首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   34587篇
  免费   2428篇
  国内免费   967篇
工业技术   37982篇
  2024年   67篇
  2023年   420篇
  2022年   687篇
  2021年   1162篇
  2020年   905篇
  2019年   782篇
  2018年   883篇
  2017年   923篇
  2016年   852篇
  2015年   1061篇
  2014年   1406篇
  2013年   2115篇
  2012年   1986篇
  2011年   2308篇
  2010年   1831篇
  2009年   1876篇
  2008年   1929篇
  2007年   1738篇
  2006年   1566篇
  2005年   1254篇
  2004年   1107篇
  2003年   1190篇
  2002年   1397篇
  2001年   1177篇
  2000年   814篇
  1999年   706篇
  1998年   974篇
  1997年   689篇
  1996年   576篇
  1995年   473篇
  1994年   388篇
  1993年   332篇
  1992年   245篇
  1991年   221篇
  1990年   225篇
  1989年   199篇
  1988年   169篇
  1987年   152篇
  1986年   127篇
  1985年   126篇
  1984年   109篇
  1983年   74篇
  1982年   70篇
  1981年   59篇
  1980年   81篇
  1979年   49篇
  1978年   60篇
  1977年   58篇
  1976年   76篇
  1975年   43篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Enabling adaptive live streaming in P2P multipath networks   总被引:1,自引:1,他引:0  
Live Internet streaming can be regarded as a major current multimedia delivery mode. Efficient delivery under changing network conditions is a severe challenge in the design of live streaming systems. This study analyzes the key considerations and factors influencing live stream quality during system operations, and attempts to improve present P2P (peer-to-peer) live streaming systems by allowing users to enjoy high quality of service under the limitations of network resources. The proposed R-D (Rate-Distortion) optimized-dynamic-nodes-join algorithm is based on multipath streaming concept and receiver-driven approach. This distributed algorithm enables the system to evaluate the current network status in order to optimize the end-to-end distortion of P2P networks and stay in the optimal status. Experiment results of this study demonstrate the effectiveness of the proposed approach.  相似文献   
992.
This paper deals with direction-of-arrival (DOA) estimation based on iterative searching technique for code-division multiple access signals. It has been shown that the iterative searching technique is more likely to converge to a local maximum, causing errors in DOA estimation. In conjunction with a genetic algorithm for selecting initial search angle, we present an efficient approach to achieve the advantages of iterative DOA estimation with fast convergence and more accuracy estimate over existing conventional spectral searching methods. Finally, several computer simulation examples are provided for illustration and comparison.  相似文献   
993.
In this paper, we have demonstrated a successful electroplating process of nickel (Ni) in a sulfamate electrolyte bath at ultra low electrolytic temperatures of 273–278 K. The potentiostatic mode is essential for the electroplating process rather than galvanostatic mode. The reason is that diffusion-limited current can be easily obtained by applying a specific potential which is higher than reduction potential. On the contrary, galvanostatic mode can not identify the diffusion-limited current and the reduction will suspend while the setting current is higher than diffusion-limited current ranged in hundreds of μA. The microstructure, morphology and hardness of the Ni electrodeposits were characterized using grazing incidence x-ray diffractometer, atomic force microscopy and nano-indentation test were performed. The hardness of Ni film was much enhanced to around 6.37 GPa at 273 K to 6.18 GPa at 278 K compared with that around 4.11 GPa at 288 K to 4.01 GPa at 293 K. The normal hardness of pure nickel is about 4 GPa. The enhanced hardness of Ni at ultra low temperature is attributed to both mechanisms of reduced grain size strengthening and residual compressive stress hardening.  相似文献   
994.
In most existing Wyner–Ziv video coding schemes, a feedback channel (FC) is expected at the decoder in order to allocate a proper bit rate for each Wyner–Ziv frame. However, FC not only results in additional latency but also increases decoding complexity due to the several feedback-decoding iterations. Moreover, FC may be unavailable in many practical video applications. In this paper, we propose a novel feedback-free rate-allocation scheme for transform domain Wyner–Ziv video coding (TD-WZVC), which predicts the rate for each Wyner–Ziv frame at the encoder without significantly increasing the complexity of the encoder. First, a correlation estimation model is presented to characterize the relationship between the source frame and the reference frame estimated at the encoder in TD-WZVC. Then, an efficient FC-free rate-allocation algorithm is proposed and a linear model is built to avoid both overestimation and underestimation of the real rate and obtain an optimal rate-distortion performance. Experimental results show that the proposed scheme is able to achieve a good encoder rate allocation while still maintaining consistent coding efficiency.  相似文献   
995.
