首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2194篇
  免费   127篇
  国内免费   8篇
电工技术   20篇
综合类   1篇
化学工业   519篇
金属工艺   34篇
机械仪表   47篇
建筑科学   80篇
矿业工程   4篇
能源动力   97篇
轻工业   249篇
水利工程   36篇
石油天然气   10篇
无线电   171篇
一般工业技术   329篇
冶金工业   234篇
原子能技术   14篇
自动化技术   484篇
  2024年   4篇
  2023年   29篇
  2022年   33篇
  2021年   110篇
  2020年   78篇
  2019年   65篇
  2018年   69篇
  2017年   75篇
  2016年   79篇
  2015年   79篇
  2014年   66篇
  2013年   153篇
  2012年   156篇
  2011年   158篇
  2010年   105篇
  2009年   114篇
  2008年   99篇
  2007年   102篇
  2006年   92篇
  2005年   77篇
  2004年   63篇
  2003年   42篇
  2002年   52篇
  2001年   28篇
  2000年   16篇
  1999年   27篇
  1998年   57篇
  1997年   39篇
  1996年   23篇
  1995年   19篇
  1994年   17篇
  1993年   19篇
  1992年   8篇
  1991年   14篇
  1990年   8篇
  1989年   18篇
  1988年   8篇
  1987年   14篇
  1986年   12篇
  1985年   7篇
  1984年   11篇
  1983年   11篇
  1982年   4篇
  1981年   7篇
  1980年   15篇
  1979年   4篇
  1976年   8篇
  1975年   4篇
  1974年   7篇
  1972年   4篇
排序方式: 共有2329条查询结果,搜索用时 437 毫秒
51.
In Information Technology Service Management (ITSM), network management teams typically use an Incident Ticket System (ITS) as a tool to track, troubleshoot, and coordinate the resolution of network incidents that occur during the daily operation of the network. A well organized ITS may positively impact on the efficiency of the incident management process. Nevertheless, in many cases the handling of tickets by the management team is not completely systematic and may be incoherent and inefficient. This way, irrelevant or redundant tickets for the same incident may be issued, thus creating a redundancy in the system that leads to inefficiencies. In this paper, we suggest a model aimed to correlate redundant tickets in order to reduce the information to a single ticket per incident. We validate the proposed correlation model by evaluating it with two datasets taken from a real ticketing system of a telecommunications network company. Using this model as a basis, we also develop and evaluate a methodology that assesses the efficiency of the management team during the process of tickets creation and management. Based on it, we also get some insights on the performance of the different management groups involved in the ticket creation process. These analyses can be leveraged for improving both the management groups functioning and the policies for the tickets’ creation.  相似文献   
52.
53.
When a realistic modelling of radioactive contaminant transport in flowing groundwater is required, very large systems of coupled partial and ordinary differential equations can arise that have to be solved numerically. For that purpose, the software package \(r^3t\) is developed in which several advanced numerical methods are implemented to solve such models efficiently and accurately. Using software tools of \(r^3t\) one can treat successfully nontrivial mathematical problems like advection-dominated system with different retardation of transport for each component and with nonlinear Freundlich sorption and/or precipitation. Additionally, long time simulations on complex 3D geological domains using unstructured grids can be realized. In this paper we introduce and summarize the most important and novel features of numerical simulation for radioactive contaminant transport in porous media when using \(r^3t\).  相似文献   
54.
55.
As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available.  相似文献   
56.
Entanglement in high-dimensional many-body systems plays an increasingly vital role in the foundations and applications of quantum physics. In the present paper, we introduce a theoretical concept which allows to categorize multipartite states by the number of degrees of freedom being entangled. In this regard, we derive computable and experimentally friendly criteria for arbitrary multipartite qudit systems that enable to examine in how many degrees of freedom a mixed state is genuine multipartite entangled.  相似文献   
57.
Visual Navigation for Mobile Robots: A Survey   总被引:4,自引:0,他引:4  
Mobile robot vision-based navigation has been the source of countless research contributions, from the domains of both vision and control. Vision is becoming more and more common in applications such as localization, automatic map construction, autonomous navigation, path following, inspection, monitoring or risky situation detection. This survey presents those pieces of work, from the nineties until nowadays, which constitute a wide progress in visual navigation techniques for land, aerial and autonomous underwater vehicles. The paper deals with two major approaches: map-based navigation and mapless navigation. Map-based navigation has been in turn subdivided in metric map-based navigation and topological map-based navigation. Our outline to mapless navigation includes reactive techniques based on qualitative characteristics extraction, appearance-based localization, optical flow, features tracking, plane ground detection/tracking, etc... The recent concept of visual sonar has also been revised. This work is partially supported by DPI 2005-09001-C03-02 and FEDER funding.  相似文献   
58.
Regional anaesthetic procedures are not popular in paediatric anaesthesia in many institutions. However, regional anaesthesia is gaining ground, especially in a "new" concept of balanced paediatric anaesthesia. The decisive argument for the use of regional anaesthesia is the prolongation of pain relief further into the postoperative phase. The minimal haemodynamic and respiratory side effects during epidural and spinal anaesthesia, the reduced narcotic requirement and the potential early mobilisation all speak in favour of practical application of these techniques. Specially adapted needles and catheters have reduced the technical limitations. The use of nerve stimulators has optimize the accuracy of needle and catheter positioning. The use of a nerve stimulator is therefore highly recommended for peripheral nerve blocks in children. On the other hand, the use of regional anaesthesia in children has potential disadvantages, which should be considered. Special knowledge and continuous training are required. Many techniques are time consuming and personnel intensive, at least temporarily, and the combination of general and regional anesthesia exposes the child to the potential risk inherent in both procedures. The aim of this paper is to discuss procedures which have gained favour in paediatric regional anaesthesia during the past few years. These include caudal, epidural and spinal anaesthesia, especially for infants with high narcotic risk, as well as fascia iliaca compartment blocks for lower extremity analgesia and penile blocks. Many peripheral nerve blocks require special experience and therefore are not discussed here, but they are used routinely by specialists in all age groups. Good anatomic and pharmacologic knowledge should be a prerequisite for all physicians who use regional anaesthetic procedures. Continuous training and critical analysis are needed for good results. Only then can such methods be introduced into routine paediatric anaesthetic practice.  相似文献   
59.
60.
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users: (i) hiding locations inside cloaking regions (CRs) and (ii) encrypting location data using private information retrieval (PIR) protocols. Previous work focused on finding good trade-offs between privacy and performance of user protection techniques, but disregarded the important issue of protecting the POI dataset D. For instance, location cloaking requires large-sized CRs, leading to excessive disclosure of POIs (O(|D|) in the worst case). PIR, on the other hand, reduces this bound to \(O(\sqrt{|D|})\), but at the expense of high processing and communication overhead. We propose hybrid, two-step approaches for private location-based queries which provide protection for both the users and the database. In the first step, user locations are generalized to coarse-grained CRs which provide strong privacy. Next, a PIR protocol is applied with respect to the obtained query CR. To protect against excessive disclosure of POI locations, we devise two cryptographic protocols that privately evaluate whether a point is enclosed inside a rectangular region or a convex polygon. We also introduce algorithms to efficiently support PIR on dynamic POI sub-sets. We provide solutions for both approximate and exact NN queries. In the approximate case, our method discloses O(1) POI, orders of magnitude fewer than CR- or PIR-based techniques. For the exact case, we obtain optimal disclosure of a single POI, although with slightly higher computational overhead. Experimental results show that the hybrid approaches are scalable in practice, and outperform the pure-PIR approach in terms of computational and communication overhead.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号