首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   44064篇
  免费   3117篇
  国内免费   46篇
电工技术   303篇
综合类   20篇
化学工业   9392篇
金属工艺   719篇
机械仪表   947篇
建筑科学   1398篇
矿业工程   99篇
能源动力   977篇
轻工业   8103篇
水利工程   530篇
石油天然气   187篇
武器工业   3篇
无线电   1958篇
一般工业技术   7218篇
冶金工业   8793篇
原子能技术   172篇
自动化技术   6408篇
  2024年   102篇
  2023年   428篇
  2022年   623篇
  2021年   1221篇
  2020年   1059篇
  2019年   1145篇
  2018年   1895篇
  2017年   1831篇
  2016年   1958篇
  2015年   1477篇
  2014年   1809篇
  2013年   3703篇
  2012年   2831篇
  2011年   2641篇
  2010年   2109篇
  2009年   1887篇
  2008年   1939篇
  2007年   1761篇
  2006年   1204篇
  2005年   962篇
  2004年   946篇
  2003年   822篇
  2002年   777篇
  2001年   535篇
  2000年   448篇
  1999年   536篇
  1998年   2926篇
  1997年   1926篇
  1996年   1197篇
  1995年   663篇
  1994年   537篇
  1993年   566篇
  1992年   188篇
  1991年   174篇
  1990年   157篇
  1989年   150篇
  1988年   166篇
  1987年   156篇
  1986年   130篇
  1985年   155篇
  1984年   123篇
  1983年   82篇
  1982年   96篇
  1981年   122篇
  1980年   114篇
  1979年   57篇
  1978年   57篇
  1977年   194篇
  1976年   379篇
  1975年   54篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
We extend the notion of randomness (in the version introduced by Schnorr) to computable probability spaces and compare it to a dynamical notion of randomness: typicality. Roughly, a point is typical for some dynamic, if it follows the statistical behavior of the system (Birkhoff’s pointwise ergodic theorem). We prove that a point is Schnorr random if and only if it is typical for every mixing computable dynamics. To prove the result we develop some tools for the theory of computable probability spaces (for example, morphisms) that are expected to have other applications.  相似文献   
982.
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model (Blesa et al. in MFCS, Lecture Notes in Computer Science, vol. 3618, pp. 144–155, 2005) by considering the possibility that the router clocks in the network are not synchronized. We name the new model Non Synchronized CAQT (NSCAQT). Clearly, this new extension to the model only affects those scheduling policies that use some form of timing. In a first approach we consider the case in which although not synchronized, all clocks run at the same speed, maintaining constant differences. In this case we show that all universally stable policies in CAQT that use the injection time and the remaining path to schedule packets remain universally stable. These policies include, for instance, Shortest in System (SIS) and Longest in System (LIS). Then, we study the case in which clock differences can vary over time, but the maximum difference is bounded. In this model we show the universal stability of two families of policies related to SIS and LIS respectively (the priority of a packet in these policies depends on the arrival time and a function of the path traversed). The bounds we obtain in this case depend on the maximum difference between clocks. This is a necessary requirement, since we also show that LIS is not universally stable in systems without bounded clock difference. We then present a new policy that we call Longest in Queues (LIQ), which gives priority to the packet that has been waiting the longest in edge queues. This policy is universally stable and, if clocks maintain constant differences, the bounds we prove do not depend on them. To finish, we provide with simulation results that compare the behavior of some of these policies in a network with stochastic injection of packets.  相似文献   
983.
In this paper, we show that free algebras in the variety of residuated lattices and some of its subvarieties are directly indecomposable and show, as a consequence, the direct indecomposability of free algebras for some classes of their bounded implicative subreducts.  相似文献   
984.
The localization of the components of an object near to a device before obtaining the real interaction is usually determined by means of a proximity measurement to the device of the object’s features. In order to do this efficiently, hierarchical decompositions are used, so that the features of the objects are classified into several types of cells, usually rectangular.In this paper we propose a solution based on the classification of a set of points situated on the device in a little-known spatial decomposition named tetra-tree. Using this type of spatial decomposition gives us several quantitative and qualitative properties that allow us a more realistic and intuitive visual interaction, as well as the possibility of selecting inaccessible components. These features could be used in virtual sculpting or accessibility tasks.In order to show these properties we have compared an interaction system based on tetra-trees to one based on octrees.  相似文献   
985.
