首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7169篇
  免费   670篇
  国内免费   15篇
工业技术   7854篇
  2024年   4篇
  2023年   110篇
  2022年   79篇
  2021年   232篇
  2020年   176篇
  2019年   215篇
  2018年   292篇
  2017年   250篇
  2016年   293篇
  2015年   231篇
  2014年   400篇
  2013年   503篇
  2012年   551篇
  2011年   608篇
  2010年   424篇
  2009年   450篇
  2008年   436篇
  2007年   333篇
  2006年   292篇
  2005年   247篇
  2004年   237篇
  2003年   221篇
  2002年   188篇
  2001年   158篇
  2000年   116篇
  1999年   114篇
  1998年   180篇
  1997年   95篇
  1996年   83篇
  1995年   64篇
  1994年   54篇
  1993年   39篇
  1992年   30篇
  1991年   11篇
  1990年   26篇
  1989年   21篇
  1988年   10篇
  1987年   18篇
  1986年   15篇
  1985年   9篇
  1984年   15篇
  1983年   5篇
  1981年   2篇
  1980年   2篇
  1979年   4篇
  1978年   2篇
  1976年   2篇
  1975年   2篇
  1974年   1篇
  1973年   2篇
排序方式: 共有7854条查询结果,搜索用时 187 毫秒
51.
52.
The bang-bang controlled capacitor coupled converter (C3) is described in this paper. Due to the converter's inherent commutating property, the C3 can accommodate thyristors as well as high-power gate turn-off switches, due to zero-current switching transitions. The zero-current switching is achieved at no current stress increase, therefore, the topology is considered appropriate for high-power processing. DC and small signal AC models are derived for the bang-bang controlled C3, a design procedure is proposed, and simulation results are discussed. Finally, oscillograms from a proof of principle prototype circuit are presented  相似文献   
53.
54.
55.
Understanding information sharing is an important challenge to modern organizations, and is likely to be increasingly considered when IT investment decisions are made world-wide. Our research study investigated the influence of cultural factors on information sharing in China. It was postulated that social network structures such as guanxi, Confucian dynamism, and collectivism could explain the degree to which information sharing took place between people in China. It was found that guanxi, Confucian dynamism, and collectivism all had a significant influence on information sharing.  相似文献   
56.
Winner-Take-All (WTA) or K-Winner-Take-All (KWTA) networks have been frequently used as the basic building blocks of complex neural networks. This paper introduces a new selection rule for network connections that implements stable KWTA networks. To widen the applications of WTA networks, a new class of WTA networks is proposed, and their efficient design methods are presented. We demonstrate the properties of the generalized class of WTA networks, through three application examples.  相似文献   
57.
Artificial Intelligence Review - Visual object tracking has become one of the most active research topics in computer vision, and it has been applied in several commercial...  相似文献   
58.
The squash-and-stretch describes the rigidity of the character. This effect is the most important technique in traditional cartoon animation. In this paper, we introduce a method that applies the squash-and-stretch effect to character motion. Our method exaggerates the motion by sequentially applying the spatial exaggeration technique and the temporal exaggeration technique. The spatial exaggeration technique globally deforms the pose in order to make the squashed or stretched pose by modeling it as a covariance matrix of joint positions. Then, the temporal exaggeration technique computes a time-warping function for each joint, and applies it to the position of the joint allowing the character to stretch its links appropriately. The motion stylized by our method is a sequence of squashed and stretched poses with stretching limbs. By performing a user survey, we prove that the motion created using our method is similar to that used in 2D cartoon animation and is funnier than the original motion for human observers who are familiar with 2D cartoon animation.  相似文献   
59.
In this paper, we propose an advanced partial encryption of watermarking and scrambling using the magnitude information of Modifed Discrete Cosine Transform (MDCT). In MPEG-1/Audio Layer III (MP3), the magnitude and phase information of modified discrete cosine transform (MDCT) coefficients is encrypted. The proposed method uses both watermarking and scrambling, and aims at protecting the contents against eavesdropping and moreover against illegal mass distribution after descrambled. Experimental results show that the proposed method can achieve higher security and less computational complexity by reusing the MDCT coefficients obtained in MP3.  相似文献   
60.
We report an active micromixer utilizing vortex generation due to non-equilibrium electrokinetics near micro/nanochannel interfaces. Its design is relatively simple, consisting of a U-shaped microchannel and a set of nanochannels. We fabricated the micromixer just using a two-step reactive ion etching process. We observed strong vortex generation in fluorescent microscopy experiments. The mixing performance was evident in a combined pressure-driven and electroosmotic flows, compared with the case with a pure pressure-driven flow. We characterized the micromixer for several conditions: different applied voltages, ion concentrations, flow rates, and nanochannel widths. The experimental results show that the mixing performance is better with a higher applied voltage, a lower ion concentration, and a wider nanochannel width. We quantified the mixing characteristics in terms of mixing time. The lowest mixing time was 2 milliseconds with the voltage of 230 V and potassium chloride solutions of 0.1 mM. We expect that the micromixer is beneficial in several applications requiring rapid mixing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号