首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   133398篇
  免费   5643篇
  国内免费   2588篇
电工技术   3686篇
技术理论   7篇
综合类   5532篇
化学工业   19914篇
金属工艺   7670篇
机械仪表   6188篇
建筑科学   5772篇
矿业工程   2196篇
能源动力   2663篇
轻工业   6731篇
水利工程   2061篇
石油天然气   3503篇
武器工业   488篇
无线电   15131篇
一般工业技术   22506篇
冶金工业   5109篇
原子能技术   937篇
自动化技术   31535篇
  2024年   275篇
  2023年   956篇
  2022年   1623篇
  2021年   2289篇
  2020年   1740篇
  2019年   1401篇
  2018年   15796篇
  2017年   15000篇
  2016年   11403篇
  2015年   2726篇
  2014年   2939篇
  2013年   3413篇
  2012年   6480篇
  2011年   12882篇
  2010年   11226篇
  2009年   8377篇
  2008年   9569篇
  2007年   10391篇
  2006年   2734篇
  2005年   3459篇
  2004年   2694篇
  2003年   2524篇
  2002年   1885篇
  2001年   1268篇
  2000年   1347篇
  1999年   1234篇
  1998年   1037篇
  1997年   858篇
  1996年   826篇
  1995年   598篇
  1994年   515篇
  1993年   347篇
  1992年   288篇
  1991年   224篇
  1990年   173篇
  1989年   136篇
  1988年   119篇
  1987年   60篇
  1986年   62篇
  1985年   34篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1959年   37篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
Song Hu  Andreas Jess  Minhou Xu 《Fuel》2007,86(17-18):2778-2788
The slow pyrolysis of six Chinese biomasses was studied by thermogravimetric experiments. Non-linear square fitting method is used to calculate DTG data. The analysis results show that it is not possible to exactly represent the biomass pyrolysis by a one-step model with different mechanisms. Thus, three-pseudocomponent models were used to simulate the biomass pyrolysis. It was found that the three-pseudocomponent model with n-order kinetics (model II) is more accurate than the model with first-order kinetics (model I). Activation energies of three-pseudocomponents in model II are bigger than the values in model I. It is shown that model II yields the best simulation results, especially with respect to describe accurately the pyrolysis of the first pseudocomponent (hemicellulose) and the last one (lignin). Nevertheless, with regard to a practical utilization, the three-pseudocomponent model with a reaction order of one could be used, because the accuracy to represent biomass pyrolysis is high enough. Unrealistic high values of the reaction order are avoided, and thus this model is more realistic with respect to the chemical interpretation of the reaction order.  相似文献   
993.
The time dependences of electrical conduction and self‐heating behaviors in high‐density polyethylene filled with acetylene carbon black of 0.082 in volume fraction are studied in relation to voltage and ambient temperature. The characteristic decay current constant τi, and the exponential growth time constant for self‐heating τg are determined for the samples under voltages U above the critical value Uc for the onset of self‐heating. The influences of voltage and ambient temperature on τi and τg as well as the amplitude of the low‐resistance to high‐resistance switching are discussed on the basis of the random resistor network (RRN) model and the relationship between Uc and the intrinsic resistivity. © 2005 Wiley Periodicals, Inc. J Appl Polym Sci 99: 1124–1131, 2006  相似文献   
994.
Holistic schedulability analysis for multipacket messages in AFDX networks   总被引:1,自引:0,他引:1  
The ARINC-664, Part 7 (AFDX) standard defines a communication network based on Ethernet and the UDP/IP protocols. Contrary to general-purpose Ethernet, the timing behavior in AFDX is deterministic due to the use of special network switches and end systems with static routing tables and traffic policing at the sending end through mechanisms called virtual links. Even though the latencies in this network are bounded, there are scheduling and contention effects that need to be analyzed. In this paper we develop a response-time analysis for multipacket messages transmitted through an AFDX network including the scheduling of the virtual links and sub-virtual links, and also the contention in the end systems and in the switches. This analysis allows us to obtain worst-case latencies and output jitter for the network messages with a precise modeling of the sending and receiving ends. These results can be integrated in a holistic approach with the response time analysis of the threads in the processing nodes to obtain end-to-end response times in heterogeneous distributed systems.  相似文献   
995.
