首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   108869篇
  免费   18011篇
  国内免费   9852篇
电工技术   16604篇
技术理论   10篇
综合类   12671篇
化学工业   3536篇
金属工艺   2013篇
机械仪表   5668篇
建筑科学   4187篇
矿业工程   2669篇
能源动力   2272篇
轻工业   1470篇
水利工程   2051篇
石油天然气   1825篇
武器工业   1074篇
无线电   24963篇
一般工业技术   4468篇
冶金工业   1642篇
原子能技术   292篇
自动化技术   49317篇
  2025年   4篇
  2024年   2608篇
  2023年   2828篇
  2022年   4661篇
  2021年   4997篇
  2020年   4985篇
  2019年   3590篇
  2018年   3014篇
  2017年   3550篇
  2016年   3745篇
  2015年   4266篇
  2014年   7348篇
  2013年   6505篇
  2012年   8205篇
  2011年   8407篇
  2010年   6661篇
  2009年   6979篇
  2008年   7375篇
  2007年   8269篇
  2006年   6870篇
  2005年   6151篇
  2004年   5087篇
  2003年   4467篇
  2002年   3479篇
  2001年   2975篇
  2000年   2274篇
  1999年   1843篇
  1998年   1323篇
  1997年   1080篇
  1996年   883篇
  1995年   686篇
  1994年   498篇
  1993年   315篇
  1992年   206篇
  1991年   137篇
  1990年   107篇
  1989年   95篇
  1988年   60篇
  1987年   31篇
  1986年   29篇
  1985年   35篇
  1984年   19篇
  1983年   20篇
  1982年   27篇
  1981年   7篇
  1980年   4篇
  1979年   8篇
  1965年   2篇
  1959年   4篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
无线传感器网络在军事和民用领域得到广泛的应用。由于传感器节点的资源有限以及通信的开放性使得其安全性显得尤为重要。出于对能量消耗的考虑,目前的路由协议设计得比较简单,作者对路由的安全性能以及可能受到的攻击进行分析,并给出相应的防范对策。  相似文献   
92.
For a non-idealized machine tool, each point in the workspace is associated with a tool point positioning error vector. If this error map can be determined, then it is possible to substantially improve the positioning performance of the machine by introducing suitable compensation into the control loop. This paper explores the possibility of using an artifical neural network (ANN) to compute this mapping. The training set for the ANN is obtained by mounting a physical artifact whose dimensions are precisely known in the machine's workspace. The machine, equipped with a touch trigger probe, measures the positions of features on the artifact. The difference between the machine reading and the known dimension is the machine error at that point in the workspace. Using standard modeling techniques, the kinematic error model for a CNC turning center was developed. This model was parameterized by measurement of the parametric error functions using a laser interferometer, electronic levels and a precision square. The kinematic model was then used to simulate the artifact-measuring process and develop the ANN training set. The effect of changing artifact geometry was explored and a machining operation was simulated using the ANN output to provide compensation. The results show that the ANN is capable of learning the error map of a real machine, and that ANN-based compensation can significantly reduce part-dimensional errors.  相似文献   
93.
Ship surveillance plays an important role in ensuring the safety of maritime transportation and navigation. Due to the influence of factors such as waves and special weather, the existing detection methods still cannot balance the accuracy, speed and the parameters of the model in the changeable and complex marine environment. To solve this problem, this paper proposes an improved real-time method based on YOLOv5, which has few parameters and achieves high detection accuracy with little memory and computation cost. Collaborative Attention (CA) mechanism is added to the network structure, which enables the model to more accurately locate and identify target regions. We also design a Spatial Pyramid Pooling module (SPP) and a weighted pyramid network called Bidirectional Feature Pyramid Network (BiFPN) based on the characteristics of the ships to better fuse feature information. Transformer encoder is introduced to capture long-distance dependencies and preserve global and local features to the greatest extent. Furthermore, the ability of our proposed structure to localize objects at each stage is improved through integrating the output of multiple modules. The experimental results show that, the comprehensive performance of this method is better than the existing technology in ship detection on different evaluation criteria.  相似文献   
94.
In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating the pathways using multiple criteria and analytics. We present a Group Adaptive Hybrid Routing Algorithm (GAHRA) for gathering portability, which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile situations. Based on this aspect, the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach, with the objectives of enhancing the output of MANET routing computation in each hub. Simulation analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications.  相似文献   
95.
