首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13634篇
  免费   1089篇
  国内免费   505篇
电工技术   2228篇
技术理论   1篇
综合类   861篇
化学工业   394篇
金属工艺   387篇
机械仪表   1114篇
建筑科学   778篇
矿业工程   282篇
能源动力   195篇
轻工业   125篇
水利工程   237篇
石油天然气   98篇
武器工业   122篇
无线电   2458篇
一般工业技术   1210篇
冶金工业   210篇
原子能技术   208篇
自动化技术   4320篇
  2024年   51篇
  2023年   218篇
  2022年   250篇
  2021年   364篇
  2020年   328篇
  2019年   209篇
  2018年   184篇
  2017年   302篇
  2016年   358篇
  2015年   358篇
  2014年   681篇
  2013年   610篇
  2012年   814篇
  2011年   1032篇
  2010年   727篇
  2009年   759篇
  2008年   786篇
  2007年   1058篇
  2006年   871篇
  2005年   880篇
  2004年   785篇
  2003年   633篇
  2002年   552篇
  2001年   394篇
  2000年   329篇
  1999年   303篇
  1998年   232篇
  1997年   210篇
  1996年   163篇
  1995年   141篇
  1994年   123篇
  1993年   87篇
  1992年   104篇
  1991年   76篇
  1990年   58篇
  1989年   44篇
  1988年   42篇
  1987年   25篇
  1986年   7篇
  1985年   25篇
  1984年   10篇
  1983年   13篇
  1982年   7篇
  1981年   8篇
  1980年   5篇
  1979年   4篇
  1974年   1篇
  1973年   1篇
  1964年   2篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
141.
生成式隐写通过生成足够自然或真实的含密样本来隐藏秘密消息,是信息隐藏方向的研究热点,但目前在视频隐写领域的研究还比较少。结合数字化卡登格的思想,提出一种基于深度卷积生成对抗网络(DCGAN)的半生成式视频隐写方案。该方案中,设计了基于DCGAN的双流视频生成网络,用来生成视频的动态前景、静态后景与时空掩模三个部分,并以随机噪声驱动生成不同的视频。方案中的发送方可设定隐写阈值,在掩模中自适应地生成数字化卡登格,并将其作为隐写与提取的密钥;同时以前景作为载体,实现信息的最优嵌入。实验结果表明,该方案生成的含密视频具有良好的视觉质量,Frechet Inception距离(FID)值为90,且嵌入容量优于现有的生成式隐写方案,最高可达0.11 bpp,能够更高效地传输秘密消息。  相似文献   
142.
143.
The introduction of digital twins is expected to fundamentally change the technology in transportation systems, as they appear to be a compelling concept for monitoring the entire life cycle of the transport system. The advent of widespread information technology, particularly the availability of real-time traffic data, provides the foundation for supplementing predominated (offline) microscopic simulation approaches with actual data to create a detailed real-time digital representation of the physical traffic. However, the use of actual traffic data in real-time motorway analysis has not yet been explored. The reason is that there are no supporting models and the applicability of real-time data in the context of microscopic simulations has yet to be recognized. Thus, this article focuses on microscopic motorway simulation with real-time data integration during system run-time. As a result, we propose a novel paradigm in motorway traffic modeling and demonstrate it using the continuously synchronized digital twin model of the Geneva motorway (DT-GM). We analyze the application of the microscopic simulator SUMO in modeling and simulating on-the-fly synchronized digital replicas of real traffic by leveraging fine-grained actual traffic data streams from motorway traffic counters as input to DT-GM. Thus, the detailed methodological process of developing DT-GM is presented, highlighting the calibration features of SUMO that enable (dynamic) continuous calibration of running simulation scenarios. By doing so, the actual traffic data are directly fused into the running DT-GM every minute so that DT-GM is continuously calibrated as the physical equivalent changes. Accordingly, DT-GM raises a technology dimension in motorway traffic simulation to the next level by enabling simulation-based control optimization during system run-time that was previously unattainable. It, thus, forms the foundation for further evolution of real-time predictive analytics as support for safety–critical decisions in traffic management. Simulation results provide a solid basis for the future real-time analysis of an extended Swiss motorway network.  相似文献   
144.
该文提出了一种增强型PTP光纤级联精细时频同步方法,该方法以PTP同步技术为基础,结合同步以太网时钟传递技术和基于数字双混频时差法的多级级联精细时钟同步技术,对PTP技术进行改进和增强,然后基于该方法,通过多级时频设备光纤级联的形式实现多节点、大跨度、网络化的时频信号传递与同步输出,并解决多级级联情况下同步精度会逐级恶化的问题,实现ns量级的系统时间同步精度,保证系统各环节在高度统一的时间尺度下进行高效同步与联动工作。通过设计、试验,验证了该方法的可行性和有效性。  相似文献   
145.
