首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16134篇
  免费   2738篇
  国内免费   2422篇
电工技术   798篇
技术理论   4篇
综合类   1176篇
化学工业   297篇
金属工艺   143篇
机械仪表   673篇
建筑科学   321篇
矿业工程   227篇
能源动力   169篇
轻工业   131篇
水利工程   251篇
石油天然气   140篇
武器工业   143篇
无线电   3377篇
一般工业技术   737篇
冶金工业   89篇
原子能技术   54篇
自动化技术   12564篇
  2024年   181篇
  2023年   549篇
  2022年   831篇
  2021年   962篇
  2020年   1051篇
  2019年   753篇
  2018年   756篇
  2017年   871篇
  2016年   984篇
  2015年   1163篇
  2014年   1767篇
  2013年   1403篇
  2012年   1574篇
  2011年   1337篇
  2010年   840篇
  2009年   765篇
  2008年   860篇
  2007年   909篇
  2006年   681篇
  2005年   627篇
  2004年   489篇
  2003年   421篇
  2002年   315篇
  2001年   274篇
  2000年   185篇
  1999年   161篇
  1998年   113篇
  1997年   90篇
  1996年   82篇
  1995年   55篇
  1994年   58篇
  1993年   30篇
  1992年   35篇
  1991年   20篇
  1990年   19篇
  1989年   14篇
  1988年   15篇
  1987年   8篇
  1986年   10篇
  1985年   5篇
  1984年   5篇
  1983年   7篇
  1982年   2篇
  1980年   3篇
  1979年   4篇
  1978年   1篇
  1977年   4篇
  1976年   1篇
  1972年   2篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
81.
在高地震烈度区的岩石高边坡抗震安全评价需要大规模数值计算,而现有商业软件无法有效解决这类复杂的工程问题,因此,本文开发了解决岩石高边坡接触稳定性问题的对等架构并行计算程序,并应用于泰山公司抽水蓄能电站上水库左岸边坡的静力和动力稳定性评价。在数值建模过程中,将岩石边坡滑块体、地质结构面、库水作用以及近场地基作为岩石高边坡动力接触系统。在稳定性安全评价中结合了有限元法、极限平衡法和接触算法,考虑影响高边坡稳定性的多种复杂因素,通过计算特定滑动面的安全系数或安全系数时程,基于现行水电工程水工建筑物抗震设计规范,完成了岩石高边坡稳定性评价,回避了求解复杂岩体材料非线性的问题。计算结果显示,所开发的程序具有较高的并行计算效率,对解决复杂岩石高边坡稳定问题具有显著的优势。  相似文献   
82.
The three-dimensional virtual scene can provide users with a visual three-dimensional virtual environment, with various multimedia channels such as sound, video, force feedback equipment, etc., to bring users a completely immersive interactive experience. This paper introduces 3D imaging and virtual reality technology in the film and television industry cloud exhibition, and develops a virtual display platform. First of all, this paper divides the registration into two processes: camera calibration and joint calibration of the camera and laser scanner based on the calibration results. Camera calibration can determine the plane model of the calibration board in the camera coordinate system, and the joint calibration uses the RANSAC algorithm to extract the point cloud of the plane model of the calibration board, and then optimizes the distance between the points in the plane model point cloud and the corresponding plane in the camera coordinate system Find the optimal transformation between the two sets of data, and then calculate the registration relationship between the point cloud and the image. Secondly, this article conducts a demand analysis of the film and television industry cloud exhibition platform based on virtual reality technology, including the business goals set by the platform, platform system analysis, overall design, and system operating environment and configuration requirements. This model provides a feasible solution for the visual interaction of the cloud exhibition design of the film and television industry.  相似文献   
83.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS.  相似文献   
84.
Defect inspection of glass bottles in the beverage industrial is of significance to prevent unexpected losses caused by the damage of bottles during manufacturing and transporting. The commonly used manual methods suffer from inefficiency, excessive space consumption, and beverage wastes after filling. To replace the manual operations in the pre-filling detection with improved efficiency and reduced costs, this paper proposes a machine learning based Acoustic Defect Detection (LearningADD) system. Moreover, to realize scalable deployment on edge and cloud computing platforms, deployment strategies especially partitioning and allocation of functionalities need to be compared and optimized under realistic constraints such as latency, complexity, and capacity of the platforms. In particular, to distinguish the defects in glass bottles efficiently, the improved Hilbert-Huang transform (HHT) is employed to extend the extracted feature sets, and then Shuffled Frog Leaping Algorithm (SFLA) based feature selection is applied to optimize the feature sets. Five deployment strategies are quantitatively compared to optimize real-time performances based on the constraints measured from a real edge and cloud environment. The LearningADD algorithms are validated by the datasets from a real-life beverage factory, and the F-measure of the system reaches 98.48 %. The proposed deployment strategies are verified by experiments on private cloud platforms, which shows that the Distributed Heavy Edge deployment outperforms other strategies, benefited from the parallel computing and edge computing, where the Defect Detection Time for one bottle is less than 2.061 s in 99 % probability.  相似文献   
85.
