首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9545篇
  免费   176篇
  国内免费   8篇
电工技术   40篇
综合类   1篇
化学工业   846篇
金属工艺   40篇
机械仪表   84篇
建筑科学   129篇
矿业工程   5篇
能源动力   114篇
轻工业   569篇
水利工程   30篇
石油天然气   20篇
无线电   206篇
一般工业技术   479篇
冶金工业   6361篇
原子能技术   13篇
自动化技术   792篇
  2024年   10篇
  2023年   45篇
  2022年   127篇
  2021年   143篇
  2020年   115篇
  2019年   134篇
  2018年   121篇
  2017年   110篇
  2016年   142篇
  2015年   114篇
  2014年   147篇
  2013年   288篇
  2012年   236篇
  2011年   264篇
  2010年   211篇
  2009年   193篇
  2008年   179篇
  2007年   153篇
  2006年   124篇
  2005年   98篇
  2004年   80篇
  2003年   81篇
  2002年   70篇
  2001年   36篇
  2000年   34篇
  1999年   229篇
  1998年   2012篇
  1997年   1101篇
  1996年   798篇
  1995年   421篇
  1994年   345篇
  1993年   384篇
  1992年   49篇
  1991年   95篇
  1990年   56篇
  1989年   72篇
  1988年   67篇
  1987年   67篇
  1986年   69篇
  1985年   53篇
  1983年   11篇
  1982年   27篇
  1981年   43篇
  1980年   63篇
  1979年   7篇
  1978年   17篇
  1977年   140篇
  1976年   316篇
  1975年   11篇
  1973年   6篇
排序方式: 共有9729条查询结果,搜索用时 0 毫秒
131.
We present a process to automatically generate three-dimensional mesh representations of the complex, arborized cell membrane surface of cortical neurons (the principal information processing cells of the brain) from nonuniform morphological measurements. Starting from manually sampled morphological points (3D points and diameters) from neurons in a brain slice preparation, we construct a polygonal mesh representation that realistically represents the continuous membrane surface, closely matching the original experimental data. A mapping between the original morphological points and the newly generated mesh enables simulations of electrophysiolgical activity to be visualized on this new membrane representation. We compare the new mesh representation with the state of the art and present a series of use cases and applications of this technique to visualize simulations of single neurons and networks of multiple neurons.  相似文献   
132.
The following article from Human Factors and Ergonomics in Manufacturing & Service Industries, “Using ergonomic digital human modeling in evaluation of workplace design and prevention of workrelated musculoskeletal disorders onboard small fishing vessel,” by Enrique Álvarez‐Casado, Bing Zhang, Sonia Tello Sandoval and Mondelo Pedro, published online on October 11, 2011 in Wiley Online Library ( www.onlinelibrary.wiley.com ), has been retracted by agreement between the authors, the journal Editors‐in‐Chief, Waldemar Karwowski and Gavriel Salvendy, and Publisher Wiley Periodicals, Inc. The retraction has been agreed as these articles were mistakenly published after being rejected.  相似文献   
133.
Vehicular sensor networks are an emerging network paradigm, suitable for various applications in vehicular environment making use of vehicles’ sensors as data sources and Inter-Vehicle Communication systems for the transmissions. We present a solution, based on vehicular sensor networks, for gathering data from a certain geographic area while satisfying with a specific delay bound. The method leverages the time interval during which the query is active in order to make the gathering process efficient, properly alternating data muling and multi-hop forwarding strategies like in delay-bounded routing protocols. Simulations show that our proposed solution succeeds in performing efficient data gathering outperforming other solutions.  相似文献   
134.
Vapor-liquid equilibrium data for the binary systems methyl butanoate/ethanol and methyl butanoate/propan-l-ol at pressures of 114.66 and 127.99 kPa are presented. Both mixtures yield an azeotrope, the compositions (ester) of which decrease quasi-linearly as the pressure increases. The experimental data for all the binary mixtures were fitted to a suitable equation and then used for comparison with predictions by ASOG and UNIFAC methods. These group contribution models give a good estimation of activity coefficients with an overall mean error less than 5% for all cases.  相似文献   
135.
Invertible Bloom Lookup Tables (IBLTs) have been recently introduced as an extension of traditional Bloom filters. IBLTs store key-value pairs. Unlike traditional Bloom filters, IBLTs support both a lookup operation (given a key, return a value) and an operation that lists out all the key-value pairs stored. One issue with IBLTs is that there is a probability that a lookup operation will return “not found” for a key. In this paper, a technique to reduce this probability without affecting the storage requirement and only moderately increasing the search time is presented and evaluated. The results show that it can significantly reduce the probability of not returning a value that is actually stored in the IBLT. The overhead of the modified search procedure, compared to the standard IBLT search procedure, is small and has little impact on the average search time.  相似文献   
136.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
137.
138.
A model for atmospheric pollutant transport is proposed considering an advection–diffusion–reaction equation. A splitting method is used to decouple the advection, diffusion and reaction parts. A scheme based on finite volume, finite difference and backward differentiation formula is used for solving an atmospheric transport-chemistry problem.  相似文献   
139.
Modelling students' behaviours has reached a status that can only be overcome by improving the ability of predicting the results on teamwork. Indeed, teamwork is an important piece on the learning process, but understanding their mechanisms and predicting the results achieved is far from being solved by traditional classifiers. In this paper, we address the problem of predicting teamwork results, and propose a recommender system that suggests new teams, in the context of a given curricular unit. Any student, who is looking for a team, may use the system; in particular, he may ask for the best team to join, either considering all available colleagues or just the set of his previous teammates. Our system makes use of social network analysis and classification methods as the algorithmic core of the decision‐making process. System evaluation is presented through a set of experimental results, which report the performance of social network analysis and classification algorithms over real datasets.  相似文献   
140.
This paper presents a novel integrated guidance and control strategy for docking of autonomous underwater vehicles. The approach to the base, and hence the control design, is divided in two steps: (i) in the first, at higher speed, the vehicle dynamics is assumed to be underactuated, and an appropriate control law is derived to steer the vehicle towards the final docking path, achieving convergence to zero of the appropriate error variables for almost all initial conditions; (ii) in the second stage, at low speed, the vehicle is assumed to be fully actuated, and a robust control law is designed that achieves convergence to zero of the appropriate error variables for all initial conditions, in the presence of parametric model uncertainty. Simulations are presented illustrating the performance of the proposed controllers, including model uncertainty and sensor noise. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号