The rise of big data and the fluid boundaries of digital products are driving companies to use business analytics (BA) to power their customer involvement. The complementarity view offers unique competence to generate value from BA because capability complementarity is less likely to be replicated or imitated. Unlike prior studies on BA-enabled value realization, our research investigates the interactions of BA and customer involvement capabilities using the complementarity view. We tested our model using data collected from 317 IT companies in China. Our results suggest that BA value realization requires both a top-down mechanism in which BA skills provide global guidance for alignment with a company’s goals and a bottom-up mechanism in which BA culture empowers local autonomy for adaptation to ever-changing needs. Our BA-complemented mechanisms provide research and practice with a way to concurrently use BA and customer involvement capabilities to address the duality of digital innovation. We further suggest that BA skills are necessary but insufficient for digital innovation because BA culture demonstrates a stronger effect in complementing organizations’ existing capabilities than BA skills do.  相似文献   
146.
With business ecosystems digitalizing by the force of digital innovation, the deployment of boundary resources (such as application programming interfaces: APIs) becomes a strategic option across contexts. We distinguish between boundary resources that provide access openness and those that provide resource openness, and theorize the antecedents and consequences of their deployment. Employing panel data regressions to a longitudinal cross-industry dataset, we find that the digital knowledge base of the focal firm and the existence of potential digital complementors drive boundary resource deployment. Such deployment benefits firm performance depending on the firm’s market power. From our empirical analysis, we reveal a differentiated perspective on the quality of the confined openness provided by boundary resources as well as the embeddedness of their deployment in the rationales and motivations of the associated actors in digital business ecosystems. We complement the existent theoretical framework on boundary resources and provide valuable insights to managers reflecting about deploying boundary resources in a beneficial way.  相似文献   
147.
Modern information technologies and in particular the internet have revolutionized the patent information professionals' work in terms of speed of access and information comprehensiveness from both company internal and external digital sources. Here, I describe how the digital mindmapping technique can be used to complement existing intellectual property management software solutions to meet the challenge of optimizing and managing patent search workflows as well as to rapidly organise and access highly dynamic, heterogeneous and scattered patent information sources. Both eye catching and highly memorable and at the same time self-explanatory mindmapping examples are presented. These were designed to include basic and advanced level digital mindmapping features tailored to significantly speed up and maintain a high work quality level of patent search professionals. A special emphasis is put on the great benefit of organising and accessing the plethora of internet-based worldwide online patent registers through mindmapping, both in terms of managing the constantly changing deep links to the actual search options for e.g., legal status information, and keeping track of the offered level of content.  相似文献   
148.
《工程(英文)》2018,4(1):29-39
With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas.  相似文献   
149.
Analyzable data capturing physical entity activities is a prerequisite for complex hospital operational decision-makings. However, there is a lack of effective strategies to integrate real-time data from multiple sources for efficient clinical and non-clinical operations in healthcare settings. Drawing on previous explorations of digital twins that facilitate real-time feedback of physical entities, we propose a conceptual framework of digital twinning for smart hospitals, with identified information needs and enabling technologies. A pilot platform is developed and tested in a Shanghai municipal hospital. The results indicate that the digital twinning method enables continuous real-time control of related operational tasks, and further promotes the development of digitization, automation, and intelligence in hospital operations.  相似文献   
150.
Considering that random fluctuations can affect the rolling process of cold rolling mills, leading to abnormal cold mill performance and defects in the rolled product. Therefore, it is crucial to study the influence of random fluctuations on the system of cold rolling mills. In this paper, taking a model of the vertical vibration of a four-roller cold rolling mill under harmonic excitation as a prototype class for a real system, the effects of random fluctuations on the system response are analyzed. Firstly, based on the deterministic vertical vibration model of a four-roller cold rolling mill under harmonic excitation, a stochastic vertical vibration model of a four-roller cold rolling mill with random fluctuation as Gaussian white noise is introduced. Subsequently, the vertical vibration model of a four-roller rolling mill is theoretically analyzed by the averaging method and the stochastic averaging method, respectively. The effectiveness of the proposed theoretical method is verified by numerical simulation results, and the influences of harmonic excitation and random excitation on the system response are also investigated in detail. Finally, the results show that the noise induces the occurrence of stochastic transitions and bifurcations, and the steady-state probability density function and time history diagrams are given to further explain the existence of these dynamic phenomena. The related research can provide theoretical guidance for the realization of vibration control and reliability design in the four-roller cold rolling mill system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号