首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5926篇
  免费   406篇
  国内免费   16篇
电工技术   64篇
综合类   4篇
化学工业   1597篇
金属工艺   84篇
机械仪表   129篇
建筑科学   249篇
矿业工程   7篇
能源动力   224篇
轻工业   674篇
水利工程   38篇
石油天然气   36篇
无线电   459篇
一般工业技术   1030篇
冶金工业   525篇
原子能技术   42篇
自动化技术   1186篇
  2023年   73篇
  2022年   140篇
  2021年   245篇
  2020年   147篇
  2019年   192篇
  2018年   204篇
  2017年   170篇
  2016年   231篇
  2015年   210篇
  2014年   310篇
  2013年   482篇
  2012年   390篇
  2011年   463篇
  2010年   287篇
  2009年   293篇
  2008年   256篇
  2007年   264篇
  2006年   230篇
  2005年   184篇
  2004年   156篇
  2003年   150篇
  2002年   136篇
  2001年   69篇
  2000年   76篇
  1999年   80篇
  1998年   132篇
  1997年   87篇
  1996年   74篇
  1995年   59篇
  1994年   67篇
  1993年   52篇
  1992年   35篇
  1991年   35篇
  1990年   28篇
  1989年   44篇
  1988年   22篇
  1987年   31篇
  1986年   28篇
  1985年   32篇
  1984年   26篇
  1983年   19篇
  1982年   20篇
  1981年   16篇
  1980年   25篇
  1977年   8篇
  1976年   18篇
  1975年   6篇
  1974年   5篇
  1973年   7篇
  1969年   7篇
排序方式: 共有6348条查询结果,搜索用时 656 毫秒
121.
Heterogeneous formation shape control with interagent bearing and distance constraints involves the design of a distributed control law that ensures the formation moves such that these interagent constraints are achieved and maintained. This paper looks at the design of a distributed control scheme to solve different formation shape control problems in an ambient two‐dimensional space with bearing, distance and mixed bearing and distance constraints. The proposed control law allows the agents in the formation to move in any direction on a half‐plane and guarantees that despite this freedom, the proposed shape control algorithm ensures convergence to a formation shape meeting the prescribed constraints. This work provides an interesting and novel contrast to much of the existing work in formation control where distance‐only constraints are typically maintained and where each agent's motion is typically restricted to follow a very particular path. A stability analysis is sketched, and a number of illustrative examples are also given. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
122.
A solution to the stabilization problem of a compact set by means of the Interconnection and Damping Assignment Passivity‐Based Control methodology, for an affine nonlinear system, was introduced. To this end, we expressed the closed‐loop system as a Port Hamiltonian system, having the property of almost all their trajectories asymptotically converge to a convenient limit set, except for a set of measure zero. It was carried out by solving a partial differential equation (PDE) or single matching condition, which allows the desired energy level or limit set E to be shaped explicitly. The control strategy was tested using the magnetic beam balance system and the pendulum actuated by a direct current motor (DC‐motor), having obtained satisfactory results. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
123.
This work describes a neural network based architecture that represents and estimates object motion in videos. This architecture addresses multiple computer vision tasks such as image segmentation, object representation or characterization, motion analysis and tracking. The use of a neural network architecture allows for the simultaneous estimation of global and local motion and the representation of deformable objects. This architecture also avoids the problem of finding corresponding features while tracking moving objects. Due to the parallel nature of neural networks, the architecture has been implemented on GPUs that allows the system to meet a set of requirements such as: time constraints management, robustness, high processing speed and re-configurability. Experiments are presented that demonstrate the validity of our architecture to solve problems of mobile agents tracking and motion analysis.  相似文献   
124.
The mobile health (mHealth) and electronic health (eHealth) systems are useful to maintain a correct administration of health information and services. However, it is mandatory to ensure a secure data transmission and in case of a node failure, the system should not fall down. This fact is important because several vital systems could depend on this infrastructure. On the other hand, a cloud does not have infinite computational and storage resources in its infrastructure or would not provide all type of services. For this reason, it is important to establish an interrelation between clouds using communication protocols in order to provide scalability, efficiency, higher service availability and flexibility which allow the use of services, computing and storage resources of other clouds. In this paper, we propose the architecture and its secure protocol that allows exchanging information, data, services, computing and storage resources between all interconnected mHealth clouds. The system is based on a hierarchic architecture of two layers composed by nodes with different roles. The routing algorithm used to establish the connectivity between the nodes is the shortest path first (SPF), but it can be easily changed by any other one. Our architecture is highly scalable and allows adding new nodes and mHealth clouds easily, while it tries to maintain the load of the cloud balanced. Our protocol design includes node discovery, authentication and fault tolerance. We show the protocol operation and the secure system design. Finally we provide the performance results in a controlled test bench.  相似文献   
125.
