首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2166篇
  免费   77篇
  国内免费   7篇
电工技术   19篇
综合类   5篇
化学工业   456篇
金属工艺   29篇
机械仪表   36篇
建筑科学   124篇
矿业工程   9篇
能源动力   49篇
轻工业   174篇
水利工程   19篇
石油天然气   3篇
无线电   157篇
一般工业技术   366篇
冶金工业   347篇
原子能技术   33篇
自动化技术   424篇
  2023年   27篇
  2022年   47篇
  2021年   63篇
  2020年   31篇
  2019年   43篇
  2018年   38篇
  2017年   38篇
  2016年   49篇
  2015年   49篇
  2014年   93篇
  2013年   94篇
  2012年   131篇
  2011年   147篇
  2010年   90篇
  2009年   109篇
  2008年   116篇
  2007年   106篇
  2006年   86篇
  2005年   68篇
  2004年   61篇
  2003年   53篇
  2002年   48篇
  2001年   37篇
  2000年   38篇
  1999年   33篇
  1998年   80篇
  1997年   60篇
  1996年   48篇
  1995年   33篇
  1994年   25篇
  1993年   31篇
  1992年   20篇
  1991年   10篇
  1990年   11篇
  1989年   15篇
  1988年   12篇
  1987年   20篇
  1986年   15篇
  1985年   18篇
  1984年   8篇
  1983年   11篇
  1981年   10篇
  1980年   9篇
  1978年   9篇
  1977年   7篇
  1976年   15篇
  1975年   8篇
  1974年   10篇
  1969年   7篇
  1954年   11篇
排序方式: 共有2250条查询结果,搜索用时 0 毫秒
41.
Synchronous bandwidth, defined as the maximum time a node is allowed to send its synchronous messages while holding the token, is a sensitive parameter for deadline guarantees of synchronous messages in any timed token network. In order to offer such guarantees, synchronous bandwidth has to be allocated carefully to each individual node. This paper studies the synchronous bandwidth allocated to those synchronous message streams whose deadlines are less than twice the Target Token Rotation Time (TTRT). A new approach for allocating synchronous bandwidth to such streams, which can be used with any previously published local synchronous bandwidth allocation (SBA) for guaranteeing a general synchronous message set with its minimum deadline (Dmin) no less than 2 · TTRT, is proposed. The proposed scheme can be applied efficiently in practice to any general synchronous message set with Dmin > TTRT. Numerical examples are presented to demonstrate the enhanced performance of this new local scheme over any of the previously published local SBA schemes.  相似文献   
42.
Action systems provide a formal approach to modelling parallel and reactive systems. They have a well established theory of refinement supported by simulation-based proof rules. This paper introduces an automatic approach for verifying action system refinements utilising standard CTL model checking. To do this, we encode each of the simulation conditions as a simulation machine, a Kripke structure on which the proof obligation can be discharged by checking that an associated CTL property holds. This procedure transforms each simulation condition into a model checking problem. Each simulation condition can then be model checked in isolation, or, if desired, together with the other simulation conditions by combining the simulation machines and the CTL properties.  相似文献   
43.
44.
This paper proposes a quadrilateral finite element method of the lowest order for Reissner–Mindlin (R–M) plates on the basis of Hellinger–Reissner variational principle, which includes variables of displacements, shear stresses and bending moments. This method uses continuous piecewise isoparametric bilinear interpolation for the approximation of transverse displacement and rotation. The piecewise-independent shear stress/bending moment approximation is constructed by following a self-equilibrium criterion and a shear-stress-enhanced condition. A priori and reliable a posteriori error estimates are derived and shown to be uniform with respect to the plate thickness t. Numerical experiments confirm the theoretical results.  相似文献   
45.