86.
In the robotic eye-in-hand measurement system, a hand-eye calibration method is essential. From the perspective of 3D reconstruction, this paper first analyzes the influence of the line laser sensor hand-eye calibration error on the 3D reconstructed point clouds error. Based on this, considering the influence of line laser sensor measurement errors and the need for high efficiency and convenience in robotic manufacturing systems, this paper proposes a 3D reconstruction-based robot line laser hand-eye calibration method. In this method, combined with the point cloud registration technique, the newly defined error-index more intuitively reflects the calibration result than traditional methods. To raise the performance of the calibration algorithm, a Particle Swarm Optimization - Gaussian Process (PSO-GP) method is adopted to improve the efficiency of the calibration. The experiments show that the Root Mean Square Error (RMSE) of the reconstructed point cloud can reach 0.1256 mm when using the proposed method, and the reprojection error is superior to those using traditional hand-eye calibration methods.  相似文献   
87.
Nowadays, cities are the most relevant type of human settlement and their population has been endlessly growing for decades. At the same time, we are witnessing an explosion of digital data that capture many different aspects and details of city life. This allows detecting human mobility patterns in urban areas with more detail than ever before. In this context, based on the fusion of mobility data from different and heterogeneous sources, such as public transport, transport‐network connectivity and Online Social Networks, this study puts forward a novel approach to uncover the actual land use of a city. Unlike previous solutions, our work avoids a time‐invariant approach and it considers the temporal factor based on the assumption that urban areas are not used by citizens all the time in the same manner. We have tested our solution in two different cities showing high accuracy rates.  相似文献   
88.
同态加密可以满足计算外包、数据共享、数据交易等应用对隐私保护计算的需要,但是同态加密的高计算开销限制了它在实际生产中的应用.本文从硬件卸载的角度解决同态加密的高性能计算问题,基于Intel QAT加速卡实现了一个半同态加密的高性能异步卸载框架QHCS. QHCS通过重构同态加密应用的软件栈来实现高效的异步卸载,并通过引入协程机制、批量加密技术等实现加密性能的最大化.本文同时给出了偏好不同性能指标(吞吐量、延迟)的两种卸载方案.进一步地,在由GPU及QAT组成的异构计算系统中,利用QHCS完整地实现了一个隐私保护的线性回归应用.实验结果表明,QHCS的吞吐量是目前软件实现的110倍,在百万量级的高维数据上实施隐私保护的线性回归计算只需十几分钟,可以较好地满足实际应用的需要.  相似文献   
89.
桌面云是云计算的一种典型应用,能够有效提高资源利用率和维护效率,使人们应用桌面系统的方式发生了深刻变革。但是随着桌面云的广泛应用,如何集中管理和统一认证用户身份成为了桌面云面临的挑战。文章通过分析传统单点登录和桌面云认证技术,提出了一种基于桌面云的统一身份认证模式.并对该架构的优势进行了分析。  相似文献   
90.
云存储安全增强系统的设计与实现   总被引:1,自引:0,他引:1  
云存储是一种新型的网络存储形式,并逐步为大家所接受,企业和个人用户都开始使用云存储作为其网络存储媒介。目前很多著名的IT企业都推出了云存储服务,其中Amazon公司推出的SimpleStorageService(S3)就是商用云存储服务的典型代表。随着云存储的广泛使用,云存储中数据的安全问题,如数据泄漏和数据篡改,也成了用户广泛关注的问题。文章基于Amazons3的云存储服务,设计并实现了一款云存储安全增强系统,对用户上传至Amazons3的数据进行加密保护,使得文件以密文形式存储于Amazons3,可以有效防止数据在传输和存储过程中的泄漏;同时系统还对从s3下栽的文件进行完整性校验,检测其内容与上传时是否一致,以防止文件被篡改;最后,系统还提供了多用户访问控制支持,多个用户可以共享同一个S3账号,同时保证各自存储的内容互相隔离,禁止一个用户非授权访问其他用户存储的文件。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号