首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   40386篇
  免费   5012篇
  国内免费   3704篇
电工技术   5175篇
技术理论   8篇
综合类   4439篇
化学工业   2898篇
金属工艺   765篇
机械仪表   1307篇
建筑科学   2014篇
矿业工程   1027篇
能源动力   994篇
轻工业   998篇
水利工程   748篇
石油天然气   739篇
武器工业   342篇
无线电   6898篇
一般工业技术   2717篇
冶金工业   928篇
原子能技术   342篇
自动化技术   16763篇
  2024年   242篇
  2023年   620篇
  2022年   963篇
  2021年   1229篇
  2020年   1449篇
  2019年   1262篇
  2018年   1061篇
  2017年   1357篇
  2016年   1477篇
  2015年   1528篇
  2014年   3040篇
  2013年   2739篇
  2012年   3150篇
  2011年   3430篇
  2010年   2531篇
  2009年   2539篇
  2008年   2663篇
  2007年   2898篇
  2006年   2644篇
  2005年   2222篇
  2004年   1848篇
  2003年   1615篇
  2002年   1246篇
  2001年   970篇
  2000年   800篇
  1999年   655篇
  1998年   437篇
  1997年   405篇
  1996年   348篇
  1995年   288篇
  1994年   273篇
  1993年   237篇
  1992年   180篇
  1991年   124篇
  1990年   117篇
  1989年   75篇
  1988年   72篇
  1987年   37篇
  1986年   39篇
  1985年   40篇
  1984年   48篇
  1983年   40篇
  1982年   36篇
  1981年   18篇
  1980年   15篇
  1979年   20篇
  1978年   9篇
  1977年   7篇
  1960年   5篇
  1959年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
131.
基于MODIS - NDVI 数据,辅以线性回归法与分段线性回归法,并借助ArcGIS 软件,对辽宁 省2000—2014 年植被覆盖的动态演变过程进行分析。结果表明: ( 1) 时间上,辽宁省植被NDVI 在年 际尺度上呈现出明显的增大趋势,2005 年出现突变,多年平均NDVI 值为0. 496; 春季、夏季、秋季 以及植被生长季NDVI 突变年份分别为2006 年、2005 年、2009 年和2004 年,秋季波动变化的突变点 明显滞后; 植被生长最旺盛的季节为夏季,且集中于8 月。( 2) 空间上,辽宁省植被覆盖具有明显的 地域性差异,呈现出东部高、中西部低的分布特征; 辽宁省植被覆盖优良区与辽东山地的界限基本吻 合,植被覆盖贫乏区主要集中在朝阳市和阜新市的东北部地区。( 3) 辽宁省植被覆盖程度呈山地阴坡 高于阳坡的形态,并且植被覆盖程度最好的坡向为北偏西方向。( 4) 2000—2014 年辽宁省植被覆盖度 整体以维持现状和轻微改善为主,保持不变的区域集中于中东部地区,辽阳市与沈阳市一带有轻微退 化现象,辽西北地区改善情况较为明显。  相似文献   
132.
1H dipolar decoupled 13C n.m.r. experiments with the aid of the magic angle spinning technique have been used to determine the graft content and the isomer content of the polybutadiene grafts in a graft copolymer with isotactic polypropylene.  相似文献   
133.
Phosphorus modification of ZSM-5 leads to extra framework P5+ and probably incorporation of +3 valence state of P in the framework. The resulting system has increased Brønsted acidity. Theoretical calculations also favour the postulate that phosphorus in +3 valence state can be incorporated into the lattice.  相似文献   
134.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
135.
Career visual searchers such as radiologists and airport security screeners strive to conduct accurate visual searches, but despite extensive training, errors still occur. A key difference between searches in radiology and airport security is the structure of the search task: Radiologists typically scan a certain number of medical images (fixed objective), and airport security screeners typically search X-rays for a specified time period (fixed duration). Might these structural differences affect accuracy? We compared performance on a search task administered either under constraints that approximated radiology or airport security. Some displays contained more than one target because the presence of multiple targets is an established source of errors for career searchers, and accuracy for additional targets tends to be especially sensitive to contextual conditions. Results indicate that participants searching within the fixed objective framework produced more multiple-target search errors; thus, adopting a fixed duration framework could improve accuracy for career searchers.  相似文献   
136.
