首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1505篇
  免费   92篇
  国内免费   3篇
电工技术   15篇
综合类   1篇
化学工业   354篇
金属工艺   32篇
机械仪表   41篇
建筑科学   63篇
矿业工程   3篇
能源动力   61篇
轻工业   197篇
水利工程   15篇
石油天然气   6篇
武器工业   1篇
无线电   154篇
一般工业技术   292篇
冶金工业   68篇
原子能技术   9篇
自动化技术   288篇
  2023年   23篇
  2022年   29篇
  2021年   65篇
  2020年   55篇
  2019年   60篇
  2018年   57篇
  2017年   56篇
  2016年   50篇
  2015年   53篇
  2014年   66篇
  2013年   128篇
  2012年   97篇
  2011年   136篇
  2010年   92篇
  2009年   73篇
  2008年   100篇
  2007年   67篇
  2006年   60篇
  2005年   41篇
  2004年   43篇
  2003年   46篇
  2002年   32篇
  2001年   15篇
  2000年   8篇
  1999年   8篇
  1998年   17篇
  1997年   12篇
  1996年   14篇
  1995年   13篇
  1994年   10篇
  1993年   11篇
  1992年   4篇
  1991年   4篇
  1990年   5篇
  1989年   2篇
  1988年   5篇
  1987年   6篇
  1986年   3篇
  1985年   11篇
  1984年   3篇
  1983年   3篇
  1979年   2篇
  1978年   1篇
  1976年   3篇
  1975年   1篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
  1970年   2篇
  1969年   1篇
排序方式: 共有1600条查询结果,搜索用时 15 毫秒
41.
In this paper, we present new monolithic and compositional algorithms to solve the LTL realizability problem. Those new algorithms are based on a reduction of the LTL realizability problem to a game whose winning condition is defined by a universal automaton on infinite words with a k-co-Büchi acceptance condition. This acceptance condition asks that runs visit at most k accepting states, so it implicitly defines a safety game. To obtain efficient algorithms from this construction, we need several additional ingredients. First, we study the structure of the underlying automata constructions, and we show that there exists a partial order that structures the state space of the underlying safety game. This partial order can be used to define an efficient antichain algorithm. Second, we show that the algorithm can be implemented in an incremental way by considering increasing values of k in the acceptance condition. Finally, we show that for large LTL formulas that are written as conjunctions of smaller formulas, we can solve the problem compositionally by first computing winning strategies for each conjunct that appears in the large formula. We report on the behavior of those algorithms on several benchmarks. We show that the compositional algorithms are able to handle LTL formulas that are several pages long.  相似文献   
42.
In GIS-based data-driven modeling of mineral prospectivity, a suitably fine unit cell size is used for spatial representation of known occurrences of mineral deposits of the type sought (D) in a study area (T). However, until now, the unit cell size is chosen subjectively. In this paper, a methodology is proposed for objective selection of the most suitable unit cell size for data-driven modeling of mineral prospectivity using a raster-based GIS. A set of choices of suitable unit cell sizes is first derived via point pattern analysis of a set of known occurrences of mineral deposits of the type sought. Then, (a) the lower limit of a set of choices of suitable unit cell sizes is considered and defined according to the map scales from which spatial data for mineral prospectivity mapping were derived, and (b) the upper limit of the same set of choices of suitable unit cell sizes is considered (and revised as necessary) based on knowledge of spatial extents of mineral deposits of the type sought or via analysis of reflexive nearest neighbour points. Finally, it is shown that fractal analysis of spatial contrast between unit cells containing D and unit cells not containing D in T provides for objective selection of the most suitable unit cell size. In a case study application of the weight-of-evidence method to mineral prospectivity mapping, using the most suitable unit cell size, found via the proposed methodology, results in spatial evidence weights and weight uncertainties that are nearly identical to those derived by using the finest (i.e., lower limit) unit cell size. In contrast to using the most suitable unit cell size, using coarser unit cell sizes result in higher positive weights, lower negative weights and higher weight uncertainties of spatial evidence of mineral prospectivity. The proposed methodology for objective selection of the most suitable unit cell size in data-driven modeling of mineral prospectivity using a raster-based GIS is robust and can easily be implemented.  相似文献   
43.
