首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3058篇
  免费   228篇
  国内免费   6篇
电工技术   36篇
综合类   1篇
化学工业   745篇
金属工艺   75篇
机械仪表   122篇
建筑科学   127篇
矿业工程   2篇
能源动力   223篇
轻工业   540篇
水利工程   16篇
石油天然气   16篇
无线电   198篇
一般工业技术   578篇
冶金工业   94篇
原子能技术   19篇
自动化技术   500篇
  2024年   19篇
  2023年   42篇
  2022年   76篇
  2021年   135篇
  2020年   127篇
  2019年   122篇
  2018年   155篇
  2017年   143篇
  2016年   177篇
  2015年   123篇
  2014年   163篇
  2013年   388篇
  2012年   176篇
  2011年   220篇
  2010年   177篇
  2009年   207篇
  2008年   164篇
  2007年   133篇
  2006年   97篇
  2005年   70篇
  2004年   67篇
  2003年   41篇
  2002年   52篇
  2001年   21篇
  2000年   24篇
  1999年   32篇
  1998年   29篇
  1997年   12篇
  1996年   24篇
  1995年   7篇
  1994年   3篇
  1993年   4篇
  1992年   9篇
  1991年   10篇
  1990年   7篇
  1989年   2篇
  1988年   4篇
  1987年   4篇
  1986年   4篇
  1985年   4篇
  1984年   4篇
  1982年   2篇
  1981年   2篇
  1980年   2篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1970年   1篇
排序方式: 共有3292条查询结果,搜索用时 45 毫秒
991.
This paper discusses a formal approach for establishing theories of trust for authentication systems which can be used to reason about how agent beliefs evolve through time. The goal of an authentication system is to verify and authorise users in order to protect restricted data and information, so trust is a critical issue for authentication systems. After authentication, two principals (people, computers, services) should be entitled to believe that they are communicating with each other and not with intruders. So, it is important to express such beliefs precisely and to capture the reasoning that leads to them. In this paper, we focus on analysis of agent beliefs in dynamic environments using a temporalised belief logic, obtained by adding a temporal logic onto a belief logic. Working through a well-known authentication protocol, namely Kerberos, we discuss how to express principal beliefs involved in authentication protocols and the evolution of those beliefs based on a series of observations of agents as a consequence of communication. Our approach could be used for designing, verifying and implementing authentication protocols.
Mehmet A. OrgunEmail:
  相似文献   
992.
993.
994.
Discharge characteristics of fine polydisperse granular powders of equal-solid density and near-spherical particle shape through a conical hopper were investigated by measuring solid discharge rates of powders. Effects of orifice size of hopper and size distribution of powders on discharge rate were determined by means of experiments conducted for six different sizes of hopper orifice and three different powder types under gravity flow conditions. A new effective mean diameter characterizing polydisperse powders is first introduced and determined from the particle size versus weight fraction distribution of a powder as the size corresponding to 50% cumulative weight fraction. This effective mean diameter was efficiently used in two modified forms of the Beverloo equation to predict discharge rates of polydisperse powders through hopper orifices.  相似文献   
995.
Internet contributes to the development of science and facilitates scientific demeanors while it also serves as a ground for academic misdemeanors. Recent studies indicate that Internet facilitates and spreads academic dishonesty. The purpose of the current study is to investigate the extent of involvement of Turkish university students in academic dishonesty practices facilitated through Internet (i.e. e-dishonesty) and to question the conditions which lead to e-dishonesty. Three hundred and forty nine education faculty students from the most populated state university in Turkey were administered two Likert-Scale questionnaires developed by the researchers. After the reliability and validity conditions were met, two exploratory factor analyses were conducted. The first one revealed the factors constituting common types of e-dishonesty among undergraduate students which were fraudulence, plagiarism, falsification, delinquency, and unauthorized help. The second factor analysis exhibited individual and contextual factors triggering e-dishonesty which were named as individual factors, institutional policies and peer pressure. Results of both analyses are discussed and suggestions for further research are provided.  相似文献   
996.
