首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   122327篇
  免费   12368篇
  国内免费   7414篇
电工技术   9477篇
技术理论   5篇
综合类   9708篇
化学工业   18044篇
金属工艺   7341篇
机械仪表   8359篇
建筑科学   10367篇
矿业工程   3507篇
能源动力   3409篇
轻工业   8944篇
水利工程   2871篇
石油天然气   5751篇
武器工业   1311篇
无线电   15138篇
一般工业技术   13453篇
冶金工业   4834篇
原子能技术   1527篇
自动化技术   18063篇
  2024年   666篇
  2023年   2189篇
  2022年   4311篇
  2021年   5851篇
  2020年   4418篇
  2019年   3424篇
  2018年   3542篇
  2017年   4191篇
  2016年   3795篇
  2015年   5460篇
  2014年   6724篇
  2013年   7983篇
  2012年   8992篇
  2011年   9673篇
  2010年   8617篇
  2009年   8423篇
  2008年   8391篇
  2007年   7474篇
  2006年   6972篇
  2005年   5581篇
  2004年   3813篇
  2003年   3193篇
  2002年   3415篇
  2001年   3040篇
  2000年   2393篇
  1999年   1974篇
  1998年   1427篇
  1997年   1181篇
  1996年   1050篇
  1995年   899篇
  1994年   709篇
  1993年   548篇
  1992年   408篇
  1991年   339篇
  1990年   229篇
  1989年   196篇
  1988年   151篇
  1987年   100篇
  1986年   75篇
  1985年   56篇
  1984年   38篇
  1983年   35篇
  1982年   36篇
  1981年   26篇
  1980年   35篇
  1979年   18篇
  1976年   5篇
  1967年   3篇
  1959年   8篇
  1951年   11篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
移动定位技术的现状与发展趋势   总被引:1,自引:0,他引:1  
基于位置服务为人们的日常生活带来了极大的方便,同时也推动了移动定位技术行业的快速发展。针对移动定位技术发展状况,分析目前主流定位技术的优劣,并对取得的突破作简单的总结归纳。  相似文献   
72.
无人机机载功率放大器的性能一直是限制无人机技术发展的主要因素,为此提出了将功率合成技术应用于无人机数据系统的方法解决上述问题。利用微带线技术结合系统性的电路调试方法,辅以Advanced Design System仿真软件优化设计,同时采用实频技术法进行宽带功放设计,成功研制了频段在1.3 GHz~1.7 GHz的功率放大器,单路功率放大器采用级联的技术输出功率为8 W,两路合成后,实测总输出功率为15.67 W,合成效率达97%,性能稳定,达到实用水平。  相似文献   
73.
The SRM (Spatial Rich Model) is a very effective steganalysis method. It uses statistics of neighboring noise residual samples as features to capture the dependency changes caused by embedding. Because the noise residuals are the high-frequency components of image and closely tied to image content, the residuals of different types of image regions have different statistical properties and effectiveness for steganalysis. In this paper, the effectiveness of the residuals is investigated. Then the effectiveness of the statistics collected from different types of neighboring residual samples is investigated from the FLD (Fisher Linear Discriminant) viewpoint, and ineffective, effective and high-effective neighboring residual samples are defined. The ineffective neighboring residual samples are not likely to change during embedding, and if they are counted in statistics, they may mix the features with noise and make the features impure. Pure SRM features are extracted based on neighboring noise residual sample selection strategy. Furthermore, multi-order statistical features are proposed to increase the statistical diversity. Steganalysis performances of the statistical features collected from different types of neighboring residual samples are investigated on three content adaptive steganographic algorithms. Experimental results demonstrate that the proposed method can achieve a more accurate detection than SRM.  相似文献   
74.
75.
Multi-agent technologies have been widely employed for the development of web-based systems, including web-based e-markets, web-based grid computing, e-governments and service-oriented software systems. In these service-oriented systems, service provider agents and service consumer agents are autonomous and rational entities, which can enter and leave the environments freely. For simplicity, we use terms ‘provider’ and ‘consumer’ to represent this two types of agents. How to select the most suitable service providers according to a service request from a consumer in such an open environment is a very challenging issue. In this paper, we propose an innovative trust model, called the GTrust model, for service group selection in general service-oriented environments. In the GTrust model, the trust evaluation for a service group is based on the functionality coverage of the group, the dependency relationships among individual services in the group, the ratings of individual services on the attributes of the service request and a similarity measurement of the extent to which reference reports can reflect the service request in terms of the priority distribution of attributes. The experimental results and analysis demonstrate the good performance of the GTrust model on the service group selection in service-oriented environments.  相似文献   
76.
77.
In this work, we have put forth two different protocols to address a concrete secure multi-party computational (MPC) problem related to a triangle, of which the coordinates of the three vertices are confidentially kept by the three participants, respectively. The three parties wish to collaboratively compute the area of this triangle while preserving their own coordinate privacy. As one of the merits, our protocols employ weaker assumptions of the existence of pseudorandom generators. In particular, unlike massive secure MPC protocols that rely a lot on oblivious transfer, ours utilize a new computing idea called “pseudorandom-then-rounding” method to avoid this burdensome obstacle. The two protocols are based on different theorems, while they both make use of the same underlying idea. At last, we provide a detailed proof for the first protocol by a series of security reductions of our newly defined games, which seems somewhat stronger than the previous simulation-based proofs and a proof sketch for the second one. Analysis and discussion about the reasons are provided as well to round off our work.  相似文献   
78.
在经济的推动下,商业区数量日益增多,空间布局更加紧凑,用电量也随之大幅增加,管理更为困难。因此,要重视商业区建筑的供电配电。介绍了商业区建筑的特点,然后结合实际案例对其供配电进行了设计。  相似文献   
79.
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号