Machine vision represents a particularly attractive solution for sensing and detecting potential collision‐course targets due to the relatively low cost, size, weight, and power requirements of vision sensors (as opposed to radar and Traffic Alert and Collision Avoidance System). This paper describes the development and evaluation of a real‐time, vision‐based collision‐detection system suitable for fixed‐wing aerial robotics. Using two fixed‐wing unmanned aerial vehicles (UAVs) to recreate various collision‐course scenarios, we were able to capture highly realistic vision (from an onboard camera perspective) of the moments leading up to a collision. This type of image data is extremely scarce and was invaluable in evaluating the detection performance of two candidate target detection approaches. Based on the collected data, our detection approaches were able to detect targets at distances ranging from 400 to about 900 m. These distances (with some assumptions about closing speeds and aircraft trajectories) translate to an advance warning of between 8 and 10 s ahead of impact, which approaches the 12.5‐s response time recommended for human pilots. We overcame the challenge of achieving real‐time computational speeds by exploiting the parallel processing architectures of graphics processing units (GPUs) found on commercial‐off‐the‐shelf graphics devices. Our chosen GPU device suitable for integration onto UAV platforms can be expected to handle real‐time processing of 1,024 × 768 pixel image frames at a rate of approximately 30 Hz. Flight trials using manned Cessna aircraft in which all processing is performed onboard will be conducted in the near future, followed by further experiments with fully autonomous UAV platforms. © 2010 Wiley Periodicals, Inc.  相似文献   
986.
987.
The paper discusses the theoretical and empirical evidence on the subject and concludes that freight mode choice can be best understood as the outcome of interactions between shippers and carriers, and that mode choice depends to a large extent on the shipment size that results from shipper-carrier interactions. These conclusions are supported by economic experiments designed to test the hypothesis of cooperative behavior. This was accomplished by conducting two sets of experiments (ones with the shipper playing the lead role in selecting the shipment size; and others in which the shipment size decision was left to the carriers), and by comparing their results to the ones obtained numerically under the assumption of perfect cooperation. The comparison of results indicated that the experiments converged to the perfect cooperation case. This is in line with the conclusion from game theory that indicates that under typical market conditions the shipper and carrier would cooperate. These results also imply that it really does not matter who “makes” the decision about the shipment size and mode to be used at a given time period, as over time the shipper—that is the customer—ends up selecting the bids more consistent with its own interest. In other words, these results do not support the assumption that freight mode choice is solely made by the carriers.  相似文献   
988.
In this work we present two new approaches to solve the location management problem, respectively, based on the location areas and the reporting cells strategies. The location management problem corresponds to the management of the network configuration with the objective of minimizing the costs involved. We use the differential evolution algorithm to find the best configuration for the location areas and the reporting cells strategies, which principally considers the location update and paging costs. With this work we want to define the best values to the differential evolution configuration, using test networks and also realistic networks, as well as compare our results with the ones obtained by other authors. These two new approaches applied to this problem have given us very good results, when compared with those obtained by other authors.  相似文献   
989.
In this contribution, we present an a posteriori error estimator for the incompressible Stokes problem valid for a conventional mixed FE formulation. Due to the saddle-point property of the problem, conventional error estimators developed for pure minimization problems cannot be utilized straight-forwardly. The new estimator is built up by two key ingredients. At first, a computed error approximation, exactly fulfilling the continuity equation for the error, is obtained via local Dirichlet problems. Secondly, we adopt the approach of solving local equilibrated flux-free problems in order to bound the remaining, incompressible, error. In this manner, guaranteed upper and lower bounds, of the velocity “energy norm” of the error as well as goal-oriented (linear) output functionals, with respect to a reference (overkill) mesh are obtained. In particular, it should be noted that this approach requires no computation of hybrid fluxes. Furthermore, the estimator is applicable to mixed FE formulations using continuous pressure approximations, such as the Mini and Taylor–Hood class of elements. In conclusion, a few simple numerical examples are presented, illustrating the accuracy of the error bounds.  相似文献   
990.
Current software development often relies on non-trivial coordination logic for combining autonomous services, eventually running on different platforms. As a rule, however, such a coordination layer is strongly woven within the application at source code level. Therefore, its precise identification becomes a major methodological (and technical) problem and a challenge to any program understanding or refactoring process.The approach introduced in this paper resorts to slicing techniques to extract coordination data from source code. Such data are captured in a specific dependency graph structure from which a coordination model can be recovered either in the form of an Orc specification or as a collection of code fragments corresponding to the identification of typical coordination patterns in the system. Tool support is also discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号