首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69603篇
  免费   11148篇
  国内免费   7082篇
电工技术   7581篇
技术理论   5篇
综合类   6704篇
化学工业   4523篇
金属工艺   1724篇
机械仪表   4578篇
建筑科学   3013篇
矿业工程   1490篇
能源动力   1048篇
轻工业   5182篇
水利工程   770篇
石油天然气   1610篇
武器工业   1015篇
无线电   13773篇
一般工业技术   5639篇
冶金工业   1700篇
原子能技术   777篇
自动化技术   26701篇
  2024年   683篇
  2023年   1877篇
  2022年   2985篇
  2021年   3274篇
  2020年   3369篇
  2019年   2796篇
  2018年   2364篇
  2017年   2964篇
  2016年   3131篇
  2015年   3429篇
  2014年   5142篇
  2013年   4714篇
  2012年   5401篇
  2011年   5754篇
  2010年   4297篇
  2009年   4241篇
  2008年   4396篇
  2007年   4761篇
  2006年   4057篇
  2005年   3418篇
  2004年   2672篇
  2003年   2238篇
  2002年   1812篇
  2001年   1365篇
  2000年   1156篇
  1999年   986篇
  1998年   750篇
  1997年   636篇
  1996年   579篇
  1995年   450篇
  1994年   380篇
  1993年   340篇
  1992年   275篇
  1991年   204篇
  1990年   188篇
  1989年   111篇
  1988年   113篇
  1987年   59篇
  1986年   64篇
  1985年   49篇
  1984年   56篇
  1983年   48篇
  1982年   45篇
  1981年   33篇
  1980年   29篇
  1979年   26篇
  1978年   14篇
  1977年   11篇
  1964年   8篇
  1959年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
网络安全事件的关联分析方法的比较研究   总被引:2,自引:0,他引:2  
随着当前攻击手段和技术的日益复杂化,一次入侵事件往往需要多个步骤才能完成,这些步骤都是彼此相关的。但是传统的入侵检测集中于检测底层的入侵或异常,所检测到的结果也仅仅是一次完整入侵的一部分,所以不能将不同的报警结合起来以发现入侵的逻辑步骤或者入侵背后的攻击策略。关联分析技术将不同分析器上产生的报警进行融合与关联分析,极大地减少了报警的数量,降低了入侵检测的误报率,并且适当的减少了入侵检测的漏报率。文中在对网络安全事件关联分析方法的系统结构进行分析后,着重介绍了当前比较流行的几种网络安全事件关联分析方法,最后对各种方法进行了比较研究。  相似文献   
12.
在时变多径衰落信道下,接收到的CDMA信号功率变化较大,此时D-Rake盲自适应多用户检测器性能显著下降,将变步长LMS算法与基于主分量的相干合并引入到D-Rake(DecorrelatingRake)检测器中,构成一种变步长D-Rake,称之为VD-Rake(Variablestep-sizeDecorrelatingRake)检测器。该检测器能克服原D-Rake检测器对信号功率变化较敏感等缺点,有效地改善了D-Rake检测器的性能。  相似文献   
13.
基于扩展分形和CFAR特征融合的SAR图像目标识别   总被引:3,自引:0,他引:3  
研究了多信息融合技术在SAR图像目标识别中的应用。将扩展分形特征(Extended Fractal)与双参数恒虚警特征(Double Parameter CFAR)形成的多信息进行融合处理。运用Dempster-Shafer证据理论,在决策层对SAR图像中的像素进行识别分类。实验结果表明通过融合对像素分类的准确性明显好于单特征的检测结果,减少了虚警概率,提高了系统的识别能力。  相似文献   
14.
高功率脉冲水中放电的应用及其发展   总被引:7,自引:0,他引:7  
首先介绍了高功率脉冲水下放电的机理,然后综合论述了其应用和研究的状况,从较为成熟的脉冲水处理技术到医疗领域的ESWL应用技术,以及在脉冲电场食品杀菌和水下目标探测方面的最新发展和研究,最后指出了高功率脉冲电技术应用前景以及进行更系统和深入研究的必要性。  相似文献   
15.
美国固体照明技术进展概况   总被引:2,自引:0,他引:2  
马小军 《半导体技术》2006,31(1):8-11,14
介绍了美国能源部于2002年开始实施的固体照明(SSL)技术的"下一代照明计划".同时对美国SSL技术的研发、生产和使用现状以及召开学术会议的情况做了叙述.  相似文献   
16.
