首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   690篇
  免费   43篇
  国内免费   23篇
电工技术   9篇
综合类   3篇
化学工业   6篇
金属工艺   1篇
机械仪表   4篇
建筑科学   2篇
矿业工程   1篇
能源动力   6篇
轻工业   4篇
水利工程   1篇
石油天然气   1篇
无线电   180篇
一般工业技术   31篇
自动化技术   507篇
  2024年   1篇
  2023年   11篇
  2022年   25篇
  2021年   19篇
  2020年   44篇
  2019年   34篇
  2018年   49篇
  2017年   124篇
  2016年   82篇
  2015年   65篇
  2014年   60篇
  2013年   22篇
  2012年   38篇
  2011年   23篇
  2010年   35篇
  2009年   29篇
  2008年   8篇
  2007年   22篇
  2006年   9篇
  2005年   12篇
  2004年   6篇
  2003年   5篇
  2002年   6篇
  2001年   6篇
  2000年   3篇
  1999年   6篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
  1990年   2篇
  1988年   3篇
排序方式: 共有756条查询结果,搜索用时 359 毫秒
1.
Novel organic hybrid silver thiostannates [Hen]4[Ln(en)4]2[Ag6Sn6S20]·3en (Ln = Er, 1; Tm, 2; Yb, 3) were prepared by the reactions of Ln2O3, Ag, Sn and S in ethylenediamine (en) under solvothermal conditions. Six SnS4 tetrahedra and six AgS3 triangles are connected into the heterometallic sulfide cluster [Ag6Sn6S20]10  via edge-sharing. In the [Ag6Sn6S20]10  cluster, a hexanuclear Ag6S6 core is enclosed by two Sn3S10 fragments. The Ag6S6 core is the first As–S cluster stabilized by inorganic SnS4 ligands. In 13, all Ln3 + ions are in 8-fold coordination environments that involved four bidentate en ligands, forming bicapped trigonal prisms. Compounds 13 show well-defined absorption edges with band gaps in the range of 2.18–2.47 eV.  相似文献   
2.
An Intermediate Bulk Container (IBC) was punctured during its handling, releasing oil onto soil at an environmentally-sensitive region of Australia. The telehandler did not pierce the plastic of the IBC directly (as was expected) but rather one of the tynes had caught on the underside of the metal base plate, despite numerous controls being in place at time of spill, revealing a previously unreported mechanism for a fluid spill from handling of petroleum hydrocarbons. The diverse investigation team used a root cause analysis (RCA) technique to identify the underlying cause: the inspection process was inadequate with contributing factors of not using a spotter and design of IBC did not anticipate conditions. Engineering controls were put in place as part of the change management process to help prevent spills from occurring from piercing from telehandler tynes on the current project site.  相似文献   
3.
As haze intensifies in China, controlling haze emission has become the country's top priority for environmental protection. Because haze moves across different regions, it is necessary to develop a data envelopment analysis (DEA) model underpinned by both competition and cooperation to evaluate the haze emission efficiency in different provinces. This study innovatively adopts the spatial econometrics to construct the co-opetition matrices of Chinese provinces, then builds the co-opetition DEA model to evaluate the haze emission efficiency of them, and finally uses the haze data of 2015 as an example to assess the applicability of the model. The results of the study include the following: First, compared with the traditional CCR (A. Charnes & W. W. Cooper & E. Rhodes) model, this study constructs the co-opetition DEA cross-efficiency model that integrates haze's feature of cross-border moving; thus, it is more in line with the reality of haze emission and movement. Second, compared with the efficiency value gained from the CCR model, the haze emission efficiency values for Tianjin and Guangdong, two decision-making units, register greater variance when using the DEA model. The reason might lie in that they have a different spatial transportation relationship with their surrounding provinces. Third, the haze emission efficiency of provinces, according to the evaluation based on the co-opetition DEA method, varies greatly: Those with high efficiency are mostly inland provinces with slow economic growth and adverse climatic conditions, whereas many of the provinces with low efficiency are located in the relatively prosperous East China. The specific co-opetition DEA model constructed in this study enriches the research on the DEA model, which can be applied to the emission efficiency evaluation of similar pollutants around the world and can contribute empirical support to the haze reducing efforts of the government with its empirical results.  相似文献   
4.