The secure operation of autonomous vehicle networks in the presence of adversarial observation is examined, in the context of a canonical double-integrator-network (DIN) model. Specifically, we study the ability of a sentient adversary to estimate the full network’s state, from noisy local measurements of vehicle motions. Algebraic, spectral, and graphical characterizations are provided, which indicate the critical role of the inter-vehicle communication topology and control scheme in achieving security.  相似文献   
137.
Experiences applying standards in personal health devices (PHDs) show an inherent trade-off between interoperability and costs (in terms of processing load and development time). Therefore, reducing hardware and software costs as well as time-to-market is crucial for standards adoption. The ISO/IEEE11073 PHD family of standards (also referred to as X73PHD) provides interoperable communication between PHDs and aggregators. Nevertheless, the responsibility of achieving inexpensive implementations of X73PHD in limited resource microcontrollers falls directly on the developer. Hence, the authors previously presented a methodology based on patterns to implement X73-compliant PHDs into devices with low-voltage low-power constraints. That version was based on multitasking, which required additional features and resources. This paper therefore presents an event-driven evolution of the patterns-based methodology for cost-effective development of standardized PHDs. The results of comparing between the two versions showed that the mean values of decrease in memory consumption and cycles of latency are 11.59% and 45.95%, respectively. In addition, several enhancements in terms of cost-effectiveness and development time can be derived from the new version of the methodology. Therefore, the new approach could help in producing cost-effective X73-compliant PHDs, which in turn could foster the adoption of standards.  相似文献   
138.
The improvement of safety and dependability in systems that physically interact with humans requires investigation with respect to the possible states of the user’s motion and an attempt to recognize these states. In this study, we propose a method for real-time visual state classification of a user with a walking support system. The visual features are extracted using principal component analysis and classification is performed by hidden Markov models, both for real-time fall detection (one-class classification) and real-time state recognition (multi-class classification). The algorithms are used in experiments with a passive-type walker robot called “RT Walker” equipped with servo brakes and a depth sensor (Microsoft Kinect). The experiments are performed with 10 subjects, including an experienced physiotherapist who can imitate the walking pattern of the elderly and people with disabilities. The results of the state classification can be used to improve fall-prevention control algorithms for walking support systems. The proposed method can also be used for other vision-based classification applications, which require real-time abnormality detection or state recognition.  相似文献   
139.
This paper proposes a quantification method for a comprehensive work flow in construction work for describing work states in more detail on the basis of analyzing state transitions of primitive static states (PSS), which consist of 16 symbolic work states defined by using on-off state of the lever operations and joint loads for the manipulator and end-effector. On the basis of the state transition rules derived from a transition-condition analysis, practical state transitions (PST), which are common and frequent transitions in arbitrary construction work, are defined. PST can be classified into essential state transition (EST) or nonessential state transitions (NST). EST extracts common phases of work progress and estimates positional relations between a manipulator and an object. NST reveals wasted movements that degrade the efficiency and quality of work. To evaluate comprehensive work flows modeled by combining EST and NST, work-analysis experiments using our instrumented setup were conducted. Results indicate that all the PSS definitely changes on the basis of PST under various work conditions, and work analysis using EST and NST easily reveals work characteristics and untrained tasks related to wasted movements.  相似文献   
140.
为了提高彩色图像加密的安全性和加密性能,设计了一种基于多混沌系统的彩色图像加密方法.将一个彩色图像分解为R、G、B三个灰度图像,使用MD5算法动态生成加密算法的初始值,然后使用三种不同的基于混沌的加密结构对三个图像进行加密.对R图像使用Feistel结构加密,其中Feistel结构的S一盒由Logistic混沌序列和Hyperhenon混沌序列组合产生;对G图像使用由Lorenz系统产生加密序列对图像进行代替和置换操作的加密结构;对B图像使用由分段线性混沌映射产生加密序列,然后加密图像的加密结构,再把加密后的图像结合起来生成加密后的图像.理论分析和实验结果表明,该加密方法能够较为有效地保证彩色图像加密的安全性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号