Automated Tape Laying and Fiber Placement of composite materials are the two principal automated processes used for fabrication of large composite structures in aeronautical industry. The aluminum parts produced by High Speed Machining tend to be replaced by carbon fiber composite parts realized with these processes. However, structural parts present reinforcement zones which disturb the tool path follow-up and generate an increase of the manufacturing time. Thus, this paper deals with the optimization of tool paths of a 7-axis machine tool of Fiber Placement with the objective of reducing the manufacturing time while ensuring the requested quality of the final part. In this paper, two complementary methods are detailed. The first method takes advantage of the degree of redundancy of the machine tool to decrease the kinematic loads of the control joints. The second method aims to smooth the orientation of the machine head along the tool path while ensuring quality constraints. These two methods are then applied on a test tool path and bring to a significant decrease of the manufacturing time (32.9%).  相似文献   
44.
This paper develops a model for evaluating the consequences of increasing block tariff pricing policies when multiple households share a connection and applies it to a sample from Kumasi, Ghana. Results show that for any given consumption, a household's average share of total monthly water bill for shared connections can either be higher or lower than its single-household equivalent. Significant differences between the average and single-household equivalent bills were found in these cases, although this difference is under-estimated if the sample is not disaggregated by payment group.  相似文献   
45.
We present new and effective lower bounds for the resource constrained project scheduling problem. This problem is widely known to be notoriously difficult to solve due to the lack of lower bounds that are both tight and fast. In this paper, we propose several new lower bounds that are based on the concept of energetic reasoning. A major contribution of this work is to investigate several enhanced new feasibility tests that prove useful for deriving new lower bounds that consistently outperform the classical energetic reasoning-based lower bound. In particular, we present the results of a comprehensive computational study, carried out on 1560 benchmark instances, that provides strong evidence that a deceptively simple dual feasible function-based lower bound is highly competitive with a state-of-the-art lower bound while being extremely fast. Furthermore, we found that an effective shaving procedure enables to derive an excellent lower bound that often outperforms the best bound from the literature while being significantly simpler.  相似文献   
46.
47.
48.
Nowadays video surveillance systems are widely deployed in many public places. However, the widespread use of video surveillance violates the privacy rights of the people. Many authors have addressed the privacy issues from various points of view. In this paper we propose a novel, on-demand selectively revocable, privacy preserving mechanism. The surveillance video can be tuned to view with complete privacy or by revoking the privacy of any subset of pedestrians while ensuring complete privacy to the remaining pedestrians. We achieve this by tracking the pedestrians using a novel Markov chain algorithm with two hidden states, detecting the head contour of the tracked pedestrians and obscuring their faces using an encryption mechanism. The detected pedestrian face/head is obscured by encrypting with a unique key derived from a master key for the privacy preservation purpose. The performance evaluations on many challenging surveillance scenarios show that the proposed mechanism can effectively and robustly track as well as identify multiple pedestrians and obscure/unobscure their faces/head in real time.  相似文献   
49.
The enlarged Horn formulas generalize the extended Horn formulas introduced by Chandru and Hooker (1991). Their satisfying truth assignments can be generated with polynomial delay. Unfortunately no polynomial algorithm is known for recognizing enlarged Horn formulas or extended Horn formulas. In this paper we define the class of simple enlarged Horn formulas, a subclass of the enlarged Horn formulas, that contains the simple extended Horn formulas introduced by Swaminathan and Wagner (1995). We present recognition algorithms for the simple enlarged Horn formulas and the simple extended Horn formulas whose complexity is bounded by the complexity of the arborescence-realization problem.  相似文献   
50.
This paper defines direction relations (e.g., north, northeast) between two-dimensional objects and shows how they can be efficiently retrieved using B-, KDB- and R- tree-based data structures. Essentially, our work studies optimisation techniques for 2D range queries that arise during the processing of direction relations. We test the efficiency of alternative indexing methods through extensive experimentation and present analytical models that estimate their performance. The analytical estimates are shown to be very close to the actual results and can be used by spatial query optimizers in order to predict the retrieval cost. In addition, we implement modifications of the existing structures that yield better performance for certain queries. We conclude the paper by discussing the most suitable method depending on the type of the range and the properties of the data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号