首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   25011篇
  免费   2542篇
  国内免费   1582篇
电工技术   1610篇
技术理论   2篇
综合类   3069篇
化学工业   1199篇
金属工艺   574篇
机械仪表   1753篇
建筑科学   3378篇
矿业工程   874篇
能源动力   625篇
轻工业   695篇
水利工程   650篇
石油天然气   535篇
武器工业   174篇
无线电   2136篇
一般工业技术   1312篇
冶金工业   569篇
原子能技术   160篇
自动化技术   9820篇
  2024年   58篇
  2023年   178篇
  2022年   350篇
  2021年   473篇
  2020年   571篇
  2019年   503篇
  2018年   494篇
  2017年   600篇
  2016年   880篇
  2015年   971篇
  2014年   2071篇
  2013年   1524篇
  2012年   1784篇
  2011年   1961篇
  2010年   1652篇
  2009年   1549篇
  2008年   1631篇
  2007年   2007篇
  2006年   1773篇
  2005年   1541篇
  2004年   1240篇
  2003年   1044篇
  2002年   736篇
  2001年   569篇
  2000年   497篇
  1999年   404篇
  1998年   304篇
  1997年   268篇
  1996年   266篇
  1995年   268篇
  1994年   185篇
  1993年   121篇
  1992年   109篇
  1991年   109篇
  1990年   74篇
  1989年   86篇
  1988年   68篇
  1987年   35篇
  1986年   22篇
  1985年   25篇
  1984年   27篇
  1983年   16篇
  1982年   6篇
  1981年   12篇
  1979年   6篇
  1977年   7篇
  1976年   7篇
  1963年   10篇
  1961年   8篇
  1957年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
《工程爆破》2022,(1):47-49
介绍电气化铁路既有线无隔墙台阶爆破扩堑方法。沿既有线方向设置低台阶 ,边界处布置光爆孔 ,采用“同列同段和列间微差”的起爆网路。采用自制的“炮被”和架设“钢管排架”阻挡飞石、滚石和滑石 ,确保了既有线的安全。文中还概述了“炮被”和“钢管排架”的制做以及作者的认识和体会。  相似文献   
3.
High dimensionality in real-world multi-reservoir systems greatly hinders the application and popularity of evolutionary algorithms, especially for systems with heterogeneous units. An efficient hierarchical optimization framework is presented for search space reduction, determining the best water distributions, not only between cascade reservoirs, but also among different types of hydropower units. The framework is applied to the Three Gorges Project (TGP) system and the results demonstrate that the difficulties of multi-reservoir optimization caused by high dimensionality can be effectively solved by the proposed hierarchical method. For the day studied, power output could be increased by 6.79 GWh using an optimal decision with the same amount of water actually used; while the same amount of power could be generated with 2.59 × 107 m3 less water compared to the historical policy. The methodology proposed is general in that it can be used for other reservoir systems and other types of heterogeneous unit generators.  相似文献   
4.
Reliability based criteria are quite popular for optimal sensor network design. We present a modified definition of system reliability for sensor network design for two applications: reliable estimation of variables in a steady state linear flow process, and reliable fault detection and diagnosis for any process. Unlike the weakest-link based definition of system reliability in the literature, the proposed definition considers the entire system and is consistent with the reliability concept used in classical reliability literature. For each application, dual approaches for defining system reliability are proposed, and their analogy with the reliability problem in the classical reliability literature is established. Using examples and stochastic simulations, the advantage of using the proposed system reliability in contrast to the existing definition is illustrated. Part II of this series of articles presents methods for efficient generation of the system reliability function and its use in optimization-based approaches for designing optimal sensor networks.  相似文献   
5.
Facial Expression Recognition (FER) is an important subject of human–computer interaction and has long been a research area of great interest. Accurate Facial Expression Sequence Interception (FESI) and discriminative expression feature extraction are two enormous challenges for the video-based FER. This paper proposes a framework of FER for the intercepted video sequences by using feature point movement trend and feature block texture variation. Firstly, the feature points are marked by Active Appearance Model (AAM) and the most representative 24 of them are selected. Secondly, facial expression sequence is intercepted from the face video by determining two key frames whose emotional intensities are minimum and maximum, respectively. Thirdly, the trend curve which represents the Euclidean distance variations between any two selected feature points is fitted, and the slopes of specific points on the trend curve are calculated. Finally, combining Slope Set which is composed by the calculated slopes with the proposed Feature Block Texture Difference (FBTD) which refers to the texture variation of facial patch, the final expressional feature are formed and inputted to One-dimensional Convolution Neural Network (1DCNN) for FER. Five experiments are conducted in this research, and three average FER rates 95.2%, 96.5%, and 97% for Beihang University (BHU) facial expression database, MMI facial expression database, and the combination of two databases, respectively, have shown the significant advantages of the proposed method over the existing ones.  相似文献   
6.
