首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   666篇
  免费   26篇
  国内免费   1篇
电工技术   5篇
化学工业   179篇
金属工艺   17篇
机械仪表   7篇
建筑科学   13篇
能源动力   22篇
轻工业   76篇
水利工程   5篇
石油天然气   4篇
无线电   59篇
一般工业技术   126篇
冶金工业   58篇
原子能技术   3篇
自动化技术   119篇
  2024年   2篇
  2023年   14篇
  2022年   20篇
  2021年   28篇
  2020年   22篇
  2019年   18篇
  2018年   24篇
  2017年   18篇
  2016年   21篇
  2015年   13篇
  2014年   26篇
  2013年   48篇
  2012年   53篇
  2011年   59篇
  2010年   49篇
  2009年   33篇
  2008年   33篇
  2007年   30篇
  2006年   36篇
  2005年   19篇
  2004年   15篇
  2003年   16篇
  2002年   5篇
  2001年   6篇
  2000年   7篇
  1999年   9篇
  1998年   19篇
  1997年   16篇
  1996年   5篇
  1995年   8篇
  1994年   5篇
  1993年   2篇
  1992年   3篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1976年   1篇
  1973年   1篇
排序方式: 共有693条查询结果,搜索用时 15 毫秒
61.
The resource-constrained nature of mote-level wireless sensor networks (WSNs) poses challenges for the design of a general-purpose sensor network query processors (SNQPs). Existing SNQPs tend to generate query execution plans (QEPs) that are selected on the basis of a fixed, implicit expectation, for example, that energy consumption should be kept as small as possible. However, in WSN applications, the same query may be subject to several, possibly conflicting, quality-of-service (QoS) expectations concomitantly (for example maximizing data acquisition rates subject to keeping energy consumption low). It is also not uncommon for the QoS expectations to change over the lifetime of a deployment (for example from low to high data acquisition rates). This paper describes optimization algorithms that respond to stated QoS expectations (about acquisition rate, delivery time, energy consumption and lifetime) when making routing, placement, and timing decisions for in-WSN query processing. The paper shows experimentally that QoS-awareness offers significant benefits in responding to, and reconciling, diverse QoS expectations, thereby enabling QoS-aware SNQPs to generate efficient QEPs for a broader range WSN applications than has hitherto been possible.  相似文献   
62.
We prove several results relating injective one-way functions, time-bounded conditional Kolmogorov complexity, and time-bounded conditional entropy. First we establish a connection between injective, strong and weak one-way functions and the expected value of the polynomial time-bounded Kolmogorov complexity, denoted here by?E(K t (x|f(x))). These results are in both directions. More precisely, conditions on?E(K t (x|f(x))) that imply that?f is a weak one-way function, and properties of?E(K t (x|f(x))) that are implied by the fact that?f is a strong one-way function. In particular, we prove a separation result: based on the concept of time-bounded Kolmogorov complexity, we find an interval in which every function?f is a necessarily weak but not a strong one-way function. Then we propose an individual approach to injective one-way functions based on Kolmogorov complexity, defining Kolmogorov one-way functions and prove some relationships between the new proposal and the classical definition of one-way functions, showing that a Kolmogorov one-way function is also a deterministic one-way function. A relationship between Kolmogorov one-way functions and the conjecture of polynomial time symmetry of information is also proved. Finally, we relate?E(K t (x|f(x))) and two forms of time-bounded entropy, the unpredictable entropy?H unp, in which ??one-wayness?? of a function can be easily expressed, and the Yao+ entropy, a measure based on compression/decompression schema in which only the decompressor is restricted to be time-bounded.  相似文献   
63.
Compiler Verification has been identified as a vital process in the implementation of correct safety-critical systems. We extend here Hoare's refinement-algebra approach to compilation in order to include real-time languages in which processes interact asynchronously via communication queues. The existence of unique fixed-points is exploited to verify the implementation of crucial operators such as asynchronous input, delay and timeout.  相似文献   
64.
An embedded smart camera is a stand-alone unit that not only captures images, but also includes a processor, memory and communication interface. Battery-powered, embedded smart cameras introduce many additional challenges since they have very limited resources, such as energy, processing power and memory. Computer vision algorithms running on these camera boards should be light-weight and efficient. Considering the memory requirements of an algorithm and its portability to an embedded processor should be an integral part of the algorithm design in addition to the accuracy requirements. This paper presents a light-weight and efficient background modeling and foreground detection algorithm that is highly robust against lighting variations and non-static backgrounds including scenes with swaying trees, water fountains and rain. Compared to many traditional methods, the memory requirement for the data saved for each pixel is very small in the proposed algorithm. Moreover, the number of memory accesses and instructions are adaptive, and are decreased depending on the amount of activity in the scene. Each pixel is treated differently based on its history, and instead of requiring the same number of memory accesses and instructions for every pixel, we require less instructions for stable background pixels. The plot of the number of unstable pixels at each frame also serves as a tool to find the video portions with high activity. The proposed method selectively updates the background model with an automatically adaptive rate, thus can adapt to rapid changes. As opposed to traditional methods, pixels are not always treated individually, and information about neighbors is incorporated into decision making. The results obtained with nine challenging outdoor and indoor sequences are presented, and compared with the results of different state-of-the-art background subtraction methods. The ROC curves and memory comparison of different background subtraction methods are also provided. The experimental results demonstrate the success of the proposed light-weight salient foreground detection method.  相似文献   
65.
