首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2269篇
  免费   146篇
  国内免费   8篇
电工技术   25篇
综合类   1篇
化学工业   491篇
金属工艺   33篇
机械仪表   48篇
建筑科学   157篇
矿业工程   3篇
能源动力   98篇
轻工业   143篇
水利工程   16篇
石油天然气   8篇
无线电   226篇
一般工业技术   442篇
冶金工业   235篇
原子能技术   16篇
自动化技术   481篇
  2024年   3篇
  2023年   27篇
  2022年   70篇
  2021年   88篇
  2020年   58篇
  2019年   70篇
  2018年   73篇
  2017年   58篇
  2016年   78篇
  2015年   80篇
  2014年   94篇
  2013年   184篇
  2012年   109篇
  2011年   164篇
  2010年   101篇
  2009年   108篇
  2008年   108篇
  2007年   104篇
  2006年   100篇
  2005年   84篇
  2004年   53篇
  2003年   75篇
  2002年   56篇
  2001年   27篇
  2000年   30篇
  1999年   36篇
  1998年   51篇
  1997年   27篇
  1996年   32篇
  1995年   26篇
  1994年   31篇
  1993年   19篇
  1992年   23篇
  1991年   24篇
  1990年   9篇
  1989年   16篇
  1988年   10篇
  1987年   10篇
  1986年   10篇
  1985年   20篇
  1984年   9篇
  1983年   12篇
  1982年   7篇
  1981年   7篇
  1980年   11篇
  1979年   3篇
  1978年   5篇
  1976年   6篇
  1973年   3篇
  1969年   5篇
排序方式: 共有2423条查询结果,搜索用时 31 毫秒
41.
Liquid phase volumetric mass transfer coefficients for oxygen were determined in three-phase fluidized beds of 8 mm glass spheres fluidized by a cocurrent flow of air and pseudoplastic polysaccharide solutions (carboxymethyl cellulose, xanthan). A semi-theoretical relation for the effective shear rate was suggested. The mass transfer coefficients could be correlated, together with literature data for particle diameters of 3 mm and 5 mm in other liquids, using the terminal velocity as the particle-specific property.  相似文献   
42.

Fraudulent online sellers often collude with reviewers to garner fake reviews for their products. This act undermines the trust of buyers in product reviews, and potentially reduces the effectiveness of online markets. Being able to accurately detect fake reviews is, therefore, critical. In this study, we investigate several preprocessing and textual-based featuring methods along with machine learning classifiers, including single and ensemble models, to build a fake review detection system. Given the nature of product review data, where the number of fake reviews is far less than that of genuine reviews, we look into the results of each class in detail in addition to the overall results. We recognise from our preliminary analysis that, owing to imbalanced data, there is a high imbalance between the accuracies for different classes (e.g., 1.3% for the fake review class and 99.7% for the genuine review class), despite the overall accuracy looking promising (around 89.7%). We propose two dynamic random sampling techniques that are possible for textual-based featuring methods to solve this class imbalance problem. Our results indicate that both sampling techniques can improve the accuracy of the fake review class—for balanced datasets, the accuracies can be improved to a maximum of 84.5% and 75.6% for random under and over-sampling, respectively. However, the accuracies for genuine reviews decrease to 75% and 58.8% for random under and over-sampling, respectively. We also discover that, for smaller datasets, the Adaptive Boosting ensemble model outperforms other single classifiers; whereas, for larger datasets, the performance improvement from ensemble models is insignificant compared to the best results obtained by single classifiers.

  相似文献   
43.
Multibody System Dynamics - Heretofore, the Serret–Frenet frame has been the ubiquitous choice for analyzing the elastic deformations of beam elements. It is well-known that this frame is...  相似文献   
44.
International Journal of Information Security - The complexity of today’s integrated circuit (IC) supply chain, organised in several tiers and including many companies located in different...  相似文献   
45.
Engaging users in threat reporting is important in order to improve threat monitoring in urban environments. Today, mobile applications are mostly used to provide basic reporting interfaces. With a rapid evolution of mobile devices, the idea of context awareness has gained a remarkable popularity in recent years. Modern smartphones and tablets are equipped with a variety of sensors including accelerometers, gyroscopes, pressure gauges, light and GPS sensors. Additionally, the devices become computationally powerful which allows for real-time processing of data gathered by their sensors. Universal access to the Internet via WiFi hot-spots and GSM network makes mobile devices perfect platforms for ubiquitous computing. Although there exist numerous frameworks for context-aware systems, they are usually dedicated to static, centralized, client-server architectures. There is still space for research in the field of context modeling and reasoning for mobile devices. In this paper, we propose a lightweight context-aware framework for mobile devices that uses data gathered by mobile device sensors and performs on-line reasoning about possible threats based on the information provided by the Social Threat Monitor system developed in the INDECT project.  相似文献   
46.
