首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5593篇
  免费   368篇
  国内免费   11篇
电工技术   109篇
综合类   9篇
化学工业   1594篇
金属工艺   79篇
机械仪表   167篇
建筑科学   214篇
矿业工程   5篇
能源动力   187篇
轻工业   550篇
水利工程   41篇
石油天然气   23篇
无线电   448篇
一般工业技术   927篇
冶金工业   267篇
原子能技术   30篇
自动化技术   1322篇
  2024年   6篇
  2023年   85篇
  2022年   248篇
  2021年   322篇
  2020年   174篇
  2019年   200篇
  2018年   207篇
  2017年   206篇
  2016年   250篇
  2015年   212篇
  2014年   270篇
  2013年   447篇
  2012年   394篇
  2011年   450篇
  2010年   333篇
  2009年   330篇
  2008年   292篇
  2007年   253篇
  2006年   214篇
  2005年   151篇
  2004年   123篇
  2003年   94篇
  2002年   86篇
  2001年   63篇
  2000年   56篇
  1999年   57篇
  1998年   80篇
  1997年   64篇
  1996年   52篇
  1995年   27篇
  1994年   36篇
  1993年   29篇
  1992年   12篇
  1991年   11篇
  1990年   12篇
  1989年   10篇
  1988年   6篇
  1987年   11篇
  1985年   12篇
  1984年   8篇
  1983年   16篇
  1982年   8篇
  1981年   4篇
  1980年   9篇
  1979年   9篇
  1978年   6篇
  1977年   10篇
  1974年   2篇
  1973年   3篇
  1971年   3篇
排序方式: 共有5972条查询结果,搜索用时 15 毫秒
61.
This study investigates the whole-body vibration exposure in kite surfing, alpine skiing, snowboarding and cycling. The vibration exposure was experimentally evaluated following the ISO 2631 guidelines. Results evidenced that the most critical axis is the vertical one. The weighted vibration levels are always larger than 2.5 m/s2 and the vibration dose values are larger than 25 m/s1.75. The exposure limit values of the EU directive are reached after 8–37 min depending on the sport. The vibration magnitude is influenced by the athletes’ speed, by their skill level and sometimes by the equipment. The large vibration values suggest that the practice of sport activities may be a confounding factor in the aetiology of vibration-related diseases.  相似文献   
62.
In the digital world, assigning arbitrary colors to an object is a simple operation thanks to texture mapping. However, in the real world, the same basic function of applying colors onto an object is far from trivial. One can specify colors during the fabrication process using a color 3D printer, but this does not apply to already existing objects. Paint and decals can be used during post‐fabrication, but they are challenging to apply on complex shapes. In this paper, we develop a method to enable texture mapping of physical objects, that is, we allow one to map an arbitrary color image onto a three‐dimensional object. Our approach builds upon hydrographics, a technique to transfer pigments printed on a sheet of polymer onto curved surfaces. We first describe a setup that makes the traditional water transfer printing process more accurate and consistent across prints. We then simulate the transfer process using a specialized parameterization to estimate the mapping between the planar color map and the object surface. We demonstrate that our approach enables the application of detailed color maps onto complex shapes such as 3D models of faces and anatomical casts.  相似文献   
63.
The need for creativity is ubiquitous, and mobile devices connected to Web services can help us. Linguistic creativity is widely used in advertisements to surprise us, to get our attention, and to stick concepts in our memory. However, creativity can also be used as a defense. When we walk in the street, we are overwhelmed by messages that try to get our attention with any persuasive device at hand. As messages get ever more aggressive, often our basic cognitive defenses—trying not to perceive those messages—are not sufficient. One advanced defensive technique is based on transforming the perceived message into something different (for instance, making use of irony or hyperbole) from what was originally meant in the message. In this article, we describe an implemented application for smartphones, which creatively modifies the linguistic expression in a virtual copy of a poster encountered on the street. The mobile system is inspired by the subvertising practice of countercultural art.  相似文献   
64.
65.
Transnational activism endures as a political practice turning a mirror onto the world's powerbrokers. We analyse a variety of transnational activism best characterized as serial by virtue of an observed systematic time and border‐spanning commitment to protest communication. Following statistical disambiguation of a dataset of 2.5 million unique Twitter users, we identified a subset of exceptionally prolific communicators and interviewed 21 of them. We show that a noted prominence in networked communication of otherwise unremarkable Twitter users may be an upshot of purposive strategies intended to publicize, support or help orchestrate collective action. Accordingly, we propose the term “engagement compass” to address the relationship between activists' life‐patterns and their personal investment in protest over time.  相似文献   
66.
In recent years, cubic regularization algorithms for unconstrained optimization have been defined as alternatives to trust-region and line search schemes. These regularization techniques are based on the strategy of computing an (approximate) global minimizer of a cubic overestimator of the objective function. In this work we focus on the adaptive regularization algorithm using cubics (ARC) proposed in Cartis et al. [Adaptive cubic regularisation methods for unconstrained optimization. Part I: motivation, convergence and numerical results, Mathematical Programming A 127 (2011), pp. 245–295]. Our purpose is to design a modified version of ARC in order to improve the computational efficiency preserving global convergence properties. The basic idea is to suitably combine a Goldstein-type line search and a nonmonotone accepting criterion with the aim of advantageously exploiting the possible good descent properties of the trial step computed as (approximate) minimizer of the cubic model. Global convergence properties of the proposed nonmonotone ARC algorithm are proved. Numerical experiments are performed and the obtained results clearly show satisfactory performance of the new algorithm when compared to the basic ARC algorithm.  相似文献   
67.
68.
69.
Internet measured data collected via passive measurement are analyzed to obtain localization information on nodes by clustering (i.e., grouping together) nodes that exhibit similar network path properties. Since traditional clustering algorithms fail to correctly identify clusters of homogeneous nodes, we propose the NetCluster novel framework, suited to analyze Internet measurement datasets. We show that the proposed framework correctly analyzes synthetically generated traces. Finally, we apply it to real traces collected at the access link of Politecnico di Torino campus LAN and discuss the network characteristics as seen at the vantage point.  相似文献   
70.
Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus.The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware—and Zeus in particular—that could pave the way for further investigation in this field.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号