首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15788篇
  免费   1007篇
  国内免费   138篇
电工技术   248篇
综合类   70篇
化学工业   4093篇
金属工艺   422篇
机械仪表   606篇
建筑科学   613篇
矿业工程   29篇
能源动力   1086篇
轻工业   1521篇
水利工程   228篇
石油天然气   262篇
武器工业   4篇
无线电   1564篇
一般工业技术   2916篇
冶金工业   548篇
原子能技术   120篇
自动化技术   2603篇
  2024年   76篇
  2023年   303篇
  2022年   656篇
  2021年   1046篇
  2020年   870篇
  2019年   974篇
  2018年   1113篇
  2017年   987篇
  2016年   998篇
  2015年   566篇
  2014年   902篇
  2013年   1597篇
  2012年   1061篇
  2011年   1086篇
  2010年   782篇
  2009年   675篇
  2008年   459篇
  2007年   384篇
  2006年   332篇
  2005年   204篇
  2004年   191篇
  2003年   158篇
  2002年   136篇
  2001年   94篇
  2000年   95篇
  1999年   82篇
  1998年   141篇
  1997年   120篇
  1996年   100篇
  1995年   76篇
  1994年   55篇
  1993年   63篇
  1992年   51篇
  1991年   42篇
  1990年   44篇
  1989年   36篇
  1988年   27篇
  1987年   25篇
  1986年   35篇
  1985年   30篇
  1984年   27篇
  1983年   29篇
  1982年   23篇
  1981年   22篇
  1980年   22篇
  1979年   21篇
  1978年   20篇
  1977年   19篇
  1976年   26篇
  1975年   16篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
The widespread availability of broadband internet access and the growth in server-based processing have provided an opportunity to run games away from the player into the cloud and offer a new promising service known as cloud gaming. The concept of cloud gaming is to render a game in the cloud and stream the resulting game scenes to the player as a video sequence over a broadband connection. To meet the stringent network bandwidth requirements of cloud gaming and support more players, efficient bit rate reduction techniques are needed. In this paper, we introduce the concept of game attention model (GAM), which is basically a game context-based visual attention model, as a means for reducing the bit rate of the streaming video more efficiently. GAM estimates the importance of each macro-block in a game frame from the player’s perspective and allows encoding the less important macro-blocks with lower bit rate. We have evaluated nine game video sequences, covering a wide range of game genre and a spectrum of scene content in terms of details, motion and brightness. Our subjective assessment shows that by integrating this model into the cloud gaming framework, it is possible to decrease the required bit rate by nearly 25 % on average, while maintaining a relatively high user quality of experience. This clearly enables players with limited communication resources to benefit from cloud gaming with acceptable quality.  相似文献   
62.
Ali M. El-Nashar 《Desalination》1977,20(1-3):267-277
The wastewater from the textile dyeing operations was separated into a concentrate stream, rich in salts and dyes, and a purified product water stream using reverse osmosis membranes. Three membrane materials and three module configurations were used, namely : polyamide (hollow fine fiber configuration ), cellulose acetate ( spiral wound and tubular configurations ) and hydrous Zr(IV)- polyacrylate ( tubular configuration ). The modules were tested for periods ranging from 600 hours to more than 1000 hours under actual field conditions. Membrane flux and rejection were monitored throughout the operation and samples of the feed and product water were analysed chemically. The successful operation of the R.O. equipment under field conditions demonstrated the applicability of this process in the desalination of dyeing wastewater.  相似文献   
63.
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes.  相似文献   
64.
The kernels of 10 different mango varieties were extracted. The physico-chemical characteristics and lipid class composition of fats were studied. The fat content of mango kernels grown under the soil and climatic conditions of Bangladesh varied from 7.1% to 10%, depending on the variety. The total lipid extracts were fractionated into lipid classes by a combination of column and thin layer chromatography (TLC). The hydrocarbon and sterol esters varied from 0.3% to 0.7%, triglycerides from 55.6% to 91.5%, partial glycerides from 2.3% to 4% and free sterol from 0.3% to 0.6%. Free fatty acids amounted to 3.0–37% as oleic; glycolipids were 0.6–1.2% and phospholipids 0.11–0.8%. The fatty acid composition of triglyceride (TG) fractions was analyzed by gas liquid chromatography (GLC). Palmitic acid varied from 7.9 molar % to 10.0 molar %, stearic from 38.2% to 40.2%, oleic from 41.1% to 43.8%, linoleic from 6.0% to 7.6%, linolenic from 0.6% to 1.0% and arachidic acid from 1.7% to 2.6%. TLC revealed the presence of lyso-phosphatidylcholine, phosphatidylcholine, phosphatidylinositol, phosphatidylethanolamine and phosphatidic acid in the phospholipid fraction.  相似文献   
