首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2120篇
  免费   109篇
  国内免费   6篇
电工技术   29篇
综合类   13篇
化学工业   622篇
金属工艺   42篇
机械仪表   49篇
建筑科学   126篇
矿业工程   2篇
能源动力   60篇
轻工业   190篇
水利工程   6篇
石油天然气   5篇
无线电   134篇
一般工业技术   362篇
冶金工业   262篇
原子能技术   17篇
自动化技术   316篇
  2023年   21篇
  2022年   39篇
  2021年   42篇
  2020年   28篇
  2019年   45篇
  2018年   44篇
  2017年   37篇
  2016年   62篇
  2015年   73篇
  2014年   70篇
  2013年   88篇
  2012年   93篇
  2011年   153篇
  2010年   111篇
  2009年   104篇
  2008年   91篇
  2007年   98篇
  2006年   72篇
  2005年   80篇
  2004年   70篇
  2003年   52篇
  2002年   48篇
  2001年   30篇
  2000年   32篇
  1999年   52篇
  1998年   80篇
  1997年   52篇
  1996年   41篇
  1995年   30篇
  1994年   23篇
  1993年   33篇
  1992年   18篇
  1991年   27篇
  1990年   30篇
  1989年   20篇
  1988年   20篇
  1987年   25篇
  1986年   22篇
  1985年   17篇
  1984年   17篇
  1983年   8篇
  1982年   10篇
  1981年   16篇
  1979年   8篇
  1977年   8篇
  1976年   12篇
  1975年   12篇
  1974年   11篇
  1972年   9篇
  1969年   9篇
排序方式: 共有2235条查询结果,搜索用时 31 毫秒
51.
This paper focuses on a bi-objective experimental evaluation of online scheduling in the Infrastructure as a Service model of Cloud computing regarding income and power consumption objectives. In this model, customers have the choice between different service levels. Each service level is associated with a price per unit of job execution time, and a slack factor that determines the maximal time span to deliver the requested amount of computing resources. The system, via the scheduling algorithms, is responsible to guarantee the corresponding quality of service for all accepted jobs. Since we do not consider any optimistic scheduling approach, a job cannot be accepted if its service guarantee will not be observed assuming that all accepted jobs receive the requested resources. In this article, we analyze several scheduling algorithms with different cloud configurations and workloads, considering the maximization of the provider income and minimization of the total power consumption of a schedule. We distinguish algorithms depending on the type and amount of information they require: knowledge free, energy-aware, and speed-aware. First, to provide effective guidance in choosing a good strategy, we present a joint analysis of two conflicting goals based on the degradation in performance. The study addresses the behavior of each strategy under each metric. We assess the performance of different scheduling algorithms by determining a set of non-dominated solutions that approximate the Pareto optimal set. We use a set coverage metric to compare the scheduling algorithms in terms of Pareto dominance. We claim that a rather simple scheduling approach can provide the best energy and income trade-offs. This scheduling algorithm performs well in different scenarios with a variety of workloads and cloud configurations.  相似文献   
52.
Among the highly developed countries, demographic ageing is particularly advanced in Germany. Accentuated by migration, there is great regional variation in the progress of demographic change. Within urban areas, residential neighbourhoods differ considerably in their demographic composition and perspectives. Based on municipal data, this paper examines regional variability in the diversity and pace of neighbourhood-level ageing. Focusing on the Rhine-Ruhr conurbation in North Rhine-Westphalia, the analysis outlines at what pace ageing proceeds in a variety of neighbourhoods, which attract no constant influx of working-age migrants. After decades of suburbanisation, in the period from 1998 to 2008 regional migration concentrated on the central districts of large cities. More profoundly in the most prosperous cities growing in population than in other cities, childless working-age adults separate from other age groups and family types in selected central city quarters. The findings suggest that spatial differentials in ageing are likely to affect future location decisions and, thereby, regional and local prosperity.  相似文献   
53.
The ability to reliably merge independent updates of a document is a crucial prerequisite to efficient collaboration in office work. However, merge support for common office document standards like OpenDocument or OfficeOpenXML is still in its infancy. In this paper, we present a consistent versioning model for XML documents in general including merge support. This is achieved by using context-aware fingerprints that identify edit operations and allow for a conflict detection. We show how to extract tracked changes from office documents and map them on our delta model. Experimental results indicate that our fingerprinting technique is efficient and reliable.  相似文献   
54.
We consider an underactuated two‐link robot called the inertia wheel pendulum. The system consists of a free planar rotational pendulum and a symmetric disk attached to its end, which is directly controlled by a DC‐motor. The goal is to create stable oscillations of the pendulum, which is not directly actuated. We exploit a recently proposed feedback‐control design strategy based on motion planning via virtual holonomic constraints. This strategy is shown to be useful for design of regulators for achieving orbitally exponentially stable oscillatory motions. The main contribution is a step‐by‐step procedure on how to achieve oscillations with pre‐specified amplitude from a given range and an arbitrary independently chosen period. The theoretical results are verified via experiments with a real hardware setup. Copyright © 2009 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
55.
56.
57.
Biologically-inspired methods such as evolutionary algorithms and neural networks are proving useful in the field of information fusion. Artificial immune systems (AISs) are a biologically-inspired approach which take inspiration from the biological immune system. Interestingly, recent research has shown how AISs which use multi-level information sources as input data can be used to build effective algorithms for realtime computer intrusion detection. This research is based on biological information fusion mechanisms used by the human immune system and as such might be of interest to the information fusion community. The aim of this paper is to present a summary of some of the biological information fusion mechanisms seen in the human immune system, and of how these mechanisms have been implemented as AISs.  相似文献   
58.
We present a method for analytically calculating an anti‐aliased rasterization of arbitrary polygons or fonts bounded by Bézier curves in 2D as well as oriented triangle meshes in 3D. Our algorithm rasterizes multiple resolutions simultaneously using a hierarchical wavelet representation and is robust to degenerate inputs. We show that using the simplest wavelet, the Haar basis, is equivalent to performing a box‐filter to the rasterized image. Because we evaluate wavelet coefficients through line integrals in 2D, we are able to derive analytic solutions for polygons that have Bézier curve boundaries of any order, and we provide solutions for quadratic and cubic curves. In 3D, we compute the wavelet coefficients through analytic surface integrals over triangle meshes and show how to do so in a computationally efficient manner.  相似文献   
59.
We present a method for calculating the boundary of objects from Discrete Indicator Functions that store 2‐material volume fractions with a high degree of accuracy. Although Marching Cubes and its derivatives are effective methods for calculating contours of functions sampled over discrete grids, these methods perform poorly when contouring non‐smooth functions such as Discrete Indicator Functions. In particular, Marching Cubes will generate surfaces that exhibit aliasing and oscillations around the exact surface. We derive a simple solution to remove these problems by using a new function to calculate the positions of vertices along cell edges that is efficient, easy to implement, and does not require any optimization or iteration. Finally, we provide empirical evidence that the error introduced by our contouring method is significantly less than is introduced by Marching Cubes.  相似文献   
60.
Metaphors are often used to provide the user with a mental model to ease the use of computers. An example of such a metaphor is the commonly used “Desktop Metaphor”. Metaphors also can be used to ease context-aware information access for the users of mobile information systems. In this paper we present a taxonomy that allows the categorisation of such metaphors. Furthermore, we give an overview of existing metaphors and their implementations. After introducing some new metaphors we conclude our considerations with a classification of new and existing metaphors using our taxonomy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号