首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33043篇
  免费   2176篇
  国内免费   76篇
电工技术   436篇
综合类   35篇
化学工业   7324篇
金属工艺   1304篇
机械仪表   1944篇
建筑科学   715篇
矿业工程   17篇
能源动力   1287篇
轻工业   2901篇
水利工程   130篇
石油天然气   34篇
无线电   5240篇
一般工业技术   6965篇
冶金工业   2993篇
原子能技术   439篇
自动化技术   3531篇
  2023年   340篇
  2022年   233篇
  2021年   951篇
  2020年   690篇
  2019年   787篇
  2018年   961篇
  2017年   980篇
  2016年   1123篇
  2015年   952篇
  2014年   1413篇
  2013年   2154篇
  2012年   2152篇
  2011年   2600篇
  2010年   1920篇
  2009年   1897篇
  2008年   1800篇
  2007年   1397篇
  2006年   1199篇
  2005年   1077篇
  2004年   985篇
  2003年   918篇
  2002年   883篇
  2001年   740篇
  2000年   644篇
  1999年   658篇
  1998年   1193篇
  1997年   775篇
  1996年   619篇
  1995年   428篇
  1994年   332篇
  1993年   317篇
  1992年   234篇
  1991年   189篇
  1990年   172篇
  1989年   182篇
  1988年   140篇
  1987年   119篇
  1986年   106篇
  1985年   119篇
  1984年   102篇
  1983年   75篇
  1982年   74篇
  1981年   68篇
  1980年   68篇
  1979年   50篇
  1977年   72篇
  1976年   112篇
  1975年   56篇
  1974年   39篇
  1973年   41篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
In this paper, conceptual modeling as well as numerical simulation of two-phase flow in deep, deformable geological formations induced by CO2 injection are presented. The conceptual approach is based on balance equations for mass, momentum and energy completed by appropriate constitutive relations for the fluid phases as well as the solid matrix. Within the context of the primary effects under consideration, the fluid motion will be expressed by the extended Darcy's law for two phase flow. Additionally, constraint conditions for the partial saturations and the pressure fractions of carbon dioxide and brine are defined. To characterize the stress state in the solid matrix, the effective stress principle is applied. Furthermore, the interaction of fluid and solid phases is illustrated by constitutive models for capillary pressure, porosity and permeability as functions of saturation. Based on this conceptual model, a coupled system of nonlinear differential equations for two-phase flow in a deformable porous matrix (H2M model) is formulated. As the displacement vector acts as primary variable for the solid matrix, multiphase flow is simulated using both pressure/pressure or pressure/saturation formulations. An object-oriented finite element method is used to solve the multi-field problem numerically. The capabilities of the model and the numerical tools to treat complex processes during CO2 sequestration are demonstrated on three benchmark examples: (1) a 1-D case to investigate the influence of variable fluid properties, (2) 2-D vertical axi-symmetric cross-section to study the interaction between hydraulic and deformation processes, and (3) 3-D to test the stability and computational costs of the H2M model for real applications.  相似文献   
992.
Future chip multiprocessors (CMPs) may have hundreds to thousands of threads competing to access shared resources, and will require quality-of-service (QoS) support to improve system utilization. This paper introduces Globally-Synchronized Frames (GSF), a framework for providing guaranteed QoS in on-chip networks in terms of minimum bandwidth and maximum delay bound. The GSF framework can be easily integrated in a conventional virtual channel (VC) router without significantly increasing the hardware complexity. We exploit a fast on-chip barrier network to efficiently implement GSF. Performance guarantees are verified by analysis and simulation. According to our simulations, all concurrent flows receive their guaranteed minimum share of bandwidth in compliance with a given bandwidth allocation. The average throughput degradation of GSF on an 8×8 mesh network is within 10% compared to the conventional best-effort VC router.  相似文献   
993.
The present study investigated the effects of multi-media modules and their combinations on the learning of procedural tasks. In the experiment, 72 participants were classified as having either low- or high spatial ability based on their spatial ability test. They were randomly assigned to one of the six experimental conditions in a 2 × 3 factorial design with verbal modality (on-screen text procedure vs. auditory procedure) and the format of visual representation (static visual representation vs. static visual representation with motion cues vs. animated visual representation). After they completed their learning session, the ability to perform the procedural task was directly measured in a realistic setting. The results revealed that: (1) in the condition of static visual representation, the high spatial ability group outperformed the low spatial ability group, (2) for the low spatial ability participants, the animated visual representation group outperformed the static visual representation group, however, the static visual representation with motion cues group did not outperform the static visual representation group, (3) the use of animated visual representation helped participants with low spatial ability more than those with high spatial ability, and (4) a modality effect was found for the measure of satisfaction when viewing the animated visual representation. Since the participants with low spatial ability benefited from the use of animation, the results might support an idea that people are better able to retrieve the procedural information by viewing animated representation. The findings also might reflect a preference for the auditory mode of presentation with greater familiarity with the type of visual representation.  相似文献   
994.
