首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8398篇
  免费   494篇
  国内免费   73篇
电工技术   123篇
综合类   32篇
化学工业   2209篇
金属工艺   184篇
机械仪表   317篇
建筑科学   289篇
矿业工程   8篇
能源动力   555篇
轻工业   729篇
水利工程   126篇
石油天然气   62篇
无线电   799篇
一般工业技术   1487篇
冶金工业   438篇
原子能技术   110篇
自动化技术   1497篇
  2024年   31篇
  2023年   162篇
  2022年   412篇
  2021年   560篇
  2020年   444篇
  2019年   502篇
  2018年   526篇
  2017年   459篇
  2016年   473篇
  2015年   302篇
  2014年   496篇
  2013年   794篇
  2012年   496篇
  2011年   528篇
  2010年   418篇
  2009年   376篇
  2008年   245篇
  2007年   189篇
  2006年   183篇
  2005年   138篇
  2004年   97篇
  2003年   97篇
  2002年   82篇
  2001年   59篇
  2000年   50篇
  1999年   51篇
  1998年   91篇
  1997年   72篇
  1996年   54篇
  1995年   65篇
  1994年   30篇
  1993年   44篇
  1992年   30篇
  1991年   30篇
  1990年   29篇
  1989年   22篇
  1988年   15篇
  1987年   34篇
  1986年   34篇
  1985年   26篇
  1984年   35篇
  1983年   30篇
  1982年   20篇
  1981年   10篇
  1980年   16篇
  1979年   15篇
  1978年   16篇
  1977年   16篇
  1976年   15篇
  1975年   14篇
排序方式: 共有8965条查询结果,搜索用时 15 毫秒
101.
This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide-area sites. The architecture confines the effects of any malicious replica to its local site, reduces message complexity of wide-area communication, and allows read-only queries to be performed locally within a site for the price of additional standard hardware. We present proofs that our algorithm provides safety and liveness properties. A prototype implementation is evaluated over several network topologies and is compared with a flat Byzantine fault-tolerant approach. The experimental results show considerable improvement over flat Byzantine replication algorithms, bringing the performance of Byzantine replication closer to existing benign fault-tolerant replication techniques over wide area networks.  相似文献   
102.
We study a class of anti-periodic boundary value problems of fractional differential equations. Some existence and uniqueness results are obtained by applying some standard fixed point principles. Several examples are given to illustrate the results.  相似文献   
103.
In the present paper, the cubic B-splines method is considered for solving one-dimensional heat and wave equations. A typical finite difference approach had been used to discretize the time derivative while the cubic B-spline is applied as an interpolation function in the space dimension. The accuracy of the method for both equations is discussed. The efficiency of the method is illustrated by some test problems. The numerical results are found to be in good agreement with the exact solution.  相似文献   
104.
The widespread use of the Internet and the convenient mechanism it provides, such as easy access, easy downloads, and easy copy and paste functions have made many types of unethical behaviors easier, particularly those involving students in academic settings. Among the issues in ethics within the academic environment that can be triggered by the Internet are fraudulence, plagiarism, falsification, delinquency, unauthorized help, and facility misuse. Given these issues, the study seeks to investigate the extent to which students at a public university in Malaysia engage in such unethical behavior and their relationship with the big five personality model. This study was conducted using a survey method of 252 students in three different academic faculties. The results of factor analyses confirm and refine the reliability of the scales for both big five personality variables and unethical Internet behaviors as conceptualized through Internet triggered academic dishonesty (ITADS). The findings indicate that personality traits such as (1) agreeableness, (2) conscientiousness and (3) emotional stability are significantly and negatively correlated with unethical Internet behavior in university students. Significant differences in facility misuse are also observed between the three academic faculties investigated. This research should provide significant contributions to educators in designing the computer ethics curriculum and in allowing for educational institutions as well as other organizations in developing relevant policies and guidelines on matters pertaining to academic conduct, utilization of computers and Internet, and recruitment exercises.  相似文献   
105.
