首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2765篇
  免费   248篇
  国内免费   11篇
电工技术   61篇
综合类   5篇
化学工业   638篇
金属工艺   102篇
机械仪表   100篇
建筑科学   68篇
能源动力   114篇
轻工业   175篇
水利工程   7篇
石油天然气   5篇
无线电   647篇
一般工业技术   586篇
冶金工业   198篇
原子能技术   15篇
自动化技术   303篇
  2023年   17篇
  2022年   37篇
  2021年   65篇
  2020年   52篇
  2019年   63篇
  2018年   72篇
  2017年   82篇
  2016年   108篇
  2015年   103篇
  2014年   106篇
  2013年   189篇
  2012年   183篇
  2011年   188篇
  2010年   143篇
  2009年   137篇
  2008年   116篇
  2007年   117篇
  2006年   140篇
  2005年   102篇
  2004年   100篇
  2003年   101篇
  2002年   96篇
  2001年   76篇
  2000年   69篇
  1999年   81篇
  1998年   97篇
  1997年   81篇
  1996年   51篇
  1995年   41篇
  1994年   22篇
  1993年   20篇
  1992年   16篇
  1991年   12篇
  1990年   11篇
  1989年   16篇
  1988年   13篇
  1987年   9篇
  1986年   12篇
  1985年   8篇
  1984年   11篇
  1983年   7篇
  1982年   6篇
  1981年   4篇
  1980年   5篇
  1979年   6篇
  1978年   6篇
  1977年   6篇
  1976年   6篇
  1975年   6篇
  1974年   3篇
排序方式: 共有3024条查询结果,搜索用时 15 毫秒
81.
With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because individual identification is important in ubiquitous environment, RFID technology would be used frequently. RFID is a radio frequency identification technology to replace bar code. The reader transmits query (request of user information) and tag-provides user information. RFID has various advantages, such as high speed identification rates, mass memory storages. However, eavesdropping is possible as well as a problem that user information is exposed (Juels et al. in Conference on Computer and Communications Security—ACM CCS, pp. 103–111, 2003; Ohkubo et al. in RFID Privacy Workshop 2003; Weis et al. in International Conference on Security in Pervasive Computing, pp. 201–212, 2003; Weis et al. in Cryptographic Hardware and Embedded Systems—CHES, pp. 454–469, 2002). Therefore, when off-line customer had visited bank for banking service, RNTS (RFID number ticket service) system provides both anonymity in customer identification and efficiency of banking service. In addition, RNTS system protects privacy of an off-line user visiting the bank and it is an efficient method offering service in order of arriving in the bank.  相似文献   
82.
Fully discrete potential-based finite element methods called methods are used to solve a transient eddy current problem in a three-dimensional convex bounded polyhedron. Using methods, fully discrete coupled and decoupled numerical schemes are developed. The existence and uniqueness of solutions for these schemes together with the energy-norm error estimates are provided. To verify the validity of both schemes, some computer simulations are performed for the model from TEAM Workshop Problem 7. This work was supported by Postech BSRI Research Fund-2009, National Basic Research Program of China (2008CB425701), NSFC under the grant 10671025 and the Key Project of Chinese Ministry of Education (No. 107018).  相似文献   
83.
In this paper, a panel generation system for analyzing seakeeping performance of a ship is developed. Given a set of offset data representing the ship hull, the system first creates a surface model of the ship. From the surface model, the wetted part of the ship is obtained by computing the intersection between the water surface and the hull, which is then processed to generate quadrilateral panels for the hull and the water surface. The system is designed to handle various kinds of ships such as ships with a mono-skeg, a twin-skeg and/or a bulbous bow in either an automatic or an interactive manner. Moreover, it can generate input panels for three different seakeeping analysis methods. Examples are provided to demonstrate the capabilities of the system.  相似文献   
84.
This paper studies a heavy-tailed stochastic volatility (SV) model with leverage effect, where a bivariate Student-t distribution is used to model the error innovations of the return and volatility equations. Choy et al. (2008) studied this model by expressing the bivariate Student-t distribution as a scale mixture of bivariate normal distributions. We propose an alternative formulation by first deriving a conditional Student-t distribution for the return and a marginal Student-t distribution for the log-volatility and then express these two Student-t distributions as a scale mixture of normal (SMN) distributions. Our approach separates the sources of outliers and allows for distinguishing between outliers generated by the return process or by the volatility process, and hence is an improvement over the approach of Choy et al. (2008). In addition, it allows an efficient model implementation using the WinBUGS software. A simulation study is conducted to assess the performance of the proposed approach and its comparison with the approach by Choy et al. (2008). In the empirical study, daily exchange rate returns of the Australian dollar to various currencies and daily stock market index returns of various international stock markets are analysed. Model comparison relies on the Deviance Information Criterion and convergence diagnostic is monitored by Geweke’s convergence test.  相似文献   
85.
