首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1973篇
  免费   118篇
  国内免费   26篇
电工技术   29篇
综合类   15篇
化学工业   423篇
金属工艺   41篇
机械仪表   77篇
建筑科学   80篇
矿业工程   4篇
能源动力   126篇
轻工业   189篇
水利工程   51篇
石油天然气   33篇
武器工业   2篇
无线电   220篇
一般工业技术   425篇
冶金工业   100篇
原子能技术   11篇
自动化技术   291篇
  2024年   4篇
  2023年   44篇
  2022年   79篇
  2021年   137篇
  2020年   93篇
  2019年   128篇
  2018年   133篇
  2017年   106篇
  2016年   118篇
  2015年   69篇
  2014年   97篇
  2013年   171篇
  2012年   104篇
  2011年   153篇
  2010年   99篇
  2009年   89篇
  2008年   92篇
  2007年   61篇
  2006年   50篇
  2005年   30篇
  2004年   24篇
  2003年   23篇
  2002年   17篇
  2001年   19篇
  2000年   12篇
  1999年   8篇
  1998年   17篇
  1997年   15篇
  1996年   12篇
  1995年   15篇
  1994年   9篇
  1993年   4篇
  1992年   7篇
  1991年   3篇
  1990年   4篇
  1989年   6篇
  1988年   6篇
  1987年   7篇
  1986年   11篇
  1985年   7篇
  1984年   7篇
  1983年   2篇
  1982年   3篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   2篇
  1974年   2篇
  1973年   2篇
  1972年   2篇
排序方式: 共有2117条查询结果,搜索用时 930 毫秒
31.
This paper deals with the problem of forbidden states in safe Petri nets to obtain a maximally permissive controller. To prevent the system from entering the forbidden states, assigning some constraints to them is possible. The constraints can be enforced on the system using control places. When the number of forbidden states is large, a large number of constraints should be assigned to them. This results in a large number of control places being added to the model of the system, which causes a complicated model. Some methods have been proposed to reduce the number of constraints. Nevertheless, they do not always give the best results. In this paper, two ideas are offered to reduce the number of constraints, giving a more simplified controller.  相似文献   
32.
Many software systems would significantly improve performance if they could adapt to the emotional state of the user, for example if Intelligent Tutoring Systems (ITSs), ATM’s, ticketing machines could recognise when users were confused, frustrated or angry they could guide the user back to remedial help systems so improving the service. Many researchers now feel strongly that ITSs would be significantly enhanced if computers could adapt to the emotions of students. This idea has spawned the developing field of affective tutoring systems (ATSs): ATSs are ITSs that are able to adapt to the affective state of students. The term “affective tutoring system” can be traced back as far as Rosalind Picard’s book Affective Computing in 1997.This paper presents research leading to the development of Easy with Eve, an ATS for primary school mathematics. The system utilises a network of computer systems, mainly embedded devices to detect student emotion and other significant bio-signals. It will then adapt to students and displays emotion via a lifelike agent called Eve. Eve’s tutoring adaptations are guided by a case-based method for adapting to student states; this method uses data that was generated by an observational study of human tutors. This paper presents the observational study, the case-based method, the ATS itself and its implementation on a distributed computer systems for real-time performance, and finally the implications of the findings for Human Computer Interaction in general and e-learning in particular. Web-based applications of the technology developed in this research are discussed throughout the paper.  相似文献   
33.
Detection and classification of road signs in natural environments   总被引:5,自引:2,他引:3  
An automatic road sign recognition system first locates road signs within images captured by an imaging sensor on-board of a vehicle, and then identifies the detected road signs. This paper presents an automatic neural-network-based road sign recognition system. First, a study of the existing road sign recognition research is presented. In this study, the issues associated with automatic road sign recognition are described, the existing methods developed to tackle the road sign recognition problem are reviewed, and a comparison of the features of these methods is given. Second, the developed road sign recognition system is described. The system is capable of analysing live colour road scene images, detecting multiple road signs within each image, and classifying the type of road signs detected. The system consists of two modules: detection and classification. The detection module segments the input image in the hue-saturation-intensity colour space, and then detects road signs using a Multi-layer Perceptron neural-network. The classification module determines the type of detected road signs using a series of one to one architectural Multi-layer Perceptron neural networks. Two sets of classifiers are trained using the Resillient-Backpropagation and Scaled-Conjugate-Gradient algorithms. The two modules of the system are evaluated individually first. Then the system is tested as a whole. The experimental results demonstrate that the system is capable of achieving an average recognition hit-rate of 95.96% using the scaled-conjugate-gradient trained classifiers.  相似文献   
34.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
35.
Wireless Networks - Orthogonal frequency division multiplexing (OFDM) has been investigated for the high-speed transmission of data in radio frequency and optical wireless communications. The OFDM...  相似文献   
36.