Exploratory tools that are sensitive to arbitrary statistical variations in spike train observations open up the possibility of novel neuroscientific discoveries. Developing such tools, however, is difficult due to the lack of Euclidean structure of the spike train space, and an experimenter usually prefers simpler tools that capture only limited statistical features of the spike train, such as mean spike count or mean firing rate. We explore strictly positive-definite kernels on the space of spike trains to offer both a structural representation of this space and a platform for developing statistical measures that explore features beyond count or rate. We apply these kernels to construct measures of divergence between two point processes and use them for hypothesis testing, that is, to observe if two sets of spike trains originate from the same underlying probability law. Although there exist positive-definite spike train kernels in the literature, we establish that these kernels are not strictly definite and thus do not induce measures of divergence. We discuss the properties of both of these existing nonstrict kernels and the novel strict kernels in terms of their computational complexity, choice of free parameters, and performance on both synthetic and real data through kernel principal component analysis and hypothesis testing.  相似文献   
995.
Social media services such as YouTube and Flickr have become online necessities for millions of users worldwide. Social media are online services that enable users to share contents, opinions, and perspectives that support communication with other users. Social media places an emphasis on the shared experience between users, which we call co-experience. However, the online characteristics of social media increase psychological distance between users, which, in turn, results in a decrease in the quality of co-experience. Hence, as the goal of this study, we theoretically modeled and empirically verified the antecedents and user experience-based consequences of psychological distance in a social media-enhanced real-time streaming video service. In order to reduce psychological distance, we introduced two system elements: inhabited space (the degree of being situated in context and in a meaningful place) and isomorph effects (the degree of preserving the structure of a user’s actions). We constructed a social media-enhanced real-time streaming video service prototype and conducted a field experiment with actual social media users. The prototype, which streamed a live baseball game, enabled users to simultaneously view the game from remote locations and to interact with each other through cheering tools. The results indicate that inhabited space and isomorph effects reduce psychological distance between users, and this, in turn, enhances co-experience. This paper ends with theoretical as well as practical implications of the study.  相似文献   
996.
The current study examined the effects of online product reviews on individuals’ credibility perceptions of the reviews and their attitudes about the product targeted in the reviews. Study 1 used a 2 (review type: statistical and narrative) × 2 (review valence: negative and positive) design, and study 2 used a 2 (statistical review valence: positive and negative) × 2 (narrative review valence: positive and negative) design. The findings of study 1 were consistent with those of study 2 and indicated that negative statistical reviews were perceived as more credible than negative narrative reviews, while the credibility of positive statistical reviews did not differ from that of positive narrative reviews. On the other hand, statistical reviews and narrative reviews did not differ in terms of affecting individuals’ attitudes about the product. The current study also found that the vividness and valence of each review type had varying effects on review credibility and attitudes about the product. The implications of these and other findings are discussed in detail in the paper.  相似文献   
997.
Currently, embedded systems have been widely used for ubiquitous computing environments including digital setup boxes, mobile phones, and USN (Ubiquitous Sensor Networks). The significance of security has been growing as it must be necessarily embedded in all these systems. Up until now, many researchers have made efforts to verify the integrity of applied binaries downloaded in embedded systems. The research of problem solving is organized into hardware methods and software-like methods. In this research, the basic approach to solving problems from the software perspective was employed. From the software perspective, unlike in the existing papers (Seshadri et al., Proc. the IEEE symposium on security and privacy, 2004; Seshadri et al., Proc. the symposium on operating systems principals, 2005) based on the standardized model (TTAS.KO-11.0054. 2006) publicized in Korea, there is no extra verifier and conduct for the verification function in the target system. Contrary to the previous schemes (Jung et al. , 2008; Lee et al., LNCS, vol. 4808, pp. 346–355, 2007), verification results are stored in 1 validation check bit, instead of storing signature value for application binary files in the i-node structure for the purpose of reducing run-time execution overhead. Consequently, the proposed scheme is more efficient because it dramatically reduces overhead in storage space, and when it comes to computing, it performs one hash algorithm for initial execution and thereafter compares 1 validation check bit only, instead of signature and hash algorithms for every application binary. Furthermore, in cases where there are frequent changes in the i-node structure or file data depending on the scheme application, the scheme can provide far more effective verification performance compared to the previous schemes.  相似文献   
998.
This paper describes a scheme for proactive human search for a designated person in an undiscovered indoor environment without human operation or intervention. In designing and developing human identification with prior information a new approach that is robust to illumination and distance variations in the indoor environment is proposed. In addition, a substantial exploration method with an octree structure, suitable for path planning in an office configuration, is employed. All these functionalities are integrated in a message- and component-based architecture for the efficient integration and control of the system. This approach is demonstrated by succeeding human search in the challenging robot mission of the 2009 Robot Grand Challenge Contest.  相似文献   
999.
In the blogosphere, there exist posts relevant to a particular subject and blogs that show interest in the subject. In this paper, we define a set of such posts and blogs as a blog community and propose a method for extracting the blog community associated with a particular subject. The proposed method is based on the idea that the blogs who have performed actions (e.g., read, comment, trackback, scrap) to the posts of a particular subject are the ones with interest in the subject, and that the posts that have received actions from such blogs are the ones that contain the subject. The proposed method starts with a small number of manually-selected seed posts containing the subject. Then, the method selects the blogs that have performed actions to the seed posts over some threshold and the posts that have received actions over some threshold. Repeating these two steps gradually expands the blog community. This paper presents various techniques to improve the accuracy of the proposed method. The experimental results show that the proposed method exhibits a higher level of accuracy than the methods proposed in prior research. This paper also discusses business applications of the extracted community, such as target marketing, market monitoring, improving search results, finding power bloggers, and revitalization of the blogosphere.  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号