65.
In this paper, we consider the H filters design for singular bilinear systems. The approach is based on the parameterized solution of a set of constrained Sylvester equations. The exponential convergence and l 2 gain attenuation problems are solved by using the bounded real lemma, which leads to linear matrix inequalities (LMI) formulation. Finally, a detailed design procedure is given for the estimation of the states of a flexible joint robot, which demonstrates the effectiveness of the proposed method.  相似文献   
66.
One of the main problems in the VANET(vehicular ad-hoc network)routing algorithms is how to establish the stable routes.The link duration in these networks is often very short because of the frequent changes in the network topology.Short link duration reduce the network efficiency.Different speeds of the vehicles and choosing different directions by the vehicles in the junctions are the two reasons that lead to link breakage and a reduction in link duration.Several routing protocols have been proposed for VANET in order to improve the link duration,while none of them avoids the link breakages caused by the second reason.In this paper,a new method for routing algorithms is proposed based on the vehicles trips history.Here,each vehicle has a profile containing its movement patterns extracted from its trips history.The next direction which each vehicle may choose at the next junction is predicted using this profile and is sent to other vehicles.Afterward each vehicle selects a node the future direction of which is the same as its predicted direction.Our case study indicates that applying our proposed method to ROMSGP(receive on most stable group-path)routing protocol reduces the links breakages and increases the link duration time.  相似文献   
67.
Multimedia Tools and Applications - Various technologies have been utilized today for recognizing client or user in the indoor areas. These technologies incorporate RSSI, Bluetooth Low Energy...  相似文献   
68.
Neural Processing Letters - The motivation behind this paper is to explore the issue of synchronization of fractional order neutral type fuzzy cellular neural networks with state feedback control....  相似文献   
69.

The need of human beings for better social media applications has increased tremendously. This increase has necessitated the need for a digital system with a larger storage capacity and more processing power. However, an increase in multimedia content size reduces the overall processing performance. This occurs because the process of storing and retrieving large files affects the execution time. Therefore, it is extremely important to reduce the multimedia content size. This reduction can be achieved by image and video compression. There are two types of image or video compression: lossy and lossless. In the latter compression, the decompressed image is an exact copy of the original image, while in the former compression, the original and the decompressed image differ from each other. Lossless compression is needed when every pixel matters. This can be found in autoimage processing applications. On the other hand, lossy compression is used in applications that are based on human visual system perception. In these applications, not every single pixel is important; rather, the overall image quality is important. Many video compression algorithms have been proposed. However, the balance between compression rate and video quality still needs further investigation. The algorithm developed in this research focuses on this balance. The proposed algorithm exhibits diversity of compression stages used for each type of information such as elimination of redundant and semi redundant frames, elimination by manipulating consecutive XORed frames, reducing the discrete cosine transform coefficients based on the wanted accuracy and compression ratio. Neural network is used to further reduce the frame size. The proposed method is a lossy compression type, but it can reach the near-lossless type in terms of image quality and compression ratio with comparable execution time.

  相似文献   
70.

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号