首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   74639篇
  免费   5436篇
  国内免费   2771篇
工业技术   82846篇
  2024年   305篇
  2023年   1269篇
  2022年   2112篇
  2021年   2915篇
  2020年   2204篇
  2019年   1981篇
  2018年   2318篇
  2017年   2525篇
  2016年   2099篇
  2015年   2717篇
  2014年   3462篇
  2013年   4286篇
  2012年   4399篇
  2011年   4929篇
  2010年   4238篇
  2009年   4012篇
  2008年   3962篇
  2007年   3797篇
  2006年   3861篇
  2005年   3513篇
  2004年   2335篇
  2003年   2120篇
  2002年   1911篇
  2001年   1661篇
  2000年   1808篇
  1999年   2066篇
  1998年   1782篇
  1997年   1443篇
  1996年   1423篇
  1995年   1203篇
  1994年   970篇
  1993年   724篇
  1992年   558篇
  1991年   431篇
  1990年   333篇
  1989年   259篇
  1988年   241篇
  1987年   146篇
  1986年   126篇
  1985年   101篇
  1984年   75篇
  1983年   45篇
  1982年   44篇
  1981年   32篇
  1980年   27篇
  1979年   16篇
  1977年   7篇
  1976年   10篇
  1975年   8篇
  1945年   4篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
981.
NCO是卫星信号模拟器中频信号处理的关键部分;介绍了GNSS卫星信号模拟器码NCO和载波NCO的原理及作用,建立DDS模型,确定基本参数并根据参数设计了码NCO和载波NCO基本结构;给出了码NCO和载波NCO的实现过程,利用verilog在Xilinx'ISE 11.2和modelsim6.5中完成载波NCO和码NCO的设计和仿真,在FPGA中进行了实现,并给出仿真波形和信号频谱图;本码NCO和载波NCO模块已应用于某型GNSS模拟器样机,通过程序仿真与样机测试,证明本码NCO和载波NCO模块性能满足GNSS卫星信号模拟器系统需求.  相似文献   
982.
This paper presents a model-based approximate λ-policy iteration approach using temporal differences for optimizing paths online for a pursuit-evasion problem, where an agent must visit several target positions within a region of interest while simultaneously avoiding one or more actively pursuing adversaries. This method is relevant to applications, such as robotic path planning, mobile-sensor applications, and path exposure. The methodology described utilizes cell decomposition to construct a decision tree and implements a temporal difference-based approximate λ-policy iteration to combine online learning with prior knowledge through modeling to achieve the objectives of minimizing the risk of being caught by an adversary and maximizing a reward associated with visiting target locations. Online learning and frequent decision tree updates allow the algorithm to quickly adapt to unexpected movements by the adversaries or dynamic environments. The approach is illustrated through a modified version of the video game Ms. Pac-Man, which is shown to be a benchmark example of the pursuit-evasion problem. The results show that the approach presented in this paper outperforms several other methods as well as most human players.  相似文献   
983.
针对PCB图像的特点对图像进行增强处理,使得图像的边缘更加突出,灰度的对比度增加,同时滤除靠近边缘的噪声,为后续图像分割时更有效的选取阈值打下良好基础。使用二阶梯度算子获得图像的增强效果,实验表明,不仅解决了边缘附近噪声去除问题,而且有效地突出了边缘信息,图像的黑白对比分明,尤其是目标图像靠近边缘部分灰度值明显高于其他的非边缘区域。  相似文献   
984.
平均保障延误时间(MLDT)建模方法研究   总被引:1,自引:0,他引:1  
针对现代装备系统的精确化保障要求,对装备保障的主要参数指标MLDT进行了建模分析,主要分析了三种计算方法:图估法、解析法和基于排队论的MLDT建模理论,解决了评估MLDT指标时的定量计算问题。  相似文献   
985.