In a mobile environment, querying a database at a stationary server from a mobile client is expensive due to the limited bandwidth of a wireless channel and the instability of the wireless network. We address this problem by maintaining a materialized view in a mobile client's local storage. Such a materialized view can be considered as a data warehouse. The materialized view contains results of common queries in which the mobile client is interested. In this paper, we address the view update problem for maintaining the consistency between a materialized view at a mobile client and the database server. The content of a materialized view could become incoherent with that at the database server when the content of the database server and/or when the location of the client is changed. Existing view update mechanisms are ‘push-based’. The server is responsible for notifying all clients whose views might be affected by the changes in database or the mobility of the client. This is not appropriate in a mobile environment due to the frequent wireless channel disconnection. Furthermore, it is not easy for a server to keep track of client movements to update individual client location-dependent views. We propose a ‘pull-based’ approach that allows a materialized view to be updated at a client in an incremental manner, requiring a client to request changes to its view from the server. We demonstrate the feasibility of our approach with experimental results. Received 27 January 1999 / Revised 26 November 1999 / Accepted 17 April 2000  相似文献   
86.
Acoustic emission (AE) sensors have been fabricated using polarized polyvinylidene fluoride/trifluoroethylene (P(VDF-TrFE)) piezoelectric copolymer films. The acoustic and electromechanical properties of the copolymers have been determined using the ultrasonic immersion technique and the resonance technique, respectively. The P(VDF-TrFE) AE sensors have been calibrated according to the ASTM standard and evaluated for potential application in the detection of AE in glass fiber reinforced polypropylene (GFPP). A ceramic AE sensor also has been fabricated using lead zirconate titanate (PZT) 7A piezoelectric ceramic and its sensitivity and performance are reported as well. The copolymer sensors do not show resonance peaks of the ceramic sensor and have adequate sensitivity. They can reproduce AE signals accurately without giving artifacts and have potential use in commercial AE systems.  相似文献   
87.
Robust measurement of ocular torsion using iterative Lucas-Kanade   总被引:1,自引:0,他引:1  
We present a new method to measure ocular torsion using Lucas-Kanade method. After pixels of iris annulus around a pupil have been converted into Cartesian coordinates, 30 features on the iris was selected then the features were tracked using the iterative Lucas-Kanade algorithm to calculate torsional shift. The results show that a precision of the method is higher than those measured by a conventional cross-correlation and by a template matching method. The suggested method showed 0.03 degrees mean error with 0.15 degrees maximum error. Particularly, the method was robust to change of pupil size and misalignment of pupil location. Processing time was also fast enough to be implemented in a real-time system.  相似文献   
88.
The past few decades have seen a resurgence ofreasoning techniques in artificial intelligenceinvolving both classical and non-classical logics. Inhis paper, ``Multi-valued Logics: A Uniform Approach toReasoning in Artificial Intelligence', Ginsberg hasshown that through the use of bilattices,several reasoning techniques can be unified under asingle framework. A bilattice is a structure that canbe viewed as a class of truth values that canaccommodate incomplete and inconsistent informationand in certain cases default information. Inbilattice theory, knowledge is ordered along twodimensions: truth/falsity and certainty/uncertainty. By defining the corresponding bilattices as truthspaces, Ginsberg has shown that the same theoremprover can be used to simulate reasoning in firstorder logic, default logic, prioritized default logicand assumption truth maintenance system. Although thisis a significant contribution, Ginsberg's paper waslengthy and involved. This paper summarizes some ofthe essential concepts and foundations of bilatticetheory. Furthermore, it discusses the connections ofbilattice theory and several other existingmulti-valued logics such as the various three-valuedlogics and Belnap's four-valued logic. It is notedthat the set of four truth values in Belnap's logicform a lattice structure that is isomorphic to thesimplest bilattice. Subsequently, Fitting proposed aconflation operation that can be used to selectsub-sets of truth values from this and otherbilattices. This method of selecting sub-sets oftruth values provides a means for identifyingsub-logic in a bilattice.  相似文献   
89.
A numerical process to simulate SiO2 dry etching with inductively coupled C2F6 plasmas has been constructed using a commercial CFD code as a first step to design a run-to-run control system. The simulator was found to reasonably predict the reactive ion etching behavior of C2F6 plasmas and used to investigate the effects of plasma operating variables on the etch rate and uniformity. The relationship between the operating variables and the etching characteristics was mathematically modeled through linear regression for future run-to-run control system design.  相似文献   
90.
We study stochastic stability of centralized Kalman filtering for linear time-varying systems equipped with wireless sensors. Transmission is over fading channels where variable channel gains are counteracted by power control to alleviate the effects of packet drops. We establish sufficient conditions for the expected value of the Kalman filter covariance matrix to be exponentially bounded in norm. The conditions obtained are then used to formulate stabilizing power control policies which minimize the total sensor power budget. In deriving the optimal power control laws, both statistical channel information and full channel information are considered. The effect of system instability on the power budget is also investigated for both these cases.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号