首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3972篇
  免费   547篇
  国内免费   3篇
电工技术   14篇
综合类   1篇
化学工业   1148篇
金属工艺   35篇
机械仪表   72篇
建筑科学   147篇
矿业工程   7篇
能源动力   60篇
轻工业   1579篇
水利工程   40篇
石油天然气   27篇
无线电   134篇
一般工业技术   599篇
冶金工业   262篇
原子能技术   3篇
自动化技术   394篇
  2024年   12篇
  2023年   43篇
  2022年   61篇
  2021年   125篇
  2020年   134篇
  2019年   137篇
  2018年   238篇
  2017年   224篇
  2016年   250篇
  2015年   230篇
  2014年   234篇
  2013年   440篇
  2012年   349篇
  2011年   344篇
  2010年   225篇
  2009年   177篇
  2008年   175篇
  2007年   209篇
  2006年   117篇
  2005年   117篇
  2004年   92篇
  2003年   103篇
  2002年   87篇
  2001年   32篇
  2000年   21篇
  1999年   27篇
  1998年   65篇
  1997年   60篇
  1996年   36篇
  1995年   32篇
  1994年   18篇
  1993年   17篇
  1992年   8篇
  1991年   5篇
  1990年   6篇
  1989年   7篇
  1988年   5篇
  1987年   2篇
  1985年   3篇
  1984年   5篇
  1982年   2篇
  1981年   7篇
  1980年   7篇
  1979年   2篇
  1978年   2篇
  1977年   6篇
  1976年   10篇
  1974年   7篇
  1969年   1篇
  1968年   1篇
排序方式: 共有4522条查询结果,搜索用时 31 毫秒
71.
We present a novel strategy for computing disparity maps from omni-directional stereo images obtained with fish-eye lenses in forest environments. At a first segmentation stage, the method identifies textures of interest to be either matched or discarded. Two of them are identified by applying the powerful Support Vector Machines approach. At a second stage, a stereovision matching process is designed based on the application of four stereovision matching constraints: epipolarity, similarity, uniqueness and smoothness. The epipolarity guides the process. The similarity and uniqueness are mapped once again through the Support Vector Machines, but under a different way to the previous case; after this an initial disparity map is obtained. This map is later filtered by applying the Discrete Simulated Annealing framework where the smoothness constraint is conveniently mapped. The combination of the segmentation and stereovision matching approaches makes the main contribution. The method is compared against the usage of simple features and combined similarity matching strategies.  相似文献   
72.
This paper presents a Web 2.0 Learning Environment, for a systematic creation of adaptive and intelligent tutoring systems. Authoring contents is made by a community of users including teachers and students. The tutoring systems adapt the contents according to the best learning style using self-organizing maps (SOMs). The SOM was trained for classifying Felder–Silverman learning styles. The most important advantage of these unsupervised neural networks is that they do not require an external teacher for presenting a training set. The approach was implemented under an authoring tool that allows the production of personalized learning material to be used under collaborative and mobile learning environments. The tutoring systems together with the neural network can also be exported to mobile devices. We present different results to the approach working under the authoring tool.  相似文献   
73.
In this paper, we present a review of the recent approaches proposed in the literature for strip-packing problems. Many of them have been concurrently published, given some similar results for the same set of benchmarks. Due to the quantity of published papers, it is difficult to ascertain the level of current research in this area.  相似文献   
74.
This paper presents a system that is able to process the information provided by a Tagged World to identify user’s behavior and to produce alarms in dangerous situations. The system inputs are signals from sensors, which are used to recognize correct behavior (action sequences) by Inductive Learning, using Data Mining techniques. The inference engine is a reasoning device that is implemented by means of Regular Grammars. It permits us to control user’s behavior. As output, the system produces and sends alarms when a user action sequence is wrong, indicating the erroneous actions, forgotten future, and so on. To test our system, the Tagged World is supposed to be at a house, where we have used RFID technology to control the objects inside it.  相似文献   
75.
76.
Virtual organizations (VOs) are formed by an alliance of organizations linked by a partnership for dealing with emerging challenges. Information and communication technologies play a fundamental role facilitating cooperation, communication and collaboration among the VO members. The formal identification and representation of Requirements Engineering (RE) for one organization have been researched to a large extent along with several elicitation techniques. However, these techniques are not adequate for covering the major challenges of RE for VO. We explore the work done in the management and RE fields to propose a model-based framework for eliciting VOs’ requirements. The goal is to analyze the VO from two points of view: border (intra-organizational, inter-organizational and extra-organizational) and abstract (intentional, organizational and operational). This article includes the framework validation with a case study and a transformation process to develop partial Business Process Diagram from the intentional models.  相似文献   
77.
A framework for stability analysis of local on‐ramp metering control strategies based on the cell transmission model is presented. Within this framework, it is possible to formulate Lyapunov and input‐state stability results for on‐ramp metering control strategies in an open section of highway with on‐ramps. Using this analysis, recommendations for the design of on‐ramp metering control laws set points are derived. Two examples on the use of such analysis are presented. One deals with the stability analysis of a local on‐ramp metering control law and the other with the design of a disturbance observer that, used in combination with the local on‐ramp metering control law, provides a more robust response to traffic regulation. Simulation results are included that confirm the possibility of using this framework to test the impact of local on‐ramp metering control strategies.  相似文献   
78.
Information Systems and e-Business Management - This study evaluates the differential effect of price promotions on brand choice across the offline and online channels of a grocery retailer. We use...  相似文献   
79.
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process.  相似文献   
80.
Higman??s lemma is an important result in infinitary combinatorics, which has been formalized in several theorem provers. In this paper we present a formalization and proof of Higman??s Lemma in the ACL2 theorem prover. Our formalization is based on a proof by Murthy and Russell, where the key termination argument is justified by the multiset relation induced by a well-founded relation. To our knowledge, this is the first mechanization of this proof.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号