首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6169篇
  免费   257篇
  国内免费   256篇
电工技术   166篇
综合类   400篇
化学工业   118篇
金属工艺   202篇
机械仪表   522篇
建筑科学   327篇
矿业工程   139篇
能源动力   56篇
轻工业   144篇
水利工程   84篇
石油天然气   50篇
武器工业   33篇
无线电   799篇
一般工业技术   241篇
冶金工业   37篇
原子能技术   18篇
自动化技术   3346篇
  2024年   15篇
  2023年   92篇
  2022年   88篇
  2021年   146篇
  2020年   133篇
  2019年   106篇
  2018年   69篇
  2017年   100篇
  2016年   136篇
  2015年   180篇
  2014年   294篇
  2013年   287篇
  2012年   395篇
  2011年   405篇
  2010年   362篇
  2009年   427篇
  2008年   378篇
  2007年   414篇
  2006年   462篇
  2005年   433篇
  2004年   314篇
  2003年   347篇
  2002年   305篇
  2001年   189篇
  2000年   202篇
  1999年   116篇
  1998年   76篇
  1997年   34篇
  1996年   26篇
  1995年   27篇
  1994年   17篇
  1993年   18篇
  1992年   18篇
  1991年   8篇
  1990年   9篇
  1989年   9篇
  1988年   4篇
  1987年   1篇
  1986年   5篇
  1985年   6篇
  1984年   5篇
  1983年   6篇
  1982年   8篇
  1981年   5篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
排序方式: 共有6682条查询结果,搜索用时 15 毫秒
91.
特征编码是利用广义视觉词袋模型获得图像稀疏表示的关键步骤。本文研究了两种常用的局部线性特征编码方法即LLC及NSLLC编码方法,并针对其存在的问题,提出了一种利用编码系数非负性约束对其进行改进的方法——NNLLC,并将其应用于图像分类任务中。实验结果表明,该方法能有效改进局部线性特征编码性能,提高图像特征的可区分性,相比于LLC及NSLLC特征编码方法,在图像分类任务中取得了更高的平均分类准确率。  相似文献   
92.
93.
To avert potential crisis from Japan’s aging infrastructure and declining birth rate, the Japanese Government is planning to introduce robotic technology for the inspection of social infrastructure (such as pipes, dams, and bridges). Recording underwater positions is a difficult task for human divers who undertake conventional dam inspections. This study presents the Anchor Diver 5.2 system for efficient and effectual dam inspection. Anchor Diver 5.2 is based on an extended-tether-maneuvered remotely operated vehicle (ROV) equipped with cameras. The ROV is lowered into water by a hoist system from a boat and implements a visual survey of the concrete underwater structure. To improve the visibility of the ROV in murky and cloudy water, a novel concept named Water Loupe is proposed. In addition, a simple boat-fixing method is proposed to provide a stable base on the water surface, and the underwater position of the ROV, which cannot be accessed by global positioning systems, is recorded using a feasible localization method. Finally, the developed system was evaluated in field experiments conducted in the Amagase Dam, Japan, and its merits and problems are discussed.  相似文献   
94.
利用MicrosoftVisualC作为集成开发程序,开发一个具有信息录入、信息查询、排序、信息修改等基本功能,学生信息管理系统。  相似文献   
95.
许永达 《计算机系统应用》2013,22(3):153-156,181
C语言指针的有些错误在程序编译阶段难以发现,且现行教材主要从概念、理论上对指针错误进行讲述,存在不足.分析了带有此类错误的示例程序,并在VISUAL C++6.0进行调试,展示此类指针错误的错误现象,分析其产生的原因,提出正确使用指针的方法,以达到预防此类指针错误发生的目的.  相似文献   
96.
This study investigated the effect of moving from small offices to a landscape environment for 19 Visual Display Unit (VDU) operators at Alcatel Denmark AS. The operators reported significantly improved lighting condition and glare situation. Further, visual discomfort was also significantly reduced on a Visual Analogue Scale (VAS). There was no significant correlation between lighting condition and visual discomfort neither in the small offices nor in the office landscape. However, visual discomfort correlated significantly with glare in small offices i.e. more glare is related to more visual discomfort. This correlation disappeared after the lighting system in the office landscape had been improved. There was also a significant correlation between glare and itching of the eyes as well as blurred vision in the small offices, i.e. more glare more visual symptoms. Experience of pain was found to reduce the subjective assessment of work capacity during VDU tasks. There was a significant correlation between visual discomfort and reduced work capacity in small offices and in the office landscape. When moving from the small offices to the office landscape, there was a significant reduction in headache as well as back pain. No significant changes in pain intensity in the neck, shoulder, forearm, and wrist/hand were observed.The pain levels in different body areas were significantly correlated with subjective assessment of reduced work capacity in small offices and in the office landscape.By careful design and construction of an office landscape with regard to lighting and visual conditions, transfer from small offices may be acceptable from a visual-ergonomic point of view.  相似文献   
97.
98.
Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure.  相似文献   
99.
Security under man-in-the-middle attacks is extremely important when protocols are executed on asynchronous networks, as the Internet. Focusing on interactive proof systems, one would like also to achieve unconditional soundness, so that proving a false statement is not possible even for a computationally unbounded adversarial prover. Motivated by such requirements, in this paper we address the problem of designing constant-round protocols in the plain model that enjoy simultaneously non-malleability (i.e., security against man-in-the-middle attacks) and unconditional soundness (i.e., they are proof systems).We first give a construction of a constant-round one-many (i.e., one honest prover, many honest verifiers) concurrent non-malleable zero-knowledge proof (in contrast to argument) system for every NP language in the plain model. We then give a construction of a constant-round concurrent non-malleable witness-indistinguishable proof system for every NP language. Compared with previous results, our constructions are the first constant-round proof systems that in the plain model guarantee simultaneously security against some non-trivial concurrent man-in-the-middle attacks and against unbounded malicious provers.  相似文献   
100.
The protection of patients’ health information is a very important issue in the information age. Health Insurance Portability and Accountability Act (HIPAA) of privacy and security regulations are two crucial provisions in the protection of healthcare privacy, especially electronic medical information. For the quality and efficiency of the electronic services, it is necessary to construct better performance for the user and the trusted party. Based on elliptic curve cryptography (ECC) and complying with HIPAA regulations, this article presents an efficient key management scheme to facilitate inter-operations among the applied cryptographic mechanisms. In addition, the proposed scheme can achieve the complete functionality which includes: (1) a dictionary of key tables is not required for users and other units; (2) users can freely choose their own passwords; (3) users can freely update their passwords after the registration phase; (4) the computational cost is very low for users and the trusted center or server; (5) users are able to access their individual medical information through the authorization process; (6) case of consent exceptions intended to facilitate emergency applications or other possible exceptions can also be dealt with easier.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号