首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3501篇
  免费   238篇
  国内免费   14篇
电工技术   65篇
综合类   11篇
化学工业   841篇
金属工艺   69篇
机械仪表   92篇
建筑科学   118篇
矿业工程   5篇
能源动力   271篇
轻工业   381篇
水利工程   52篇
石油天然气   50篇
无线电   502篇
一般工业技术   656篇
冶金工业   141篇
原子能技术   20篇
自动化技术   479篇
  2024年   7篇
  2023年   78篇
  2022年   148篇
  2021年   274篇
  2020年   173篇
  2019年   167篇
  2018年   200篇
  2017年   198篇
  2016年   181篇
  2015年   142篇
  2014年   200篇
  2013年   326篇
  2012年   230篇
  2011年   259篇
  2010年   158篇
  2009年   152篇
  2008年   100篇
  2007年   116篇
  2006年   93篇
  2005年   71篇
  2004年   64篇
  2003年   43篇
  2002年   30篇
  2001年   22篇
  2000年   28篇
  1999年   25篇
  1998年   31篇
  1997年   31篇
  1996年   24篇
  1995年   18篇
  1994年   19篇
  1993年   22篇
  1992年   16篇
  1991年   11篇
  1990年   11篇
  1989年   16篇
  1988年   6篇
  1987年   4篇
  1986年   9篇
  1985年   7篇
  1984年   4篇
  1983年   2篇
  1982年   9篇
  1981年   4篇
  1979年   6篇
  1977年   2篇
  1976年   5篇
  1975年   3篇
  1973年   2篇
  1963年   2篇
排序方式: 共有3753条查询结果,搜索用时 343 毫秒
81.
The proliferation of a multi-agent system (MAS) and ideas from Artificial Intelligence (AI)/distributed AI have changed the way systems, in general are controlled, and operation of a system (diesel engine) in particular is automated. In this paper a distributed multi-agent architecture for a diesel engine and the knowledge sources that handle electricity generation is developed. Electronic devices and components used for data handling are described. The sensed data are presented in fuzzy logic and calculated in entropy values and depicted in a decision hierarchy. A comparative performance assessment of the proposed multi-agent based system with an existing system is presented and discussed.  相似文献   
82.
This paper presents a performance assessment of 88 Association of Southeast Asian Nations banks from 2010 to 2013, using an integrated three‐stage approach on financial criteria that emulates the CAMELS rating system. More precisely, fuzzy analytic hierarchy process is used first to assess the relative weights of a number of criteria related to capital adequacy (C), asset quality (A), management quality (M), earnings (E), liquidity (L), and sensitivity to market risk (S) based on the opinion of 88 Association of Southeast Asian Nations experts. Then, these weights are used as technique for order of preference by similarity to ideal solution inputs to assess their relative efficiency. Lastly, neural networks are combined with technique for order of preference by similarity to ideal solution results to produce a model for banking performance with effective predictive ability. The results reveal that contextual variables have a prominent impact on efficiency. Specifically, parsimony in equity leveraging derived from Islamic finance principles may be the underlying cause in explaining higher efficiency levels.  相似文献   
83.
84.
The Cu2Zn1?xCdxSnS4 quinternary alloy nanostructures with different Cd contents were grown using spin coating technique on porous silicon (63.93 %) substrate. The structural properties of Cu2Zn1?xCdxSnS4/PS were investigated by X-ray diffraction and field emission-scanning electron microscope (FE-SEM). The optical properties studied through photoluminescence technique, indicated that the band gap is shifted as Cd content increases from 1.84 eV at x = 0 to 1.76 eV at x = 1. The electrical characterization of the Ag/n-PS/Cu2Zn1?xCdxSnS4/Ag diode through current to voltage (I–V) characterization shows the highest photo-response of (value if any) at Cu2Zn0.4Cd0.6SnS4 composition.  相似文献   
85.
The advancement of digital photography and the popularity of photo sharing social media such as Instagram and Facebook have undoubtedly stimulated growing interest in aesthetics quality improvement. One aspect of photography that contributes to high quality photos is image composition; the spatial arrangement of photo subjects in the image frame. Professional photographers often apply a wealth of photographic composition rules, e.g., rule of thirds, visual balance and simplicity to capture compelling photos. In the recent years, aesthetics-driven recomposition that attempts to computationally modify the composition of an image to mimic a professional photo has started to receive considerable research interest. Researchers have proposed numerous recomposition techniques that utilize a single or a combination of multiple image operators, i.e., cropping, warping and patch rearrangement operators, to modify the composition of an image. In this paper, we present a survey on the state-of-the-arts aesthetic-driven image recomposition. We define the image recomposition problem, outline its objectives, and provide a comprehensive review of the existing image recompositoin techniques, together with a detailed analysis of the effectiveness of each technique in achieving the recomposition objectives. This survey is intended as a good reference for researchers interested in image recomposition.  相似文献   
86.
The rise of online social media has led to an explosion of metadata-containing user generated content. The tracking of metadata distribution is essential to understand social media. This paper presents two statistical models that detect interpretable topics over time along with their hashtags distribution. A topic is represented by a cluster of words that frequently occur together, and a context is represented by a cluster of hashtags, i.e., the hashtag distribution. The models combine a context with a related topic by jointly modeling words with hashtags and time. Experiments with real-world datasets demonstrate that the proposed models discover topics over time with related contexts effectively.  相似文献   
87.
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic curve cryptography for the users of mobile devices. We have analyzed the security aspects of the Yang and Chang's scheme and identified some security flaws. Also two improvements of the Yang and Chang's scheme have been proposed recently, however, it has been found that the schemes have similar security flaws as in the Yang and Chang's scheme. In order to remove the security pitfalls of the Yang and Chang and the subsequent schemes, we proposed an enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique. It supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability. In addition, the proposed scheme possesses low power consumption, low computation cost and better security attributes. As a result, the proposed scheme seems to be more practical and suitable for mobile users for secure Internet banking, online shopping, online voting, etc.  相似文献   
88.
89.
Manipulating deformable objects like clothes, plastic, and paper by a robot is very challenging. This paper focuses on clothes manipulation as an example. A tracing manipulation method is used here to find a corner of the clothes. In this paper, tracing refers to tracing the clothes’ edge, with the robot’s movement based on feedback from sensors. One difficulty during this edge tracing is to make the robot trace smoothly and speedily without dropping the clothes in the process. This is due to the fact that deformable objects are sensitive to contact forces. A solution to this problem is to design a special robot gripper that can trace the clothes without having to worry about the clothes slipping away. In this paper, the development of inchworm-type grippers is proposed. Two sets of grippers inside a robot hand will allow the robot to trace the clothes more freely because there will always be a gripper firmly holding the clothes at any time. A unique tracing method for towel spreading using the inchworm grippers is also discussed. Experimental results have demonstrated the effectiveness of both the proposed grippers and also the algorithm. This work was presented in part at the 12th International Symposium on Artificial Life and Robotics, Oita, Japan, January 25–27, 2007  相似文献   
90.
We give simple, self-contained proofs of the basic hardness results for the classes W[t]W[t] of the weft hierarchy. We extend these proofs to higher levels of the hierarchy and illuminate the distinctions among its classes. The anti-monotone collapse at W[1,s]W[1,s] and the normalization of weft-tt formulas arise as by-products of the proofs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号