首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7402篇
  免费   422篇
  国内免费   8篇
电工技术   52篇
综合类   6篇
化学工业   2033篇
金属工艺   69篇
机械仪表   122篇
建筑科学   274篇
矿业工程   17篇
能源动力   283篇
轻工业   1443篇
水利工程   74篇
石油天然气   19篇
无线电   471篇
一般工业技术   1046篇
冶金工业   172篇
原子能技术   48篇
自动化技术   1703篇
  2024年   9篇
  2023年   94篇
  2022年   284篇
  2021年   382篇
  2020年   225篇
  2019年   285篇
  2018年   303篇
  2017年   286篇
  2016年   329篇
  2015年   240篇
  2014年   387篇
  2013年   622篇
  2012年   564篇
  2011年   614篇
  2010年   439篇
  2009年   420篇
  2008年   386篇
  2007年   365篇
  2006年   227篇
  2005年   213篇
  2004年   177篇
  2003年   170篇
  2002年   132篇
  2001年   72篇
  2000年   65篇
  1999年   72篇
  1998年   77篇
  1997年   60篇
  1996年   51篇
  1995年   44篇
  1994年   34篇
  1993年   29篇
  1992年   28篇
  1991年   24篇
  1990年   20篇
  1989年   23篇
  1988年   8篇
  1987年   8篇
  1986年   4篇
  1985年   10篇
  1984年   5篇
  1983年   7篇
  1982年   7篇
  1981年   4篇
  1979年   2篇
  1978年   8篇
  1977年   7篇
  1976年   2篇
  1975年   2篇
  1973年   2篇
排序方式: 共有7832条查询结果,搜索用时 15 毫秒
51.
Participation is the cornerstone of any community. Promoting, understanding and properly managing it allows not only keeping the community sustainable, but also providing personalized services to its members and managers. This article presents a case study in which student participation in a course community was motivated using two different extrinsic mechanisms, and mediated by a software platform. The results were compared with a baseline community of the same course, in which participation was not motivated by external means. The analysis of these results indicates that managing a partially virtual course community requires the introduction of monitoring services, community managers and extrinsic mechanisms to motivate participation. These findings allow community managers to improve their capability for promoting participation and keeping the community sustainable. The findings also raise several implications that should be considered in the design of software supporting this kind of community, when managing the participation of its members.  相似文献   
52.
53.
Many structural design problems in the field of civil engineering are naturally multi-criteria, i.e., they have several conflicting objectives that have to be optimized simultaneously. An example is when we aim to reduce the weight of a structure while enhancing its robustness. There is no a single solution to these types of problems, but rather a set of designs representing trade-offs among the conflicting objectives. This paper focuses on the application of multi-objective metaheuristics to solve two variants of a real-world structural design problem. The goal is to compare a representative set of state-of-the-art multi-objective metaheuristic algorithms aiming to provide civil engineers with hints as to what optimization techniques to use when facing similar problems as those selected in the study presented in this paper. Accordingly, our study reveals that MOCell, a cellular genetic algorithm, provides the best overall performance, while NSGA-II, the de facto standard multi-objective metaheuristic technique, also demonstrates a competitive behavior.  相似文献   
54.
The influence of aging on computer interaction has been widely analyzed in human–computer interaction research literature. Despite this, there are no age-based user maps that could support the user-interface customization. Studying the specific needs and constraints of these groups is crucial in order to adapt a user interface to the user’s interaction requirements. This work studies the performance of a sample of participants on three different basic tasks (pointing, dragging and dropping, and text selection) and the influence of age for each of them. It is concluded that this influence differs between specific activities. A group profile map that can support automatic classification in the future has been obtained.  相似文献   
55.
This study aims to explore how people behave when they have to find a location within a complex building and are confronted with situations where directional signage (i.e., explicit information) is in opposition to environmental affordances that naturally direct users towards a specific path, creating a situation with conflicting information (e.g., a brighter corridor vs. a darker corridor but with a directional sign indicating to follow the darker one). A virtual reality–based methodology was used and a between‐subject design was considered. Thus, participants were given the tasks of finding three publicly accessible central points in a virtual hotel and confronted with a two forced‐choice task of local scenes in which environmental variables (i.e., corridor width and brightness) and signage varied systematically, in two experimental conditions (i.e., neutral and signage). For the signage condition, signs were inserted to explicitly point in the opposite direction than that implicitly suggested by the environmental affordances, creating situations with conflicting information. Results indicate that environmental variables were able to direct people indoors acting as environmental affordances. Users preferred to follow the wider and brighter paths. However, when directional signage pointed in the opposite direction of the paths preferred by the participants, most of them complied with signage.  相似文献   
56.
