首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4328篇
  免费   304篇
  国内免费   2篇
电工技术   55篇
综合类   4篇
化学工业   1109篇
金属工艺   65篇
机械仪表   79篇
建筑科学   159篇
矿业工程   18篇
能源动力   177篇
轻工业   791篇
水利工程   24篇
石油天然气   16篇
无线电   212篇
一般工业技术   718篇
冶金工业   200篇
原子能技术   21篇
自动化技术   986篇
  2024年   10篇
  2023年   44篇
  2022年   156篇
  2021年   199篇
  2020年   124篇
  2019年   147篇
  2018年   186篇
  2017年   176篇
  2016年   179篇
  2015年   154篇
  2014年   193篇
  2013年   339篇
  2012年   329篇
  2011年   361篇
  2010年   283篇
  2009年   240篇
  2008年   254篇
  2007年   212篇
  2006年   163篇
  2005年   147篇
  2004年   105篇
  2003年   95篇
  2002年   93篇
  2001年   44篇
  2000年   39篇
  1999年   34篇
  1998年   44篇
  1997年   32篇
  1996年   25篇
  1995年   43篇
  1994年   18篇
  1993年   17篇
  1992年   12篇
  1991年   17篇
  1990年   13篇
  1989年   13篇
  1988年   9篇
  1987年   6篇
  1986年   5篇
  1985年   7篇
  1984年   11篇
  1983年   8篇
  1981年   3篇
  1980年   3篇
  1979年   7篇
  1978年   4篇
  1977年   5篇
  1976年   4篇
  1975年   8篇
  1974年   3篇
排序方式: 共有4634条查询结果,搜索用时 62 毫秒
111.
Cross-entropy has been recently proposed as a heuristic method for solving combinatorial optimization problems. We briefly review this methodology and then suggest a hybrid version with the goal of improving its performance. In the context of the well-known max-cut problem, we compare an implementation of the original cross-entropy method with our proposed version. The suggested changes are not particular to the max-cut problem and could be considered for future applications to other combinatorial optimization problems.  相似文献   
112.
Currently, the design of aesthetic products is a process that requires a set of activities where digital models and physical mockups play a key role. Typically, these are modified (and built) several times before reaching the desired design, increasing the development time and, consequently, the final product cost. In this paper, we present an innovative design environment for computer-aided design (CAD) surface analysis. Our system relies on a direct visuo-haptic display system, which enables users to visualize models using a stereoscopic view, and allows the evaluation of sectional curves using touch. Profile curves are rendered using an haptic device that deforms a plastic strip, thanks to a set of actuators, to reproduce the curvature of the shape co-located with the virtual model. By touching the strip, users are able to evaluate shape characteristics, such as curvature or discontinuities (rendered using sound), and to assess the surface quality. We believe that future computer-aided systems (CAS)/CAD systems based on our approach will contribute in improving the design process at industrial level. Moreover, these will allow companies to reduce the product development time by reducing the number of physical mockups necessary for the product design evaluation and by increasing the quality of the final product, allowing a wider exploration and comparative evaluation of alternatives in the given time.  相似文献   
113.
According to Emulsion Stability Simulations (ESS), the flocculation of two non-deformable drops in the primary minimum of the interaction potential, necessarily leads to their coalescence. This property is used here for the evaluation of the stability ratio (W) of solid particles, interacting with the same inter-particle potential as the one of non-deformable droplets. Two different methodologies are used. The first one consists on the repeated evaluation of the coalescence time between two particles. The second one consists on the estimation of the time required for a decrease in the number of aggregates of the dispersion equal to n0/2 (where n0 is the initial number of aggregates). The results of the simulations are contrasted with the stability ratio of an anionic latex suspension subject to several ionic strengths (400-1000 mM). The first methodology is far more efficient for the evaluation of W although it misses the development of the aggregates and their growth. Absolute coagulation rates (kf) can also be obtained using one N-particle simulation for the calculation of the fast flocculation rate , and several two-particle simulations for the evaluation of W. This combined procedure is also more efficient than the N-particle evaluation of .  相似文献   
114.
