首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62216篇
  免费   10292篇
  国内免费   6165篇
电工技术   5696篇
技术理论   2篇
综合类   5424篇
化学工业   2267篇
金属工艺   1354篇
机械仪表   4373篇
建筑科学   1993篇
矿业工程   1011篇
能源动力   684篇
轻工业   4675篇
水利工程   448篇
石油天然气   1346篇
武器工业   1088篇
无线电   18360篇
一般工业技术   4394篇
冶金工业   774篇
原子能技术   649篇
自动化技术   24135篇
  2024年   605篇
  2023年   1729篇
  2022年   2739篇
  2021年   3002篇
  2020年   2980篇
  2019年   2366篇
  2018年   2060篇
  2017年   2700篇
  2016年   2874篇
  2015年   3269篇
  2014年   4875篇
  2013年   4256篇
  2012年   5226篇
  2011年   5498篇
  2010年   4104篇
  2009年   3999篇
  2008年   4119篇
  2007年   4445篇
  2006年   3634篇
  2005年   3034篇
  2004年   2268篇
  2003年   1873篇
  2002年   1382篇
  2001年   1035篇
  2000年   864篇
  1999年   657篇
  1998年   581篇
  1997年   446篇
  1996年   432篇
  1995年   315篇
  1994年   245篇
  1993年   205篇
  1992年   177篇
  1991年   146篇
  1990年   121篇
  1989年   64篇
  1988年   65篇
  1987年   29篇
  1986年   38篇
  1985年   34篇
  1984年   31篇
  1983年   34篇
  1982年   21篇
  1981年   23篇
  1980年   20篇
  1979年   7篇
  1978年   7篇
  1977年   6篇
  1959年   5篇
  1951年   4篇
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
81.
Gd2O3:Eu3+@CsPbBr3 quantum dots (QDs) mesoporous hollow nanocomposites with good luminescent properties and high stability were built. Among which, the hollow Gd2O3:Eu3+ spheres and CsPbBr3 QDs were prepared by urea homogeneous precipitation and hot-injection method, respectively. Finally, the Gd2O3:Eu3+@CsPbBr3 QDs shell–core compounds were constructed through mechanical stirring. The structure, morphology, stability and luminescent properties were studied by Fourier transform infrared spectroscopy (FT-IR), differential scanning calorimetry/thermogravity (DSC/TG), X-ray diffraction (XRD), field-emission scanning electron microscopy (FE-SEM), transmission electron microscopy (TEM), photoluminescence excitation/photoluminescence (PLE/PL) and life decay tools. Compared to the original CsPbBr3 QDs, Gd2O3:Eu3+@CsPbBr3 QDs display better photostability, thermal stability and current stability. The resulting Gd2O3:Eu3+@CsPbBr3 QDs composite exhibits good yellow emission. The Gd2O3:Eu3+@CsPbBr3 QDs mixed silicone resin was directly coated on the blue LED chip, then the w-LED device with the color coordinate of (0.31, 0.32) was successfully assembled. The Gd2O3:Eu3+@CsPbBr3 QDs compounds with excellent luminescent properties and stability are expected to be widely used in lighting and display areas.  相似文献   
82.
Six distillation column models have been used in studies of the usefulness of the Inverse Nyquist Array (INA) method for design of dual composition control for distillation. Five of the column models are experimental, one describing an industrial column, the others four pilot plants. One column model is obtained by modeling from first principles.

The control strategies investigated and compared are multiloop SISO, 2-way decoupling and l-way decoupling. The control variables are the standard ones, i.e. reflux flow and boilup.

In most of the cases INA has been found to be a useful tool for design of the loops and for comparison of the different control approaches. INA has also been found to be useful for simultaneous tuning of the decouplers and the feedback controllers.

For 2-way decoupling the criterion to minimize interaction at the critical frequency for each primary feedback loop has been found useful in most, but not all, cases. The scheme can be designed by pure gains in the decouplers and there is no reason to introduce dynamics into the decouplers—the systems studied are already sufficiently rich in dynamics.

INA has been found to be a suitable vehicle for the choice between the two possible l-way decoupling schemes.

With the design approach taken, l-way decoupling has been found to provide considerably better control quality than 2-way decoupling in two of the six systems, the differences in control quality being small in the other cases.

The effect of model mismatching on the results, caused e.g. by process nonlinearities, is discussed and simple rules to decrease the parameter sensitivity for 2-way decoupling schemes are given. When model mismatching is considered, the advantage of l-way decoupling over 2-way decoupling seems to increase.

