首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1286篇
  免费   59篇
  国内免费   3篇
电工技术   15篇
综合类   2篇
化学工业   339篇
金属工艺   19篇
机械仪表   35篇
建筑科学   62篇
矿业工程   2篇
能源动力   39篇
轻工业   140篇
水利工程   9篇
无线电   115篇
一般工业技术   192篇
冶金工业   70篇
原子能技术   11篇
自动化技术   298篇
  2023年   13篇
  2022年   20篇
  2021年   58篇
  2020年   24篇
  2019年   27篇
  2018年   33篇
  2017年   33篇
  2016年   57篇
  2015年   30篇
  2014年   39篇
  2013年   97篇
  2012年   82篇
  2011年   93篇
  2010年   68篇
  2009年   74篇
  2008年   61篇
  2007年   65篇
  2006年   62篇
  2005年   48篇
  2004年   48篇
  2003年   37篇
  2002年   36篇
  2001年   19篇
  2000年   17篇
  1999年   15篇
  1998年   26篇
  1997年   27篇
  1996年   13篇
  1995年   18篇
  1994年   18篇
  1993年   12篇
  1992年   10篇
  1991年   7篇
  1990年   4篇
  1989年   5篇
  1988年   7篇
  1987年   2篇
  1986年   2篇
  1985年   3篇
  1984年   5篇
  1983年   9篇
  1982年   2篇
  1980年   2篇
  1979年   3篇
  1977年   2篇
  1976年   2篇
  1973年   2篇
  1970年   2篇
  1963年   1篇
  1903年   1篇
排序方式: 共有1348条查询结果,搜索用时 390 毫秒
991.
992.
We present a new coaxial antenna for microwave interstitial coagulative therapy, working at 2450 MHz and endowed with a miniaturized sleeve choke in order to reduce back heating effects and make the system response less dependent on the antenna insertion depth into the tissue; the way the choke is implemented makes the overall transversal size minimum and allows small adjustments of the choke section length even during operation. We describe the main technical features of the antenna and show experimental results clearly proving the choke effectiveness. Numerical simulations well agree with experimental data, confirming the suitability of the proposed device for minimally invasive medical applications.  相似文献   
993.
The mechanical behavior of nanostructured spherical submicrometer titania particles was studied by in situ uniaxial compression experiments in the scanning and transmission electron microscope (SEM and TEM). Mesoporous and amorphous titania particles were prepared by a wet chemical sol‐gel approach. To obtain nanocrystalline (nc) single‐phase anatase and rutile particles the amorphous particles were crystallized by high‐temperature annealing. For each sample the deformation behavior of at least 50 particles was investigated by in situ compression experiments in the SEM. In all cases an elastic – predominantly plastic deformation behavior accompanied by crack initiation at exceptionally high engineering strain values of several percent were observed. Crack propagation presumably along grain boundaries and a Weibull distributed fracture stress was shown for all nc particles. Complementary in situ TEM experiments and ex situ analysis of focused ion beam prepared particle cross‐sections were carried out to identify the underlying deformation mechanisms. Grain rotations and grain sliding are observed for nc anatase particles during in situ compression and are further identified to be linked to a densification of the mesoporous particle structure. Our dedicated preparation and quantitative in situ characterization methodology provides an excellent basis for a better understanding of the mechanical behavior of advanced ceramics.  相似文献   
994.
995.
Variable-Bit-Rate (VBR) video transmission over UMTS networks is assuming an ever growing importance, then scheduling VBR data over wireless channels attracts great interest today. This paper proposes an on-line PI control algorithm for easily and suitably scheduling interactive multimedia transmission of VBR video streams. It dynamically adapts the transmitted bit rate to the user's actions that can suddenly and highly modify the client buffer level. The Real-time Transport Control Protocol (RTCP) packets periodically feed back the buffer level to the server for keeping the free buffer space at 50% of its capacity, so as to prevent both buffer overflow and underflow. Numerical results of different simulated scenarios show the effectiveness of the proposed controller in comparison with two well-established algorithms, enhanced with RTCP information.  相似文献   
996.
This paper proposes an improved voice activity detection (VAD) algorithm using wavelet and support vector machine (SVM) for European Telecommunication Standards Institution (ETSI) adaptive multi-rate (AMR) narrow-band (NB) and wide-band (WB) speech codecs. First, based on the wavelet transform, the original IIR filter bank and pitch/tone detector are implemented, respectively, via the wavelet filter bank and the wavelet-based pitch/tone detection algorithm. The wavelet filter bank can divide input speech signal into several frequency bands so that the signal power level at each sub-band can be calculated. In addition, the background noise level can be estimated in each sub-band by using the wavelet de-noising method. The wavelet filter bank is also derived to detect correlated complex signals like music. Then the proposed algorithm can apply SVM to train an optimized non-linear VAD decision rule involving the sub-band power, noise level, pitch period, tone flag, and complex signals warning flag of input speech signals. By the use of the trained SVM, the proposed VAD algorithm can produce more accurate detection results. Various experimental results carried out from the Aurora speech database with different noise conditions show that the proposed algorithm gives considerable VAD performances superior to the AMR-NB VAD Options 1 and 2, and AMR-WB VAD.  相似文献   
997.
The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the “productivity paradoxon” of the 1990s, Carr’s widely recognized paper “IT doesn’t matter”, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain “IS business value”. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research.  相似文献   
998.
This is the second part of a large survey paper in which we analyze recent literature on Formal Concept Analysis (FCA) and some closely related disciplines using FCA. We collected 1072 papers published between 2003 and 2011 mentioning terms related to Formal Concept Analysis in the title, abstract and keywords. We developed a knowledge browsing environment to support our literature analysis process. We use the visualization capabilities of FCA to explore the literature, to discover and conceptually represent the main research topics in the FCA community. In this second part, we zoom in on and give an extensive overview of the papers published between 2003 and 2011 which applied FCA-based methods for knowledge discovery and ontology engineering in various application domains. These domains include software mining, web analytics, medicine, biology and chemistry data.  相似文献   
999.
A new methodology is introduced that leverages data harvested from social media for tasking the collection of remote-sensing imagery during disasters or emergencies. The images are then fused with multiple sources of contributed data for the damage assessment of transportation infrastructure. The capability is valuable in situations where environmental hazards such as hurricanes or severe weather affect very large areas. During these types of disasters it is paramount to ‘cue’ the collection of remote-sensing images to assess the impact of fast-moving and potentially life-threatening events. The methodology consists of two steps. First, real-time data from Twitter are monitored to prioritize the collection of remote-sensing images for evolving disasters. Commercial satellites are then tasked to collect high-resolution images of these areas. Second, a damage assessment of transportation infrastructure is carried out by fusing the tasked images with contributed data harvested from social media such as Flickr and Twitter, and any additional available data. To demonstrate its feasibility, the proposed methodology is applied and tested on the 2013 Colorado floods with a special emphasis in Boulder County and the cities of Boulder and Longmont.  相似文献   
1000.
By definition, regulatory rules (in legal context called norms) intend to achieve specific behaviour from business processes, and might be relevant to the whole or part of a business process. They can impose conditions on different aspects of process models, e.g., control-flow, data and resources etc. Based on the rules sets, norms can be classified into various classes and sub-classes according to their effects. This paper presents an abstract framework consisting of a list of norms and a generic compliance checking approach on the idea of (possible) execution of processes. The proposed framework is independent of any existing formalism, and provides a conceptually rich and exhaustive ontology and semantics of norms needed for business process compliance checking. Apart from the other uses, the proposed framework can be used to compare different compliance management frameworks (CMFs).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号