首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   364487篇
  免费   41235篇
  国内免费   25104篇
电工技术   53783篇
技术理论   25篇
综合类   38283篇
化学工业   27675篇
金属工艺   12275篇
机械仪表   29399篇
建筑科学   25425篇
矿业工程   13377篇
能源动力   11742篇
轻工业   13154篇
水利工程   9423篇
石油天然气   11419篇
武器工业   5598篇
无线电   39741篇
一般工业技术   23307篇
冶金工业   10739篇
原子能技术   3246篇
自动化技术   102215篇
  2024年   1353篇
  2023年   4657篇
  2022年   9778篇
  2021年   12565篇
  2020年   10961篇
  2019年   8705篇
  2018年   8412篇
  2017年   11056篇
  2016年   13659篇
  2015年   15771篇
  2014年   24413篇
  2013年   21711篇
  2012年   27081篇
  2011年   27813篇
  2010年   21472篇
  2009年   21819篇
  2008年   22251篇
  2007年   27909篇
  2006年   24868篇
  2005年   21624篇
  2004年   17295篇
  2003年   15501篇
  2002年   11654篇
  2001年   9602篇
  2000年   7923篇
  1999年   6341篇
  1998年   4621篇
  1997年   3771篇
  1996年   3295篇
  1995年   2719篇
  1994年   2239篇
  1993年   1562篇
  1992年   1327篇
  1991年   941篇
  1990年   849篇
  1989年   676篇
  1988年   481篇
  1987年   291篇
  1986年   211篇
  1985年   213篇
  1984年   202篇
  1983年   158篇
  1982年   136篇
  1981年   118篇
  1980年   129篇
  1979年   73篇
  1978年   53篇
  1977年   51篇
  1962年   69篇
  1959年   48篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
This paper is the second one of the two papers entitled “Weighted Superposition Attraction (WSA) Algorithm”, which is about the performance evaluation of the WSA algorithm in solving the constrained global optimization problems. For this purpose, the well-known mechanical design optimization problems, design of a tension/compression coil spring, design of a pressure vessel, design of a welded beam and design of a speed reducer, are selected as test problems. Since all these problems were formulated as constrained global optimization problems, WSA algorithm requires a constraint handling method for tackling them. For this purpose we have selected 6 formerly developed constraint handling methods for adapting into WSA algorithm and analyze the effect of the used constraint handling method on the performance of the WSA algorithm. In other words, we have the aim of producing concluding remarks over the performance and robustness of the WSA algorithm through a set of computational study in solving the constrained global optimization problems. Computational study indicates the robustness and the effectiveness of the WSA in terms of obtained results, reached level of convergence and the capability of coping with the problems of premature convergence, trapping in a local optima and stagnation.  相似文献   
102.
CAN-BUS系统自问世以来,已将近30年,当代各品牌车辆纷纷采用,但大部分技术人员对CAN总线系统既熟悉又陌生。经常能听到,但具体操作又显得有些力不从心。本文通过对奇瑞A3品牌轿车CAN总线的巧妙应用,引导大家进一步理解和应用CAN总线。  相似文献   
103.
We present an optimization-based unsupervised approach to automatic document summarization. In the proposed approach, text summarization is modeled as a Boolean programming problem. This model generally attempts to optimize three properties, namely, (1) relevance: summary should contain informative textual units that are relevant to the user; (2) redundancy: summaries should not contain multiple textual units that convey the same information; and (3) length: summary is bounded in length. The approach proposed in this paper is applicable to both tasks: single- and multi-document summarization. In both tasks, documents are split into sentences in preprocessing. We select some salient sentences from document(s) to generate a summary. Finally, the summary is generated by threading all the selected sentences in the order that they appear in the original document(s). We implemented our model on multi-document summarization task. When comparing our methods to several existing summarization methods on an open DUC2005 and DUC2007 data sets, we found that our method improves the summarization results significantly. This is because, first, when extracting summary sentences, this method not only focuses on the relevance scores of sentences to the whole sentence collection, but also the topic representative of sentences. Second, when generating a summary, this method also deals with the problem of repetition of information. The methods were evaluated using ROUGE-1, ROUGE-2 and ROUGE-SU4 metrics. In this paper, we also demonstrate that the summarization result depends on the similarity measure. Results of the experiment showed that combination of symmetric and asymmetric similarity measures yields better result than their use separately.  相似文献   
104.