This work presents a general mechanism for executing specifications that comply with given invariants, which may be expressed in different formalisms and logics. We exploit Maude’s reflective capabilities and its properties as a general semantic framework to provide a generic strategy that allows us to execute Maude specifications taking into account user-defined invariants. The strategy is parameterized by the invariants and by the logic in which such invariants are expressed. We experiment with different logics, providing examples for propositional logic, (finite future time) linear temporal logic and metric temporal logic.  相似文献   
115.
Most real‐coded genetic algorithm research has focused on developing effective crossover operators, and as a result, many different types of crossover operators have been proposed. Some forms of crossover operators are more suitable to tackle certain problems than others, even at the different stages of the genetic process in the same problem. For this reason, techniques that combine multiple crossovers, called hybrid crossover operators, have been suggested as alternative schemes to the common practice of applying only one crossover model to all the elements in the population. On the other hand, there are operators with multiple offsprings, more than two descendants from two parents, which present a better behavior than the operators with only two descendants, and achieve a good balance between exploration and exploitation. © 2009 Wiley Periodicals, Inc.  相似文献   
116.
We have previously proposed SecureUML, an expressive UML-based language for constructing security-design models, which are models that combine design specifications for distributed systems with specifications of their security policies. Here, we show how to automate the analysis of such models in a semantically precise and meaningful way. In our approach, models are formalized together with scenarios that represent possible run-time instances. Queries about properties of the security policy modeled are expressed as formulas in UML’s Object Constraint Language. The policy may include both declarative aspects, i.e., static access-control information such as the assignment of users and permissions to roles, and programmatic aspects, which depend on dynamic information, namely the satisfaction of authorization constraints in a given scenario. We show how such properties can be evaluated, completely automatically, in the context of the metamodel of the security-design language. We demonstrate, through examples, that this approach can be used to formalize and check non-trivial security properties. The approach has been implemented in the SecureMOVA tool and all of the examples presented have been checked using this tool.  相似文献   
117.
Many software systems fail to address their intended purpose because of a lack of user involvement and requirements deficiencies. This paper discusses the elaboration of a requirements-analysis process that integrates a critical-parameter-based approach to task modeling within a user-centric design framework. On one hand, adapting task models to capture requirements bridges the gap between scenarios and critical parameters which benefits design from the standpoint of user involvement and accurate requirements. On the other hand, using task models as a reusable component leverages requirements reuse which benefits design by increasing quality while simultaneously reducing development costs and time-to-market. First, we present the establishment of both a user-centric and reuse-centric requirements process along with its implementation within an integrated design tool suite. Secondly, we report the design, procedures, and findings of two user studies aimed at assessing the feasibility for novice designers to conduct the process as well as evaluating the resulting benefits upon requirements-analysis deliverables, requirements quality, and requirements reuse.  相似文献   
118.
Many countries have implemented changes in public-sector management models, based on the strategic and intensive use of new information and communication technologies. From a critical standpoint, this paper analyzes and characterizes the contributions made by research in the field of e-government, identifying future areas of interest and potentially valuable methodologies. In addition, it compares research efforts focused on developing countries with those concerning developed economies, in order to identify research gaps and possibilities for improvement in the context of e-government research in developing countries. Diverse scientometric approaches are employed in this analysis of papers published by international journals listed in the SSCI index in the fields of Public Administration and of Information Science & Library Science. Our findings reveal the existence of various research gaps and highlight areas that should be addressed in future research, especially in developing countries. Indeed, the research approach to e-government remains immature, focusing on particular cases or dimensions, while little has been done to produce theories or models to clarify and explain the political processes of e-government. In addition, significant differences are found between the impact of scientific output and patterns of scientific production as regards developing and developed countries.  相似文献   
119.
120.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号