首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   84019篇
  免费   7036篇
  国内免费   4559篇
电工技术   4895篇
技术理论   2篇
综合类   7771篇
化学工业   13480篇
金属工艺   4520篇
机械仪表   5289篇
建筑科学   5801篇
矿业工程   1985篇
能源动力   2271篇
轻工业   7256篇
水利工程   1688篇
石油天然气   3441篇
武器工业   631篇
无线电   9958篇
一般工业技术   9302篇
冶金工业   3633篇
原子能技术   1126篇
自动化技术   12565篇
  2024年   275篇
  2023年   993篇
  2022年   1777篇
  2021年   2556篇
  2020年   2040篇
  2019年   1789篇
  2018年   1949篇
  2017年   2225篇
  2016年   2134篇
  2015年   2977篇
  2014年   3974篇
  2013年   4851篇
  2012年   5559篇
  2011年   5929篇
  2010年   5647篇
  2009年   5499篇
  2008年   5464篇
  2007年   5331篇
  2006年   5220篇
  2005年   4370篇
  2004年   3541篇
  2003年   3270篇
  2002年   3898篇
  2001年   3359篇
  2000年   2352篇
  1999年   1805篇
  1998年   1257篇
  1997年   1061篇
  1996年   938篇
  1995年   803篇
  1994年   613篇
  1993年   445篇
  1992年   364篇
  1991年   286篇
  1990年   233篇
  1989年   155篇
  1988年   147篇
  1987年   101篇
  1986年   63篇
  1985年   61篇
  1984年   57篇
  1983年   40篇
  1982年   28篇
  1981年   30篇
  1980年   31篇
  1979年   20篇
  1978年   11篇
  1977年   15篇
  1976年   23篇
  1959年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
在分析了数字版权研究现状和功能框架的基础上,设计了基于多重数字水印和密码的版权管理模型;该模型采用数字内容和许可证各自单独封装、独立分发的方式,使得只有购买了许可证的特定用户才能使用数字内容,实现了水印作品的许可交易;另外,内容服务器采用的对数字作品加载两次水印,对数字内容部分签名加密,未加密部分签名的方案,在有效保证数字内容安全传输的基础上又减少了计算量和存储量;分析表明该模型有显著的优点和很好的安全性。  相似文献   
92.
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed.  相似文献   
93.
This paper presents a method of autonomous topological modeling and localization in a home environment using only low-cost sonar sensors. The topological model is extracted from a grid map using cell decomposition and normalized graph cut. The autonomous topological modeling involves the incremental extraction of a subregion without predefining the number of subregions. A method of topological localization based on this topological model is proposed wherein a current local grid map is compared with the original grid map. The localization is accomplished by obtaining a node probability from a relative motion model and rotational invariant grid-map matching. The proposed method extracts a well-structured topological model of the environment, and the localization provides reliable node probability even when presented with sparse and uncertain sonar data. Experimental results demonstrate the performance of the proposed topological modeling and localization in a real home environment.  相似文献   
94.
动态相位调整技术在FPGA中的设计与实现   总被引:1,自引:0,他引:1  
提出一种基于FPGA的动态相位调整实现方案。在高速数据传输接口中,由于数据窗缩小以及传输路径不一致,造成数据和时钟信号在FPGA的接收端发生位偏移和字偏移。动态相位调整技术根据当前各数据线物理状态,对各信号线动态进行去偏移操作,克服了静态相位调整中参数不可再调的缺点,使接口不断适应外部环境的变化,从而保证数据的可靠传输。  相似文献   
95.
96.
Voting systems are common tools in a variety of areas. This paper studies parameterized computational complexity of control of Plurality, Condorcet and Approval voting systems, respectively. The types of controls considered include adding or deleting candidates or voters, under constructive or destructive setting. We obtain the following results: (1) constructive control by adding candidates in Plurality voting is W[2]-hard with respect to the parameter “number of added candidates”, (2) destructive control by adding candidates in Plurality voting is W[2]-hard with respect to the parameter “number of added candidates”, (3) constructive control by adding voters in Condorcet voting is W[1]-hard with respect to the parameter “number of added voters”, (4) constructive control by deleting voters in Condorcet voting is W[1]-hard with respect to the parameter “number of deleted voters”, (5) constructive control by adding voters in Approval voting is W[1]-hard with respect to the parameter “number of added voters”, and (6) constructive control by deleting voters in Approval voting is W[2]-hard with respect to the parameter “number of deleted voters”.  相似文献   
97.
98.
99.
Deng  Juan  Zhao  Shu  Wang  Yan  Wang  Lei  Wang  Hong  Sha  Hong 《Multimedia Tools and Applications》2017,76(7):10097-10117
Multimedia Tools and Applications - Most of the existing image encryption algorithms based on compressive sensing are too complex to operate. An image compression-encryption scheme with simple...  相似文献   
100.
This paper reports the dynamic behaviour of a magnetically actuated floating liquid marble by analysing the oscillation of the marble. A liquid marble is a liquid droplet coated with hydrophobic powder. Magnetite particles inside the marble make it magnetic. The marble floats on a carrier liquid that contains aqueous glycerol of various concentrations. A permanent magnet located under the carrier liquid drives the floating marble with the initial velocity. Stopping the magnet abruptly causes the marble to oscillate around its final position for a few seconds. The oscillation was recorded and analysed using customised image processing and evaluation software. The damped harmonic motion model was then applied to the data and tested. Subsequently, critical parameters of the system such as the initial displacement, friction correction factor, the apparent frequency and the spring constant were determined and discussed. The simple experimental set-up and convenient theoretical approach allow us to characterise the marble motion under the influence of a magnet with good accuracy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号