首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15092篇
  免费   937篇
  国内免费   28篇
电工技术   163篇
综合类   42篇
化学工业   3087篇
金属工艺   307篇
机械仪表   314篇
建筑科学   684篇
矿业工程   45篇
能源动力   506篇
轻工业   1216篇
水利工程   123篇
石油天然气   47篇
无线电   1109篇
一般工业技术   2966篇
冶金工业   2239篇
原子能技术   117篇
自动化技术   3092篇
  2023年   145篇
  2022年   128篇
  2021年   561篇
  2020年   375篇
  2019年   383篇
  2018年   496篇
  2017年   462篇
  2016年   533篇
  2015年   465篇
  2014年   596篇
  2013年   1061篇
  2012年   972篇
  2011年   1159篇
  2010年   806篇
  2009年   749篇
  2008年   789篇
  2007年   777篇
  2006年   582篇
  2005年   506篇
  2004年   371篇
  2003年   382篇
  2002年   340篇
  2001年   216篇
  2000年   187篇
  1999年   206篇
  1998年   212篇
  1997年   183篇
  1996年   169篇
  1995年   171篇
  1994年   149篇
  1993年   137篇
  1992年   113篇
  1991年   68篇
  1990年   118篇
  1989年   116篇
  1988年   78篇
  1987年   92篇
  1986年   99篇
  1985年   100篇
  1984年   87篇
  1983年   75篇
  1982年   95篇
  1981年   90篇
  1980年   71篇
  1979年   70篇
  1978年   62篇
  1977年   74篇
  1976年   61篇
  1975年   45篇
  1974年   41篇
排序方式: 共有10000条查询结果,搜索用时 218 毫秒
991.
This paper presents the large-eddy simulation of the lid-driven cubic cavity flow by the spectral element method (SEM) using the dynamic model. Two spectral filtering techniques suitable for these simulations have been implemented. Numerical results for Reynolds number Re=12,000 are showing very good agreement with other experimental and DNS results found in the literature.  相似文献   
992.
This paper presents a model of (en)action from a conceptual and theoretical point of view. This model is used to provide solid bases to overcome the complexity of designing virtual environments for learning (VEL). It provides a common grounding for trans-disciplinary collaborations where embodiment can be perceived as the cornerstone of the project. Where virtual environments are concerned, both computer scientists and educationalists have to deal with the learner/user’s body; therefore the model provides tools with which to approach both human actions and learning processes within a threefold model. It is mainly based on neuroscientific research, including enaction and the neurophysiology of action.  相似文献   
993.
Quantum Malware     
When quantum communication networks proliferate they will likely be subject to a new type of attack by hackers, virus makers, and other malicious intruders. Here we introduce the concept of “quantum malware” to describe such human-made intrusions. We offer a simple solution for storage of quantum information in a manner, which protects quantum networks from quantum malware. This solution involves swapping the quantum information at random times between the network and isolated, distributed ancillas. It applies to arbitrary attack types, provided the protective operations are themselves not compromised.  相似文献   
994.
To promote tighter collaboration between the IEEE Intelligent Transportation Systems Society and the pervasive computing research community, the authors introduce the ITS Society and present several pervasive computing-related research topics that ITS Society researchers are working on. This department is part of a special issue on Intelligent Transportation.  相似文献   
995.
Free viewpoint action recognition using motion history volumes   总被引:5,自引:0,他引:5  
Action recognition is an important and challenging topic in computer vision, with many important applications including video surveillance, automated cinematography and understanding of social interaction. Yet, most current work in gesture or action interpretation remains rooted in view-dependent representations. This paper introduces Motion History Volumes (MHV) as a free-viewpoint representation for human actions in the case of multiple calibrated, and background-subtracted, video cameras. We present algorithms for computing, aligning and comparing MHVs of different actions performed by different people in a variety of viewpoints. Alignment and comparisons are performed efficiently using Fourier transforms in cylindrical coordinates around the vertical axis. Results indicate that this representation can be used to learn and recognize basic human action classes, independently of gender, body size and viewpoint.  相似文献   
996.
The normalization of a data cube is the ordering of the attribute values. For large multidimensional arrays where dense and sparse chunks are stored differently, proper normalization can lead to improved storage efficiency. We show that it is NP-hard to compute an optimal normalization even for 1 × 3 chunks, although we find an exact algorithm for 1 × 2 chunks. When dimensions are nearly statistically independent, we show that dimension-wise attribute frequency sorting is an optimal normalization and takes time O(dn log(n)) for data cubes of size nd. When dimensions are not independent, we propose and evaluate a several heuristics. The hybrid OLAP (HOLAP) storage mechanism is already 19-30% more efficient than ROLAP, but normalization can improve it further by 9-13% for a total gain of 29-44% over ROLAP.  相似文献   
997.
A Taxonomy and Evaluation of Dense Two-Frame Stereo Correspondence Algorithms   总被引:104,自引:9,他引:104  
Stereo matching is one of the most active research areas in computer vision. While a large number of algorithms for stereo correspondence have been developed, relatively little work has been done on characterizing their performance. In this paper, we present a taxonomy of dense, two-frame stereo methods. Our taxonomy is designed to assess the different components and design decisions made in individual stereo algorithms. Using this taxonomy, we compare existing stereo methods and present experiments evaluating the performance of many different variants. In order to establish a common software platform and a collection of data sets for easy evaluation, we have designed a stand-alone, flexible C++ implementation that enables the evaluation of individual components and that can easily be extended to include new algorithms. We have also produced several new multi-frame stereo data sets with ground truth and are making both the code and data sets available on the Web. Finally, we include a comparative evaluation of a large set of today's best-performing stereo algorithms.  相似文献   
998.
One of the persistently exciting control applications is that of disk drive servos. From the start in the early 1950s to the massive capacity commodity drives of the early 2000s, the problem of accessing data on rotating disk media has provided a wealth of control challenges to be solved. This survey paper traces the early history of disk drive control from the first disk drive in 1956 to the first commercial drive with Magneto-Resistive heads in 1990. Rather than the approach used in (Abramovitch and Franklin, 2002a) in which the histories of the components were outlined first, we will focus on the feedback loop itself in those early days. The paper will survey the different areas of the disk drive control problem and how they evolved.  相似文献   
999.
Tingshu Hu  Daniel E. Miller 《Automatica》2002,38(11):2009-2013
We present a formula for the extremes of the null controllable region of a general LTI discrete-time system with bounded inputs. For an nth order system with only real poles (not necessarily distinct), the formula is simplified to an elementary matrix function, which in turn shows that the set of the extremes coincides with a set of trajectories of the time-reversed system under bang-bang controls with n−2 or less switches.  相似文献   
1000.
Our approach for automating the negotiation of business contracts proceeds in three broad steps. First, determine the structure of the negotiation process by applying general knowledge about auctions and domain–specific knowledge about the contract subject along with preferences from potential buyers and sellers. Second, translate the determined negotiation structure into an operational specification for an auction platform. Third, after the negotiation has completed, map the negotiation results to a final contract. We have implemented a prototype which supports these steps by employing a declarative specification (in courteous logic programs) of (1) high–level knowledge about alternative negotiation structures, (2) general–case rules about auction parameters, (3) rules to map the auction parameters to a specific auction platform, and (4) special–case rules for subject domains. We demonstrate the flexibility of this approach by automatically generating several alternative negotiation structures for the domain of travel shopping in a trading agent competition.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号