首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9092篇
  免费   317篇
  国内免费   40篇
电工技术   123篇
综合类   22篇
化学工业   2111篇
金属工艺   167篇
机械仪表   232篇
建筑科学   573篇
矿业工程   31篇
能源动力   174篇
轻工业   788篇
水利工程   54篇
石油天然气   11篇
武器工业   1篇
无线电   595篇
一般工业技术   1464篇
冶金工业   1545篇
原子能技术   71篇
自动化技术   1487篇
  2023年   60篇
  2022年   121篇
  2021年   145篇
  2020年   108篇
  2019年   119篇
  2018年   168篇
  2017年   110篇
  2016年   192篇
  2015年   191篇
  2014年   253篇
  2013年   569篇
  2012年   402篇
  2011年   545篇
  2010年   413篇
  2009年   391篇
  2008年   433篇
  2007年   425篇
  2006年   367篇
  2005年   314篇
  2004年   295篇
  2003年   223篇
  2002年   233篇
  2001年   175篇
  2000年   169篇
  1999年   157篇
  1998年   266篇
  1997年   198篇
  1996年   168篇
  1995年   142篇
  1994年   122篇
  1993年   136篇
  1992年   131篇
  1991年   75篇
  1990年   92篇
  1989年   79篇
  1988年   94篇
  1987年   69篇
  1986年   54篇
  1985年   81篇
  1984年   96篇
  1983年   61篇
  1982年   67篇
  1981年   84篇
  1980年   69篇
  1979年   85篇
  1978年   68篇
  1977年   68篇
  1976年   58篇
  1975年   58篇
  1973年   47篇
排序方式: 共有9449条查询结果,搜索用时 15 毫秒
41.
From dust till drawn   总被引:1,自引:0,他引:1  
We present a system for drawing pastel media in real-time as an effective alternative to most existing digital solutions that basically allow for drawing arbitrary strokes in a particular style. Our approach is focused on the simulation of the natural material itself and on its interaction with the drawing surface and the drawing tool. Upon free-form drawing, a bidirectional transfer of pigment takes place. In one direction, the paper surface is dusted with new pigment particles broken off the tip (i.e., the end of the drawing tool). A large part of these particles will be deposited or blended together with previously deposited ones whereas the remainder does not contribute to the drawing and is blown off. On the other hand, a certain amount of previously deposited pigment is scraped off and picked up again soiling the tip. This is noticeable in the next strokes to be drawn. Furthermore, both the tip and the paper surface are subject to weathering depending on the exerted pressure and friction of the drawing tool, and the bumpiness of the paper. As a result, the paper surface becomes slightly damaged, limiting the deposition of new pigment. The tip, on the other hand, becomes blunt making new strokes wider. From a stylistic point of view, similarly to traditional drawings our results convey the artists’ characteristics (e.g., the way of wielding the brush, skillfulness, feeling for the medium). Therefore, we believe that our system allows an artist to create realistically looking pastel images without losing his/her personal touch.  相似文献   
42.
In Deutschland geh?rt der Einsatz von NEDAP-Wahlcomputern in immer mehr Gemeinden zum Alltag. Durch Untersuchungen zur Sicherheit und Manipulierbarkeit konnten Erkenntnisse gewonnen werden, mit welchen Methoden manipulierte Software in den Wahlcomputer eingebracht und Hardwarekomponenten ausgetauscht werden k?nnen. Dadurch ist erstmals eine Beurteilung der Eignung der NEDAP-Wahlcomputer hinsichtlich der Anforderungen an manipulationsfeste, nachvollziehbare und transparente Wahlen m?glich.  相似文献   
43.
In general, the performance of a KE penetrator against most targets increases with velocity regardless of the particular penetrator-target interaction mode. It is possible to show that there exists an optimum velocity which maximizes the performance of an impacting penetrator for a given expenditure of kinetic energy. Simple graphical methods are described that determine the optimum velocity from general performance-velocity plots. These graphical methods may also be applied to experimental data alone. In addition, simple analytic models which describe the velocity dependent penetration/perforation performance of KE penetrators are examined and extended. These models may be used to explicitly assess the influence of parameters such as target strength and density and penetrator mass, strength and density. For some of the models in this analysis, the explicit relations between the optimum striking velocity for a specific kinetic energy value and the penetrator-target parameters are described.  相似文献   
44.
Much of what has been written in Australia about the protection of computer programs has been inspired by high profile cases concerning the boundaries of copyright protection. The Australian law firm Clayton Utz says that there has been little discussion about other types of legal protection for computer programs, and as a consequence, other intellectual property laws should not be overlooked.  相似文献   
45.
46.
A robustness analysis and synthesis for incomplete nonlinear decoupling for a class of nonlinear systems is discussed. Rigid and elastic-joint robot models belong to this class. For the elastic case, a transformation facilitates the robustness analysis under a weak assumption. Charts with H 1- and H - norms of closed-loop disturbance transfer functions of the nonlinear-decoupled system are presented for a robust pole assignment.  相似文献   
47.
Neural Computing and Applications - In the medical imaging domain, nonlinear warping has enabled pixel-by-pixel mapping of one image dataset to a reference dataset. This co-registration of data...  相似文献   
48.
Phan  Alex  Truong  Phuong  Schade  Christoph  Vasan  Aditya  Friend  James  Talke  Frank E. 《Microsystem Technologies》2021,27(6):2473-2479
Microsystem Technologies - “Zero drift” behavior of an optical intraocular pressure sensor is studied using an analytical model based on the deflection of a circular membrane. Results...  相似文献   
49.
Certain tasks, such as formal program development and theorem proving, fundamentally rely upon the manipulation of higher-order objects such as functions and predicates. Computing tools intended to assist in performing these tasks are at present inadequate in both the amount of knowledge they contain (i.e., the level of support they provide) and in their ability to learn (i.e., their capacity to enhance that support over time). The application of a relevant machine learning technique—explanation-based generalization (EBG)—has thus far been limited to first-order problem representations. We extend EBG to generalize higher-order values, thereby enabling its application to higher-order problem encodings.Logic programming provides a uniform framework in which all aspects of explanation-based generalization and learning may be defined and carried out. First-order Horn logics (e.g., Prolog) are not, however, well suited to higher-order applications. Instead, we employ Prolog, a higher-order logic programming language, as our basic framework for realizing higher-order EBG. In order to capture the distinction between domain theory and training instance upon which EBG relies, we extend Prolog with the necessity operator of modal logic. We develop a meta-interpreter realizing EBG for the extended language, Prolog, and provide examples of higher-order EBG.  相似文献   
50.
Conventional access methods cannot be effectively used in large Scientific/Statistical Database (SSDB) applications. A file structure (called bit transposed file (BTF)) is proposed which offers several attractive features that are better suited for the special characteristics that SSDBs exhibit. This file structure is an extreme version of the (attribute) transposed file. The data are stored by vertical bit partitions. The bit patterns of attributes are assigned using one of several data encoding methods. Each of these encoding methods is appropriate for different query types. The bit partitions can also be compressed using a version of the run length encoding scheme. Efficient operators on compressed bit vectors have been developed and form the basis of a query language. Because of the simplicity of the file structure and query language, optimization problems for database design, query evaluation, and common subexpression removal can be formalized and efficient exact solution or near optimal solution can be achieved. In addition to selective power with low overheads for SSDBs, the BTF is also amenable to special parallel hardware. Results from experiments with the file structure suggest that this approach may be a reasonable alternative file structure for large SSDBs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号