首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29769篇
  免费   3157篇
  国内免费   1527篇
电工技术   2341篇
技术理论   7篇
综合类   4476篇
化学工业   2049篇
金属工艺   728篇
机械仪表   1308篇
建筑科学   2602篇
矿业工程   977篇
能源动力   812篇
轻工业   3562篇
水利工程   859篇
石油天然气   1107篇
武器工业   233篇
无线电   3531篇
一般工业技术   2340篇
冶金工业   806篇
原子能技术   357篇
自动化技术   6358篇
  2025年   199篇
  2024年   622篇
  2023年   601篇
  2022年   809篇
  2021年   889篇
  2020年   1127篇
  2019年   940篇
  2018年   815篇
  2017年   1019篇
  2016年   1109篇
  2015年   1256篇
  2014年   1823篇
  2013年   1795篇
  2012年   2220篇
  2011年   2249篇
  2010年   1730篇
  2009年   1682篇
  2008年   1745篇
  2007年   2005篇
  2006年   1740篇
  2005年   1401篇
  2004年   1093篇
  2003年   982篇
  2002年   767篇
  2001年   605篇
  2000年   537篇
  1999年   413篇
  1998年   413篇
  1997年   310篇
  1996年   274篇
  1995年   229篇
  1994年   222篇
  1993年   142篇
  1992年   162篇
  1991年   123篇
  1990年   81篇
  1989年   70篇
  1988年   57篇
  1987年   35篇
  1986年   24篇
  1985年   22篇
  1984年   14篇
  1983年   9篇
  1982年   11篇
  1981年   8篇
  1980年   8篇
  1964年   6篇
  1961年   5篇
  1960年   5篇
  1955年   10篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
As the result of vibration emission in air, a machine sound signal carries important information about the working condition of machinery. But in practice, the sound signal is typically received with a very low signal-to-noise ratio. To obtain features of the original sound signal, uncorrelated sound signals must be removed and the wavelet coefficients related to fault condition must be retrieved. In this paper, the blind source separation technique is used to recover the wavelet coefficients of a monitored source from complex observed signals. Since in the proposed blind source separation (BSS) algorithms it is generally assumed that the number of sources is known, the Gerschgorin disk estimator method is introduced to determine the number of sound sources before applying the BSS method. This method can estimate the number of sound sources under non-Gaussian and non-white noise conditions. Then, the partial singular value analysis method is used to select these significant observations for BSS analysis. This method ensures that signals are separated with the smallest distortion. Afterwards, the time-frequency separation algorithm, converted to a suitable BSS algorithm for the separation of a non-stationary signal, is introduced. The transfer channel between observations and sources and the wavelet coefficients of the source signals can be blindly identified via this algorithm. The reconstructed wavelet coefficients can be used for diagnosis. Finally, the separation results obtained from the observed signals recorded in a semi-anechoic chamber demonstrate the effectiveness of the presented methods .  相似文献   
2.
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the proxy group can produce the signcryption cryptogram. combines the functionality of threshold proxy signing and encryption. The proposed scheme combines the functionality of both threshold proxy signing and encryption, and provides fair protection for the sender and the proxy agents. This scheme is secure against attack of public key substitution. It also satisfies security properties such as confidentiality and authenticity.  相似文献   
3.
The impurity mechanism proposed earlier is used to interpret the magnetic properties of hightemperature superconductors. The appearance of superconductive granules and the existence of weak bonds in grains of ceramics and in single crystals is explained. The irreversibility line is obtained and its new interpretation as the line of thresholds of appearance of infinite nonsuperconductive cluster is given. The relaxation time of the magnetic susceptibility in alternating magnetic fields is calculated. The decrease of the Meissner fraction with increase in magnetic field and decrease in doping, and other magnetic properties are explained.  相似文献   
4.
