首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5386篇
  免费   708篇
  国内免费   665篇
电工技术   395篇
综合类   480篇
化学工业   41篇
金属工艺   17篇
机械仪表   158篇
建筑科学   206篇
矿业工程   49篇
能源动力   35篇
轻工业   63篇
水利工程   53篇
石油天然气   21篇
武器工业   22篇
无线电   1025篇
一般工业技术   790篇
冶金工业   92篇
原子能技术   10篇
自动化技术   3302篇
  2024年   64篇
  2023年   140篇
  2022年   235篇
  2021年   251篇
  2020年   271篇
  2019年   256篇
  2018年   280篇
  2017年   300篇
  2016年   260篇
  2015年   272篇
  2014年   400篇
  2013年   390篇
  2012年   422篇
  2011年   415篇
  2010年   273篇
  2009年   287篇
  2008年   330篇
  2007年   293篇
  2006年   236篇
  2005年   226篇
  2004年   198篇
  2003年   189篇
  2002年   134篇
  2001年   107篇
  2000年   80篇
  1999年   58篇
  1998年   48篇
  1997年   56篇
  1996年   38篇
  1995年   53篇
  1994年   34篇
  1993年   33篇
  1992年   21篇
  1991年   19篇
  1990年   15篇
  1989年   6篇
  1988年   4篇
  1987年   6篇
  1986年   4篇
  1985年   11篇
  1984年   4篇
  1983年   9篇
  1982年   7篇
  1980年   2篇
  1979年   3篇
  1978年   4篇
  1977年   2篇
  1976年   4篇
  1975年   4篇
  1956年   2篇
排序方式: 共有6759条查询结果,搜索用时 0 毫秒
1.
Number entry is a ubiquitous activity and is often performed in safety- and mission-critical procedures, such as healthcare, science, finance, aviation and in many other areas. We show that Monte Carlo methods can quickly and easily compare the reliability of different number entry systems. A surprising finding is that many common, widely used systems are defective, and induce unnecessary human error. We show that Monte Carlo methods enable designers to explore the implications of normal and unexpected operator behaviour, and to design systems to be more resilient to use error. We demonstrate novel designs with improved resilience, implying that the common problems identified and the errors they induce are avoidable.  相似文献   
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
3.
ABSTRACT

The concept of digital game-based learning (DGBL) evolves rapidly together with technological enhancements of virtual reality (VR) and smart phones. However, the mental workload (MWL) that VR-training applications demand and motivational qualities originating from user experience (UX) should be identified in order to create effective and enjoyable training/learning challenges that fit with individual users’ capabilities. This study examined the effects of reality-based interaction (RBI) and VR on measures of student motivation and MWL, in a mental arithmetic game for secondary school pupils. In a randomised controlled trial with sixty school children, a mental arithmetic game was tested with three different interaction and two different presentation methods – VR RBI, VR head-mounted-display tapping and tablet flick-gesture. Results found a significant effect of RBI on MWL but no differences in enjoyment of training were found between VR-experience and tablet training-experience. In fact, adding the gaming-context to the mental arithmetic task created an enjoyable, motivating experience regardless of presentation or interaction-style.  相似文献   
4.
基于击键动力学和口令的双因素用户验证   总被引:1,自引:0,他引:1  
提出基于击键动力学和口令的一种新的身份验证方法,该方法监视用户在输入口令时的用户击键特征的有关数据,通过采用监视键盘输入时一种新的三键持续时间的击键特征表示,用一种表示用户节奏的相对击键速度的距离衡量方式,在正常样本上建立用户模式,然后用新样本与用户模式的距离匹配情况来验证用户身份的合法性。实验表明该方法简单实用,识别效率高。  相似文献   
5.
本文描述在Unix环境下开发的通用绘图软件NuSlide中的图形用户界面的设计思想和实际方法。其特点是基子面向对象的技术,提供多窗口、菜单驱动、选择面板、键盘输入等多种才法。该图形用户界面具有灵活性、可扩充性和易使用性。  相似文献   
6.
蔡士杰  张福炎 《计算机学报》1991,14(10):790-797
本文介绍了一个用户接口管理系统NUUIMS的设计和实现.重点叙述了该系统基于规范化目标用户接口模型的设计思想,系统组成及描述方法.文章也讨论了使用NUUIMS设计而成的用户接口的特点.  相似文献   
7.
Two studies are presented. The first aimed to identify possible barriers to the uptake and use of commonly available telephony features and to determine whether greater knowledge of features/access codes and availability of user manuals could increase feature usage under certain conditions. Results showed that feature-usage patterns were not affected by any of the manipulations, but that they were determined by specific job demands. Using Constantine and Lockwood's (1999) conceptualization of user roles, a method to support feature bundling decisions for specific target markets was developed and tested in the second study. The method - Strategic User Needs Analysis (SUNA) - was shown to yield a useful balance between high- and low-level information about selected roles. SUNA provided sufficient information to distinguish between PDA feature usage patterns of two similar target user groups as well as to suggest additional features each of the two target groups would find useful. The development of SUNA and observational findings of actual PDA usage are reported.  相似文献   
8.
Five experiments addressed the role of color grouping in preview search (D. G. Watson & G. W. Humphreys, 1997). Experiment 1 used opposite color ratios of distractors in preview and second search displays, creating equal numbers of distractors in each color group in the final display. There was selective slowing for new targets carrying the majority color of the old items. This effect held when there was no bias in the preview and only the second search set had an uneven color ratio (Experiment 2). In Experiment 3, participants had foreknowledge of the target color, and effects were shown over and above those due to color biases. Experiment 4 demonstrated negative color carryover even when previews changed color. Experiment 5 showed reduced color carryover effects when previews were presented more briefly. Collectively, the results provide evidence for inhibitory carryover effects in preview search based on feature grouping. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
9.
Directional features extracted from Gabor wavelets responses were used to train a structure of self-organising maps, thus classifying each pixel in the image within a neuron-map. Resulting directional primitives were grouped into perceptual primitives introducing an extended 4D Hough transform to group pixels with similar directional features. These can then be used as perceptual primitives to detect salient structures. The proposed method has independently fixed parameters that do not need to be tuned for different kind or quality of images. We present results in application to noisy FLIR images and show that line primitives for complex structures, such as bridges, or simple structures, such as runways, can be found by this approach. We compare and demonstrate the quality of our results with those obtained through a parameter-dependent traditional Canny edge detector and Hough line finding process.  相似文献   
10.
Pazzani  Michael  Billsus  Daniel 《Machine Learning》1997,27(3):313-331
We discuss algorithms for learning and revising user profiles that can determine which World Wide Web sites on a given topic would be interesting to a user. We describe the use of a naive Bayesian classifier for this task, and demonstrate that it can incrementally learn profiles from user feedback on the interestingness of Web sites. Furthermore, the Bayesian classifier may easily be extended to revise user provided profiles. In an experimental evaluation we compare the Bayesian classifier to computationally more intensive alternatives, and show that it performs at least as well as these approaches throughout a range of different domains. In addition, we empirically analyze the effects of providing the classifier with background knowledge in form of user defined profiles and examine the use of lexical knowledge for feature selection. We find that both approaches can substantially increase the prediction accuracy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号