首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10601篇
  免费   683篇
  国内免费   106篇
电工技术   141篇
综合类   32篇
化学工业   2324篇
金属工艺   200篇
机械仪表   393篇
建筑科学   238篇
矿业工程   36篇
能源动力   600篇
轻工业   1077篇
水利工程   118篇
石油天然气   82篇
武器工业   1篇
无线电   1300篇
一般工业技术   2358篇
冶金工业   669篇
原子能技术   133篇
自动化技术   1688篇
  2024年   56篇
  2023年   284篇
  2022年   700篇
  2021年   1056篇
  2020年   650篇
  2019年   715篇
  2018年   723篇
  2017年   608篇
  2016年   594篇
  2015年   398篇
  2014年   495篇
  2013年   836篇
  2012年   492篇
  2011年   575篇
  2010年   360篇
  2009年   310篇
  2008年   251篇
  2007年   229篇
  2006年   157篇
  2005年   114篇
  2004年   103篇
  2003年   110篇
  2002年   83篇
  2001年   63篇
  2000年   61篇
  1999年   80篇
  1998年   181篇
  1997年   148篇
  1996年   114篇
  1995年   93篇
  1994年   69篇
  1993年   71篇
  1992年   50篇
  1991年   54篇
  1990年   40篇
  1989年   43篇
  1988年   35篇
  1987年   38篇
  1986年   37篇
  1985年   39篇
  1984年   33篇
  1983年   32篇
  1982年   20篇
  1981年   16篇
  1980年   13篇
  1979年   11篇
  1978年   21篇
  1977年   23篇
  1976年   28篇
  1973年   11篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
International Journal of Control, Automation and Systems - The fault and disturbances estimation has an important role in the modern traction railway system. This paper proposes a unique method for...  相似文献   
72.
Cloud computing is an emerging technology in which information technology resources are virtualized to users in a set of computing resources on a pay‐per‐use basis. It is seen as an effective infrastructure for high performance applications. Divisible load applications occur in many scientific and engineering applications. However, dividing an application and deploying it in a cloud computing environment face challenges to obtain an optimal performance due to the overheads introduced by the cloud virtualization and the supporting cloud middleware. Therefore, we provide results of series of extensive experiments in scheduling divisible load application in a Cloud environment to decrease the overall application execution time considering the cloud networking and computing capacities presented to the application's user. We experiment with real applications within the Amazon cloud computing environment. Our extensive experiments analyze the reasons of the discrepancies between a theoretical model and the reality and propose adequate solutions. These discrepancies are due to three factors: the network behavior, the application behavior and the cloud computing virtualization. Our results show that applying the algorithm result in a maximum ratio of 1.41 of the measured normalized makespan versus the ideal makespan for application in which the communication to computation ratio is big. They show that the algorithm is effective for those applications in a heterogeneous setting reaching a ratio of 1.28 for large data sets. For application following the ensemble clustering model in which the computation to communication ratio is big and variable, we obtained a maximum ratio of 4.7 for large data set and a ratio of 2.11 for small data set. Applying the algorithm also results in an important speedup. These results are revealing for the type of applications we consider under experiments. The experiments also reveal the impact of the choice of the platforms provided by Amazon on the performance of the applications under study. Considering the emergence of cloud computing for high performance applications, the results in this paper can be widely adopted by cloud computing developers. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
73.
Use Case modeling is a popular technique for documenting functional requirements of software systems. Refactoring is the process of enhancing the structure of a software artifact without changing its intended behavior. Refactoring, which was first introduced for source code, has been extended for use case models. Antipatterns are low quality solutions to commonly occurring design problems. The presence of antipatterns in a use case model is likely to propagate defects to other software artifacts. Therefore, detection and refactoring of antipatterns in use case models is crucial for ensuring the overall quality of a software system. Model transformation can greatly ease several software development activities including model refactoring. In this paper, a model transformation approach is proposed for improving the quality of use case models. Model transformations which can detect antipattern instances in a given use case model, and refactor them appropriately are defined and implemented. The practicability of the approach is demonstrated by applying it on a case study that pertains to biodiversity database system. The results show that model transformations can efficiently improve quality of use case models by saving time and effort.  相似文献   
74.