杨懿 《石化技术》2020,(2):54-54,333
随着我国石油需求量不断增加,致密油藏的开发也愈发重要。如何高效开发致密油藏是一项重点难点,其中致密油藏注天然气提高采收率是一个极具潜力的研究方向。因此,本文着重介绍以天然气作为能量补充介质在国内外的研究现状和应用现状,并且从两相特征等方面总结了理论研究中的一些机理,对致密油藏注天然气提高采收率的发展前景进行了一定的展望。  相似文献   
7.
In reliability analysis, the stress-strength model is often used to describe the life of a component which has a random strength (X) and is subjected to a random stress (Y). In this paper, we considered the problem of estimating the reliability R=P [Y<X] when the distributions of both stress and strength are independent and follow exponentiated Pareto distribution. The maximum likelihood estimator of the stress strength reliability is calculated under simple random sample, ranked set sampling and median ranked set sampling methods. Four different reliability estimators under median ranked set sampling are derived. Two estimators are obtained when both strength and stress have an odd or an even set size. The two other estimators are obtained when the strength has an odd size and the stress has an even set size and vice versa. The performances of the suggested estimators are compared with their competitors under simple random sample via a simulation study. The simulation study revealed that the stress strength reliability estimates based on ranked set sampling and median ranked set sampling are more efficient than their competitors via simple random sample. In general, the stress strength reliability estimates based on median ranked set sampling are smaller than the corresponding estimates under ranked set sampling and simple random sample methods.  相似文献   
8.
The veracity present in molecular data available in biological databases possesses new challenges for data analytics. The analysis of molecular data of various diseases can provide vital information for developing better understanding of the molecular mechanism of a disease. In this paper, an attempt has been made to propose a model that addresses the issue of veracity in data analytics for amino acid association patterns in protein sequences of Swine Influenza Virus. The veracity is caused by intra-sequential and inter-sequential biases present in the sequences due to varying degrees of relationships among amino acids. A complete dataset of 63,682 protein sequences is downloaded from NCBI and is refined. The refined dataset consists of 26,594 sequences which are employed in the present study. The type I fuzzy set is employed to explore amino acid association patterns in the dataset. The type I fuzzy support is refined to partially remove the inter-sequential biases causing veracity in data. The remaining inter-sequential biases present in refined fuzzy support are evaluated and eliminated using type II fuzzy set. Hence, it is concluded that a combination of type II fuzzy & refined fuzzy approach is the optimal approach for extracting a better picture of amino acid association patterns in the molecular dataset.  相似文献   
9.
A Lattice Approach to Image Segmentation   总被引:1,自引:0,他引:1  
After a formal definition of segmentation as the largest partition of the space according to a criterion σ and a function f, the notion of a morphological connection is reminded. It is used as an input to a central theorem of the paper (Theorem 8), that identifies segmentation with the connections that are based on connective criteria. Just as connections, the segmentations can then be regrouped by suprema and infima. The generality of the theorem makes it valid for functions from any space to any other one. Two propositions make precise the AND and OR combinations of connective criteria. The soundness of the approach is demonstrated by listing a series of segmentation techniques. One considers first the cases when the segmentation under study does not involve initial seeds. Various modes of regularity are discussed, which all derive from Lipschitz functions. A second category of examples involves the presence of seeds around which the partition of the space is organized. An overall proposition shows that these examples are a matter for the central theorem. Watershed and jump connection based segmentations illustrate this type of situation. The third and last category of examples deals with cases when the segmentation occurs in an indirect space, such as an histogram, and is then projected back on the actual space under study. The relationships between filtering and segmentation are then investigated. A theoretical chapter introduces and studies the two notions of a pulse opening and of a connected operator. The conditions under which a family of pulse openings can yield a connected filter are clarified. The ability of segmentations to generate pyramids, or hierarchies, is analyzed. A distinction is made between weak hierarchies where the partitions increase when going up in the pyramid, and the strong hierarchies where the various levels are structured as semi-groups, and particularly as granulometric semi-groups. The last section is based on one example, and goes back over the controversy about “lattice” versus “functional” optimization. The problem is now tackled via a case of colour segmentation, where the saturation serves as a cursor between luminance and hue. The emphasis is put on the difficulty of grouping the various necessary optimizations into a single one.  相似文献   
10.
论文比较详细地阐述了涉密网主机系统所面临的安全隐患,提出了涉密网主机安全防护所要解决的几个技术问题,并就可能实现的技术方法进行了探讨和比较。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号