Recent inpainting techniques usually require human interactions which are labor intensive and dependent on the user experiences. In this paper, we introduce an automatic inpainting technique to remove undesired fence-like structures from images. Specifically, the proposed technique works on the RGBD images which have recently become cheaper and easier to obtain using the Microsoft Kinect. The basic idea is to segment and remove the undesired fence-like structures by using both depth and color information, and then adapt an existing inpainting algorithm to fill the holes resulting from the structure removal. We found that it is difficult to achieve a satisfactory segmentation of such structures by only using the depth channel. In this paper, we use the depth information to help identify a set of foreground and background strokes, with which we apply a graph-cut algorithm on the color channels to obtain a more accurate segmentation for inpainting. We demonstrate the effectiveness of the proposed technique by experiments on a set of Kinect images.  相似文献   
996.
Parallel machines are extensively used to increase computational speed in solving different scientific problems. Various topologies with different properties have been proposed so far and each one is suitable for specific applications. Pyramid interconnection networks have potentially powerful architecture for many applications such as image processing, visualization, and data mining. The major advantage of pyramids which is important for image processing systems is hierarchical abstracting and transferring the data toward the apex node, just like the human being vision system, which reach to an object from an image. There are rapidly growing applications in which the multidimensional datasets should be processed simultaneously. For such a system, we need a symmetric and expandable interconnection network to process data from different directions and forward them toward the apex. In this paper, a new type of pyramid interconnection network called Non-Flat Surface Level (NFSL) pyramid is proposed. NFSL pyramid interconnection networks constructed by L-level A-lateral-base pyramids that are named basic-pyramids. So, the apex node is surrounded by the level-one surfaces of NFSL that are the first nearest level of nodes to apex in the basic pyramids. Two topologies which are called NFSL-T and NFSL-Q originated from Trilateral-base and Quadrilateral-base basic-pyramids are studied to exemplify the proposed structure. To evaluate the proposed architecture, the most important properties of the networks are determined and compared with those of the standard pyramid networks and its variants.  相似文献   
997.
This paper analyzes the robustness of globally exponential stability of time-varying delayed neural networks (NNs) subjected to random disturbances. Given a globally exponentially stable neural network, and in the presence of noise, we quantify how much noise intensity that the delayed neural network can remain to be globally exponentially stable. We characterize the upper bounds of the noise intensity for the delayed NNs to sustain globally exponential stability. The upper bounds of parameter uncertainty intensity are characterized by using transcendental equation. A numerical example is provided to illustrate the theoretical result.  相似文献   
998.
999.
In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a classical binary key is implemented on quantum image. Then, we utilize a dynamic vector, instead of a fixed parameter as in other previous schemes, to control the embedding process. The dynamic embedding vector is decided by both the carrier quantum image and the watermark image, which is only known by the authorized owner. The proposed scheme is analyzed from visual quality, computational complexity, and payload capacity. Analysis and results show that the proposed scheme has better visual quality under a higher embedding capacity and lower complexity compared with other schemes proposed recently.  相似文献   
1000.
With the fast explosive rate of the amount of image data on the Internet, how to efficiently utilize them in the cross-media scenario becomes an urgent problem. Images are usually accompanied with contextual textual information. These two heterogeneous modalities are mutually reinforcing to make the Internet content more informative. In most cases, visual information can be regarded as an enhanced content of the textual document. To make image-to-image similarity being more consistent with document-to-document similarity, this paper proposes a method to learn image similarities according to the relations of the accompanied textual documents. More specifically, instead of using the static quantitative relations, rank-based learning procedure by employing structural SVM is adopted in this paper, and the ranking structure is established by comparing the relative relations of textual information. The learning results are in more accordance with the human’s recognition. The proposed method in this paper can be used not only for the image-to-image retrieval, but also for cross-modality multimedia, where a query expansion framework is proposed to get more satisfactory results. Extensive experimental evaluations on large scale Internet dataset validate the performance of the proposed methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号