首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   420篇
  免费   22篇
  国内免费   3篇
电工技术   4篇
化学工业   65篇
金属工艺   9篇
机械仪表   10篇
建筑科学   20篇
能源动力   33篇
轻工业   45篇
水利工程   3篇
石油天然气   1篇
无线电   45篇
一般工业技术   99篇
冶金工业   9篇
原子能技术   2篇
自动化技术   100篇
  2023年   13篇
  2022年   27篇
  2021年   48篇
  2020年   24篇
  2019年   21篇
  2018年   33篇
  2017年   17篇
  2016年   22篇
  2015年   11篇
  2014年   15篇
  2013年   34篇
  2012年   30篇
  2011年   26篇
  2010年   19篇
  2009年   15篇
  2008年   18篇
  2007年   10篇
  2006年   12篇
  2005年   6篇
  2004年   3篇
  2003年   3篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1997年   3篇
  1996年   3篇
  1995年   1篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1984年   5篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1975年   1篇
排序方式: 共有445条查询结果,搜索用时 15 毫秒
1.
Wireless Personal Communications - Underwater Wireless Sensor Networks (UWSNs) are playing a vital role in exploring the unseen underwater (UW) natural resources. However, performance evaluation of...  相似文献   
2.
3.
Neural Processing Letters - Political optimizer (PO) is a recently proposed human-behavior inspired meta-heuristic, which has shown tremendous performance on complex multimodal functions as well as...  相似文献   
4.
Isotropic conductive adhesives (ICAs) have recently received a lot of focus and attention from the researchers in electronics industry as a potential substitute to lead-bearing solders. Numerous studies have shown that ICAs possess many advantages over conventional soldering such as environmental friendliness, finer pitch printing, lower temperature processing and more flexible and simpler processing. However, complete replacement of soldering by ICAs is yet not possible owing to several limitations of ICAs which are mainly related to reliability aspects like limited impact resistance, unstable contact resistance, low adhesion and conductivity etc. Continued efforts for last 15 years have resulted in development of ICAs with improved properties. This review article is aimed at providing a better understanding of ICAs, their principles, performance and significant research and development work addressing the technological utility of ICAs.  相似文献   
5.
Mutations of ras oncogenes in 37 human stomach cancers and 13 adenomas were investigated with regard to the histological phenotypes using polymerase chain reaction (PCR), allele-specific oligonucleotide hybridization and/or direct sequencing of the PCR products. The ras mutation was found only in one case (2.7%), the histology of which was poorly differentiated adenocarcinoma. We found no mutation in stomach adenomas. The mutation consisted of a guanine-to-adenine transition in the first base of codon 13 of c-Ki-ras which replaced wild-type glycine with serine, indicating that a putative glycine-to-aspartic acid change is not necessarily the critical event for c-Ki-ras gene activation in codon 13. These results further confirm the infrequency of ras mutation in stomach tumors and also suggest that ras mutations are not specific to the differentiated type of stomach cancer.  相似文献   
6.
A comprehensive Arabic handwritten text database is an essential resource for Arabic handwritten text recognition research. This is especially true due to the lack of such database for Arabic handwritten text. In this paper, we report our comprehensive Arabic offline Handwritten Text database (KHATT) consisting of 1000 handwritten forms written by 1000 distinct writers from different countries. The forms were scanned at 200, 300, and 600 dpi resolutions. The database contains 2000 randomly selected paragraphs from 46 sources, 2000 minimal text paragraph covering all the shapes of Arabic characters, and optionally written paragraphs on open subjects. The 2000 random text paragraphs consist of 9327 lines. The database forms were randomly divided into 70%, 15%, and 15% sets for training, testing, and verification, respectively. This enables researchers to use the database and compare their results. A formal verification procedure is implemented to align the handwritten text with its ground truth at the form, paragraph and line levels. The verified ground truth database contains meta-data describing the written text at the page, paragraph, and line levels in text and XML formats. Tools to extract paragraphs from pages and segment paragraphs into lines are developed. In addition we are presenting our experimental results on the database using two classifiers, viz. Hidden Markov Models (HMM) and our novel syntactic classifier.  相似文献   
7.

The present article introduced a novel idea for information hiding namely steganography. We have used new notions for the construction of the nonlinear component for block cipher based on inverse LA-semigroups. This nonlinear component fundamentally provides confidentiality in the proposed steganographic algorithm. The construction of the algorithm is fundamentally twofold. Firstly, we have constructed a novel scheme to design confusion component namely substitution box (S-box). Secondly, we have utilized the anticipated nonlinear component in digital steganography. The suggested algorithm is tested for different standard digital images. The authentication of the proposed algorithm is confirmed through statistical analysis.

  相似文献   
8.
In this paper, a new class of additive codes which is referred to as ?2 ?2[u]-additive codes is introduced. This is a generalization towards another direction of recently introduced ?2 ?4-additive codes [J. Borges, C. Fernández-Córdoba, J. Pujol, J. Rif´a, and M. Villanueva, ?2 ?4-linear codes: Generator matrices and duality, Designs Codes Cryptogr. 54(2) (2010), pp. 167–179]. ?2 ?4-additive codes have shown to provide a promising class of codes with their algebraic structure and applications such as steganography. The standard generator matrices are established and by introducing orthogonality the parity-check matrices are also obtained. A MacWilliams-type identity that relates the weight enumerator of a code with its dual is proved. Furthermore, a Gray map that maps these codes to binary codes is defined and some examples of optimal codes which are the binary Gray images of ?2 ?2[u]-additive codes are presented.  相似文献   
9.
10.
We present a scheme for the implementation of three-qubit Grover’s algorithm using four-level superconducting quantum interference devices (SQUIDs) coupled to a superconducting resonator. The scheme is based on resonant, off-resonant interaction of the cavity field with SQUIDs and application of classical microwave pulses. We show that adjustment of SQUID level spacings during the gate operations, adiabatic passage, and second-order detuning are not required that leads to faster implementation. We also show that the marked state can be searched with high fidelity even in the presence of unwanted off-resonant interactions, level decay, and cavity dissipation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号