This paper proposes the Mobility-Aware Resource Reservation Protocol (MARSVP) in which mobility and QoS signaling are performed as a single functional block. The key concept of MARSVP is to convey mobility-specific information (binding updates and their associated acknowledgments) by using newly defined RSVP objects embedded in existing RSVP messages. An appealing feature of MARSVP is that it adheres to the current RSVP standard (RFC 2205) and thus requires minimal changes to end nodes without affecting any of the conventional RSVP routers in between. The proposed mechanism is evaluated using a simulation model for application-level performance and an analytical model for network-level signaling cost. Simulation results indicate a 27.9% improvement in QoS interruption when using Mobile IPv6 (MIPv6), 12.5% when using Hierarchical Mobile IPv6 (HMIPv6), and no improvement when using Fast Handovers for MIPv6 (FMIPv6). On the network-level, signaling cost savings of 9.4% and 11.9% are achieved for MIPv6 and HMIPv6, respectively, while FMIPv6 achieves savings of 17.9% when using Voice-over-IP traffic and 26.7% for Video-over-IP traffic. The results of the conducted studies indicate MARSVP’s superiority to conventional RSVP when deployed over wireless networks.  相似文献   
106.
A hybrid recommendation technique based on product category attributes   总被引:3,自引:0,他引:3  
Recommender systems are powerful tools that allow companies to present personalized offers to their customers and defined as a system which recommends an appropriate product or service after learning the customers’ preferences and desires. Extracting users’ preferences through their buying behavior and history of purchased products is the most important element of such systems. Due to users’ unlimited and unpredictable desires, identifying their preferences is very complicated process. In most researches, less attention has been paid to user’s preferences varieties in different product categories. This may decrease quality of recommended items. In this paper, we introduced a technique of recommendation in the context of online retail store which extracts user preferences in each product category separately and provides more personalized recommendations through employing product taxonomy, attributes of product categories, web usage mining and combination of two well-known filtering methods: collaborative and content-based filtering. Experimental results show that proposed technique improves quality, as compared to similar approaches.  相似文献   
107.
This paper deals with the leader-follower consensus problem of Lipschitz nonlinear systems under fixed directed communication networks. Both state and output feedback control are proposed based on state and output measurements of neighbouring agents, respectively. Laplacian matrix features are explored for the stability analysis, and the sufficient conditions are derived to solve the consensus problem. Finally, simulation results are included to demonstrate the effectiveness of the output-based consensus controller.  相似文献   
108.
Digital image processing systems are complex, being usually composed of different computer vision libraries. Algorithm implementations cannot be directly used in conjunction with algorithms developed using other computer vision libraries. This paper formulates a software solution by proposing a processor with the capability of handling different types of image processing algorithms, which allow the end users to install new image processing algorithms from any library. This approach has other functionalities like capability to process one or more images, manage multiple processing jobs simultaneously and maintain the manner in which an image was processed for later use. It is a computational efficient and promising technique to handle variety of image processing algorithms. To promote the reusability and adaptation of the package for new types of analysis, a feature of sustainability is established. The framework is integrated and tested on a medical imaging application, and the software is made freely available for the reader. Future work involves introducing the capability to connect to another instance of processing service with better performance. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
109.
ABSTRACT

The effect of 2D and 3D educational content learning on memory has been studied using electroencephalography (EEG) brain signal. A hypothesis is set that the 3D materials are better than the 2D materials for learning and memory recall. To test the hypothesis, we proposed a classification system that will predict true or false recall for short-term memory (STM) and long-term memory (LTM) after learning by either 2D or 3D educational contents. For this purpose, EEG brain signals are recorded during learning and testing; the signals are then analysed in the time domain using different types of features in various frequency bands. The features are then fed into a support vector machine (SVM)-based classifier. The experimental results indicate that the learning and memory recall using 2D and 3D contents do not have significant differences for both the STM and the LTM.  相似文献   
110.
In this article, a hybrid technique for user activities outliers detection is introduced. The hybrid technique consists of a two‐stage integration of principal component analysis and fuzzy rule‐based systems. In the first stage, the Hamming distance is used to measure the differences between different activities. Principal component analysis is then applied to the distance measures to find two indices of Hotelling's T2 and squared prediction error. In the second stage of the process, the calculated indices are provided as inputs to the fuzzy rule‐based systems to model them heuristically. The model is used to identify the outliers and classify them. The proposed system is tested in real home environments, equipped with appropriate sensory devices, to identify outliers in the activities of daily living of the user. Three case studies are reported to demonstrate the effectiveness of the proposed system. The proposed system successfully identifies the outliers in activities distinguishing between the normal and abnormal behavioral patterns.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号