Smart surveillance systems are increasingly being used to detect potentially dangerous situations. To do so, the common and easier way is to model normal human behaviors and consider as abnormal any new strange behavior in the scene. In this article, Dominant Sets is adapted to model most frequent behaviors and to detect any unknown event to trigger an alarm. It is proved that after an unsupervised training, Dominant Sets can robustly detect abnormal behaviors. The method is tested in several different cases and compared to other usual clusterization methods such as KNN, mixture of Gaussians or Fuzzy \(K\) -Means to confirm its robustness and performance. The overall performance of abnormal behavior detection based on Dominant Sets is better, being the error ratio at least \(1.5\) points lower than the others.  相似文献   
66.
About 10% of the world has access to information and communication technologies (ICTs). Telecenters and cyber cafés are one prevalent way to increase access. This paper suggests increasing access through currently existing, local businesses where people already gather and where proprietors already posses existing business relationships with suppliers and customers. This paper questions the prevailing emphasis on the “cyber'' characteristics of access, e.g., computing and internet access as is currently known, and attempts to refocus the conversation by considering computing and access in the context of the “café,” e.g., as public life in the sense of Habermas, which permits an in situ evolution of relevant access. This analysis is based on extant literature and direct ethnographic research in several public places in six countries. We offer example design perspectives based on a reflection of “third places” as inspiration for appropriate innovation in the provision of computing and communications. © 2005 Wiley Periodicals, Inc.  相似文献   
67.
The scanning electrochemical microscope (SECM) is a non-optical scanning microscopic instrument capable of imaging highly localized electrical currents associated with charge transfer reactions occurring in the vicinity of the surface of coated metals. The SECM tip operates as working microelectrode in an electrochemical cell under potentiostatic control. Microelectrode current and position is recorded as the tip is scanned very near a coated sample at a constant Z height, and variations in the faradaical current measured at selected tip potential values can be related to changes in the local concentration of electroactive species involved in corrosion reactions occurring at the substrate. Carbon steel samples coated with polyurethane in which a holiday was produced prior to immersion in different aqueous electrolytes were investigated with this technique. The release of Fe(II) ionic species into the solution phase from local anodic sites, as well as the consumption of dissolved oxygen at the corresponding cathodic locations was successfully monitored.  相似文献   
68.
In order to evaluate the variability in concentration of secondary metabolites among grains from different sorghum hybrids (Sorghum bicolor (L) Moench) and provide some information for rational use in animal feeds, grain samples were collected from 12 hybrids (Criollo 1, Criollo 27, Chaguaramas III, Chaguaramas VII, Cristiani Burkard H-8046-2, Guanipa 95, Himeca 101, Himeca 400, Pioneer 81-G67, Pioneer 83-G88, Pioneer 86-P42 y Tecsem 120) sowed on 2008 in the Turén municipality, Portuguesa State-Venezuela. Using standardized analytical methods, hybrids showed polyphenolics compounds contents (0.92 +/- 0.37% TaE), total (0.61 +/- 0.29% TaE) and condensed tannins (0.95 +/- 0.65% LeuE), phytic phosphorus (0.17 +/- 0.03%) and intrinsic phytase activity (12.3 +/- 6.74 U/kg) in the ranges described in the literature, with an important variation among hybrids that must be considered for their inclusion levels in the formulation of balanced feeds, as well as plant breeding programs.  相似文献   
69.
Orai1, the first identified member of the Orai protein family, is ubiquitously expressed in the animal kingdom. Orai1 was initially characterized as the channel responsible for the store-operated calcium entry (SOCE), a major mechanism that allows cytosolic calcium concentration increments upon receptor-mediated IP3 generation, which results in intracellular Ca2+ store depletion. Furthermore, current evidence supports that abnormal Orai1 expression or function underlies several disorders. Orai1 is, together with STIM1, the key element of SOCE, conducting the Ca2+ release-activated Ca2+ (CRAC) current and, in association with TRPC1, the store-operated Ca2+ (SOC) current. Additionally, Orai1 is involved in non-capacitative pathways, as the arachidonate-regulated or LTC4-regulated Ca2+ channel (ARC/LRC), store-independent Ca2+ influx activated by the secretory pathway Ca2+-ATPase (SPCA2) and the small conductance Ca2+-activated K+ channel 3 (SK3). Furthermore, Orai1 possesses two variants, Orai1α and Orai1β, the latter lacking 63 amino acids in the N-terminus as compared to the full-length Orai1α form, which confers distinct features to each variant. Here, we review the current knowledge about the differences between Orai1α and Orai1β, the implications of the Ca2+ signals triggered by each variant, and their downstream modulatory effect within the cell.  相似文献   
70.
Wireless sensor networks for environmental monitoring and agricultural applications often face Long‐range requirements at low bit rates together with a large numbers of nodes. This paper presents the design and test of a novel wireless sensor network that combines a large radio range with very low power consumption and cost. Our asymmetric sensor network uses ultra‐low‐cost 40‐MHz transmitters and a sensitive software‐defined radio receiver with multi‐channel capability. Experimental radio range measurements in two different outdoor environments demonstrate a single‐hop range of up to 1.8 km. A theoretical model for radio propagation at 40 MHz in outdoor environments is proposed and validated with the experimental measurements. The reliability and fidelity of network communication over longer periods is evaluated with a deployment for distributed temperature measurements. Our results demonstrate the feasibility of the transmit‐only low‐frequency system design approach for future environmental sensor networks. Although there have been several papers proposing the theoretical benefits of this approach, to the best of our knowledge, this is the first paper to provide experimental validation of such claims. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号