首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12193篇
  免费   782篇
  国内免费   20篇
电工技术   184篇
综合类   11篇
化学工业   3496篇
金属工艺   191篇
机械仪表   364篇
建筑科学   496篇
矿业工程   28篇
能源动力   448篇
轻工业   1515篇
水利工程   101篇
石油天然气   58篇
无线电   852篇
一般工业技术   1952篇
冶金工业   565篇
原子能技术   77篇
自动化技术   2657篇
  2024年   28篇
  2023年   180篇
  2022年   518篇
  2021年   630篇
  2020年   380篇
  2019年   425篇
  2018年   479篇
  2017年   495篇
  2016年   526篇
  2015年   438篇
  2014年   580篇
  2013年   1003篇
  2012年   831篇
  2011年   992篇
  2010年   699篇
  2009年   726篇
  2008年   627篇
  2007年   563篇
  2006年   476篇
  2005年   344篇
  2004年   267篇
  2003年   255篇
  2002年   218篇
  2001年   137篇
  2000年   138篇
  1999年   120篇
  1998年   128篇
  1997年   119篇
  1996年   102篇
  1995年   65篇
  1994年   66篇
  1993年   56篇
  1992年   27篇
  1991年   31篇
  1990年   24篇
  1989年   28篇
  1988年   17篇
  1987年   22篇
  1986年   13篇
  1985年   26篇
  1984年   16篇
  1983年   24篇
  1982年   21篇
  1981年   10篇
  1980年   17篇
  1979年   19篇
  1978年   25篇
  1977年   13篇
  1976年   10篇
  1973年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
In this article, the design, fabrication, and on‐wafer test of X‐Band and 2–18 GHz wideband high‐power SPDT MMIC switches in AlGaN/GaN technology are presented. The switches have demonstrated state‐of‐the‐art performance and RF fabrication yield better than 65%. Linear and power measurements for different control voltages have been reported and an explanation of the dependence of the power performances on the control voltage is given. In particular, the X‐band switch exhibits a 0.4 dB compression level at 10 GHz when driven by a 38 dBm input signal. The wideband switch shows a compression level of 1 dB at an input drive higher than 38 dBm across the entire bandwidth. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2009.  相似文献   
102.
Although 9-anilinoacridines are among the best studied antitumoral intercalators, there are few studies about the effect of isosteric substitution of a benzene moiety for a heterocycle ring in the acridine framework. According to these studies, this approach may lead to effective cytotoxic agents, but good cytotoxic activity depends on structural requirements in the aniline ring which differ from those in 9-anilinoacridines. The present paper deals with molecular modeling studies of some 9-anilino substituted tricyclic compounds and their intercalation complexes (in various DNA sequences) resulting from docking the compounds into various DNA sequences. As expected, the isosteric substitution in 9-anilinoacridines influences the LUMO energy values and orbital distribution, the dipole moment, electrostatic charges and the conformation of the anilino ring. Other important differences are observed during the docking studies, for example, changes in the spatial arrangement of the tricyclic nucleus and the anilino ring at the intercalation site. Semiempirical calculations of the intercalation complexes show that the isosteric replacement of a benzene ring in the acridine nucleus affects not only DNA affinity but also base pair selectivity. These findings explain, at least partially, the different structural requirements observed in several 9-anilino substituted tricyclic compounds for cytotoxic activity. Thus, the data presented here may guide the rational design of new agents with different DNA binding properties and/or a cytotoxic profile by isosteric substitution of known intercalators.  相似文献   
103.
104.
Motivated by the importance of accurate identification for a range of applications, this paper compares and contrasts the effective and efficient classification of network-based applications using behavioral observations of network-traffic and those using deep-packet inspection.Importantly, throughout our work we are able to make comparison with data possessing an accurate, independently determined ground-truth that describes the actual applications causing the network-traffic observed.In a unique study in both the spatial-domain: comparing across different network-locations and in the temporal-domain: comparing across a number of years of data, we illustrate the decay in classification accuracy across a range of application–classification mechanisms. Further, we document the accuracy of spatial classification without training data possessing spatial diversity.Finally, we illustrate the classification of UDP traffic. We use the same classification approach for both stateful flows (TCP) and stateless flows based upon UDP. Importantly, we demonstrate high levels of accuracy: greater than 92% for the worst circumstance regardless of the application.  相似文献   
105.
