首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4648篇
  免费   571篇
  国内免费   427篇
电工技术   318篇
综合类   297篇
化学工业   493篇
金属工艺   278篇
机械仪表   394篇
建筑科学   819篇
矿业工程   44篇
能源动力   260篇
轻工业   25篇
水利工程   70篇
石油天然气   39篇
武器工业   11篇
无线电   410篇
一般工业技术   971篇
冶金工业   77篇
原子能技术   35篇
自动化技术   1105篇
  2024年   17篇
  2023年   187篇
  2022年   242篇
  2021年   174篇
  2020年   303篇
  2019年   225篇
  2018年   212篇
  2017年   268篇
  2016年   323篇
  2015年   254篇
  2014年   376篇
  2013年   388篇
  2012年   455篇
  2011年   367篇
  2010年   277篇
  2009年   330篇
  2008年   138篇
  2007年   248篇
  2006年   247篇
  2005年   105篇
  2004年   52篇
  2003年   44篇
  2002年   42篇
  2001年   46篇
  2000年   34篇
  1999年   45篇
  1998年   18篇
  1997年   9篇
  1996年   11篇
  1995年   10篇
  1994年   15篇
  1993年   9篇
  1992年   14篇
  1991年   11篇
  1990年   10篇
  1989年   10篇
  1988年   18篇
  1987年   41篇
  1986年   56篇
  1985年   9篇
  1980年   1篇
  1979年   5篇
排序方式: 共有5646条查询结果,搜索用时 15 毫秒
31.
Diamond-like carbon (DLC) layers deposited at room temperature in 13.56 MHz radio-frequency methane (CH4) plasma have been studied. The results of transient currents for DLC thin films are reported. The carrier's lifetime was determined based on the transient current analysis for the surface and bulk recombinations: trs=0.3 ms, trv=0.11 ms. These values seem to be relatively high for structures of this type. The diffusion length for DLC films L*=0.67×10−4 cm. Other parameters such as the diffusion coefficient D*=4×10−5 cm2/s and surface recombination rate S=0.37 cm/s are exceptionally small here.  相似文献   
32.
This paper proposes a self-embedding watermarking scheme that reduces the watermark payload significantly while maintaining good recovery quality and security. The embedded watermark contributes to the tamper detection and content recovery and is composed of only the compression codes of the image content. The compression codes with variable length are generated according to the roughness of the image. To improve the security, a chaos-based pseudorandom sequence generator is adopted to generate block-mapping sequence and encrypt compression codes. The proposed method takes into account the invisibility, recovery quality, and security using the flexible watermark payload, which preserves sufficient information of the image block with as few bits as possible. Experimental results demonstrate that the proposed scheme not only outperforms conventional self-embedding fragile watermarking algorithms in tamper detection and recovery, but also improve the security against the various counterfeiting attacks.  相似文献   
33.
This paper proposes an adaptive watermarking scheme for e-government document images. The adaptive scheme combines the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Genetic algorithm (GA), subsequently, is employed for the optimization of the scaling factor of the masking. Involving a number of steps, the scheme proposed through this study begins by calculating the mask of the host image using luminance masking. It is then continued by transforming the mask on each area into all frequencies domain. The watermark image, following this, is embedded by modifying the singular values of DCT-transformed host image with singular values of mask coefficient of host image and the control parameter of DCT-transformed watermark image using Genetic Algorithm (GA). The use of both the singular values and the control parameter respectively, in this case, is not only to improve the sensitivity of the watermark performance but also to avoid the false positive problem. The watermark image, afterwards, is extracted from the distorted images. The experiment results show the improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks.  相似文献   
34.
Two schemes via different entangled resources as the quantum channel are proposed to realize remote preparation of an arbitrary four-particle \(\chi \) -state with high success probabilities. To design these protocols, some useful and general measurement bases are constructed, which have no restrictions on the coefficients of the prepared states. It is shown that through a four-particle projective measurement and two-step three-particle projective measurement under the novel sets of mutually orthogonal basis vectors, the original state can be prepared with the probability 50 and 100 %, respectively. And for the first scheme, the special cases of the prepared state that the success probability reaches up to 100 % are discussed by the permutation group. Furthermore, the present schemes are extended to the non-maximally entangled quantum channel, and the classical communication costs are calculated.  相似文献   
35.
利用IKONOS影像对红格钒钛磁铁矿区的矿山地质环境进行监测,结合实地调查资料,利用模糊数学综合评价法建立了研究区的评价指标体系,并对研究区矿山地质环境进行了综合评价。以研究区内5个规模较大的矿山为评价单元,得到白草铁矿、潘家田铁矿和小黑箐铁矿的矿山地质环境评价等级为Ⅰ(好),优于阳雀箐铁矿的Ⅱ(一般)和红格铁矿的Ⅲ(较差)。研究成果可为矿山地质环境评价、矿产资源合理开发及矿山生态环境综合整治等工作提供参考。  相似文献   
36.
In this paper, the control synthesis problem for a class of large‐scale systems with multi‐modes that are called large‐scale switched systems is addressed. By introducing the concept of decentralized switching signal and the relevant decentralized average dwell time, the asymptotic stability and weighted ?2 gain performance are investigated. It should be noted that the decentralized switching covers general switching cases for large‐scale switched systems, namely, it admits both time‐dependent switching signal and arbitrary switching signal blended in the decentralized switching. Then, on the basis of the analysis results, the decentralized weighted control scheme including state feedback controller gains and switching signals is studied. Several design algorithms are proposed to meet different controller design problems. Finally, numerical examples are provided to illustrate theoretical findings within this paper. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
37.
38.
韧性断裂准则在板料成形中应用研究进展   总被引:1,自引:0,他引:1  
对板料成形中的成形极限应力图、最大变薄率、成形极限图以及韧性断裂准则等预测成形极限的方法进行了综述和分析,提出了利用韧性断裂准则能够较好地预测塑性差的板料成形极限,而且还能考虑应变路径的变化.利用有限元方法模拟时,韧性断裂准则既可以运用到完全耦合的弹塑性损伤模型的增量方法中,也可以运用到一步有限元逆算法中.指出了为准确地预测成形极限,除了提高有限元模拟精度外,应找到一种本质地反映材料性能的准则.  相似文献   
39.
应用copula函数来表示由两类失效部件组成的相依串联系统和相依并联系统的可靠性,并对这两种系统的可靠性进行比较,得到了使这两种相依系统的可靠性之间的大小关系成立的一些条件.  相似文献   
40.
基于FCM的驾驶行为险态辨识模型   总被引:1,自引:0,他引:1  
为实现险性驾驶行为的有效辨识,以事故发生概率为依据,在对驾驶行为状态予以险态分级的前提下,采用单因子方差分析进行险态辨识主因子析取,并基于模糊C均值聚类法构建了险态行为辨识模型。最后,结合实例对模型予以试算,并采用样本回代对模型进行了验证。结果表明,模型误差率为2.5%。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号