首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3140篇
  免费   167篇
  国内免费   14篇
电工技术   35篇
化学工业   931篇
金属工艺   69篇
机械仪表   94篇
建筑科学   116篇
矿业工程   22篇
能源动力   90篇
轻工业   245篇
水利工程   19篇
石油天然气   11篇
武器工业   1篇
无线电   230篇
一般工业技术   703篇
冶金工业   160篇
原子能技术   36篇
自动化技术   559篇
  2023年   31篇
  2022年   122篇
  2021年   121篇
  2020年   92篇
  2019年   75篇
  2018年   121篇
  2017年   120篇
  2016年   106篇
  2015年   108篇
  2014年   148篇
  2013年   244篇
  2012年   175篇
  2011年   210篇
  2010年   150篇
  2009年   145篇
  2008年   160篇
  2007年   131篇
  2006年   103篇
  2005年   91篇
  2004年   67篇
  2003年   63篇
  2002年   67篇
  2001年   37篇
  2000年   36篇
  1999年   29篇
  1998年   45篇
  1997年   25篇
  1996年   25篇
  1995年   28篇
  1994年   27篇
  1993年   30篇
  1992年   20篇
  1991年   19篇
  1990年   13篇
  1989年   16篇
  1988年   14篇
  1987年   28篇
  1986年   18篇
  1985年   17篇
  1984年   17篇
  1983年   12篇
  1982年   19篇
  1981年   17篇
  1980年   15篇
  1979年   21篇
  1978年   11篇
  1977年   11篇
  1976年   13篇
  1975年   18篇
  1973年   22篇
排序方式: 共有3321条查询结果,搜索用时 15 毫秒
71.
We give drawings of a complete graphK n withO(n 4 log2 g/g) many crossings on an orientable or nonorientable surface of genusg 2. We use these drawings ofK n and give a polynomial-time algorithm for drawing any graph withn vertices andm edges withO(m 2 log2 g/g) many crossings on an orientable or nonorientable surface of genusg 2. Moreover, we derive lower bounds on the crossing number of any graph on a surface of genusg 0. The number of crossings in the drawings produced by our algorithm are within a multiplicative factor ofO(log2 g) from the lower bound (and hence from the optimal) for any graph withm 8n andn 2/m g m/64.The research of the third and the fourth authors was partially supported by Grant No. 2/1138/94 of the Slovak Academy of Sciences and by EC Cooperative action IC1000 Algorithms for Future Technologies (Project ALTEC). A preliminary version of this paper was presented at WG93 and published in Lecture Notes in Computer Science, Vol. 790, 1993, pp. 388–396.  相似文献   
72.
73.
In this paper, we present a novel technique which simulates directional light scattering for more realistic interactive visualization of volume data. Our method extends the recent directional occlusion shading model by enabling light source positioning with practically no performance penalty. Light transport is approximated using a tilted cone‐shaped function which leaves elliptic footprints in the opacity buffer during slice‐based volume rendering. We perform an incremental blurring operation on the opacity buffer for each slice in front‐to‐back order. This buffer is then used to define the degree of occlusion for the subsequent slice. Our method is capable of generating high‐quality soft shadowing effects, allows interactive modification of all illumination and rendering parameters, and requires no pre‐computation.  相似文献   
74.
An approximate rank revealing factorization problem with structure constraints on the normalized factors is considered. Examples of structure, motivated by an application in microarray data analysis, are sparsity, nonnegativity, periodicity, and smoothness. In general, the approximate rank revealing factorization problem is nonconvex. An alternating projections algorithm is developed, which is globally convergent to a locally optimal solution. Although the algorithm is developed for a specific application in microarray data analysis, the approach is applicable to other types of structures.  相似文献   
75.
In wireless systems, the communication mechanism combines features of broadcast, synchrony, and asynchrony. We develop an operational semantics for a calculus of wireless systems. We present different Reduction Semantics and a Labelled Transition Semantics and prove correspondence results between them. Finally, we apply CWS to the modelling of the Alternating Bit Protocol, and prove a simple correctness result as an example of the kind of properties that can be formalized in this framework.A major goal of the semantics is to describe the forms of interference among the activities of processes that are peculiar of wireless systems. Such interference occurs when a location is simultaneously reached by two transmissions. The Reduction Semantics differ on how information about the active transmissions is managed.We use the calculus to describe and analyse a few properties of a version of the Alternating Bit Protocol.  相似文献   
76.
In the literature, there are few studies of the human factors involved in the engagement of presence. The present study aims to investigate the influence of five user characteristics – test anxiety, spatial intelligence, verbal intelligence, personality and computer experience – on the sense of presence. This is the first study to investigate the influence of spatial intelligence on the sense of presence, and the first to use an immersive virtual reality system to investigate the relationship between users’ personality characteristics and presence. The results show a greater sense of presence in test anxiety environments than in a neutral environment. Moreover, high test anxiety students feel more presence than their non-test anxiety counterparts. Spatial intelligence and introversion also influence the sense of presence experienced by high test anxiety students exposed to anxiety triggering virtual environments. These results may help to identify new groups of patients likely to benefit from virtual reality exposure therapy.  相似文献   
77.
In this paper, we present an analytical model to evaluate the hidden station effect on the performance of the IEEE 802.11 Distributed Coordination Function (DCF) in both non-saturation and saturation condition. DCF is a random channel-access scheme based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) method and the exponential backoff procedure. DCF is widely used and can support both wireless network with an access point and ad hoc wireless network because of its random channel-access method. On the other hand, this method unavoidably suffers the hidden station effect that causes significant performance degradation. As shown in this paper, hidden stations occur frequently in real-world settings, and the performance impact on the 802.11 DCF is a significant concern, but it has not been adequately studied. We study this problem through a spatial–temporal analysis and a Markov chain model. Our model generalizes the existing work on the performance modeling of 802.11 DCF for both non-saturation and saturation conditions. The scenario of no hidden station can be considered as a special case in our model. The performance of our model is evaluated by comparison with ns-2 simulations.  相似文献   
78.
We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L.  相似文献   
79.
A novel step sequence planning (SSP) method for biped-walking robots is presented. The method adopts a free space representation custom-designed for efficient biped robot motion planning. The method rests upon the approximation of the robot shape by a set of 3D cylindrical solids. This feature allows efficient determination of feasible paths in a 2.5D map, comprising stepping over obstacles and stair climbing. A SSP algorithm based on A-search is proposed which uses the advantages of the aforementioned environment representation. The efficiency of the proposed approach is evaluated by a series of simulations performed for eight walking scenarios.  相似文献   
80.
Inspired by the Witkowski’s algorithm, we introduce a novel path planning and replanning algorithm — the two-way D (TWD) algorithm — based on a two-dimensional occupancy grid map of the environment. Unlike the Witkowski’s algorithm, which finds optimal paths only in binary occupancy grid maps, the TWD algorithm can find optimal paths in weighted occupancy grid maps. The optimal path found by the TWD algorithm is the shortest possible path for a given occupancy grid map of the environment. This path is more natural than the path found by the standard D algorithm as it consists of straight line segments with continuous headings. The TWD algorithm is tested and compared to the D and Witkowski’s algorithms by extensive simulations and experimentally on a Pioneer 3DX mobile robot equipped with a laser range finder.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号