首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6830篇
  免费   860篇
  国内免费   782篇
电工技术   148篇
技术理论   1篇
综合类   1995篇
化学工业   71篇
金属工艺   30篇
机械仪表   178篇
建筑科学   5篇
矿业工程   15篇
能源动力   51篇
轻工业   7篇
石油天然气   8篇
武器工业   4篇
无线电   3491篇
一般工业技术   295篇
冶金工业   9篇
原子能技术   1篇
自动化技术   2163篇
  2024年   20篇
  2023年   79篇
  2022年   203篇
  2021年   222篇
  2020年   189篇
  2019年   160篇
  2018年   169篇
  2017年   171篇
  2016年   151篇
  2015年   181篇
  2014年   497篇
  2013年   546篇
  2012年   763篇
  2011年   675篇
  2010年   623篇
  2009年   683篇
  2008年   623篇
  2007年   701篇
  2006年   678篇
  2005年   369篇
  2004年   162篇
  2003年   144篇
  2002年   108篇
  2001年   122篇
  2000年   126篇
  1999年   46篇
  1998年   22篇
  1997年   1篇
  1996年   4篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   3篇
  1987年   8篇
  1986年   7篇
  1985年   3篇
  1984年   1篇
  1983年   1篇
  1979年   1篇
排序方式: 共有8472条查询结果,搜索用时 0 毫秒
41.
通过结合网站设计初期的网站结构和典型用例的预先定义,构建一个基于Web日志数据的用户访问数据分析系统。该系统(AS-UAB,Analysis System of User Access Behaviors)通过对网站结构和典型用例的预先植入,利用该领域最新的研究方法和结论,为网站相关人员提供可视化的用户访问信息统计及趋势预测,网站结构设计及交互设计上存在的问题及改进建议等通用功能和个性化定制功能。  相似文献   
42.
由于品种多、批量小而总量大,退书处理在我国以人力为主的图书配送中心作业中已经成为重要的问题环节。为此对某省新华书店的退货系统进行了粗分和二次分拣的播种式作业流程设计,并采用eM-Plant仿真软件进行建模,分析了分拣模式、人力配置和作业效率,验证了退书作业方案。  相似文献   
43.
Node classification has a wide range of application scenarios such as citation analysis and social network analysis. In many real-world attributed networks, a large portion of classes only contain limited labeled nodes. Most of the existing node classification methods cannot be used for few-shot node classification. To train the model effectively and improve the robustness and reliability of the model with scarce labeled samples, in this paper, we propose a local adaptive discriminant structure learning (LADSL) method for few-shot node classification. LADSL aims to properly represent the nodes in the attributed graphs and learn a metric space with a strong discriminating power by reducing the intra-class variations and enlarging inter-class differences. Extensive experiments conducted on various attributed networks datasets demonstrate that LADSL is superior to the other methods on few-shot node classification task.  相似文献   
44.
Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first is the migration trigger determination algorithm for cross-border migration and service degradation migration, respectively, based on trajectory prediction and traffic awareness to improve the determination accuracy. The second is the migration target decision calculation model for minimizing the average migration time and maximizing the average service time to reduce migration times and improve the stability and adaptability of migration decisions. The third is the migration decision algorithm based on the improved artificial bee colony algorithm to avoid local optimal migration decisions. Simulation results show that the proposed migration mechanism can reduce migration times, reduce average migration time, improve average service time and enhance the stability and adaptability of IoV application services.  相似文献   
45.
A. Chamoli and C.M. Bhandari presented a secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]. M.Naseri analyzed its security and pointed out that in this protocol any dishonest party can obtain all the other one’s secret message with zero risk of being detected by using fake entangled particles (FEP attack) [M. Naseri, Quantum Inf. Process. online]. In this letter, we reexamine the protocol’s security and discover that except the FEP attack, using a special property of GHZ states, any one dishonest party can also take a special attack, i.e., double-CNOT(Controlled NOT) attack. Finally, a denial-of-service attack is also discussed.  相似文献   
46.
针对传统的矿井煤仓二维设计存在绘图复杂、抽象、易出错等问题,提出了一种矿井煤仓三维计算机辅助设计的方案;以恒源煤矿的-600煤仓和主井缓冲煤仓为例,详细介绍了煤仓三维计算机辅助设计及其动画演示的具体实现。该方案解决了复杂工程施工中设计者与施工人员的交流问题,为高质量、快速施工提供了基础保障。  相似文献   
47.
基于液滴指纹图的波形分析算法的改进   总被引:1,自引:0,他引:1  
不同的液体在相同的夜滴分析系统中,光纤信号的强弱不同,电容信号的强弱即液滴体积不同,液滴指纹图的波峰波谷的高度、位置以及峰的形状不同,液滴指纹图的曲线长度和曲线下的面积不同;因此,对光电液滴指纹图进行波形分析,计算波形参数,可以实现特征提取并区分不同液体.针对波形分析算法在特征提取过程中存在的两个缺陷,即最值检测时可能错误识别波谷位置和邻域比较时产生大量等值数据集,提出了改进的波形分析算法;对改进前后的波形分析算法进行了分析比较,改进后的算法有效提高了波形参数的准确性.  相似文献   
48.
软件无线电因为它的开放性强,兼容性高,在航空航天,多频段、多用户、多模兼容以及互联系统有着广泛的应用前景;文中简要介绍了软件无线电的背景,着重对其关键技术及研究难点提炼与归纳,最后对软件无线电在军事通信、个人移动通信的应用与发展趋势进行了分析及总结。  相似文献   
49.
We propose and experimentally demonstrate the heterodyne mixing and polarization diversity tech- niques in radio over fiber (ROF) systems with the advantages of high sensitivity and dispersion endurance. The generation of 2.5 Gb/s optical DPSK and PSK signals, fiber propagation and wireless transmission over 15 GHz subcarrier are illustrated with very low sensitivity of -26 and -32 dBm, respectively. Moreover, based on the wireless polarization diversity techniques, we successfully performed the t...  相似文献   
50.
To study the communication between information systems, Wang et al. [C. Wang, C. Wu, D. Chen, Q. Hu, C. Wu, Communicating between information systems, Information Sciences 178 (2008) 3228-3239] proposed two concepts of type-1 and type-2 consistent functions. Some properties of such functions and induced relation mappings have been investigated there. In this paper, we provide an improvement of the aforementioned work by disclosing the symmetric relationship between type-1 and type-2 consistent functions. We present more properties of consistent functions and induced relation mappings and improve upon several deficient assertions in the original work. In particular, we unify and extend type-1 and type-2 consistent functions into the so-called neighborhood-consistent functions. This provides a convenient means for studying the communication between information systems based on various neighborhoods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号