首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19714篇
  免费   1019篇
  国内免费   141篇
工业技术   20874篇
  2024年   25篇
  2023年   439篇
  2022年   872篇
  2021年   1167篇
  2020年   965篇
  2019年   982篇
  2018年   1270篇
  2017年   999篇
  2016年   992篇
  2015年   639篇
  2014年   899篇
  2013年   1598篇
  2012年   962篇
  2011年   1160篇
  2010年   912篇
  2009年   870篇
  2008年   766篇
  2007年   605篇
  2006年   505篇
  2005年   392篇
  2004年   290篇
  2003年   255篇
  2002年   203篇
  2001年   175篇
  2000年   160篇
  1999年   160篇
  1998年   296篇
  1997年   227篇
  1996年   226篇
  1995年   182篇
  1994年   175篇
  1993年   164篇
  1992年   111篇
  1991年   133篇
  1990年   105篇
  1989年   99篇
  1988年   87篇
  1987年   97篇
  1986年   83篇
  1985年   87篇
  1984年   74篇
  1983年   72篇
  1982年   62篇
  1981年   71篇
  1980年   50篇
  1979年   31篇
  1978年   29篇
  1977年   26篇
  1976年   40篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
Wireless Personal Communications - IoT-based smart farming techniques have come up as one of the solutions to tackle the effect of climate change, water scarcity, etc. which are the prime reason...  相似文献   
22.
Wireless Personal Communications - Recently, the theory of effective rate has attracted much attention, since it can take the delay aspect into account when performing channel capacity analysis. In...  相似文献   
23.
Photonic Network Communications - In the present work, a high-speed optical encoder is proposed based on two-dimensional photonic crystal ring resonator using coupled mode theory and resonance...  相似文献   
24.

Achieving communication security, along with high computational efficiency, is one of the challenging issues in the advancement of modern resource constraint wireless networks. Wireless physical layer secure key extraction in conjunction with suitable preprocessing techniques may be a possible way out. Principal component analysis (PCA) is one of the dimensionality reduction techniques employed commonly in various domains for different applications. However, the physical layer secure key extraction employing PCA as dimensionality reduction is untouched so far. This paper presents a comprehensive study on PCA based wireless secret key extraction with real-time experimentation. In this work, we propose to apply PCA as a preprocessing technique to reduce the total number of numerical computations required in the key generation process, by cutting down the dimension of the input data set. We propose to select the extracted principal components to be processed further for key generation, based on their information content and cross-correlation. We analyzed the performance of the proposed in terms of bit disagreement rate, key randomness and pass ratio. The computational complexity of the proposed approach is derived and the effect of dimensionality reduction factor (\({\mathbf{R}}_{\mathbf{f}}\)) on the required numerical computations is analyzed. It is found that substantial improvement in bit disagreement performance is achieved along with a significant reduction in the required numerical computations. Remarkably, these outcomes are achieved by slightly modifying one of the blocks of the traditional key generation system. Furthermore, the practicability of the proposed technique is verified through real-time experimentation in different physical scenarios.

  相似文献   
25.
Multimedia Tools and Applications - The video surveillance activity generates a vast amount of data, which can be processed to detect miscreants. The task of identifying and recognizing an object...  相似文献   
26.
This article addresses an investigation of the entropy analysis of Williamson nanofluid flow in the presence of gyrotactic microorganisms by considering variable viscosity and thermal conductivity over a convectively heated bidirectionally stretchable surface. Heat and mass transfer phenomena have been incorporated by taking into account the thermal radiation, heat source or sink, viscous dissipation, Brownian motion, and thermophoretic effects. The representing equations are nonlinear coupled partial differential equations and these equations are shaped into a set of ordinary differential equations via a suitable similarity transformation. The arising set of ordinary differential equations was then worked out by adopting a well-known scheme, namely the shooting method along with the Runge-Kutta-Felberge integration technique. The effects of flow and heat transfer controlling parameters on the solution variables are depicted and analyzed through the graphical presentation. The survey finds that magnifying viscosity parameter, Weissenberg number representing the non-Newtonian Williamson parameter cause to retard the velocity field in both the directions and thermal conductivity parameter causes to reduce fluid temperature. The study also recognizes that enhancing magnetic parameters and thermal conductivity parameters slow down the heat transfer rate. The entropy production of the system is estimated through the Bejan number. It is noticeable that the Bejan number is eminently dependent on the heat generation parameter, thermal radiation parameter, viscosity parameter, thermal conductivity parameter, and Biot number. The skillful accomplishment of the present heat and mass transfer system is achieved through the exteriorized choice of the pertinent parameters.  相似文献   
27.
28.
Wireless Personal Communications - Internet of Things (IoT) is one of the emerging technologies, which is widely used across the globe. As the idea of a smart city was founded, IoT has been...  相似文献   
29.
Vitamin A is an essential micronutrient whose deficiency is still a major health concern in many regions of the world. It plays an essential role in human growth and development, immunity, and vision, but may also help prevent several other chronic diseases. The total amount of vitamin A in the human diet often falls below the recommended dietary allowance of approximately 900–1000 μ $ \umu $ g/day for a healthy adult. Moreover, a significant proportion of vitamin A may be degraded during food processing, storage, and distribution, thereby reducing its bioactivity. Finally, the vitamin A in some foods has a relatively low bioavailability, which further reduces its efficacy. The World Health Organization has recommended fortification of foods and beverages as a safe and cost-effective means of addressing vitamin A deficiency. However, there are several factors that must be overcome before effective fortified foods can be developed, including the low solubility, chemical stability, and bioavailability of this oil-soluble vitamin. Consequently, strategies are required to evenly disperse the vitamin throughout food matrices, to inhibit its chemical degradation, to avoid any adverse interactions with any other food components, to ensure the food is palatable, and to increase its bioavailability. In this review article, we discuss the chemical, physical, and nutritional attributes of vitamin A, its main dietary sources, the factors contributing to its current deficiency, and various strategies to address these deficiencies, including diet diversification, biofortification, and food fortification.  相似文献   
30.
Multimedia Tools and Applications - Natural disasters are very unexpected in human life. The best prevention from such natural disasters is an early warning system which gives a good period to take...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号