首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   479篇
  免费   25篇
  国内免费   1篇
电工技术   2篇
综合类   1篇
化学工业   75篇
金属工艺   4篇
机械仪表   9篇
建筑科学   27篇
能源动力   11篇
轻工业   55篇
水利工程   3篇
石油天然气   3篇
无线电   54篇
一般工业技术   104篇
冶金工业   70篇
原子能技术   3篇
自动化技术   84篇
  2023年   4篇
  2022年   1篇
  2021年   16篇
  2020年   13篇
  2019年   7篇
  2018年   8篇
  2017年   10篇
  2016年   14篇
  2015年   12篇
  2014年   20篇
  2013年   38篇
  2012年   28篇
  2011年   32篇
  2010年   23篇
  2009年   21篇
  2008年   26篇
  2007年   29篇
  2006年   14篇
  2005年   23篇
  2004年   15篇
  2003年   12篇
  2002年   10篇
  2001年   8篇
  2000年   3篇
  1999年   4篇
  1998年   27篇
  1997年   14篇
  1996年   10篇
  1995年   8篇
  1994年   10篇
  1993年   7篇
  1992年   6篇
  1991年   5篇
  1988年   1篇
  1987年   2篇
  1986年   4篇
  1985年   1篇
  1984年   3篇
  1983年   5篇
  1982年   1篇
  1981年   1篇
  1980年   2篇
  1977年   3篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
排序方式: 共有505条查询结果,搜索用时 15 毫秒
1.
Spectrum asked three IEEE members from the telecommunications sector to comment on the industry's current woes and prospects. Roch Guerin discusses bandwidth as a commodity and how to deal with it. The impact of technological change on telecommunications is enormous and calls for a shift in business models. Technology is making bandwidth a commodity and it should not matter who supplies it. Competition is vital and commodity providers must be decoupled from value providers. Frank Ferrante points out that the Year 2000 crisis resulted in manufacturers being deluged with orders for new upgraded systems. Vast sums were spent to meet the demand in time. However, when Y2K was over, production stayed high and inventories continued to build, while demand effectively stopped overnight. Dazzling new innovations are needed to compel the masses to spend and manufacturers must apply their resources to deliver quickly and efficiently. Jules A. Bellisio discusses the role of engineers in bringing new ideas to the market place. Many engineers have put together ventures for the sole purpose of attracting capital. The underlying technology and business propositions were there solely to lure the unsuspecting. By allowing engineers to use technology simply to cover for a scam, then the profession is also to blame for the current problems.  相似文献   
2.
This paper presents the results of in vivo measurements on a worker from a fuel reprocessing plant who was involved in an actinide intake. The results revealed that false indications of an actinide lung burden could arise from a contaminant present elsewhere in the chest region. Consequently, it is important that lung monitoring programs for occupational workers handling actinides are conducted with this caution in mind and that due consideration is given even in cases of minor cuts/wounds in order to rule out substantial overestimation of internal radiation doses.  相似文献   
3.
In this paper, we propose a logic of argumentation for the specification and verification (LA4SV) of requirements on Dung??s abstract argumentation frameworks. We distinguish three kinds of decision problems for argumentation verification, called extension verification, framework verification, and specification verification respectively. For example, given a political requirement like ??if the argument to increase taxes is accepted, then the argument to increase services must be accepted too,?? we can either verify an extension of acceptable arguments, or all extensions of an argumentation framework, or all extensions of all argumentation frameworks satisfying a framework specification. We introduce the logic of argumentation verification to specify such requirements, and we represent the three verification problems of argumentation as model checking and theorem proving properties of the logic. Moreover, we recast the logic of argumentation verification in a modal framework, in order to express multiple extensions, and properties like transitivity and reflexivity of the attack relation. Finally, we introduce a logic of meta-argumentation where abstract argumentation is used to reason about abstract argumentation itself. We define the logic of meta-argumentation using the fibring methodology in such a way to represent attack relations not only among arguments but also among attacks. We show how to use this logic to verify the requirements of argumentation frameworks where higher-order attacks are allowed [A preliminary version of the logic of argumentation compliance was called the logic of abstract argumentation?(2005).]  相似文献   
4.
Supplementation with anthocyanins, which are a type of flavonoids mainly found in various berries, is hypothesized to be a promising approach to lower the risk of developing cognitive decline. The aim of this systematic review was to provide a comprehensive overview of dietary intervention trials describing effects of berry anthocyanins on cognitive performance in humans, while also addressing potential underlying mechanisms. A total of 1197 articles were identified through a systematic search, and 49 studies reporting effects on cognitive performance (n = 18), vascular function (n = 22), or cardiometabolic risk markers (n = 32) were included. Significant improvements were observed on memory, while some of the studies also reported effects on attention and psychomotor speed or executive function. Vascular function markers such as brachial artery flow-mediated vasodilation were also affected and consistent evidence was provided for the beneficial effects of berry anthocyanins on endothelial function. Finally, studies reported improvements in blood pressure, but effects on metabolic risk markers (e.g. carbohydrate and lipid metabolism) were less consistent. In conclusion, this review provides evidence for the beneficial effects of berry anthocyanins on cognitive performance as memory improved. Whether observed anthocyanin-induced improvements in vascular function and blood pressure underlie beneficial effects on cognitive performance warrants further study.  相似文献   
5.
6.