Software design patterns are well-known solutions for solving commonly occurring problems in software design. Detecting design patterns used in the code can help to understand the structure and behavior of the software, evaluate the quality of the software, and trace important design decisions. To develop and maintain a software system, we need sufficient knowledge of design decisions and software implementation processes. However, the acquisition of knowledge related to design patterns used in complex software systems is a challenging, time-consuming, and costly task. Therefore, using a suitable method to detect the design patterns used in the code reduces software development and maintenance costs. In this paper, we proposed a new method based on conceptual signatures to improve the accuracy of design pattern detection. So we used the conceptual signatures based on the purpose of patterns to detect the patterns’ instances that conform to the standard structure of patterns, and cover more instances of patterns’ variants and implementation versions of the patterns and improve the accuracy of pattern detection. The proposed method is a specific process in two main phases. In the first phase, the conceptual signature and detection formula for each pattern is determined manually. Then in the second phase, each pattern in the code is detected in a semi-automatic process using the conceptual signature and pattern detection formula. To implement the proposed method, we focused on GoF design patterns and their variants. We evaluated the accuracy of our proposed method on five open-source projects, namely, Junit v3.7, JHotDraw v5.1, QuickUML 2001, JRefactory v2.6.24, and MapperXML v1.9.7. Also, we performed our experiments on a set of source codes containing the instances of GoF design patterns’ variants for a comprehensive and fair evaluation. The evaluation results indicate that the proposed method has improved the accuracy of design pattern detection in the code.

  相似文献   
37.

The world has been challenged since late 2019 by COVID-19. Higher education institutions have faced various challenges in adapting online education to control the pandemic spread of COVID-19. The present study aims to conduct a survey study through the interview and scrutinizing the literature to find the key challenges. Subsequently, an integrated MCDM framework, including Stepwise Weight Assessment Ratio Analysis (SWARA) and Multiple Objective Optimization based on Ratio Analysis plus Full Multiplicative Form (MULTIMOORA), is developed. The SWARA procedure is applied to the analysis and assesses the challenges to adapt the online education during the COVID-19 outbreak, and the MULTIMOORA approach is utilized to rank the higher education institutions on hesitant fuzzy sets. Further, an illustrative case study is considered to express the proposed idea's feasibility and efficacy in real-world decision-making. Finally, the obtained result is compared with other existing approaches, confirming the proposed framework's strength and steadiness. The identified challenges were systemic, pedagogical, and psychological challenges, while the analysis results found that the pedagogical challenges, including the lack of experience and student engagement, were the main essential challenges to adapting online education in higher education institutions during the COVID-19 outbreak.

  相似文献   
38.
Neural Computing and Applications - Progress is being made to deploy convolutional neural networks (CNNs) into the Internet of Things (IoT) edge devices for handling image analysis tasks locally....  相似文献   
39.
The full potential linearized augmented plane wave method of density functional theory has been used to investigate the structural, electronic, magnetic and thermoelectric properties of cubic perovskites BaVO3 and LaVO3. The ferromagnetic ground state has been found to be stable by comparing the total energies of non-spin-polarized and spin-polarized calculations performed for optimized unit cells. For both compounds, the bond length and tolerance factor are also measured. From the band structures and density of states plots, it is found that both compounds are half-metallic. We found that the presence of V at the octahedral site of these perovskites develops exchange splitting through p-d hybridization, which results in a stable ferromagnetic state. The observed exchange splitting is further clarified from the magnetic moment, charge and spin of the anion and cations. Finally, we also presented the calculated thermoelectric properties of these materials, which show that half-metallic BaVO3 and LaVO3 materials are potential contenders for thermoelectric applications.  相似文献   
40.
Chemically modified mesoporous silica nanoparticles (MSNs) are of interest due to their chemical and thermal stability with adjustable morphology and porosity; therefore, it was aimed to develop and compare the MCM‐41 MSNs functionalised with imidazole groups (MCM‐41‐Im) to unmodified (MCM‐41‐OH) and primary amine functionalised (MCM‐41‐NH2) MSNs for experimental gene delivery. The results show efficient transfection of the complexes of the plasmid and either MCM‐41‐NH2 or MCM‐41‐Im. Furthermore, following transfection of HeLa cells using MCM‐41‐Im, an enhanced GFP expression was achieved consistent with the noticeable DNase1 protection and endosomal escape properties of MCM‐41‐Im using carboxyfluorescein tracer.Inspec keywords: condensation, mesoporous materials, silicon compounds, nanoparticles, DNA, surface chemistry, porosity, gene therapy, cellular biophysics, biomedical materials, nanomedicine, nanofabrication, molecular biophysics, biochemistryOther keywords: co‐condensation synthesis, surface chemical modification, plasmid DNA condensation, plasmid DNA transfection, chemical modified mesoporous silica nanoparticles, chemical stability, thermal stability, adjustable morphology, porosity, MCM‐41 MSN functionalisation, imidazole groups, MCM‐41‐OH, primary amine functionalised MSN, gene delivery, HeLa cell transfection, GFP expression, DNase1 protection, endosomal escape properties, carboxyfluorescein tracer, SiO2   相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号