首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4313篇
  免费   268篇
  国内免费   3篇
电工技术   65篇
综合类   2篇
化学工业   745篇
金属工艺   73篇
机械仪表   50篇
建筑科学   260篇
矿业工程   28篇
能源动力   91篇
轻工业   546篇
水利工程   27篇
石油天然气   18篇
无线电   376篇
一般工业技术   712篇
冶金工业   473篇
原子能技术   31篇
自动化技术   1087篇
  2023年   39篇
  2022年   48篇
  2021年   127篇
  2020年   83篇
  2019年   126篇
  2018年   152篇
  2017年   144篇
  2016年   183篇
  2015年   139篇
  2014年   193篇
  2013年   308篇
  2012年   266篇
  2011年   304篇
  2010年   229篇
  2009年   237篇
  2008年   252篇
  2007年   223篇
  2006年   189篇
  2005年   150篇
  2004年   153篇
  2003年   115篇
  2002年   131篇
  2001年   55篇
  2000年   53篇
  1999年   47篇
  1998年   77篇
  1997年   60篇
  1996年   57篇
  1995年   38篇
  1994年   44篇
  1993年   36篇
  1992年   31篇
  1991年   24篇
  1990年   26篇
  1989年   27篇
  1988年   9篇
  1987年   19篇
  1986年   19篇
  1985年   20篇
  1984年   30篇
  1983年   14篇
  1982年   13篇
  1981年   11篇
  1980年   15篇
  1979年   12篇
  1977年   7篇
  1976年   10篇
  1975年   8篇
  1974年   7篇
  1973年   6篇
排序方式: 共有4584条查询结果,搜索用时 109 毫秒
101.
This paper reports on a design experience for undergraduates in computer engineering, industrial design, and marketing that focuses on pervasive computing devices. Across a broad range of targeted application areas and user groups, many of the student designs have been wearable computers. Consequently, our course will be of interest to the wearable computing community, particularly in terms of our aim of bridging the gap between design and engineering. For the two most recent offerings of the course, we have utilized external observers and surveyed the students in order to validate the impact of aspects of our process and changes to it. This paper is based upon 5 years of experience and 2 years of analysis of our course, and it presents an overview of our process with both qualitative and quantitative results from these two most recent offerings.  相似文献   
102.
Parallel operation of distributed generation is an important topic for microgrids,which can provide a highly reliable electric supply service and good power quality to end customers when the utility is unavailable.However,there is a well-known limitation:the power sharing accuracy between distributed generators in a parallel operation.Frequency and voltage droop is a well-established control method for improving power sharing performance.In this method,the active and reactive power calculations are used to adjust the frequency and amplitude of the output voltage.This paper describes the digital implementation of a droop method,and analyzes the influence of power calculation on droop method performance.According to the analysis,the performance of droop control in a digital control system is limited by the accuracy and speed of the power calculation method.We propose an improved power calculation method based on p-q theory to improve the performance of the droop control method,and we compare our new method with two traditional power calculation methods.Finally,simulation results and experimental results from a three single-phase 1-kW-inverter system are presented,which validate the performance of our proposed method.  相似文献   
103.
104.
We study the fixed parameter tractability of the counting version of a parameterization of the restrictive list H-coloring problem. The parameterization is defined by fixing the number of preimages of a subset C of the vertices in H through a weight assignment K on C. We show the fixed parameter tractability of counting the number of list (H,C,K)-colorings, for the case in which (H,C,K) is simple. We introduce the concept of compactor and a new algorithmic technique, compactor enumeration, that allow us to design fixed parameter algorithms for parameterized counting problems.  相似文献   
105.
Explaining IS continuance in environments where usage is mandatory   总被引:1,自引:0,他引:1  
Several research efforts over the last decade have attempted to explain user acceptance in mandated environments. This research is an attempt in the same direction. It addresses users’ satisfaction in mandated environments to further contribute to our understanding of how we can manage mandated use of information systems (IS) effectively beyond initial adoption. To better explain users’ IS continuance a revised post-acceptance model is proposed and empirically tested using the structural equation modelling technique. The results demonstrate the reliability and validity of the proposed measurement model and further demonstrate that confirmed expectations and ease of use perceptions explain 61% of the users’ satisfaction in this setting. Our findings have important implications for the management of users in mandated environments as well as for further research in the area of mandated use. To that end, we offer directions for future research.  相似文献   
106.
This research introduces a new optimality criterion for motion planning of wheeled mobile robots based on a cost index that assesses the nearness to singularity of forward and inverse kinematic models. Slip motions, infinite estimation error and impossible control actions are avoided escaping from singularities. In addition, high amplification of wheel velocity errors and high wheel velocity values are also avoided by moving far from the singularity. The proposed cost index can be used directly to complement path-planning and motion-planning techniques (e.g. tree graphs, roadmaps, etc.) in order to select the optimal collision-free path or trajectory among several possible solutions. To illustrate the applications of the proposed approach, an industrial forklift, equivalent to a tricycle-like mobile robot, is considered in a simulated environment. In particular, several results are validated for the proposed optimality criterion, which are extensively compared to those obtained with other classical optimality criteria, such as shortest-path, time-optimal and minimum-energy.  相似文献   
107.
A Secure Elliptic Curve-Based RFID Protocol   总被引:3,自引:0,他引:3       下载免费PDF全文
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high confidence and effient privacy protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper. The proposed protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove the system secure, and even forward secure is also provided. This work is supported by the Generalitat de Catalunya under Grant No. FIC 2007FIC 00880, and the projects of the Spanish MCyT MTM2007-66842-C02-02 and TIN2006-15662-C02-02.  相似文献   
108.
瘦客户机 瘦客户机对于目前的医疗保健、金融、教育及其它行业来说.是一项良好的解决方案。不但经济实惠,也更便于IT管理人员进行管理。我们评测的是实达WT-8040瘦客户机。  相似文献   
109.
We present the design of a predictive load shedding scheme for a network monitoring platform that supports multiple and competing traffic queries. The proposed scheme can anticipate overload situations and minimize their impact on the accuracy of the traffic queries. The main novelty of our approach is that it considers queries as black boxes, with arbitrary (and highly variable) input traffic and processing cost. Our system only requires a high-level specification of the accuracy requirements of each query to guide the load shedding procedure and assures a fair allocation of computing resources to queries in a non-cooperative environment. We present an implementation of our load shedding scheme in an existing network monitoring system and evaluate it with a diverse set of traffic queries. Our results show that, with the load shedding mechanism in place, the monitoring system can preserve the accuracy of the queries within predefined error bounds even during extreme overload conditions.  相似文献   
110.
In the Internet, where millions of users are a click away from your site, being able to dynamically classify the workload in real time, and predict its short term behavior, is crucial for proper self-management and business efficiency. As workloads vary significantly according to current time of day, season, promotions and linking, it becomes impractical for some ecommerce sites to keep over-dimensioned infrastructures to accommodate the whole load. When server resources are exceeded, session-based admission control systems allow maintaining a high throughput in terms of properly finished sessions and QoS for a limited number of sessions; however, by denying access to excess users, the website looses potential customers.In the present study we describe the architecture of AUGURES, a system that learns to predict Web user’s intentions for visiting the site as well its resource usage. Predictions are made from information known at the time of their first request and later from navigational clicks. For this purpose we use machine learning techniques and Markov-chain models. The system uses these predictions to automatically shape QoS for the most profitable sessions, predict short-term resource needs, and dynamically provision servers according to the expected revenue and the cost to serve it. We test the AUGURES prototype on access logs from a high-traffic, online travel agency, obtaining promising results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号