We developed a new method for estimation of vigilance level by using both EEG and EMG signals recorded during transition from wakefulness to sleep. Previous studies used only EEG signals for estimating the vigilance levels. In this study, it was aimed to estimate vigilance level by using both EEG and EMG signals for increasing the accuracy of the estimation rate. In our work, EEG and EMG signals were obtained from 30 subjects. In data preparation stage, EEG signals were separated to its subbands using wavelet transform for efficient discrimination, and chin EMG was used to verify and eliminate the movement artifacts. The changes in EEG and EMG were diagnosed while transition from wakefulness to sleep by using developed artificial neural network (ANN). Training and testing data sets consist of the subbanded components of EEG and power density of EMG signals were applied to the ANN for training and testing the system which gives three situations for the vigilance level of the subject: awake, drowsy, and sleep. The accuracy of estimation was about 98–99% while the accuracy of the previous study, which uses only EEG, was 95–96%.  相似文献   
997.
998.
A control input separation method is proposed for reduced-order modelling in boundary control problems. The dynamics of flow systems are typically described by partial differential equations where the input affects the system through boundary conditions. From a control design perspective it is most desirable and natural to employ finite-dimensional representations in which the input enters the dynamics directly. The method proposed here to resolve the input from the boundary conditions is based on obtaining a proper orthogonal decomposition of the unforced flow of the system, and then augmenting this decomposition by optimally computed actuation modes, built using snapshots of the actuated flow. A reduced-order Galerkin model is then derived for this expansion, in which the input appears as an explicit term in the system dynamics. The model reduces exactly to the original baseline case under zero input conditions. The proposed method is then compared to an existing input separation technique, namely the sub-domain separation method. A boundary control example regarding the 2D incompressible Navier–Stokes equation is considered to illustrate the proposed method, where a controller is designed to achieve tracking of a desired 2D spatial profile for the flow velocity.  相似文献   
999.
Next generation wireless networks concept aims at collaboration of various radio access technologies in order to provide quality of service (QoS) supported and cost efficient connections at anywhere and anytime. Since the next generation wireless systems are expected to be of heterogeneous topology, traditional handoff (horizontal handoff/handover) mechanisms are not sufficient to meet the requirements of these types of networks. More intelligent vertical handoff algorithms which consider user profiles, application requirements, and network conditions must be employed in order to provide enhanced performance results for both user and network. Moreover, frequency reuse of one (FRO) seems to be the strongest candidate of deployment options for next generation wireless networks; therefore, interference conditions gains a significant attention in vertical handoff decision making process. In this study, a fuzzy logic-based handoff decision algorithm is introduced for wireless heterogeneous networks. The parameters; data rate, received signal strength indicator (RSSI), and mobile speed are considered as inputs of the proposed fuzzy-based system in order to decide handoff initialization process and select the best candidate access point around a smart mobile terminal. Also, in contrast to the traditional fuzzy-based algorithms, the method proposed takes ambient interference power, which is referred to as interference rate, as another input to the decision process. The results show that the performance is significantly enhanced for both user and network by the method proposed.  相似文献   
1000.
This paper enables the rapid creation and modification of freeform surfaces inside an augmented reality environment, and focuses on methods for enabling increased flexibility during exploratory, conceptual industrial product design through three-dimensional (3D) sketch-based user input. Specifically, we address the role of multiple shape representations with varying uncertainty levels during 3D conceptual sketching, along with methods to transform between those representations. The main contributions of this work are: (1) the formulation of virtual shape data in multiple, concurrent representations (points and surfaces), and a regression method to transition fluidly back and forth between these representations during design, (2) methods for deforming and exploring the product shape using these multiple representations, and (3) representations of these forms such that designers can explore conceptual designs without the need for detailed surface operations such as trimming or continuity enforcement. Through incorporating these contributions, we introduce techniques that can be incorporated in future computer-aided conceptual design systems. These contributions are demonstrated for freeform surface design, with examples of computer mouse and car seat exterior surfaces.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号