In this work, the issues of bandwidth enhancement of planar antennas and the relevance of precise and automated response control through numerical optimization have been investigated. Using an example of a planar antenna with parasitic radiator we illustrate possible effects of even minor modifications of the antenna geometry (here, applied to the ground plane) on its reflection performance. In particular, a proper handling of geometry parameters may lead to considerable broadening of the antenna bandwidth. For the sake of computational efficiency, the adjustment of geometry parameters is carried out using surrogate‐based optimization methods exploiting coarse‐discretization EM simulations as the underlying low‐fidelity antenna model. Additionally, suitably defined penalty function allows us to precisely control the maximum in‐band reflection so that sufficient margin to accommodate possible manufacturing tolerances can be achieved. The optimized designs of the two antenna structures considered in this work exhibit over 1.75 GHz (>31%) and 2.15 GHz (>38%) bandwidth, respectively, for the center frequency of 5.6 GHz. Simulation results are validated using measurements of the fabricated prototypes. Comparison with state‐of‐the‐art designs is also provided. © 2016 Wiley Periodicals, Inc. Int J RF and Microwave CAE 26:653–659, 2016.  相似文献   
47.
Heterogeneous formation shape control with interagent bearing and distance constraints involves the design of a distributed control law that ensures the formation moves such that these interagent constraints are achieved and maintained. This paper looks at the design of a distributed control scheme to solve different formation shape control problems in an ambient two‐dimensional space with bearing, distance and mixed bearing and distance constraints. The proposed control law allows the agents in the formation to move in any direction on a half‐plane and guarantees that despite this freedom, the proposed shape control algorithm ensures convergence to a formation shape meeting the prescribed constraints. This work provides an interesting and novel contrast to much of the existing work in formation control where distance‐only constraints are typically maintained and where each agent's motion is typically restricted to follow a very particular path. A stability analysis is sketched, and a number of illustrative examples are also given. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
48.
Scanning confocal electron microscopy (SCEM) offers a mechanism for three-dimensional imaging of materials, which makes use of the reduced depth of field in an aberration-corrected transmission electron microscope. The simplest configuration of SCEM is the bright-field mode. In this paper we present experimental data and simulations showing the form of bright-field SCEM images. We show that the depth dependence of the three-dimensional image can be explained in terms of two-dimensional images formed in the detector plane. For a crystalline sample, this so-called probe image is shown to be similar to a conventional diffraction pattern. Experimental results and simulations show how the diffracted probes in this image are elongated in thicker crystals and the use of this elongation to estimate sample thickness is explored.  相似文献   
49.
AmbiKraf     
This paper presents, AmbiKraf, a non-emissive fabric display that subtly animates patterns on common fabrics. We use thermochromic inks and peltier semiconductor elements to achieve this technology. With this technology we have produced numerous prototypes from animated wall paintings to pixilated fabric displays. The ability of this technology to subtly and ubiquitously change the color of the fabric itself has made us able to merge different fields and technologies with AmbiKraf. In addition, with an animated room divider screen, Ambikraf merged its technology with Japanese Byobu art to tighten the gap between traditional arts and contemporary technologies. Through this AmbiKraf Byobu art installation and other installations, we discuss the impact of this technology as a ubiquitous fabric display. With focus to improvements of some limitations of the existing system, we present our future vision that enables us to merge this technology into more applications fields thus making this technology a platform for ubiquitous interactions on our daily peripherals.  相似文献   
50.
Distributed video coding (DVC) constitutes an original coding framework to meet the stringent requirements imposed by uplink-oriented and low-power mobile video applications. The quality of the side information available to the decoder and the efficiency of the employed channel codes are primary factors determining the success of a DVC system. This contribution introduces two novel techniques for probabilistic motion compensation in order to generate side information at the Wyner-Ziv decoder. The employed DVC scheme uses a base layer, serving as a hash to facilitate overlapped block motion estimation at the decoder side. On top of the base layer, a supplementary Wyner-Ziv layer is coded in the DCT domain. Both proposed probabilistic motion compensation techniques are driven by the actual correlation channel statistics and reuse information contained in the hash. Experimental results report significant rate savings caused by the novel side information generation methods compared to previous techniques. Moreover, the compression performance of the presented DVC architecture, featuring the proposed side-information generation techniques, delivers state-of-the-art compression performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号