首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1637篇
  免费   90篇
  国内免费   4篇
电工技术   12篇
综合类   1篇
化学工业   402篇
金属工艺   40篇
机械仪表   22篇
建筑科学   95篇
矿业工程   13篇
能源动力   35篇
轻工业   231篇
水利工程   13篇
石油天然气   8篇
无线电   120篇
一般工业技术   275篇
冶金工业   223篇
原子能技术   5篇
自动化技术   236篇
  2023年   29篇
  2022年   29篇
  2021年   75篇
  2020年   57篇
  2019年   60篇
  2018年   50篇
  2017年   48篇
  2016年   50篇
  2015年   47篇
  2014年   63篇
  2013年   108篇
  2012年   99篇
  2011年   102篇
  2010年   74篇
  2009年   67篇
  2008年   54篇
  2007年   62篇
  2006年   57篇
  2005年   58篇
  2004年   34篇
  2003年   27篇
  2002年   35篇
  2001年   15篇
  2000年   19篇
  1999年   19篇
  1998年   38篇
  1997年   20篇
  1996年   25篇
  1995年   21篇
  1994年   22篇
  1993年   16篇
  1992年   11篇
  1991年   11篇
  1990年   13篇
  1989年   13篇
  1988年   14篇
  1987年   13篇
  1986年   15篇
  1984年   10篇
  1983年   7篇
  1982年   9篇
  1981年   8篇
  1980年   7篇
  1979年   7篇
  1976年   14篇
  1975年   11篇
  1974年   15篇
  1973年   9篇
  1970年   9篇
  1969年   7篇
排序方式: 共有1731条查询结果,搜索用时 593 毫秒
31.
Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence. We collectively refer to the convergence of different technology sectors as the internet of blended environment. The proposed approach encompasses an ensemble of heterogeneous probabilistic autoencoders that leverage the corresponding advantages of a convolutional variational autoencoder and long short-term memory variational autoencoder. An extensive experimental analysis conducted on the TON_IoT dataset demonstrated 96.02% detection accuracy. Furthermore, performance of the proposed approach was compared with various single model (autoencoder)-based network intrusion detection approaches: autoencoder, variational autoencoder, convolutional variational autoencoder, and long short-term memory variational autoencoder. The proposed model outperformed all compared models, demonstrating F1-score improvements of 4.99%, 2.25%, 1.92%, and 3.69%, respectively.  相似文献   
32.

Organizations are increasingly delegating customer inquiries to speech dialog systems (SDSs) to save personnel resources. However, customers often report frustration when interacting with SDSs due to poorly designed solutions. Despite these issues, design knowledge for SDSs in customer service remains elusive. To address this research gap, we employ the design science approach and devise a design theory for SDSs in customer service. The design theory, including 14 requirements and five design principles, draws on the principles of dialog theory and undergoes validation in three iterations using five hypotheses. A summative evaluation comprising a two-phase experiment with 205 participants yields positive results regarding the user experience of the artifact. This study contributes to design knowledge for SDSs in customer service and supports practitioners striving to implement similar systems in their organizations.

  相似文献   
33.
The time-dependent Stokes equations were solved in the vicinity of two spheres colliding in a viscous fluid with viscosity ν to determine the rate of change of the hydrodynamic forces during large accelerations associated with Hertzian mechanical contact of small duration \({\tau_{\rm c}}\). It was assumed that the gap clearance remains finite during contact and is approximately equal to the height σ of surface micro-asperities. The initial condition corresponds to the steady-state axisymmetric solution of Cooley and O’Neill (Mathematika 16:37–49, 1969), and the initial value problem for the time-dependent Stokes streamfunction was solved using Laplace transform methods. Assuming that σ is small compared to the sphere radius a, we used singular perturbation expansions and tangent-sphere coordinates to obtain an asymptotic solution for the viscous flow in the gap and around the moving sphere. The solution provides the dependence of the resistance, added mass and history forces on σ, the sphere velocity and acceleration, and the ratio of the sphere diameters. We found that the relative importance of viscous and mechanical forces during contact depends on a new Stokes number \({St_{\rm c}=\sigma^2/\nu \tau_{\rm c}}\). Integration of Newton’s equation for the motion of the sphere during mechanical contact showed that there is a critical \({St_{\rm c}=O(\sigma/a)}\) for which there is no rebound at the end of contact.  相似文献   
34.