Some reports demonstrated successful genome editing in pigs by one-step zygote microinjection of mRNA of CRISPR/Cas9-related components. Given the relatively long gestation periods and the high cost of housing, the establishment of a single blastocyst-based assay for rapid optimization of the above system is required. As a proof-of-concept, we attempted to disrupt a gene (GGTA1) encoding the α-1,3-galactosyltransferase that synthesizes the α-Gal epitope using parthenogenetically activated porcine oocytes. The lack of α-Gal epitope expression can be monitored by staining with fluorescently labeled isolectin BS-I-B4 (IB4), which binds specifically to the α-Gal epitope. When oocytes were injected with guide RNA specific to GGTA1 together with enhanced green fluorescent protein (EGFP) and human Cas9 mRNAs, 65% (24/37) of the developing blastocysts exhibited green fluorescence, although almost all (96%, 23/24) showed a mosaic fluorescent pattern. Staining with IB4 revealed that the green fluorescent area often had a reduced binding activity to IB4. Of the 16 samples tested, six (five fluorescent and one non-fluorescent blastocysts) had indel mutations, suggesting a correlation between EGFP expression and mutation induction. Furthermore, it is suggested that zygote microinjection of mRNAs might lead to the production of piglets with cells harboring various mutation types.  相似文献   
105.
Ischemic and hemorrhagic strokes are associated with severe functional disability and high mortality. Except for recombinant tissue plasminogen activator, therapies targeting the underlying pathophysiology of central nervous system (CNS) ischemia and hemorrhage are strikingly lacking. Sur1-regulated channels play essential roles in necrotic cell death and cerebral edema following ischemic insults, and in neuroinflammation after hemorrhagic injuries. Inhibiting endothelial, neuronal, astrocytic and oligodendroglial sulfonylurea receptor 1–transient receptor potential melastatin 4 (Sur1–Trpm4) channels and, in some cases, microglial KATP (Sur1–Kir6.2) channels, with glibenclamide is protective in a variety of contexts. Robust preclinical studies have shown that glibenclamide and other sulfonylurea agents reduce infarct volumes, edema and hemorrhagic conversion, and improve outcomes in rodent models of ischemic stroke. Retrospective studies suggest that diabetic patients on sulfonylurea drugs at stroke presentation fare better if they continue on drug. Additional laboratory investigations have implicated Sur1 in the pathophysiology of hemorrhagic CNS insults. In clinically relevant models of subarachnoid hemorrhage, glibenclamide reduces adverse neuroinflammatory and behavioral outcomes. Here, we provide an overview of the preclinical studies of glibenclamide therapy for CNS ischemia and hemorrhage, discuss the available data from clinical investigations, and conclude with promising preclinical results that suggest glibenclamide may be an effective therapeutic option for ischemic and hemorrhagic stroke.  相似文献   
106.
分析了全球微波接入互存(WiMAX)的技术特点和算法复杂度,探讨了其在电源监控系统中的应用,提出了基于Inter WiMAX Connection 2250技术的远程电源监控系统。在讨论WiMAX物理层算法的基础上,确定了以正交频分多址(OFDMA)模式为主体的物理层通信协议,提高了信道的利用率,抑制了码间干扰,为构建电源监控系统打下了良好的基础。  相似文献   
107.
The main purpose of this paper is to survey some recent progresses on control theory for stochastic distributed parameter systems, i.e., systems governed by stochastic differential equations in infinite dimensions, typically by stochastic partial differential equations. We will explain the new phenomenon and difficulties in the study of controllability and optimal control problems for one dimensional stochastic parabolic equations and stochastic hyperbolic equations. In particular, we shall see that both the formulation of corresponding stochastic control problems and the tools to solve them may differ considerably from their deterministic/finite-dimensional counterparts. More importantly, one has to develop new tools, say, the stochastic transposition method introduced in our previous works, to solve some problems in this field.  相似文献   
108.
Reliability based criteria are quite popular for optimal sensor network design. We present a modified definition of system reliability for sensor network design for two applications: reliable estimation of variables in a steady state linear flow process, and reliable fault detection and diagnosis for any process. Unlike the weakest-link based definition of system reliability in the literature, the proposed definition considers the entire system and is consistent with the reliability concept used in classical reliability literature. For each application, dual approaches for defining system reliability are proposed, and their analogy with the reliability problem in the classical reliability literature is established. Using examples and stochastic simulations, the advantage of using the proposed system reliability in contrast to the existing definition is illustrated. Part II of this series of articles presents methods for efficient generation of the system reliability function and its use in optimization-based approaches for designing optimal sensor networks.  相似文献   
109.
赵宏  常兆斌  王乐 《计算机应用》2019,39(1):227-231
针对互联网中恶意域名攻击事件频发,现有域名检测方法实时性不强的问题,提出一种基于词法特征的恶意域名快速检测算法。该算法根据恶意域名的特点,首先将所有待测域名按照长度进行正则化处理后赋予权值;然后利用聚类算法将待测域名划分成多个小组,并利用改进的堆排序算法按照组内权值总和计算各域名小组优先级,根据优先级降序依次计算各域名小组中每一域名与黑名单上域名之间的编辑距离;最后依据编辑距离值快速判定恶意域名。算法运行结果表明,基于词法特征的恶意域名快速检测算法与单一使用域名语义和单一使用域名词法的恶意域名检测算法相比,准确率分别提高1.7%与2.5%,检测速率分别提高13.9%与6.8%,具有更高的准确率和实时性。  相似文献   
110.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号