1990年   85篇
  1989年   79篇
  1988年   57篇
  1987年   43篇
  1986年   22篇
  1985年   23篇
  1984年   15篇
  1983年   8篇
  1982年   15篇
  1981年   10篇
  1980年   14篇
  1979年   6篇
  1976年   1篇
  1974年   1篇
  1959年   5篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
设计了一种基于MAX11068的电池电压检测及保护系统。以C8051F340单片机为主控制器,MAX11068将采集的电压数据通过I^2C总线接口隔离传输到主控器,具有电压检测、过欠压报警、均衡充电控制等功能。系统结构简单,可靠性高、安全性好,并且能达到现场智能控制的要求。  相似文献   
992.
邢晨  安义 《数字社区&智能家居》2013,(13):2967-2968,2972
在系统的应用过程中,数据库性能问题一直是决策者和技术人员共同关注的焦点,影响数据库性能的因素有很多,选择合适的索引能有效地提升查询性能。在select和where子句的列上创建连接索引,这样查询就只会访问索引,从而优化查询的性能,提升系统响应速度,节约系统资源。  相似文献   
993.
Message forwarding (e.g.,retweeting on Twitter.com) is one of the most popular functions in many existing microblogs,and a large number of users participate in the propagation of information,for any given messages.While this large number can generate notable diversity and not all users have the same ability to diffuse the messages,this also makes it challenging to find the true users with higher spreadability,those generally rated as interesting and authoritative to diffuse the messages.In this paper,a novel method called SpreadRank is proposed to measure the spreadability of users in microblogs,considering both the time interval of retweets and the location of users in information cascades.Experiments were conducted on a real dataset from Twitter containing about 0.26 million users and 10 million tweets,and the results showed that our method is consistently better than the PageRank method with the network of retweets and the method of retweetNum which measures the spreadability according to the number of retweets.Moreover,we find that a user with more tweets or followers does not always have stronger spreadability in microblogs.  相似文献   
994.
In the service-oriented computing paradigm, cross-organizational applications and information systems can be built upon services from different providers. Services are subject to changes required by the organizational and regulatory policies changes. The challenging problem of service change management has been studied actively in recent years. This paper provides an extensive overview of the current research on change management in the context of service-oriented computing. First, we classify service changes into three major types as interface, behavioral, and non-functional changes. Then, we review the existing work on change management from the four broad categories: Service Adaptation, Process Flexibility, Service Evolution, and Change Analysis and Management in Service Compositions. In each category, we discuss the focusing changes, the proposed approaches to dealing with the change problems, and the change issues that remain to be solved.  相似文献   
995.
A camera‐free 3D air‐touch system was proposed. Hovering, air swiping, and 3D gestures for further interaction with the floated 3D images on the mobile display were demonstrated. By embedding multiwavelength optical sensors into the display pixels and adding angular‐scanning illuminators with multiwavelength on the edge of the display, the flat panel can sense images reflected by a bare finger from different heights. In addition, three axis (x, y, z) information of the reflected image of the fingertip can be calculated. Finally, the proposed 3D air‐touch system was successfully demonstrated on a 4‐inch mobile 3D display.  相似文献   
996.
The optimal viewing distance was proposed as a parameter for designing a parallax barrier 3D display. It can be designed based on simple geometric method and by considering the pitches of image display pixels and parallax barrier, or even including the aperture ratios of the image display pixels and parallax barrier. It can be analyzed by using ray tracing method. By considering the optical refraction index of the cover glass, the angular behavior of the system becomes more realistic; however, the geometric method is difficult to be used. We propose a revised method for estimating the view distance and angular behavior. In this paper, we have demonstrated a designated eye position (DEP) for each view and shown that multiple DEPs make a circular curve around the center of the display. We prove the new concept by comparing the optical ray tracing calculations and optical measurement.  相似文献   
997.
A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks which limit the usability of these solutions. In this paper, we present a security enhancement to dynamic source routing (DSR) protocol against wormhole attacks for ad hoc networks which relies on calculation of round trip time (RTT). Our protocol secures DSR against a wormhole attack in ad hoc networks for multirate transmissions. We also consider the processing and queuing delays of each participating node in the calculation of RTTs between neighbors which to date has not been addressed in the existing literature. This work provides two test cases that show that not taking multirate transmission into consideration results in miss identifying a wormhole attack.  相似文献   
998.
Based on the classification rule of sparse representation-based classification (SRC) and linear regression classification (LRC), we propose the maximum nearest subspace margin criterion for feature extraction. The proposed method can be seen as a preprocessing step of SRC and LRC. By maximizing the inter-class reconstruction error and minimizing the intra-class reconstruction error simultaneously, the proposed method significantly improves the performances of SRC and LRC. Compared with linear discriminant analysis, the proposed method avoids the small sample size problem and can extract more features. Moreover, we extend LRC to overcome the potential singular problem. The experimental results on the extended Yale B (YALE-B), AR, PolyU finger knuckle print and the CENPARMI handwritten numeral databases demonstrate the effectiveness of the proposed method.  相似文献   
999.
In recent years, hashing-based methods for large-scale similarity search have sparked considerable research interests in the data mining and machine learning communities. While unsupervised hashing-based methods have achieved promising successes for metric similarity, they cannot handle semantic similarity which is usually given in the form of labeled point pairs. To overcome this limitation, some attempts have recently been made on semi-supervised hashing which aims at learning hash functions from both metric and semantic similarity simultaneously. Existing semi-supervised hashing methods can be regarded as passive hashing since they assume that the labeled pairs are provided in advance. In this paper, we propose a novel framework, called active hashing, which can actively select the most informative labeled pairs for hash function learning. Specifically, it identifies the most informative points to label and constructs labeled pairs accordingly. Under this framework, we use data uncertainty as a measure of informativeness and develop a batch mode algorithm to speed up active selection. We empirically compare our method with a state-of-the-art passive hashing method on two benchmark data sets, showing that the proposed method can reduce labeling cost as well as overcome the limitations of passive hashing.  相似文献   
1000.
Series of experiments for phenol degradation with assistance of TiO2 catalyst at pH of 6.5 and temperature of 25 degrees C were conducted using a lab-scale electrochemical reactor constructed in our laboratory. According to the results, at the presence of the TiO2 catalyst the removal of phenol was increased and first-order kinetics could describe the evolution of phenol concentration. For inspecting the relationship between rate constants and dosage of TiO2, two possible kinetics were proposed in this study. Contrasted to the abundant experimental data, a reasonable kinetics was obtained for the estimation of phenol concentration effluent during continuous flow of raw wastewater, especially when the TiO2 dosage was less than 0.5g L(-1). The model obtained from these experiments could employed for the calculation of rate constants at different TiO2 dosage and the necessary dosage of catalyst when a discharge standard was designed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号