首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   156966篇
  免费   13365篇
  国内免费   7401篇
电工技术   10482篇
技术理论   11篇
综合类   10561篇
化学工业   24983篇
金属工艺   9076篇
机械仪表   10141篇
建筑科学   12293篇
矿业工程   4160篇
能源动力   4719篇
轻工业   9680篇
水利工程   3313篇
石油天然气   7901篇
武器工业   1481篇
无线电   18825篇
一般工业技术   18325篇
冶金工业   7930篇
原子能技术   1728篇
自动化技术   22123篇
  2024年   583篇
  2023年   2121篇
  2022年   4079篇
  2021年   5710篇
  2020年   4305篇
  2019年   3540篇
  2018年   3943篇
  2017年   4632篇
  2016年   4379篇
  2015年   5825篇
  2014年   7762篇
  2013年   9382篇
  2012年   10755篇
  2011年   11282篇
  2010年   10431篇
  2009年   10022篇
  2008年   9676篇
  2007年   9313篇
  2006年   9156篇
  2005年   7813篇
  2004年   5658篇
  2003年   5150篇
  2002年   5019篇
  2001年   4463篇
  2000年   3750篇
  1999年   3574篇
  1998年   2916篇
  1997年   2366篇
  1996年   2142篇
  1995年   1755篇
  1994年   1449篇
  1993年   1035篇
  1992年   768篇
  1991年   629篇
  1990年   489篇
  1989年   428篇
  1988年   356篇
  1987年   210篇
  1986年   190篇
  1985年   119篇
  1984年   110篇
  1983年   76篇
  1982年   70篇
  1981年   63篇
  1980年   46篇
  1979年   37篇
  1978年   15篇
  1977年   34篇
  1976年   16篇
  1975年   18篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
本文从建陶产品生命周期缩短的现象入手,应用产品生命周期理论和相关的数学模型,对建陶产品生命周期的各个影响因素进行了分析和探讨。  相似文献   
992.
Recently, compressive sensing-based encryption methods which combine sampling, compression and encryption together have been proposed. However, since the quantized measurement data obtained from linear dimension reduction projection directly serve as the encrypted image, the existing compressive sensing-based encryption methods fail to resist against the chosen-plaintext attack. To enhance the security, a block cipher structure consisting of scrambling, mixing, S-box and chaotic lattice XOR is designed to further encrypt the quantized measurement data. In particular, the proposed method works efficiently in the parallel computing environment. Moreover, a communication unit exchanges data among the multiple processors without collision. This collision-free property is equivalent to optimal diffusion. The experimental results demonstrate that the proposed encryption method not only achieves the remarkable confusion, diffusion and sensitivity but also outperforms the existing parallel image encryption methods with respect to the compressibility and the encryption speed.  相似文献   
993.
In this paper, we address a new problem of noisy images which present in the procedure of relevance feedback for medical image retrieval. We concentrate on the noisy images, caused by the users mislabeling some irrelevant images as relevant ones, and a noisy-smoothing relevance feedback (NS-RF) method is proposed. In NS-RF, a two-step strategy is proposed to handle the noisy images. In step 1, a noisy elimination algorithm is adopted to identify and eliminate the noisy images. In step 2, to further alleviate the influence of noisy images, a fuzzy membership function is employed to estimate the relevance probabilities of retained relevant images. After noisy handling, the fuzzy support vector machine, which can take into account different relevant images with different relevance probabilities, is adopted to re-rank the images. The experimental results on the IRMA medical image collection demonstrate that the proposed method can deal with the noisy images effectively.  相似文献   
994.
In 2010, Shiu et al. proposed three DNA-based reversible data hiding schemes with high embedding capacity. However, their schemes were not focused on DNA modification rate or the expansion problem. Therefore, we propose a novel reversible data hiding scheme based on histogram technique to solve the weaknesses of Shiu et al.’s schemes. The proposed scheme transforms the DNA sequence into a binary string and then combines several bits into a decimal integer. These decimal integers are used to generate a histogram. Afterwards, the proposed scheme uses a histogram technique to embed secret data. The experimental results show that the modification rate of our proposed scheme is 69 % lower than that of Shiu et al.’s schemes for the same embedding capacity. In addition, the length of the DNA sequence remains unchanged in the proposed scheme.  相似文献   
995.
Video frame-rate up-conversion is one of the common operations for tampering digital videos in the temporal domain, such as creating fake high-quality videos and splicing two video clips with different frame rates. However, few existing works have been proposed for detecting this form of tampering operation. Based on the analysis of extensive experiments, we found that frame-rate up-conversion algorithms employed in most current video editing softwares will inevitably introduce some periodic artifacts into inter-frame similarity in the resulting video frame sequence. By analyzing such artifacts, we propose a simple yet very effective method to expose video after frame-rate up-conversion, and further estimate its original frame rate. The experimental results evaluated on 100 original videos at different frame rates have shown the effectiveness of the proposed method. The average detection accuracy can achieve as high as 99 % on noise-free videos in uncompressed and H.264/AVC formats. Besides, the proposed method is robust to noise as the detection accuracy could reach over 85 % and 95 % on noised videos with Gaussian white noise when SNR is 33 db and 36 db respectively.  相似文献   
996.
With the advanced technology of medical devices and sensors, an abundance of medical data streams are available. However, data analysis techniques are very limited, especially for processing massive multiple physiological streams that may only be understood by medical experts. The state-of-the-art techniques only allow multiple medical devices to independently monitor different physiological parameters for the patient’s status, thus they signal too many false alarms, creating unnecessary noise, especially in the Intensive Care Unit (ICU). An effective solution which has been recently studied is to integrate information from multiple physiologic parameters to reduce alarms. But it is a challenge to detect abnormalities from high frequently changed physiological streams data, since abnormalities occur gradually due to the complex situation of patients. An analysis of ICU physiological data streams shows that many vital physiological parameters are changed periodically (such as heart rate, arterial pressure, and respiratory impedance) and thus abnormalities are generally abnormal period patterns. In this paper, we develop a Mining Abnormal Period Patterns from Multiple Physiological Streams (MAPPMPS) method to detect and rank abnormalities in medical sensor streams. The efficiency and effectiveness of the MAPPMPS method is demonstrated by a real-world massive database of multiple physiological streams sampled in ICU, comprising 250 patients’ streams (each stream involving over 1.3 million data points) with a total size of 28 GB data.  相似文献   
997.
高支模工程安全管理不仅需要很高的技术,而且安全管理本身也具有较大的随机性,这就导致相关人员在开展安全管理工作时具有一定的难度。面对这一问题,相关监理人员必须从施工方案的审批、应急预案的落实、质量安全作业的施工技术交底和施工过程中所需要的各种原材料进场前的检验等方面加强管理。  相似文献   
998.
在实际操作中,由于变电运行非常复杂,很容易出现危险,因此,做好相关危险点的分析和预防工作,对保证电力系统运行安全有着非常重要的意义。结合变电运行倒闸操作中的危险点,对其预防对策进行了分析和探讨。  相似文献   
999.
煤炭资源是我国社会发展的重要能源之一,在煤炭资源开采过程中,必须对煤矿的地质结构进行认真分析。重点分析了煤矿地质结构与煤矿开采的关系,通过对煤矿地质结构的发展规律进行分析,建立了一套完善的煤矿地质构造评价指标系统,从而为煤矿资源的安全开采提供了保障。  相似文献   
1000.
为了推进工学结合、校企合作的人才培养模式改革,以创建国家示范性高职院校为实践平台,通过创新机制,在一定程度上解决了制约工学结合人才培养模式改革的主要问题。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号