Deceptive voting behaviors of malicious users are known as the main reason of causing content pollution in Peer-to-Peer (P2P) content sharing systems. Due to the nature of P2P overlay network such as self-organization and anonymity, the existing methods on identifying deceptive votes are not effective, especially for collusive attackers. This paper presents Sorcery, a novel active challenge-response mechanism based on the notion that one side of interaction with the dominant information can detect whether the other side is telling a lie. To make each client obtain the dominant information, our approach introduces the social network to the P2P content sharing system; therefore, clients can establish the friend-relationships with the users who are either acquaintances in reality or those reliable online friends. Using the confidential voting histories of friends as own dominant information, the client challenges target content providers with the overlapping votes of both his friends and the target content provider, thus detecting whether the content provider is a deceptive user. Moreover, Sorcery provides the punishment mechanism which can reduce the impact brought by deceptive voting behaviors, and our work also discusses some key practical issues. The experimental results illustrate that Sorcery can effectively overcome the problem of deceptive voting behaviors in P2P content sharing systems, and work better than the existing reputation models.  相似文献   
986.
针对以ADSP-BF561芯片为核心的目标跟踪系统中显示目标运动及提示信息的需要,提出了基于ADSP-BF561的英文字符库的设计方案.该字符库中包括26个小写英文字符(a~z)、10个数字(0~9),以及“:”和空格共计38个符号.该字符库通过使用存储在ADSP-BF561的L2存储器上的数据类型为布尔型、大小为16...  相似文献   
987.
数据安全是图书馆开展各项数字化服务前提和保证,本文通过分析目前西藏高校图书馆数据安全的现状及存在的问题,结合西藏各高校图书馆实际,提出了数据安全的防护策略,希望为西藏高校图书馆数据安全建设抛砖引玉。  相似文献   
988.
Feature Extraction Using Laplacian Maximum Margin Criterion   总被引:1,自引:0,他引:1  
Feature extraction by Maximum Margin Criterion (MMC) can more efficiently calculate the discriminant vectors than LDA, by avoiding calculation of the inverse within-class scatter matrix. But MMC ignores the local structures of samples. In this paper, we develop a novel criterion to address this issue, namely Laplacian Maximum Margin Criterion (Laplacian MMC). We define the total Laplacian matrix, within-class Laplacian matrix and between-class Laplacian matrix by using the similar weight of samples to capture the scatter information. Laplacian MMC based feature extraction gets the discriminant vectors by maximizing the difference between between-class laplacian matrix and within-class laplacian matrix. Experiments on FERET and AR face databases show that Laplacian MMC works well.  相似文献   
989.
Type 2 histamine receptor (H(2)R) is widely distributed in the body. Its main function is modulating the secretion of gastric acid. Most gastric acid-related diseases are closely associated with it. In this study, a combination of pharmacophore modeling, homology modeling, molecular docking and molecular dynamics methods were performed on human H(2)R and its agonists to investigate interaction details between them. At first, a pharmacophore model of H(2)R agonists was developed, which was then validated by QSAR and database searching. Afterwards, a model of the H(2)R was built utilizing homology modeling method. Then, a reference agonist was docked into the receptor model by induced fit docking. The 'induced' model can dramatically improve the recovery ratio from 46.8% to 69.5% among top 10% of the ranked database in the simulated virtual screening. The pharmocophore model and the receptor model matched very well each other, which provided valuable information for future studies. Asp98, Asp186 and Tyr190 played key roles in the binding of H(2)R agonists, and direct interactions were observed between the three residues and agonists. Residue Tyr250 could also form a hydrogen bond with H(2)R agonists. These findings would be very useful for the discovery of novel and potent H(2)R agonists.  相似文献   
990.
In this paper a new energy-aware weighted dynamic topology control (WDTC) algorithm is proposed to extend the lifetime of wireless network and balance the nodes’ energy consumption. The idea is that each node builds its local minimum spanning tree (MST) based on the energy-aware weighted graph and the network topology is adjusted accordingly. It was proved theoretically that the topology under WDTC algorithm could preserve the network connectivity and a sufficient condition for the degree of no more than 6 was also given. Simulation shows that WDTC algorithm can effectively prolong the network lifetime and has good topological features.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号