图像分割是运动目标检测与跟踪技术必须要解决的问题,在很多时候它涉及到图像阈值的选取。文章采用的算法首先计算图像中不同区域的灰度均值,结合最小差值条件,反复修订由计算所得的阈值,从而达到自动选优的目的。在此基础上,文章进一步给出了用C++语言实现算法的关键代码。测试表明此方法选择阈值简便实用,图像的二值化效果良好。  相似文献   
5.
6.
学位具有学术价值、教育价值、管理价值等本体性价值,也具有个体价值与社会价值、工具性价值和目的性价值等派生性价值。当前人们在学位价值取向上存在着一些明显的错位和偏差。其具体表现有四点:一是重学位的“派生”性价值,轻学位的“本体”性价值;二是过分强调学位的教育价值和管理价值,而缺乏对学术价值应有地位的肯定;三是重学位的社会价值,轻学位的个体价值;四是重学位的工具性价值而忽视学位的目的性价值。导致这种错位现象产生的原因,不仅有教育系统内部因素,而且也与中国传统文化价值观和当前社会对人才的选拔、聘用政策有着直接的关系。  相似文献   
7.
环境问题与经济问题紧密相连,由于环境问题的综合性和复杂性,需要运用系统工程的方法和经济学原理,将环境问题置于整个经济系统中统筹考虑,建立相对完整的环境经济系统工程方法体系,将环境保护工作纳入经济社会发展中,使其成为决策中主要考虑的因素之一,并引起应有的重视。本研究从环境与经济承载力、环境投资的经济分析、环境与投资效率比较、环境资源的经济价值以及生态补偿与污染赔偿等方面构建环境经济系统工程的基本框架体系,并结合实际进行案例分析。研究表明,单纯的政府行政干预不如创造条件,如补偿、税收减免、投资、贴息等,使其具备在市场规则下.自动引导资源向环境保护与污染治理的投入,如排污指标的交易等。此外,自然资源是不可或缺的稀有资本,应该将保护生态系统及生物多样性纳入各级政府决策的主要方面。  相似文献   
8.
本研究目的在于探究战略网络生成中制造模式的推动作用。文章首先分析了制造模式在技术经济范式变迁中扮演的角色,总结出制造模式与技术经济范式之间的关系,接着运用数学抽象和哲学思辨的方法,提炼出人类历史上三次制造模式对技术经济范式的价值实现函数。基于该函数研究发现:精益生产中目的在于充分调动人的主观能动性,以实现人的解放的复合机制——现场管理、劳工关系管理和知识管理等体系是制造模式未来的发展方向;战略网络的演进服务于制造模式的价值实现功能,它的生成是为了弥补制造模式柔性不足的缺陷。  相似文献   
9.
A long and deep recession, coupled with continuous competitive pressure to reduce costs, is forcing many companies to review their test strategies. Testing costs have become a more significant proportion of the overall manufacturing cost even though manufacturing yields have increased dramatically over the past ten or twelve years. This causes attention to be focused on testing costs as a key source of cost reduction. The increased use of DFT and the integration of design and test are very positive moves towards controlling testing costs but other methods employed can often backfire. The increased use of low priced testers is one such method. The pressure to reduce costs, higher process yields and exhortations that testing adds no value can lead the test engineering manager to take the cheap route. In reality this can often turn out to be an expensive decision. The only way to avoid expensive mistakes is to perform an economic analysis of the alternative courses of action. In most cases this is done, but not always in the right manner or with the necessary amount of detail to make the comparisons meaningful. This article discusses the need for effective cost analysis of test strategies and highlights some of the pitfalls.  相似文献   
10.
Most of the current approaches to mixture modeling consider mixture components from a few families of probability distributions, in particular from the Gaussian family. The reasons of these preferences can be traced to their training algorithms, typically versions of the Expectation-Maximization (EM) method. The re-estimation equations needed by this method become very complex as the mixture components depart from the simplest cases. Here we propose to use a stochastic approximation method for probabilistic mixture learning. Under this method it is straightforward to train mixtures composed by a wide range of mixture components from different families. Hence, it is a flexible alternative for mixture learning. Experimental results are presented to show the probability density and missing value estimation capabilities of our proposal.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号