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference.  相似文献   
106.
Mobile ad hoc networks (MANETs) show very significant difference with respect to other computer networks due to the presence of extremely large packet loss bursts. The development of protocols for mobile ad hoc networks, especially multimedia protocols, require extensive evaluation either through simulation or real-life tests. Such testing consumes a great amount of resources both in terms of time and trace file sizes. Therefore, finding efficient means of reducing the amount of data that is stored and processed is quite important to accelerate the evaluation of different audio/video streaming applications. If, moreover, we are able to model the loss pattern experienced, we can further accelerate the evaluation process.In this work we propose two models based on hidden Markov chains that are able to grasp both packet arrivals and packet loss patterns in MANETs. A simpler two-state model is proposed to model losses when proactive routing protocols are used, while a more complex three-state model is proposed for reactive routing protocols. We also introduce a new set for packet loss pattern measurements that can be of interest for the evaluation of audio/video streaming applications.Experimental results show that the proposed models can adequately reproduce extremely long packet loss patterns, typical of MANET environments, with a high degree of accuracy. Overall, we find that the proposed models are able to significantly reduce both the simulation time and the trace file sizes required.  相似文献   
107.
In the last years, metaheuristics have emerged as powerful algorithmic approaches which have been applied with great success to difficult combinatorial optimization problems. However, this does not mean that metaheuristics can be applied blindly to any new problem.In this contribution we showed how the most basic ingredients of Soft Computing, namely fuzzy sets and fuzzy rules, are used in the context of a simple metaheuristic and a cooperative strategy based on it, to obtain successful results for the p-median problem.  相似文献   
108.
This research presents a new control scheme for visual servoing that takes into account the delay introduced by image acquisition and image processing. Firstly, previous control schemes for visual servoing are discussed and then a new control scheme is proposed and fully described. Afterwards, the capabilities (steady-state errors, stability margins, step time response, etc.) of the proposed control scheme and of previous ones are analytically analyzed and compared. Next, several simulations and experimental results are provided to validate the analytical results and to illustrate the benefits of the proposed control scheme. In particular, it is shown that this new control scheme clearly improves the performance of the previous ones.  相似文献   
109.
A recent focus is on creating engaging user experiences with digital products and services such as voicemail. This study aims to design towards increased levels of engagement in voicemail browsing by using the ‘Richness, Control and Engagement’ (RC & E) framework. This framework explains the levels of engagement in terms of the levels of richness and control that are shaped by the features of a product and the user’s expertise. A product was developed that utilized gestures and sound to access digital voicemail contents. An experiment was conducted in which 28 participants interacted with the product while varying (1) the number of features of the user interface, (2) the amount of voicemail content and (3) the type of task. Results showed that the levels of engagement could be predicted according to the levels of richness and control experienced when a task-term was added to the framework. Implications of the refined RC & E framework for interaction design practice are discussed.  相似文献   
110.
We show on a case study from an autonomous aerospace context how to apply a game-based model-checking approach as a powerful technique for the verification, diagnosis, and adaptation of system behaviors based on temporal properties. This work is part of our contribution within the SHADOWS project, where we provide a number of enabling technologies for model-driven self-healing. We propose here to use GEAR, a game-based model checker, as a user-friendly tool that can offer automatic proofs of critical properties of such systems. Although it is a model checker for the full modal μ-calculus, it also supports derived, more user-oriented logics. With GEAR, designers and engineers can interactively investigate automatically generated winning strategies for the games, by this way exploring the connection between the property, the system, and the proof. This work has been partially supported by the European Union Specific Targeted Research Project SHADOWS (IST-2006-35157), exploring a Self-Healing Approach to Designing cOmplex softWare Systems. The project’s web page is at . This article is an extended version of Renner et al. [18] presented at ISoLA 2007, Poitiers, December 2007.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号