首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   25740篇
  免费   2103篇
  国内免费   994篇
电工技术   1332篇
技术理论   5篇
综合类   1465篇
化学工业   4611篇
金属工艺   1692篇
机械仪表   1580篇
建筑科学   2029篇
矿业工程   705篇
能源动力   839篇
轻工业   1694篇
水利工程   412篇
石油天然气   1766篇
武器工业   154篇
无线电   2528篇
一般工业技术   3218篇
冶金工业   1456篇
原子能技术   270篇
自动化技术   3081篇
  2024年   140篇
  2023年   509篇
  2022年   804篇
  2021年   1121篇
  2020年   904篇
  2019年   760篇
  2018年   869篇
  2017年   888篇
  2016年   776篇
  2015年   1050篇
  2014年   1240篇
  2013年   1661篇
  2012年   1621篇
  2011年   1698篇
  2010年   1499篇
  2009年   1420篇
  2008年   1349篇
  2007年   1289篇
  2006年   1377篇
  2005年   1188篇
  2004年   734篇
  2003年   677篇
  2002年   623篇
  2001年   487篇
  2000年   574篇
  1999年   674篇
  1998年   569篇
  1997年   422篇
  1996年   408篇
  1995年   340篇
  1994年   275篇
  1993年   190篇
  1992年   157篇
  1991年   111篇
  1990年   88篇
  1989年   49篇
  1988年   67篇
  1987年   41篇
  1986年   31篇
  1985年   32篇
  1984年   29篇
  1983年   16篇
  1982年   12篇
  1981年   9篇
  1980年   15篇
  1979年   10篇
  1978年   4篇
  1974年   3篇
  1959年   2篇
  1958年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
倾角是许多控制系统中需要测量的一个重要参数。针对倾角测量,设计了一种基于ARM微控制器和加速度传感器的角度测量平台。该平台采用基于ARMCortex—M3内核的STM32F103VE为数据处理的核心,利用高精度加速度传感器MMA7361L为测角传感器,同时配置液晶屏和小型键盘实现了人机交互。该平台具有测量精度高、灵敏度高、价格低的特点,应用前景广阔。  相似文献   
72.
针对远程信息监测系统中数据的实时采集更新问题,将AJAX和CGI应用到嵌入式Web服务器的设计中,实现了服务器与浏览器之间的动态信息交互。本文首先分析了uIP协议栈,并在协议栈之上设计了Web服务器,然后利用CGI服务程序处理来自客户端的XMLHttpRequest对象请求,实现动态Web功能。现场实验结果表明,嵌入式Web服务器降低了服务器端的资源开销,提高了响应速度。  相似文献   
73.
本文针对目前单片机课程的教学现状,提出了一些关于单片机教学改革的措施和方法。  相似文献   
74.
随着信息化和网络技术的不断发展,以计算机为工具来盗取用户信息的犯罪日益增加。尤其是通过网络窃取上网计算机涉密信息,已经成为国内外不法分子窃取我国秘密信息的重要手段。本文对国内外计算机窃密与反窃密技术的各种手段进行研究与分析,并通过理论与实际的相结合,提出安全与实用并重的防范措施。  相似文献   
75.
This paper addresses the problem of semi‐global stabilization by output feedback for a class of nonlinear systems whose output gains are unknown. For each subsystem, we first design a state compensator and use the compensator states to construct a control law to stabilize the nominal linear system without the perturbing nonlinearities. Then, combining the output feedback domination approach with block‐backstepping scheme, a series of homogeneous output feedback controllers are constructed recursively for each subsystem and the closed‐loop system is rendered semi‐globally asymptotically stable.  相似文献   
76.
“焦家式”金矿床金矿物的标型特征及成因意义   总被引:1,自引:0,他引:1  
杜心君  郑若惠 《黄金》1989,10(11):2-10
  相似文献   
77.
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy data-intensive applications without the infrastructure investment, where large application datasets can be stored in the cloud. Based on the pay-as-you-go model, data placement strategies have been developed to cost-effectively store large volumes of generated datasets in the scientific cloud workflows. As promising as it is, this paradigm also introduces many new challenges for data security when the users outsource sensitive data for sharing on the cloud servers, which are not within the same trusted domain as the data owners. This challenge is further complicated by the security constraints on the potential sensitive data for the scientific workflows in the cloud. To effectively address this problem, we propose a security-aware intermediate data placement strategy. First, we build a security overhead model to reasonably measure the security overheads incurred by the sensitive data. Second, we develop a data placement strategy to dynamically place the intermediate data for the scientific workflows. Finally, our experimental results show that our strategy can effectively improve the intermediate data security while ensuring the data transfer time during the execution of scientific workflows.  相似文献   
78.
The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. In this paper, we first present a general framework for searching on error-tolerant keywords. Then we propose a concrete scheme, based on a fuzzy extractor, which is proved secure against an adaptive adversary under well-defined security definition. The scheme is suitable for all similarity metrics including Hamming distance, edit distance, and set difference. It does not require the user to construct or store anything in advance, other than the key used to calculate the trapdoor of keywords and the key to encrypt data documents. Thus, our scheme tremendously eases the users' burden. What is more, our scheme is able to transform the servers' searching for error-tolerant keywords on ciphertexts to the searching for exact keywords on plaintexts. The server can use any existing approaches of exact keywords search to search plaintexts on an index table.  相似文献   
79.
In this paper, we propose a discriminative multi-task objects tracking method with active feature selection and drift correction. The developed method formulates object tracking in a particle filter framework as multi-Task discriminative tracking. As opposed to generative methods that handle particles separately, the proposed method learns the representation of all the particles jointly and the corresponding coefficients are similar. The tracking algorithm starts from the active feature selection scheme, which adaptively chooses suitable number of discriminative features from the tracked target and background in the dynamic environment. Based on the selected feature space, the discriminative dictionary is constructed and updated dynamically. Only a few of them are used to represent all the particles at each frame. In other words, all the particles share the same dictionary templates and their representations are obtained jointly by discriminative multi-task learning. The particle that has the highest similarity with the dictionary templates is selected as the next tracked target state. This jointly sparsity and discriminative learning can exploit the relationship between particles and improve tracking performance. To alleviate the visual drift problem encountered in object tracking, a two-stage particle filtering algorithm is proposed to complete drift correction and exploit both the ground truth information of the first frame and observations obtained online from the current frame. Experimental evaluations on challenging sequences demonstrate the effectiveness, accuracy and robustness of the proposed tracker in comparison with state-of-the-art algorithms.  相似文献   
80.
For hyperspectral target detection, it is usually the case that only part of the targets pixels can be used as target signatures, so can we use them to construct the most proper background subspace for detecting all the probable targets? In this paper, a dynamic subspace detection (DSD) method which establishes a multiple detection framework is proposed. In each detection procedure, blocks of pixels are calculated by the random selection and the succeeding detection performance distribution analysis. Manifold analysis is further used to eliminate the probable anomalous pixels and purify the subspace datasets, and the remaining pixels construct the subspace for each detection procedure. The final detection results are then enhanced by the fusion of target occurrence frequencies in all the detection procedures. Experiments with both synthetic and real hyperspectral images (HSI) evaluate the validation of our proposed DSD method by using several different state-of-the-art methods as the basic detectors. With several other single detectors and multiple detection methods as comparable methods, improved receiver operating characteristic curves and better separability between targets and backgrounds by the DSD methods are illustrated. The DSD methods also perform well with the covariance-based detectors, showing their efficiency in selecting covariance information for detection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号