首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   48253篇
  免费   6508篇
  国内免费   4985篇
电工技术   3854篇
技术理论   10篇
综合类   7021篇
化学工业   3090篇
金属工艺   1144篇
机械仪表   2970篇
建筑科学   3877篇
矿业工程   1650篇
能源动力   1527篇
轻工业   829篇
水利工程   1368篇
石油天然气   1150篇
武器工业   774篇
无线电   4832篇
一般工业技术   4964篇
冶金工业   2370篇
原子能技术   348篇
自动化技术   17968篇
  2024年   264篇
  2023年   927篇
  2022年   1325篇
  2021年   1604篇
  2020年   1821篇
  2019年   1631篇
  2018年   1700篇
  2017年   1909篇
  2016年   2060篇
  2015年   2145篇
  2014年   3016篇
  2013年   3443篇
  2012年   3515篇
  2011年   3843篇
  2010年   3078篇
  2009年   3128篇
  2008年   3272篇
  2007年   3450篇
  2006年   2923篇
  2005年   2459篇
  2004年   1941篇
  2003年   1589篇
  2002年   1333篇
  2001年   1061篇
  2000年   900篇
  1999年   823篇
  1998年   624篇
  1997年   538篇
  1996年   474篇
  1995年   451篇
  1994年   370篇
  1993年   307篇
  1992年   274篇
  1991年   207篇
  1990年   171篇
  1989年   184篇
  1988年   138篇
  1987年   73篇
  1986年   93篇
  1985年   76篇
  1984年   76篇
  1983年   54篇
  1982年   57篇
  1981年   45篇
  1980年   35篇
  1979年   35篇
  1978年   31篇
  1977年   28篇
  1964年   26篇
  1955年   35篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
991.
黄鹏飞  张道强 《电子学报》2008,36(Z1):50-54
 本文提出了一种用于聚类分析的加权聚类算法,通过利用拉普拉斯权,将聚类对象之间的结构信息自动转换为对象的权重.由于拉普拉斯权能够描述数据的邻域结构,从而能够更好的聚类.该加权聚类算法在性能上比经典聚类算法有较大改进,还具有对孤立点鲁棒、适合类别不平衡数据聚类、对聚类个数不敏感等优点.人工数据集以及UCI标准数据集上的实验证实了本文算法的可行性和有效性.  相似文献   
992.
Copy-move forgery is one of the most common image tampering schemes, with the potential use for misleading the opinion of the general public. Keypoint-based detection methods exhibit remarkable performance in terms of computational cost and robustness. However, these methods are difficult to effectively deal with the cases when 1) forgery only involves small or smooth regions, 2) multiple clones are conducted or 3) duplicated regions undergo geometric transformations or signal corruptions. To overcome such limitations, we propose a fast and accurate copy-move forgery detection algorithm, based on complex-valued invariant features. First, dense and uniform keypoints are extracted from the whole image, even in small and smooth regions. Then, these keypoints are represented by robust and discriminative moment invariants, where a novel fast algorithm is designed especially for the computation of dense keypoint features. Next, an effective magnitude-phase hierarchical matching strategy is proposed for fast matching a massive number of keypoints while maintaining the accuracy. Finally, a reliable post-processing algorithm is developed, which can simultaneously reduce false negative rate and false positive rate. Extensive experimental results demonstrate the superior performance of our proposed scheme compared with existing state-of-the-art algorithms, with average pixel-level F-measure of 94.54% and average CPU-time of 36.25 s on four publicly available datasets.  相似文献   
993.
Germanene, a 2D honeycomb germanium crystal, is grown at graphene/Ag(111) and hexagonal boron nitride (h-BN)/Ag(111) interfaces by segregating germanium atoms. A simple annealing process in N2 or H2/Ar at ambient pressure leads to the formation of germanene, indicating that an ultrahigh-vacuum condition is not necessary. The grown germanene is stable in air and uniform over the entire area covered with a van der Waals (vdW) material. As an important finding, it is necessary to use a vdW material as a cap layer for the present germanene growth method since the use of an Al2O3 cap layer results in no germanene formation. The present study also proves that Raman spectroscopy in air is a powerful tool for characterizing germanene at the interfaces, which is concluded by multiple analyses including first-principles density functional theory calculations. The direct growth of h-BN-capped germanene on Ag(111), which is demonstrated in the present study, is considered to be a promising technique for the fabrication of future germanene-based electronic devices.  相似文献   
994.
995.