Despite the large number of works devoted to understand P2P live streaming applications, most of them put forth so far rely on characterizing the static view of these systems. In this work, we characterize the SopCast, one of the most important P2P live streaming applications. We focus on its dynamics behavior as well as on the community formation phenomena. Our results show that SopCast presents a low overlay topology diameter and low end-to-end shortest path. In fact, diameter is smaller than 6 hops in almost 90 % of the observation time. More than 96 % of peers’ end-to-end connections present only 3 hops. These values combined may lead to low latencies and a fast streaming diffusion. Second, we show that communities in SopCast are well defined by the streaming data exchange process. Moreover, the SopCast protocol does not group peers according to their Autonomous System. In fact, the probability that a community contains 50 % of its members belonging to the same AS (when we observe the largest AS of our experiments) is lower then 10 %. Peers exchange more data with partners belonging to the same community instead of peers inside the same AS. For the largest AS we have, less than 18 % of peer traffic has been exchanged with another AS partners. Finally, our analysis provides important information to support the future design of more efficient P2P live streaming systems and new protocols that exploit communities’ relationships.  相似文献   
57.
End-effectors are usually related to the location of limbs, and their reliable detection enables robust body tracking as well as accurate pose estimation. Recent innovation in depth cameras has re-stated the pose estimation problem. We focus on the information provided by these sensors, for which we borrow the name 2.5D data from the Graphics community. In this paper we propose a human pose estimation algorithm based on topological propagation. Geometric Deformable Models are used to carry out such propagation, implemented according to the Narrow Band Level Set approach. A variant of the latter method is proposed, including a density restriction which helps preserving the topological properties of the object under analysis. Principal end-effectors are extracted from a directed graph weighted with geodesic distances, also providing a skeletal-like structure describing human pose. An evaluation against reference methods is performed with promising results. The proposed solution allows a frame-wise end-effector detection, with no temporal tracking involved, which may be generalized to the tracking of other objects beyond human body.  相似文献   
58.
Recent vehicular routing proposals use real-time road traffic density estimates to dynamically select forwarding paths. Estimating the traffic density in vehicular ad hoc networks requires the transmission of additional dedicated messages increasing the communications load. These proposals are generally based on unicast sender-based forwarding schemes. The greedy nature of sender-based forwarding can result in the selection of forwarders with weak radio links that might compromise the end-to-end performance. To overcome these limitations, this paper presents TOPOCBF, a novel contention-based broadcast forwarding protocol that dynamically selects forwarding paths based on their capability to route packets between anchor points. Such capability is estimated by means of a multi-hop connectivity metric. The obtained results demonstrate that TOPOCBF can provide good packet delivery ratios while reducing the communications load compared to unicast sender-based forwarding schemes using road traffic density estimates.  相似文献   
59.
In this paper, a fuzzy based Variable Structure Control (VSC) with guaranteed stability is presented. The main objective is to obtain an improved performance of highly non-linear unstable systems. The main contribution of this work is that, firstly, new functions for chattering reduction and error convergence without sacrificing invariant properties are proposed, which is considered the main drawback of the VSC control. Secondly, the global stability of the controlled system is guaranteed.The well known weighting parameters approach, is used in this paper to optimize local and global approximation and modeling capability of T-S fuzzy model.A one link robot is chosen as a nonlinear unstable system to evaluate the robustness, effectiveness and remarkable performance of optimization approach and the high accuracy obtained in approximating nonlinear systems in comparison with the original T-S model. Simulation results indicate the potential and generality of the algorithm. The application of the proposed FLC-VSC shows that both alleviation of chattering and robust performance are achieved with the proposed FLC-VSC controller. The effectiveness of the proposed controller is proven infront of disturbances and noise effects.  相似文献   
60.
In public key encryption schemes with a double decryption mechanism (DD-PKE), decryption can be done in either of two ways: by the user owning the secret/public key pair corresponding to the ciphertext, or by a trusted party holding a sort of master secret-key. In this note we argue that the classical security notion for standard public key encryption schemes does not suffice for DD-PKE schemes, and propose a new natural definition. Additionally, we illustrate the usefulness of the new security definition by showing that a DD-PKE scheme presented in the workshop Selected Areas in Cryptography 2005 is insecure under this augmented security notion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号