A new matching cost computation method based on nonsubsampled contourlet transform (NSCT) for stereo image matching is proposed in this paper. Firstly, stereo image is decomposed into high frequency sub-band images at different scales and along different directions by NSCT. Secondly, by utilizing coefficients in high frequency domain and grayscales in RGB color space, the computation model of weighted matching cost between two pixels is designed based on the gestalt laws. Lastly, two types of experiments are carried out with standard stereopairs in the Middlebury benchmark. One of the experiments is to confirm optimum values of NSCT scale and direction parameters, and the other is to compare proposed matching cost with nine known matching costs. Experimental results show that the optimum values of scale and direction parameters are respectively 2 and 3, and the matching accuracy of the proposed matching cost is twice higher than that of traditional NCC cost.  相似文献   
5.
Data mining consists of a set of powerful methods that have been successfully applied to many different application domains, including business, engineering, and bioinformatics. In this paper, we propose an innovative approach that uses genetic algorithms to mine a set of temporal behavior data output by a biological system in order to determine the kinetic parameters of the system. Analyzing the behavior of a biological network is a complicated task. In our approach, the machine learning method is integrated with the framework of system dynamics so that its findings are expressed in a form of system dynamics model. An application of the method to the cell division cycle model has shown that the method can discover approximate parametric values of the system and reproduce the input behavior.  相似文献   
6.
An information criterion-based model selection method is proposed for monitoring unit root and multiple structural changes. In this method, a battery of possible models is considered by changing the integration order (I(0) or I(1)) and the combinations of change points. Next, the best model is selected from among alternative models via a modified Bayesian information criterion (BIC). Accordingly, on the basis of the selected model, the process that generates the observed time series is determined. The BIC is modified in order to adjust the frequency count of incorrectly selecting stationary models via the conventional BIC. The simulation results of monitoring unit root and structural change suggest that the proposed method outperforms the conventional hypothesis testing method in terms of detection accuracy and detection speed. Furthermore, the empirical results suggest that the proposed method exhibits better performances with regard to detection stability and forecastability.  相似文献   
7.
基于LINQ to SQL的实验室网上预约系统的设计与实现   总被引:1,自引:0,他引:1  
实验室开放管理已成了信息化时代高校实验教学改革的重要内容。本文利用B/S体系架构和LINQ to SQL技术,设计并实现实验室网上预约管理系统。该系统为高效的实验室管理提供了平台,能有效地平衡各实验室的利用率,减轻实验室管理人员的工作,使实验室的开放管理水平和服务水平推上了一个新的台阶。  相似文献   
8.
In multiview 3D TV, a pair of corresponding pixels in adjacent 2D views contributes to the reconstruction of voxels (3D pixels) in the 3D scene. We analyze this reconstruction process and determine the optimal pixel aspect ratio based on which the estimated object position can be improved given specific imaging or viewing configurations and constraints. By applying mathematical modeling, we deduce the optimal solutions for two general stereo configurations: parallel and with vergence. We theoretically show that for a given total resolution a finer horizontal resolution, compared to the usual uniform pixel distribution, in general, provides a better 3D visual experience for both configurations. The optimal value may vary depending on different configuration parameter values. We validate our theoretical results by conducting subjective studies using a set of simulated non-square discretized red–blue stereo pairs and show that human observers indeed have a better 3D viewing experience with an optimized vs. a non-optimized representation of 3D-models.  相似文献   
9.
Generally, if a user wants to use numerous different network services, he/she must register himself/herself to every service providing server. It is extremely hard for users to remember these different identities and passwords. In order to resolve this problem, various multi-server authentication protocols have been proposed. Recently, Sood et al. analyzed Hsiang and Shih's multi-server authentication protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication, the session key agreement and can resist several kinds of attacks. However, through careful analysis, we find that Sood et al.'s protocol is still vulnerable to leak-of-verifier attack, stolen smart card attack and impersonation attack. Besides, since there is no way for the control server CS to know the real identity of the user, the authentication and session key agreement phase of Sood et al.'s protocol is incorrect. We propose an efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses. The proposed protocol is extremely suitable for use in distributed multi-server architecture since it provides user's anonymity, mutual authentication, efficient, and security.  相似文献   
10.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号