Beyond the catalytic activity of nanocatalysts, the support with architectural design and explicit boundary could also promote the overall performance through improving the diffusion process, highlighting additional support for the morphology-dependent activity. To delineate this, herein, a novel mazelike-reactor framework, namely multi-voids mesoporous silica sphere (MVmSiO2), is carved through a top-down approach by endowing core-shell porosity premade Stöber SiO2 spheres. The precisely-engineered MVmSiO2 with peripheral one-dimensional pores in the shell and interconnecting compartmented voids in the core region is simulated to prove combined hierarchical and structural superiority over its analogous counterparts. Supported with CuZn-based alloys, mazelike MVmSiO2 nanoreactor experimentally demonstrated its expected workability in model gas-phase CO2 hydrogenation reaction where enhanced CO2 activity, good methanol yield, and more importantly, a prolonged stable performance are realized. While tuning the nanoreactor composition besides morphology optimization could further increase the catalytic performance, it is accentuated that the morphological architecture of support further boosts the reaction performance apart from comprehensive compositional optimization. In addition to the found morphological restraints and size-confinement effects imposed by MVmSiO2, active sites of catalysts are also investigated by exploring the size difference of the confined CuZn alloy nanoparticles in CO2 hydrogenation employing both in-situ experimental characterizations and density functional theory calculations.  相似文献   
996.
Public adoption of policies detailed on government websites is an important topic in the field of e-government research, and researchers have mainly focused on the key factors that influence initial adoption. However, there has been much less discussion on factors influencing the continued use of government websites. This study identifies and tests a theoretical model that predicts consumers’ intentions to continue using government portals, using a mixed methods approach based on Grounded Theory. To construct a theoretical framework of public interest in continued use of government information portals, we interviewed 56 respondents and coded the interview data. Next, we tested the resulting model using data collected from a questionnaire-based survey of 354 users. The Structural Equation Modeling (SEM) results indicate that continued use is influenced by psychological perception, user characteristics, service parameters of the government portals and the government’s idea. Of these, psychological perception was found to have the strongest effect. These findings enrich the theoretical system of e-government public adoption of intention and have important practical significance for the development of Chinese government portals.  相似文献   
997.
In mobile distributed applications, such as traffic alert dissemination, dynamic route planning, file sharing, and so on, vehicular ad hoc network (VANET) has emerged as a feasible solution in recent years. However, the performance of the VANET depends on the routing protocol in accord with the delay and throughput requirements. Many of the routing protocols have been extensively studied in the literature. Although there are exemptions, they escalate research challenges in traffic aware routing (TAR) protocol of VANET. This paper introduces the fractional glowworm swarm optimization (FGWSO) for the TAR protocol of VANET in an urban scenario that can identify the optimal path for the vehicle with less traffic density and delay time. The proposed FGWSO searches the optimal routing path based on the fitness function formulated in this paper. Fractional glowworm swarm optimization is the combination of the GWSO and fractional theory. Moreover, exponential weighted moving average is utilized to predict the traffic density and the speed of the vehicle, which is utilized as the major constraints in the fitness function of the optimization algorithm to find the optimal traffic aware path. Simulation of FGWSO shows the significant improvement with a minimal end‐to‐end delay of 6.6395 seconds and distance of 17.3962 m, respectively, in comparison with the other existing routing approaches. The simulation also validates the optimality of the proposed TAR protocol.  相似文献   
998.
Resource discovery on Internet‐of‐Things paradigm is an eminent challenge due to data‐specific activities with respect to foraging and sense‐making loops. The prerequisite to deal with the challenge is to process and analyze the data that require resources to be indexed, ranked, and stored in an efficient manner. A novel clustering technique is proposed to resolve the specified challenge. The technique, namely, iterative k‐means clustering algorithm, targets concrete cluster formation using similarity coefficients of vector space model and performs efficient search against matching criteria with respect to complexity. It is simulated on MATLAB, and the obtained results are compared with fuzzy k‐means and fuzzy c‐means clustering algorithm with similarity coefficients of vector space model against exponential increase in the number of resources.  相似文献   
999.
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency (RF) spectrum utilization. However, there are several challenges to realize them in real systems, such as sensing uncertainty causing issues to licensed users, business models for licensed service providers. Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum, offer improved coverage and capacity of networks, enhance network security and reduce energy consumption. With wireless virtualization, wireless networks' physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations (MVNOs). Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers (WIPs), virtualized wireless networks are vulnerable to a multitude of attacks, including jamming attacks and eavesdropping attacks. This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users, and eavesdroppers aim to reduce secrecy rates. Specifically, we consider a virtual wireless network where MVNO users' job is to improve their Signal to Interference plus Noise Ratio (SINR) while the jammers target to collectively enhance their Jammer Received Signal Strength (JRSS), and an eavesdropper's goal is to reduce the overall secrecy rate. Numerical results have demonstrated that the proposed game strategies are effective (in terms of data rate, secrecy rate and latency) against such attackers compared to the traditional approaches.  相似文献   
1000.
针对局域网路由器配置的实际问题,利用排队论相关知识,比较不同方案下的信息传输的平均时间,优化路由设计。将信息传输过程中的路由器分别建模为开的Jackson网络、串联排队网络和取消中间路由的排队网络,比较三种传输网络方式下的信息传输时间,得到最佳的路由选择方案。利用matlab通过蒙特卡洛对传输过程进行仿真,仿真结果验证了理论分析的正确性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号