首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   50789篇
  免费   2918篇
  国内免费   53篇
电工技术   383篇
综合类   42篇
化学工业   10174篇
金属工艺   919篇
机械仪表   993篇
建筑科学   1677篇
矿业工程   123篇
能源动力   1285篇
轻工业   6923篇
水利工程   452篇
石油天然气   235篇
武器工业   4篇
无线电   2946篇
一般工业技术   8566篇
冶金工业   11304篇
原子能技术   274篇
自动化技术   7460篇
  2023年   445篇
  2022年   703篇
  2021年   1266篇
  2020年   994篇
  2019年   993篇
  2018年   1804篇
  2017年   1798篇
  2016年   1874篇
  2015年   1374篇
  2014年   1834篇
  2013年   3531篇
  2012年   2967篇
  2011年   2978篇
  2010年   2298篇
  2009年   2196篇
  2008年   2369篇
  2007年   2087篇
  2006年   1610篇
  2005年   1322篇
  2004年   1187篇
  2003年   1110篇
  2002年   946篇
  2001年   623篇
  2000年   618篇
  1999年   756篇
  1998年   3598篇
  1997年   2193篇
  1996年   1459篇
  1995年   872篇
  1994年   737篇
  1993年   710篇
  1992年   258篇
  1991年   260篇
  1990年   245篇
  1989年   249篇
  1988年   222篇
  1987年   203篇
  1986年   208篇
  1985年   244篇
  1984年   203篇
  1983年   149篇
  1982年   179篇
  1981年   192篇
  1980年   170篇
  1979年   144篇
  1978年   140篇
  1977年   208篇
  1976年   437篇
  1975年   97篇
  1973年   91篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
Jim Caie 《软件》2009,(8):37-39,41
竞争激烈的全球经济环境、高昂的能源价格以及可持续制造重要性的日益提高,都迫使众多企业重新思考他们的制造策略。一些公司正在使用产品生命周期管理(PLM)和数字化制造(DM)工具来设计低成本、敏捷的制造系统。少数领先的离散制造企业,尤其是在汽车行业,正在其部分工厂内部使用DM工具实现虚拟试车、改善产品发布状况。然而,绝大多数离散制造企业还没有充分认识到利用PLM/DM技术已经成为成功的关键要素。  相似文献   
992.
A Secure Elliptic Curve-Based RFID Protocol   总被引:3,自引:0,他引:3       下载免费PDF全文
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high confidence and effient privacy protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper. The proposed protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove the system secure, and even forward secure is also provided. This work is supported by the Generalitat de Catalunya under Grant No. FIC 2007FIC 00880, and the projects of the Spanish MCyT MTM2007-66842-C02-02 and TIN2006-15662-C02-02.  相似文献   
993.
This paper describes an analytical formulation to compute quantitative feedback theory (QFT) bounds in one‐degree‐of‐freedom feedback control problems. The new approach is based on envelope curves and shows that a QFT control specification can be expressed as a family of circumferences. Then, the controller bound is defined by the envelope curve of this family and can be obtained as an analytical function. This offers the possibility of studying the QFT bounds in an analytical way with several useful properties. Gridding methods are avoided, resulting in a lower computational effort procedure. The new formulation improves the accuracy of previous methods and allows the designer to calculate multivalued bounds. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
994.
Abstract— The primary goal of this study was to find a measurement method for motion blur which is easy to carry out and gives results that can be reproduced from one lab to another. This method should be able to also take into account methods for reduction of motion blur such as backlight flashing. Two methods have been compared. The first method uses a high‐speed camera that permits us to directly picture the blurred‐edge profile. The second one exploits the mathematical analysis of the motion‐blur formation to construct the blurred‐edge profile from the temporal step response. Measurement results and method proposals are given and discussed.  相似文献   
995.
Urban simulation models and their visualization are used to help regional planning agencies evaluate alternative transportation investments, land use regulations, and environmental protection policies. Typical urban simulations provide spatially distributed data about number of inhabitants, land prices, traffic, and other variables. In this article, we build on a synergy of urban simulation, urban visualization, and computer graphics to automatically infer an urban layout for any time step of the simulation sequence. In addition to standard visualization tools, our method gathers data of the original street network, parcels, and aerial imagery and uses the available simulation results to infer changes to the original urban layout and produce a new and plausible layout for the simulation results. In contrast with previous work, our approach automatically updates the layout based on changes in the simulation data and thus can scale to a large simulation over many years. The method in this article offers a substantial step forward in building integrated visualization and behavioral simulation systems for use in community visioning, planning, and policy analysis. We demonstrate our method on several real cases using a 200 GB database for a 16,300 km2 area surrounding Seattle, Washington.  相似文献   
996.