In this paper, a finite-time optimal tracking control scheme based on integral reinforcement learning is developed for partially unknown nonlinear systems. In order to realize the prescribed performance, the original system is transformed into an equivalent unconstrained system so as to a composite system is constructed. Subsequently, a modified nonlinear quadratic performance function containing the auxiliary tracking error is designed. Furthermore, the technique of experience replay is used to update the critic neural network, which eliminates the persistent of excitation condition in traditional optimal methods. By combining the prescribed performance control with the finite-time optimization control technique, the tracking error is driven to a desired performance in finite time. Consequently, it has been shown that all signals in the partially unknown nonlinear system are semiglobally practical finite-time stable by stability analysis. Finally, the provided comparative simulation results verify the effectiveness of the developed control scheme.  相似文献   
96.
This paper proposes an improved sine–cosine algorithm (ISCA) based 2-DOF-PID controller for load frequency control. A three-area test system is built for study, while some physical constraints (nonlinearities) are considered for the investigation of a realistic power system. The proposed method is used as the parameter optimizer of the LFC controller in different scenarios. The 2-DOF-PID controllers are used because of their capability of fast disturbance rejection without significant increase of overshoot in set-point tracking. The 2-DOF-PID controllers’ efficacy is observed by examining the responses with the outcomes obtained with PID and FOPID controllers. The simulation results with the suggested scheme are correlated with some of the existing algorithms, such as SCA, SSA, ALO, and PSO in three different scenarios, i.e., a disturbance in two areas, in three areas, and in the presence of physical constraints. In addition, the study is extended to a four-area power system. Statistical analysis is performed using the Wilcoxon Sign Rank Test (WSRT) on 20 independent runs. This confirms the supremacy of the proposed method.  相似文献   
97.
While the internet has a lot of positive impact on society, there are negative components. Accessible to everyone through online platforms, pornography is, inducing psychological and health related issues among people of all ages. While a difficult task, detecting pornography can be the important step in determining the porn and adult content in a video. In this paper, an architecture is proposed which yielded high scores for both training and testing. This dataset was produced from 190 videos, yielding more than 19 h of videos. The main sources for the content were from YouTube, movies, torrent, and websites that hosts both pornographic and non-pornographic contents. The videos were from different ethnicities and skin color which ensures the models can detect any kind of video. A VGG16, Inception V3 and Resnet 50 models were initially trained to detect these pornographic images but failed to achieve a high testing accuracy with accuracies of 0.49, 0.49 and 0.78 respectively. Finally, utilizing transfer learning, a convolutional neural network was designed and yielded an accuracy of 0.98.  相似文献   
98.
The diagnosis of COVID-19 requires chest computed tomography (CT). High-resolution CT images can provide more diagnostic information to help doctors better diagnose the disease, so it is of clinical importance to study super-resolution (SR) algorithms applied to CT images to improve the resolution of CT images. However, most of the existing SR algorithms are studied based on natural images, which are not suitable for medical images; and most of these algorithms improve the reconstruction quality by increasing the network depth, which is not suitable for machines with limited resources. To alleviate these issues, we propose a residual feature attentional fusion network for lightweight chest CT image super-resolution (RFAFN). Specifically, we design a contextual feature extraction block (CFEB) that can extract CT image features more efficiently and accurately than ordinary residual blocks. In addition, we propose a feature-weighted cascading strategy (FWCS) based on attentional feature fusion blocks (AFFB) to utilize the high-frequency detail information extracted by CFEB as much as possible via selectively fusing adjacent level feature information. Finally, we suggest a global hierarchical feature fusion strategy (GHFFS), which can utilize the hierarchical features more effectively than dense concatenation by progressively aggregating the feature information at various levels. Numerous experiments show that our method performs better than most of the state-of-the-art (SOTA) methods on the COVID-19 chest CT dataset. In detail, the peak signal-to-noise ratio (PSNR) is 0.11 dB and 0.47 dB higher on CTtest1 and CTtest2 at SR compared to the suboptimal method, but the number of parameters and multi-adds are reduced by 22K and 0.43G, respectively. Our method can better recover chest CT image quality with fewer computational resources and effectively assist in COVID-19.  相似文献   
99.
100.
随着互联网用户的剧增,网络安全成为困扰中国互联网健康发展的重要问题之一。与此同时,日趋严重的网络泄密问题已逐渐成为与黑客入侵、病毒袭击、垃圾邮件、流氓插件并行的第五大网络安全隐患.从法律角度来看,网路泄密实质上是对网络隐私权的侵犯,笔者通过对网路隐私权的分析,从现行法律制度与未来法律制度来解读网络泄密。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号