首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19812篇
  免费   1128篇
  国内免费   1097篇
电工技术   351篇
技术理论   1篇
综合类   872篇
化学工业   1057篇
金属工艺   355篇
机械仪表   1257篇
建筑科学   1570篇
矿业工程   502篇
能源动力   200篇
轻工业   873篇
水利工程   176篇
石油天然气   244篇
武器工业   111篇
无线电   1995篇
一般工业技术   589篇
冶金工业   497篇
原子能技术   203篇
自动化技术   11184篇
  2024年   34篇
  2023年   211篇
  2022年   318篇
  2021年   427篇
  2020年   433篇
  2019年   334篇
  2018年   346篇
  2017年   448篇
  2016年   610篇
  2015年   581篇
  2014年   1139篇
  2013年   1014篇
  2012年   1116篇
  2011年   1598篇
  2010年   1089篇
  2009年   1094篇
  2008年   1180篇
  2007年   1342篇
  2006年   1374篇
  2005年   1102篇
  2004年   1002篇
  2003年   1011篇
  2002年   810篇
  2001年   610篇
  2000年   482篇
  1999年   454篇
  1998年   382篇
  1997年   263篇
  1996年   230篇
  1995年   195篇
  1994年   108篇
  1993年   112篇
  1992年   86篇
  1991年   69篇
  1990年   45篇
  1989年   52篇
  1988年   32篇
  1987年   32篇
  1986年   52篇
  1985年   45篇
  1984年   30篇
  1983年   27篇
  1982年   21篇
  1981年   28篇
  1980年   17篇
  1979年   13篇
  1978年   7篇
  1977年   7篇
  1976年   10篇
  1973年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
针对职业院校信息化建设的目标、误区、内容和共性问题提出了自己思考与观点。  相似文献   
72.
企业信息化作为国民经济信息化的基础,是当前推进国民经济信息化的重中之重。伴随全球信息化浪潮,我国煤矿企业信息化进程不断向深度和广度双向推进,但依然存在一些不尽人意的地方。本文首先分析了煤矿企业信息化的现状和制约信息化的原因,在此基础生展望了煤矿企业信息化的发展方向。  相似文献   
73.
本文针对国土资源管理的业务需求,设计出结构合理、功能全面的国土资源业务办公系统,并利用ArcEngine和C#加以实现,系统的建成使用极大地提高了国土资源管理工作效率。  相似文献   
74.
As the demand for high-quality stereo images has grown in recent years, stereoscopic image quality assessment (SIQA) has become an important research area in modern image processing technology.In this paper, we propose a no-reference stereoscopic image quality assessment (NR-SIQA) model using heterogeneous ensemble learning ‘quality-aware’ features from luminance image, chrominance image, disparity and cyclopean images via quaternion wavelet transform (QWT). Firstly, luminance image and chrominance image are generated by CIELAB color space as monocular perception, and the novel disparity and cyclopean images are utilized to complement with monocular information. Then, a number of ‘quality-aware’ features in the quaternion wavelet domain are discovered, including entropy, texture features, energy features, energy differences features and MSCN coefficients of high frequency sub-band. Finally, a heterogeneous ensemble model via support vector regression (SVR) & extreme learning machine (ELM) & random forest (RF) is proposed to predict quality score, and bootstrap sampling and rotated feature space are used to increase the diversity of data distribution. Comparing with the state-of-the-art NR-SIQA models, experimental results on four public databases prove the accuracy and robustness of the proposed model.  相似文献   
75.
High-performance aerospace component manufacturing requires stringent in-process geometrical and performance-based quality control. Real-time observation, understanding and control of machining processes are integral to optimizing the machining strategies of aerospace component manufacturing. Digital Twin can be used to model, monitor and control the machining process by fusing multi-dimensional in-context machining process data, such as changes in geometry, material properties and machining parameters. However, there is a lack of systematic and efficient Digital Twin modeling method that can adaptively develop high-fidelity multi-scale and multi-dimensional Digital Twins of machining processes. Aiming at addressing this challenge, we proposed a Digital Twin modeling method based on biomimicry principles that can adaptively construct a multi-physics digital twin of the machining process. With this approach, we developed multiple Digital Twin sub-models, e.g., geometry model, behavior model and process model. These Digital Twin sub-models can interact with each other and compose an integrated true representation of the physical machining process. To demonstrate the effectiveness of the proposed biomimicry-based Digital Twin modeling method, we tested the method in monitoring and controlling the machining process of an air rudder.  相似文献   
76.
Defect inspection of glass bottles in the beverage industrial is of significance to prevent unexpected losses caused by the damage of bottles during manufacturing and transporting. The commonly used manual methods suffer from inefficiency, excessive space consumption, and beverage wastes after filling. To replace the manual operations in the pre-filling detection with improved efficiency and reduced costs, this paper proposes a machine learning based Acoustic Defect Detection (LearningADD) system. Moreover, to realize scalable deployment on edge and cloud computing platforms, deployment strategies especially partitioning and allocation of functionalities need to be compared and optimized under realistic constraints such as latency, complexity, and capacity of the platforms. In particular, to distinguish the defects in glass bottles efficiently, the improved Hilbert-Huang transform (HHT) is employed to extend the extracted feature sets, and then Shuffled Frog Leaping Algorithm (SFLA) based feature selection is applied to optimize the feature sets. Five deployment strategies are quantitatively compared to optimize real-time performances based on the constraints measured from a real edge and cloud environment. The LearningADD algorithms are validated by the datasets from a real-life beverage factory, and the F-measure of the system reaches 98.48 %. The proposed deployment strategies are verified by experiments on private cloud platforms, which shows that the Distributed Heavy Edge deployment outperforms other strategies, benefited from the parallel computing and edge computing, where the Defect Detection Time for one bottle is less than 2.061 s in 99 % probability.  相似文献   
77.
基于不对称加密的网络信息安全对策研究   总被引:2,自引:0,他引:2  
本文对SSL VPN的原理与连接过程及优势作了详细的分析,通过SSL VPN客户端经过安全的身份验证和加密,从而有效保障了网络资源的安全性,并使用了一个实例H3C SSL VPN。  相似文献   
78.
信息网络技术在我军各个领域得到广泛应用。本文分析了军队信息安全面临的严峻形势,提出了军队信息安全的应对策略。  相似文献   
79.
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号