This paper proposes a scenario-based two-stage stochastic programming model with recourse for master production scheduling under demand uncertainty. We integrate the model into a hierarchical production planning and control system that is common in industrial practice. To reduce the problem of the disaggregation of the master production schedule, we use a relatively low aggregation level (compared to other work on stochastic programming for production planning). Consequently, we must consider many more scenarios to model demand uncertainty. Additionally, we modify standard modelling approaches for stochastic programming because they lead to the occurrence of many infeasible problems due to rolling planning horizons and interdependencies between master production scheduling and successive planning levels. To evaluate the performance of the proposed models, we generate a customer order arrival process, execute production planning in a rolling horizon environment and simulate the realisation of the planning results. In our experiments, the tardiness of customer orders can be nearly eliminated by the use of the proposed stochastic programming model at the cost of increasing inventory levels and using additional capacity.  相似文献   
35.
Kalashnyk  Nataliya  Ledieu  Julian  Gaudry  Émilie  Cui  Can  Tsai  An-Pang  Fournée  Vincent 《Nano Research》2018,11(4):2129-2138
Nano Research - The formation of long-range ordered aperiodic molecular films on quasicrystalline substrates is a new challenge that provides an opportunity for further surface functionalization....  相似文献   
36.
The present study investigates the impact of the experience of role playing a violent character in a video game on attitudes towards violent crimes and criminals. People who played the violent game were found to be more acceptable of crimes and criminals compared to people who did not play the violent game. More importantly, interaction effects were found such that people were more acceptable of crimes and criminals outside the game if the criminals were matched with the role they played in the game and the criminal actions were similar to the activities they perpetrated during the game. The results indicate that people’s virtual experience through role-playing games can influence their attitudes and judgments of similar real-life crimes, especially if the crimes are similar to what they conducted while playing games. Theoretical and practical implications are discussed.  相似文献   
37.
Rafael  Bonifacio  Nicolas  Julian 《Neurocomputing》2009,72(16-18):3631
In this paper we explore the interest of computational intelligence tools in the management of heterogeneous communication networks, specifically to predict congestion, failures and other anomalies in the network that may eventually lead to degradation of the quality of offered services. We show two different applications based on neural and neuro-fuzzy systems for quality of service (QoS) management in next generation networks for voice and video service over heterogeneous Internet protocol (V2oIP) services. The two examples explained in this paper attempt to predict the communication network resources for new incoming calls, and visualizing the QoS of a communication network by means of self-organizing maps.  相似文献   
38.
Similarity-guided streamline placement with error evaluation   总被引:3,自引:0,他引:3  
Most streamline generation algorithms either provide a particular density of streamlines across the domain or explicitly detect features, such as critical points, and follow customized rules to emphasize those features. However, the former generally includes many redundant streamlines, and the latter requires Boolean decisions on which points are features (and may thus suffer from robustness problems for real-world data). We take a new approach to adaptive streamline placement for steady vector fields in 2D and 3D. We define a metric for local similarity among streamlines and use this metric to grow streamlines from a dense set of candidate seed points. The metric considers not only Euclidean distance, but also a simple statistical measure of shape and directional similarity. Without explicit feature detection, our method produces streamlines that naturally accentuate regions of geometric interest. In conjunction with this method, we also propose a quantitative error metric for evaluating a streamline representation based on how well it preserves the information from the original vector field. This error metric reconstructs a vector field from points on the streamline representation and computes a difference of the reconstruction from the original vector field.  相似文献   
39.
Toxicoproteomics is the use of proteomic technologies to better understand environmental and genetic factors, toxic mechanisms, and modes of action in response to acute exposure to toxicants and in the long-term development of diseases caused or influenced by these exposures. Use of toxicoproteomic technologies to identify key biochemical pathways, mechanisms, and biomarkers of exposure and toxicity will decrease the uncertainties that are associated with human health risk assessments. This review provides an overview of toxicoproteomics from human health risk assessment perspectives. Key toxicoproteomic technologies such as 2-D gel-based proteomic methods and toxicoproteomic approaches are described, and examples of applications of these technologies and methodologies in the risk assessment context are presented. The discussion includes a focus on challenges and future directions.  相似文献   
40.
A novel method for the generation of synthetic on-line signatures based on the spectral analysis and the Kinematic Theory of rapid human movements, was presented in Part I of this series of two papers. In the present paper, the experimental framework used for the validation of the novel approach is described. The validation protocol, which uses different development and test sets in order to achieve unbiased results, includes the comparison of real and synthetic databases in terms of (i) visual appearance, (ii) statistical information, and (iii) performance evaluation of three competitive and totally different verification systems. The experimental results show the high similarity existing between synthetically generated and humanly produced samples, and the great potential of the method for the study of the signature trait.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号