首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6233篇
  免费   574篇
  国内免费   6篇
电工技术   137篇
综合类   13篇
化学工业   1552篇
金属工艺   175篇
机械仪表   171篇
建筑科学   260篇
矿业工程   24篇
能源动力   211篇
轻工业   931篇
水利工程   51篇
石油天然气   51篇
武器工业   1篇
无线电   487篇
一般工业技术   1455篇
冶金工业   137篇
原子能技术   33篇
自动化技术   1124篇
  2024年   29篇
  2023年   71篇
  2022年   92篇
  2021年   206篇
  2020年   207篇
  2019年   167篇
  2018年   324篇
  2017年   350篇
  2016年   404篇
  2015年   233篇
  2014年   321篇
  2013年   662篇
  2012年   404篇
  2011年   461篇
  2010年   346篇
  2009年   338篇
  2008年   305篇
  2007年   294篇
  2006年   195篇
  2005年   171篇
  2004年   145篇
  2003年   133篇
  2002年   158篇
  2001年   85篇
  2000年   64篇
  1999年   45篇
  1998年   57篇
  1997年   58篇
  1996年   52篇
  1995年   41篇
  1994年   27篇
  1993年   28篇
  1992年   21篇
  1991年   23篇
  1990年   12篇
  1989年   16篇
  1988年   14篇
  1986年   11篇
  1985年   35篇
  1984年   12篇
  1983年   16篇
  1982年   20篇
  1981年   16篇
  1980年   12篇
  1979年   15篇
  1978年   12篇
  1977年   11篇
  1975年   9篇
  1974年   10篇
  1972年   12篇
排序方式: 共有6813条查询结果,搜索用时 15 毫秒
141.
As the first broad reform of the EU data protection legislation is being achieved, and notwithstanding EU institutions’ confident discourse, scepticism remains about the reform’s ability to safeguard the fundamental right to data protection in the face of evolving data processing techniques underlying so-called big data. Yet, one might wonder whether the cause for this difficulty should be ascribed mainly to technological progresses that the law finds it hard to deal with or rather to the policy choices embedded in the legal reform itself. Indeed, a new data protection enforcement model is being adopted, which relies heavily on risk assessment and management by the data controllers themselves. Likewise, data protection authorities see their supervisory role significantly weakened. These developments and the underlying rationality are discussed. Given the limitations of the risk-based approach as currently devised, we suggest that it be reappraised in consideration of risk regulatory experiences in other domains.  相似文献   
142.
In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency.  相似文献   
143.
Multimedia Tools and Applications - Studies of visual attention of patients with Dementia such as Parkinson’s Disease Dementia and Alzheimer Disease is a promising way for non-invasive...  相似文献   
144.
Autonomous mobile robots are increasingly employed to take measurements for environmental monitoring, but planning informative, measurement‐rich paths through large three‐dimensional environments is still challenging. Designing such paths, known as the informative path planning (IPP) problem, has been shown to be NP‐hard. Existing algorithms focus on providing guarantees on suboptimal solutions, but do not scale well to large problems. In this paper, we introduce a novel IPP algorithm that uses an evolutionary strategy to optimize a parameterized path in continuous space, which is subject to various constraints regarding path budgets and motion capabilities of an autonomous mobile robot. Moreover, we introduce a replanning scheme to adapt the planned paths according to the measurements taken in situ during data collection. When compared to two state‐of‐the‐art solutions, our method provides competitive results at significantly lower computation times and memory requirements. The proposed replanning scheme enables to build models with up to 25% lower uncertainty within an initially unknown area of interest. Besides presenting theoretical results, we tailored the proposed algorithms for data collection using an autonomous surface vessel for an ecological study, during which the method was validated through three field deployments on Lake Zurich, Switzerland. Spatiotemporal variations are shown over a period of three months and in an area of 350 m × 350 m × 13 m. Whereas our theoretical solution can be applied to multiple applications, our field results specifically highlight the effectiveness of our planner for monitoring toxic microorganisms in a pre‐alpine lake, and for identifying hot‐spots within their distribution.  相似文献   
145.