The evaluation of the emergent behaviour in complex systems requires an analytical framework which allows the observation of different phenomena that take place at different levels. In order to observe the dynamics of complex systems, it is necessary to perform simulations so that both local and the emergent behaviour can be observed. To this end, the way in which complex system simulators are built must be examined so that it will be feasible to model large scale scenarios. In this paper, the use of Model Driven Engineering methodology is proposed to deal with this issue. Among other benefits, it is shown that this methodology allows the representation and simulation of a complex system providing support for the analysis. This analysis is supported by a metamodel which describes the system components that are under study. The application of this methodology to the development of large scale simulators is explored through a case study. This case study analyses a complex socio-technical system: a power grid.  相似文献   
126.
Scanning confocal electron microscopy (SCEM) offers a mechanism for three-dimensional imaging of materials, which makes use of the reduced depth of field in an aberration-corrected transmission electron microscope. The simplest configuration of SCEM is the bright-field mode. In this paper we present experimental data and simulations showing the form of bright-field SCEM images. We show that the depth dependence of the three-dimensional image can be explained in terms of two-dimensional images formed in the detector plane. For a crystalline sample, this so-called probe image is shown to be similar to a conventional diffraction pattern. Experimental results and simulations show how the diffracted probes in this image are elongated in thicker crystals and the use of this elongation to estimate sample thickness is explored.  相似文献   
127.
Social networking services (SNSs) such as Facebook and Twitter have experienced explosive growth during the few past years. Millions of users have created their profiles on these services because they experience great benefits in terms of friendship. SNSs can help people to maintain their friendships, organize their social lives, start new friendships, and meet others who share their hobbies and interests. However, all these benefits can be eclipsed by the privacy hazards that affect people in SNSs. People expose intimate information about their lives on SNSs, and this information affects the way others think about them. It is crucial that users be able to control how their information is distributed through the SNSs and decide who can access it. This article presents a list of privacy threats that can affect SNS users and what requirements privacy mechanisms should fulfill to prevent this threats. Then the article reviews current approaches and analyzes to what extent they cover the requirements.  相似文献   
128.
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable.  相似文献   
129.
Most of the literature on innovation management highlights the fundamental role played by people in the innovation process and the need to fully develop the creative and innovative potential of organizations' members. This article offers the result of extensive research carried out among some of the most innovative companies in the Basque Country, a highly innovative region located in the north of Spain. It draws interesting conclusions about how these innovative companies combine strong leadership, human resource practices, and an organizational culture that enhances innovation capabilities among the company's employees. More specifically, it answers questions such as the following: Are human resources policies, leadership, and innovation culture implemented equally in Basque innovative companies? Do companies make the same effort in deploying these elements or routines and practices related to them? Can we see a pattern in the use of these elements among innovative firms? © 2012 Wiley Periodicals, Inc.  相似文献   
130.
AmbiKraf     
This paper presents, AmbiKraf, a non-emissive fabric display that subtly animates patterns on common fabrics. We use thermochromic inks and peltier semiconductor elements to achieve this technology. With this technology we have produced numerous prototypes from animated wall paintings to pixilated fabric displays. The ability of this technology to subtly and ubiquitously change the color of the fabric itself has made us able to merge different fields and technologies with AmbiKraf. In addition, with an animated room divider screen, Ambikraf merged its technology with Japanese Byobu art to tighten the gap between traditional arts and contemporary technologies. Through this AmbiKraf Byobu art installation and other installations, we discuss the impact of this technology as a ubiquitous fabric display. With focus to improvements of some limitations of the existing system, we present our future vision that enables us to merge this technology into more applications fields thus making this technology a platform for ubiquitous interactions on our daily peripherals.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号