Object detection (OD) is used for visual quality control in factories. Images that compose training datasets are often collected directly from the production line and labeled with bounding boxes manually. Such data represent well the inference context but might lack diversity, implying a risk of overfitting. To address this issue, we propose a dataset construction method based on an automated pipeline, which receives a CAD model of an object and returns a set of realistic synthetic labeled images (code publicly available). Our approach can be easily used by non-expert users and is relevant for industrial applications, where CAD models are widely available. We performed experiments to compare the use of datasets obtained by the two different ways—collecting and labeling real images or applying the proposed automated pipeline—in the classification of five different industrial parts. To ensure that both approaches can be used without deep learning expertise, all training parameters were kept fixed during these experiments. In our results, both methods were successful for some objects but failed for others. However, we have shown that the combined use of real and synthetic images led to better results. This finding has the potential to make industrial OD models more robust to poor data collection and labeling errors, without increasing the difficulty of the training process.  相似文献   
7.
The electromigration process has the potential capability to move atoms one by one when properly controlled. It is therefore an appealing tool to tune the cross section of monoatomic compounds with ultimate resolution or, in the case of polyatomic compounds, to change the stoichiometry with the same atomic precision. As demonstrated here, a combination of electromigration and anti‐electromigration can be used to reversibly displace atoms with a high degree of control. This enables a fine adjustment of the superconducting properties of Al weak links, whereas in Nb the diffusion of atoms leads to a more irreversible process. In a superconductor with a complex unit cell (La2?x Cex CuO4), the electromigration process acts selectively on the oxygen atoms with no apparent modification of the structure. This allows to adjust the doping of this compound and switch from a superconducting to an insulating state in a nearly reversible fashion. In addition, the conditions needed to replace feedback controlled electromigration by a simpler technique of electropulsing are discussed. These findings have a direct practical application as a method to explore the dependence of the characteristic parameters on the exact oxygen content and pave the way for a reversible control of local properties of nanowires.  相似文献   
8.
Summary The configurational analysis of racemic and optically active stereoisomers of 4-[(1-methylpropyl)oxycarbonyl]-2-oxetanone has been carried out by using chiral gas chromatography. This technique has been successful in the stereoisomers composition determination of these -substituted -lactones prepared by two different routes and used as monomers in the preparation of malic acid stereocopolymers. Result are in good agreement with those obtained from high resolution 1H NMR, in the presence of an Europium salt, as chiral shift reagent. This method has been extended to 3-methyl-4-[(1,2,2-trimethyl propyl)oxycarbonyl]-2-oxetanone. The exact knowledge of precursors configurational structure is very important in regard to the obtention of the corresponding polystereoisomers with a strictly controlled enantiomeric or diastereoisomeric composition and consequently with predictable properties.  相似文献   
9.
Malware classification based on call graph clustering   总被引:1,自引:0,他引:1  
Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based on call graph clustering. By representing malware samples as call graphs, it is possible to abstract certain variations away, enabling the detection of structural similarities between samples. The ability to cluster similar samples together will make more generic detection techniques possible, thereby targeting the commonalities of the samples within a cluster. To compare call graphs mutually, we compute pairwise graph similarity scores via graph matchings which approximately minimize the graph edit distance. Next, to facilitate the discovery of similar malware samples, we employ several clustering algorithms, including k-medoids and Density-Based Spatial Clustering of Applications with Noise (DBSCAN). Clustering experiments are conducted on a collection of real malware samples, and the results are evaluated against manual classifications provided by human malware analysts. Experiments show that it is indeed possible to accurately detect malware families via call graph clustering. We anticipate that in the future, call graphs can be used to analyse the emergence of new malware families, and ultimately to automate implementation of generic detection schemes.  相似文献   
10.
Seven flying robot “fairies” joined human actors in the Texas A&;M production of William Shakespeare’s A Midsummer Night’s Dream. The production was a collaboration between the departments of Computer Science and Engineering, Electrical and Computer Engineering, and Theater Arts. The collaboration was motivated by two assertions. First, that the performing arts have principles for creating believable agents that will transfer to robots. Second, the theater is a natural testbed for evaluating the response of untrained human groups (both actors and the audience) to robots interacting with humans in shared spaces, i.e., were believable agents created? The production used two types of unmanned aerial vehicles, an AirRobot 100-b quadrotor platform about the size of a large pizza pan, and six E-flite Blade MCX palm-sized toy helicopters. The robots were used as alter egos for fairies in the play; the robots did not replace any actors, instead they were paired with them. The insertion of robots into the production was not widely advertised so the audience was the typical theatergoing demographic, not one consisting of people solely interested technology. The use of radio-controlled unmanned aerial vehicles provides insights into what types of autonomy are needed to create appropriate affective interactions with untrained human groups. The observations from the four weeks of practice and eight performances contribute (1) a taxonomy and methods for creating affect exchanges between robots and untrained human groups, (2) the importance of improvisation within robot theater, (3) insights into how untrained human groups form expectations about robots, and (4) awareness of the importance of safety and reliability as a design constraint for public engagement with robot platforms. The taxonomy captures that apparent affect can be created without explicit affective behaviors by the robot, but requires talented actors to convey the situation or express reactions. The audience’s response to robot crashes was a function of whether they had the opportunity to observe how the actors reacted to robot crashes on stage, suggesting that pre-existing expectations must be taken into account in the design of autonomy. Furthermore, it appears that the public expect robots to be more reliable (an expectation of consumer product hardening) and safe (an expectation from product liability) than the current capabilities and this may be a major challenge or even legal barrier for introducing robots into shared public spaces. These contributions are expected to inform design strategies for increasing public engagement with robot platforms through affect, and shows the value of arts-based approaches to public encounters with robots both for generating design strategies and for evaluation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号