The use of formal methods for analyzing and synthesizing a controller for a multi-train multi-track railway system is discussed. The research was motivated by a case study involving the Bay Area Rapid Transit (BART) system. The overall goal is to design a train acceleration control function that enables trains to be safely placed but also increases system throughput. The use of a modeling language for specifying safety properties and a control function is illustrated. The program transformation methodology supported in the HATS system is employed to generate an efficient implementation from a high-level specification of a controller. This implementation can then be used to simulate the controller behavior, thus further enhancing confidence in the design. Properties of optimization transformations can be verified using an rewrite-rule based induction theorem prover Rewrite Rule Laboratory (RRL).  相似文献   
46.
This paper describes models and algorithms for the real-time segmentation of foreground from background layers in stereo video sequences. Automatic separation of layers from color/contrast or from stereo alone is known to be error-prone. Here, color, contrast, and stereo matching information are fused to infer layers accurately and efficiently. The first algorithm, layered dynamic programming (LDP), solves stereo in an extended six-state space that represents both foreground/background layers and occluded regions. The stereo-match likelihood is then fused with a contrast-sensitive color model that is learned on-the-fly and stereo disparities are obtained by dynamic programming. The second algorithm, layered graph cut (LGC), does not directly solve stereo. Instead, the stereo match likelihood is marginalized over disparities to evaluate foreground and background hypotheses and then fused with a contrast-sensitive color model like the one used in LDP. Segmentation is solved efficiently by ternary graph cut. Both algorithms are evaluated with respect to ground truth data and found to have similar performance, substantially better than either stereo or color/contrast alone. However, their characteristics with respect to computational efficiency are rather different. The algorithms are demonstrated in the application of background substitution and shown to give good quality composite video output.  相似文献   
47.
Although Evolutionary Algorithms (EAs) have been successfully applied to optimization in discrete search spaces, theoretical developments remain weak, in particular for population-based EAs. This paper presents a first rigorous analysis of the (mu+1) EA on pseudo-Boolean functions. Using three well-known example functions from the analysis of the (1+1) EA, we derive bounds on the expected runtime and success probability. For two of these functions, upper and lower bounds on the expected runtime are tight, and on all three functions, the (mu+1) EA is never more efficient than the (1+1) EA. Moreover, all lower bounds grow with mu. On a more complicated function, however, a small increase of mu probably decreases the expected runtime drastically.This paper develops a new proof technique that bounds the runtime of the (mu+1) EA. It investigates the stochastic process for creating family trees of individuals; the depth of these trees is bounded. Thereby, the progress of the population towards the optimum is captured. This new technique is general enough to be applied to other population-based EAs.  相似文献   
48.
Digital natives increasingly populate organizations?? management. These new-generation managers more naturally accept management support systems (MSS), but also have higher expectations about how they should accommodate their individual user preferences. As a result, managers question MSS that have been developed without configuration mechanisms to accommodate their working style, relevant MSS use cases, and different MSS access modes. The objective of this article is to reveal managers?? different MSS use situations and propose levers for tailoring (conceptual) MSS design to them. Use situations generalize classes of similar user-group preferences. We first apply findings from a literature review to cluster managers?? user-group preferences into 36 MSS use situations. Second, we propose that the selection of end-user devices can serve as a main lever for MSS configuration. Third, we complete the configuration with a MSS user-interface design. Finally, we demonstrate utility of our configuration model by presenting and evaluating a prototype.  相似文献   
49.
50.
Businesses have embraced the Internet to reap economic advantages through the use of Websites. Most Website design guidelines fail to address issues of branding and identity formation, focusing instead on concerns adapted from previous technologies. However, many firms are not getting their desired results from the Website investments they have made following design guidelines reflecting graphic layout and system usability issues. We suggest that Websites should be considered ‘electronic storefronts’ or public work areas providing frames of symbolic representations that create impressions of their sponsoring firms. Our exploratory study shows that Websites influence potential customers' impressions of firms' legitimacy, innovation and caring, and that these impressions vary significantly across firms and industries. Website visitors encounter symbols that are compared to mental models stored in memory and used to form impressions of the site and to draw inferences about the firm. These inferences have previously been found to influence purchasing behavior. Designers should be cognizant of these aspects of e-Business and executives should recognize the power of Web-based impression management. Identity management must take center stage in creating a Web presence.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号