Multisensory VR interaction for protein-docking in the CoRSAIRe project   总被引:1,自引:1,他引:0  
Proteins take on their function in the cell by interacting with other proteins or biomolecular complexes. To study this process, computational methods, collectively named protein docking, are used to predict the position and orientation of a protein ligand when it is bound to a protein receptor or enzyme, taking into account chemical or physical criteria. This process is intensively studied to discover new biological functions for proteins and to better understand how these macromolecules take on these functions at the molecular scale. Pharmaceutical research also employs docking techniques for a variety of purposes, most notably in the virtual screening of large databases of available chemicals to select likely molecular candidates for drug design. The basic hypothesis of our work is that Virtual Reality (VR) and multimodal interaction can increase efficiency in reaching and analysing docking solutions, in addition to fully a computational docking approach. To this end, we conducted an ergonomic analysis of the protein–protein current docking task as it is carried out today. Using these results, we designed an immersive and multimodal application where VR devices, such as the three-dimensional mouse and haptic devices, are used to interactively manipulate two proteins to explore possible docking solutions. During this exploration, visual, audio, and haptic feedbacks are combined to render and evaluate chemical or physical properties of the current docking configuration.  相似文献   
997.
We present the design of a predictive load shedding scheme for a network monitoring platform that supports multiple and competing traffic queries. The proposed scheme can anticipate overload situations and minimize their impact on the accuracy of the traffic queries. The main novelty of our approach is that it considers queries as black boxes, with arbitrary (and highly variable) input traffic and processing cost. Our system only requires a high-level specification of the accuracy requirements of each query to guide the load shedding procedure and assures a fair allocation of computing resources to queries in a non-cooperative environment. We present an implementation of our load shedding scheme in an existing network monitoring system and evaluate it with a diverse set of traffic queries. Our results show that, with the load shedding mechanism in place, the monitoring system can preserve the accuracy of the queries within predefined error bounds even during extreme overload conditions.  相似文献   
998.
The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities. This is the case of peer-to-peer IPTV communities.In this work we present a detailed study of P2P IPTV traffic, providing useful insights on both transport- and packet-level properties as well as on the behavior of the peers inside the network. In particular, we provide novel results on the (i) ports and protocols used; (ii) differences between signaling and video traffic; (iii) behavior of the traffic at different time scales; (iv) differences between TCP and UDP traffic; (v) traffic generated and received by peers; (vi) peers neighborhood and session duration. The knowledge gained thanks to this analysis is useful for several tasks, e.g. traffic identification, understanding the performance of different P2P IPTV technologies and the impact of such traffic on network nodes and links, and building more realistic models for simulations.1  相似文献   
999.
Aggregation of system-wide information in large-scale distributed systems, such as p2p systems and Grids, can be unfairly influenced by nodes that are selfish, colluding with each other, or are offline most of the time. We present AVCOL, which uses probabilistic and gossip-style techniques to provide availability-aware aggregation. Concretely, AVCOL is the first aggregation system that: (1) implements any (arbitrary) global predicate that explicitly specifies any node’s probability of inclusion in the global aggregate, as a mathematical function of that node’s availability (i.e., percentage time online); (2) probabilistically tolerates large numbers of selfish nodes and large groups of colluders; and (3) scales well with hundreds to thousands of nodes. AVCOL uses several unique design decisions: per-aggregation tree construction where nodes are allowed a limited but flexible probabilistic choice of parents or children, probabilistic aggregation along trees, and auditing of nodes both during aggregation as well as in gossip-style (i.e., periodically). We have implemented AVCOL, and we experimentally evaluated it using real-life churn traces. Our evaluation and our mathematical analysis show that AVCOL satisfies arbitrary predicates, scales well, and withstands a variety of selfish and colluding attacks.  相似文献   
1000.
Systems-on-chip (SoCs) and SoC architectures provide a collection of challenging problems related to specification, modelling techniques, security issues and structuring questions. We describe a design methodology integrating the event B method and characterized by the incremental and proof-controlled construction of SoC models. The essence of the methodology is the refinement of models, starting from system requirements and producing event B models for characterizing the system under development. The refinement is a unifying concept that ensures the consistency of the different models produced and our contribution is an illustration through a case study, namely a system for measuring the parameters of audio/video quality in the digital video broadcasting (DVB) set of digital TV standards. The first part is the derivation of an architecture of parameters from the document ETSI TR 101 290 and the validation of the architecture using invariants of B models. The second part is the proposal of B models of the SystemC scheduler and an instantiation of these abstract models of the simulation semantics by parameters of the SystemC codes automatically translated from the B models of the DVB system. Finally, the third part relies upon a proof-based methodology for deriving an operational semantics of a given system that is expressed by an event B model including invariant properties.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号