One deficiency of the INA design as used in this paper is that it does not single out the design which is to be preferred on the grounds of robustness.  相似文献   
83.
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQLIA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQLIA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods.  相似文献   
84.
非理想虹膜图像往往存在虹膜边缘模糊、灰度变化不均匀、位置偏移及光斑干扰等问题, 这些问题的存在会在一定程度上影响虹膜内、外边界定位的准确率. 针对这个问题, 本文提出采用并查集和边缘检测模板的方法来对非理想虹膜进行内、外边界定位. 内边界定位是首先采用并查集方法完成瞳孔区域粗定位, 然后采用Hough变换对瞳孔进行精确定位; 外边界定位是先利用一系列边缘检测模板大致确定外圆的位置, 然后再依据外边界附近圆环内边缘点的密度来最终完成外边界的精确定位. 实验结果表明, 对于非理想虹膜图像, 本文方法的定位正确率和定位速度均高于其他同类方法.  相似文献   
85.
为了解决攻击点在能量迹中具体位置的识别问题,在对侧信道碰撞攻击技术研究的基础上,提出了通过计算能量迹中每个采样点的方差来识别攻击点的方差检查技术。并利用基于相关系数的碰撞检测方法,对一种AES的FPGA实现实施了攻击。实验结果表明,方差检查技术可以有效地识别攻击点在能量迹中的具体位置。  相似文献   
86.
Despite the successes in the last two decades, the state-of-the-art face detectors still have problems in dealing with images in the wild due to large appearance variations. Instead of leaving appearance variations directly to statistical learning algorithms, we propose a hierarchical part based structural model to explicitly capture them. The model enables part subtype option to handle local appearance variations such as closed and open month, and part deformation to capture the global appearance variations such as pose and expression. In detection, candidate window is fitted to the structural model to infer the part location and part subtype, and detection score is then computed based on the fitted configuration. In this way, the influence of appearance variation is reduced. Besides the face model, we exploit the co-occurrence between face and body, which helps to handle large variations, such as heavy occlusions, to further boost the face detection performance. We present a phrase based representation for body detection, and propose a structural context model to jointly encode the outputs of face detector and body detector. Benefit from the rich structural face and body information, as well as the discriminative structural learning algorithm, our method achieves state-of-the-art performance on FDDB, AFW and a self-annotated dataset, under wide comparisons with commercial and academic methods.  相似文献   
87.
Behavioral cues to deception are instrumental in detecting deception. As one of the primary sources of deception behavior, text has been analyzed at the level of sub-sentence or message but not the discourse of interaction. Additionally, empirical studies on cues to deception in the case of multiple receivers remain nonexistent. To fill these voids, we propose a discourse framework and six hypotheses about deception behaviors in a multi-receiver environment. The deception behaviors are operationalized by discourse features based on an analysis of real-world data. The results of statistical analysis validate the efficacy of discourse features in discriminating deceivers from truth-tellers.  相似文献   
88.
In a large-scale locality-driven network such as in modular robotics and wireless sensor networks, knowing the state of a local area is sometimes necessary due to either interactions being local and driven by neighborhood proximity or the users being interested in the state of a certain region. We define locality-aware predicates (LAP) that aim at detecting a predicate within a specified area. We model the area of interest as the set of processes that are within a breadth-first search tree (BFST) of height kk rooted at the initiator process. Although a locality-aware predicate specifies a predicate only within a local area, observing the area consistently requires considering the entire system in a consistent manner. This raises the challenge of making the complexities of the corresponding predicate detection algorithms scale-free, i.e., independent of the size of the system. Since all existing algorithms for getting a consistent view of the system require either a global snapshot of the entire system or vector clocks of the size of the system, a new solution is needed. We focus on stable LAP, which are those LAP that remain true once they become true. We propose a scale-free algorithm to detect stable LAP within a kk-height BFST. Our algorithm can detect both stable conjunctive LAP and stable relational LAP. In the process of designing our algorithm, we also propose the first distributed algorithm for building a BFST within an area of interest in a graph, and the first distributed algorithm for recording a consistent sub-cut within the area of interest. This paper demonstrates that LAPs are a natural fit for detecting distributed properties in large-scale distributed systems, and stable LAPs can be practically detected at low cost.  相似文献   
89.
The manycore revolution can be characterized by increasing thread counts, decreasing memory per thread, and diversity of continually evolving manycore architectures. High performance computing (HPC) applications and libraries must exploit increasingly finer levels of parallelism within their codes to sustain scalability on these devices. A major obstacle to performance portability is the diverse and conflicting set of constraints on memory access patterns across devices. Contemporary portable programming models address manycore parallelism (e.g., OpenMP, OpenACC, OpenCL) but fail to address memory access patterns. The Kokkos C++ library enables applications and domain libraries to achieve performance portability on diverse manycore architectures by unifying abstractions for both fine-grain data parallelism and memory access patterns. In this paper we describe Kokkos’ abstractions, summarize its application programmer interface (API), present performance results for unit-test kernels and mini-applications, and outline an incremental strategy for migrating legacy C++ codes to Kokkos. The Kokkos library is under active research and development to incorporate capabilities from new generations of manycore architectures, and to address a growing list of applications and domain libraries.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号