Dataflow programs are widely used. Each program is a directed graph where nodes are computations and edges indicate the flow of data. In prior work, we reverse-engineered legacy dataflow programs by deriving their optimized implementations from a simple specification graph using graph transformations called refinements and optimizations. In MDE speak, our derivations were PIM-to-PSM mappings. In this paper, we show how extensions complement refinements, optimizations, and PIM-to-PSM derivations to make the process of reverse engineering complex legacy dataflow programs tractable. We explain how optional functionality in transformations can be encoded, thereby enabling us to encode product lines of transformations as well as product lines of dataflow programs. We describe the implementation of extensions in the \(\mathtt{ReFlO}\) tool and present two non-trivial case studies as evidence of our work’s generality.  相似文献   
146.
147.
Conformance control for ATM cells is based on a real-time reactive algorithm which delivers a value depending on inputs from the network. This value must always fit with a well defined theoretical value. We present here the correctness proof of the algorithm standardized for the ATM transfer capability called ABR. The proof turned out to produce a key argument during the standardization process of ABR.  相似文献   
148.
Classical visual servoing techniques need a strong a priori knowledge of the shape and the dimensions of the observed objects. In this paper, we present how the 2 1/2 D visual servoing scheme we have recently developed, can be used with unknown objects characterized by a set of points. Our scheme is based on the estimation of the camera displacement from two views, given by the current and desired images. Since vision-based robotics tasks generally necessitate to be performed at video rate, we focus only on linear algorithms. Classical linear methods are based on the computation of the essential matrix. In this paper, we propose a different method, based on the estimation of the homography matrix related to a virtual plane attached to the object. We show that our method provides a more stable estimation when the epipolar geometry degenerates. This is particularly important in visual servoing to obtain a stable control law, especially near the convergence of the system. Finally, experimental results confirm the improvement in the stability, robustness, and behaviour of our scheme with respect to classical methods.  相似文献   
149.
This paper proposes a non-parametric method for the classification of thin-layer chromatographic (TLC) images from patterns represented in a dissimilarity space. Each pattern corresponds to a mixture of Gaussian approximation of the intensity profile. The methodology comprises various phases, including image processing and analysis steps to extract the chromatographic profiles and a classification phase to discriminate among two groups, one corresponding to normal cases and the other to three pathological classes. We present an extensive study of several dissimilarity-based approaches analysing the influence of the dissimilarity measure and the prototype selection method on the classification performance. The main conclusions of this paper are that, Match and Profile-difference dissimilarity measures present better results, and a new prototype selection methodology achieves a performance similar or even better than conventional methods. Furthermore, we also concluded that simplest classifiers, such as k-NN and linear discriminant classifiers (LDCs), present good performance being the overall classification error less than 10% for the four-class problem.  相似文献   
150.
The development and adoption of lab-on-a-chip and micro-TAS (total analysis system) techniques requires not only the solving of design and manufacturing issues, but also the introduction of reliable and quantitative methods of analysis. In this work, two complementary tools are applied to the study of thermal and solutal transport in liquids. The experimental determination of the concentration of water in a water–methanol mixture and of the temperature of water in a microfluidic T-mixer are achieved by means of fluorescence lifetime imaging microscopy (FLIM). The results are compared to those of finite volume simulations based on tabulated properties and well-established correlations for the fluid properties. The good correlation between experimental and modelled results demonstrate without ambiguity that (1) the T-mixer is an adiabatic system within the conditions, fluids and flow rates used in this study, (2) buoyancy effects influence the mixing of liquids of different densities at moderate flow rates (Reynolds number Re ≪ 10−2), and (3) the combination of FLIM and computational fluid dynamics has the potential to be used to measure the thermal and solutal diffusion coefficients of fluids for a range of temperatures and concentrations in one single experiment. As such, it represents a first step towards the full-field monitoring of both the extent and the kinetics of a chemical reaction.
David-A. MendelsEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号