The metal multi-user MEMS processes (MetalMUMPs) provide one nickel film, two silicon nitride films and one polysilicon film for constructing various nickel MEMS devices. The two silicon nitride films are either bonded together as a bi-layered structure or they sandwich the polysilicon film to form a tri-layered structure to support nickel structures. The residual stress difference of the two silicon nitride films causes undesired deformations of suspended MetalMUMPs devices. In this paper, the residual stress difference of the two MetalMUMPs silicon nitride thin films is calibrated and the result is 169 MPa. The Young’s modulus of the MetalMUMPs nitride films is also measured, which is 209 GPa.  相似文献   
996.
Most anodic aluminum oxide (AAO) or porous anodic aluminum (PAA) films were fabricated using the potentiostatic method from high-purity (99.999%) aluminum films at low temperatures of 0–10°C to avoid dissolution effects at room temperature (RT). In this article, the fabrication of AAO or PAA film from commercial purity (99%) aluminum at RT has been investigated using hybrid pulse anodization under different oxalic acid concentration and process duration. The effect of acid concentration and anodization duration on the formation of AAO size and morphology has been studied. Both pore diameter and oxide layer thickness of AAO films were examined via SEM images and found that both increased with increasing oxalic concentration and anodization duration. In addition, the pore distribution was more concentrated at high electrolytic concentration and anodization duration.  相似文献   
997.
In this study, an open programmable logic controller (PLC) from Fuji electric prescribed in the Structured Text program was applied to develop a look-ahead linear jerk filter (LALJF) for a computerized numerically controlled (CNC) machine. To ensure the smooth and accurate motion of a tool with a linear change in jerk during real-time machining, the proposed filter was formed by combining a look-ahead algorithm with three modified moving average filters (3MMAF). The look-ahead algorithm performed a single look-ahead step-change in the speed of the speed curve. Based on a step-changing speed profile, given maximal acceleration/deceleration and maximum jerk, the speed curve was modified before it was passed through a linear jerk filter to reduce machining time. The speed commands filtered by the proposed filter stabilize machine table at the beginning and end of its motion, and at any point at which its speed exhibits a step-change. The theoretical and computational aspects of the LALJF are presented together with experimental results of its implementation on an XY table. The multiple-step-changing speed curve of a CNC machine and the speed curve of a high-speed measurement system were constructed in order to verify the feasibility and precision of the proposed method.  相似文献   
998.
随着恶意代码的发展,恶意代码的隐蔽性也在不断增强。多态技术便是躲避常规检测方法的一种有效的技术,本文对恶意代码检测技术进行分析,并举例介绍目前常用的多态技术,通过本文对多态有一个更深的认识。  相似文献   
999.
校园网是一个业务繁杂,用户使用频率高,控制权限划分非常严格的信息数字化平台,数字证书和LDAP协议的使用为校园网各系统实现统一身份认证提供有效的技术保障,为用户登录提供了便利,同时增强了系统的安全性。  相似文献   
1000.
Data hiding technique can facilitate security and the safe transmission of important information in the digital domain, which generally requires a high embedding payload and good stego image quality. Recently, a steganographic framework known as wet paper coding has been utilized as an effective strategy in image hiding to achieve the requirements of high embedding payload, good quality and robust security. In this paper, besides employing this mechanism as a fundamental stage, we take advantage of two novel techniques, namely, an efficient n-indicator and a fuzzy edge detector. The first is to increase the robustness of the proposed system to guard against being detected or traced by the statistics methods while allowing the receiver without knowledge of secret data positions to retrieve the embedded information. The second is to improve the payload and enhance the quality of stego image. The experimental results show that our proposed scheme outperforms its ability to reduce the conflict among three steganography requirements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号