In this paper, we propose a new approach for signal detection in wireless digital communications based on the neural network with transient chaos and time-varying gain (NNTCTG), and give a concrete model of the signal detector after appropriate transformations and mappings. It is well known that the problem of the maximum likelihood signal detection can be described as a complex optimization problem that has so many local optima that conventional Hopfield-type neural networks fail to solve. By refraining from the serious local optima problem of Hopfield-type neural networks, the NNTCTG makes use of the time-varying parameters of the recurrent neural network to control the evolving behavior of the network so that the network undergoes the transition from chaotic behavior to gradient convergence. It has richer and more flexible dynamics rather than conventional neural networks only with point attractors, so that it can be expected to have much ability to search for globally optimal or near-optimal solutions. After going through a transiently inverse-bifurcation process, the NNTCTG can approach the global optimum or the neighborhood of global optimum of our problem. Simulation experiments have been performed to show the effectiveness and validation of the proposed neural network based method for the signal detection in digital communications.  相似文献   
17.
结合“98”抗洪抢险实例,对多种险情作了具体分析,通过汛后调查,对抗洪抢险消险措施和效果进行了总结,为今后进一步做好防洪消险工作提供了经验。  相似文献   
18.
This article deals with the kinetics of two-step anionic polymerization by way of a non-steady state method. Several molecular parameters can be evaluated using the formulae developed. A bimodal molecular weight distribution function for the resulting polymer is derived from the set of kinetic differential equations, which is in agreement with the experimental data reported.  相似文献   
19.
纳米级BaAl_2O_4微粉的制备和性质   总被引:2,自引:1,他引:1  
分别用溶胶 -凝胶法、低温固相反应法 ,制得了纳米级BaAl2 O4微粉 ,用电镜观察了其形貌和粒径的大小 ,用X-射线衍射仪进行了物相分析 ,测定了其纯度与晶型 ,讨论了制备方法与粒度大小的相互影响  相似文献   
20.
The earliest investigations on rubber elasticity, commencing in the 19th century, were necessarily limited to phenomenological interpretations. The realisation that polymers consist of very long molecular chains. commencing c. 1930, gave impetus to the molecular theory of rubber elasticity (1932-). according to which the high deformability of an elastomer, and the elastic force generated by deformation, stem from the configurations accessible to long molecular chains. Theories of rubber elasticity put forward from 1934-1946 relied on the assumption that the junctions of the rubber network undergo displacements that are affine in macroscopic strain. The theory of James and Guth (1947) dispensed with this premise, and demonstrated instead that the mean positions of the junctions of a ‘phantom’ network consisting of Gaussian chains devoid of material properties are affine in the strain. The vital significance of the distinction between the actual distribution of chain vectors in a network and their distribution if the junctions would be fixed at their mean positions went unnoticed for nearly 30 years. Experimental investigations, commencing with the incisive work of Gee in 1946. revealed large departures from the relationship of stress to strain predicted by the theories cited. This discrepancy prompted extensive studies, theoretical and experimental, during succeeding years. Inquiry into the fundamentals of polymer networks, formed for example by interlinking very long polymer molecules, exposed the need to take account of network imperfections, typically consisting of chains attached at only one end to a network junction. Various means were advocated to make corrections for these imperfections. The cycle rank ζ of the network has been shown (1976) to be the fundamental measure of its connectivity, regardless of the junction functionality and pattern of imperfections. Often overlooked is the copious interpenetration of the chains comprising typical elastomeric networks. Theories that attempt to represent such networks on a lattice are incompatible with this universal feature. Moreover, the dense interpenetration of chains may limit the ability of junctions in real networks to accommodate the fluctuations envisaged in the theory of phantom networks. It was suggested in 1975 that departures from the form predicted for the elastic equation of state are due to constraints on the fluctuations of junctions whose effect diminishes with deformation and with dilation. Formulation of a self-consistent theory based on this suggestion required recognition of the non-affine connection between the chain vector distribution function and the macroscopic strain in a real network, which may partake of characteristics of a phantom network in some degree. Implementation of the idea was achieved through postulation of domains of constraint affecting the equilibrium distribution of fluctuations of network junctions from their mean positions. This led in due course to a theory that accounts for the relationship of stress to strain virtually throughout the ranges of strain accessible to measurement. The theory establishes connections between structure and elastic properties. This is achieved with utmost frugality in arbitrary parameters.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号