Big data technologies and a range of Government open data initiatives provide the basis for discovering new insights into cities; how they are planned, how they managed and the day-to-day challenges they face in health, transport and changing population profiles. The Australian Urban Research Infrastructure Network (AURIN – www.aurin.org.au) project is one example of such a big data initiative that is currently running across Australia. AURIN provides a single gateway providing online (live) programmatic access to over 2000 data sets from over 70 major and typically definitive data-driven organizations across federal and State government, across industry and across academia. However whilst open (public) data is useful to bring data-driven intelligence to cities, more often than not, it is the data that is not-publicly accessible that is essential to understand city challenges and needs. Such sensitive (unit-level) data has unique requirements on access and usage to meet the privacy and confidentiality demands of the associated organizations. In this paper we highlight a novel geo-privacy supporting solution implemented as part of the AURIN project that provides seamless and secure access to individual (unit-level) data from the Department of Health in Victoria. We illustrate this solution across a range of typical city challenges in localized contexts around Melbourne. We show how unit level data can be combined with other data in a privacy-protecting manner. Unlike other secure data access and usage solutions that have been developed/deployed, the AURIN solution allows any researcher to access and use the data in a manner that meets all of the associated privacy and confidentiality concerns, without obliging them to obtain ethical approval or any other hurdles that are normally put in place on access to and use of sensitive data. This provides a paradigm shift in secure access to sensitive data with geospatial content.  相似文献   
75.
Artificial neural networks modeling have recently acquired enormous importance in microwave community especially in analyzing and synthesizing of microstrip antennas (MSAs) due to their generalization and adaptability features. A trained neural model estimates response very fast, which is nearly equal to its measured and/or simulated counterpart. Thus, it completely bypasses the repetitive use of conventional models as these models need rediscretization for every minor changes in the geometry, which itself is a time‐consuming exercise. The purpose of this article is to review this emerging area comprehensively for both analyzing and synthesizing of the MSAs. During reviewing process, some untouched cases are also observed, which are essentially required to be resolved for antenna designers. Unique and efficient neural networks‐based solutions are suggested for these cases. The proposed neural approaches are validated by fabricating and characterizing of the prototypes too. © 2015 Wiley Periodicals, Inc. Int J RF and Microwave CAE 25:747–757, 2015.  相似文献   
76.
Service Oriented Architecture with underlying technologies like web services and web service orchestration opens new vistas for integration among business processes operating in heterogeneous environments. However, such dynamic collaborations require a highly secure environment at each respective business partner site. Existing web services standards address the issue of security only on the service provider platform. The partner platforms to which sensitive information is released have till now been neglected. Remote Attestation is a relatively new field of research which enables an authorized party to verify that a trusted environment actually exists on a partner platform. To incorporate this novel concept in to the web services realm, a new mechanism called WS-Attestation has been proposed. This mechanism provides a structural paradigm upon which more fine-grained solutions can be built. In this paper, we present a novel framework, Behavioral Attestation for Web Services, in which XACML is built on top of WS-Attestation in order to enable more flexible remote attestation at the web services level. We propose a new type of XACML policy called XACML behavior policy, which defines the expected behavior of a partner platform. Existing web service standards are used to incorporate remote attestation at the web services level and a prototype is presented, which implements XACML behavior policy using low-level attestation techniques.  相似文献   
77.
This paper proposes a new feature extraction technique using wavelet based sub-band parameters (WBSP) for classification of unaspirated Hindi stop consonants. The extracted acoustic parameters show marked deviation from the values reported for English and other languages, Hindi having distinguishing manner based features. Since acoustic parameters are difficult to be extracted automatically for speech recognition. Mel Frequency Cepstral Coefficient (MFCC) based features are usually used. MFCC are based on short time Fourier transform (STFT) which assumes the speech signal to be stationary over a short period. This assumption is specifically violated in case of stop consonants. In WBSP, from acoustic study, the features derived from CV syllables have different weighting factors with the middle segment having the maximum. The wavelet transform has been applied to splitting of signal into 8 sub-bands of different bandwidths and the variation of energy in different sub-bands is also taken into account. WBSP gives improved classification scores. The number of filters used (8) for feature extraction in WBSP is less compared to the number (24) used for MFCC. Its classification performance has been compared with four other techniques using linear classifier. Further, Principal components analysis (PCA) has also been applied to reduce dimensionality.  相似文献   
78.
ABSTRACT

The quality of user-generated content over World Wide Web media is a matter of serious concern for both creators and users. To measure the quality of content, webometric techniques are commonly used. In recent times, bibliometric techniques have been introduced to good effect for evaluation of the quality of user-generated content, which were originally used for scholarly data. However, the application of bibliometric techniques to evaluate the quality of YouTube content is limited to h-index and g-index considering only views. This paper advocates for and demonstrates the adaptation of existing Bibliometric indices including h-index, g-index and M-index exploiting both views and comments and proposes three indices hvc, gvc and mvc for YouTube video channel ranking. The empirical results prove that the proposed indices using views along with the comments outperform the existing approaches on a real-world dataset of YouTube.  相似文献   
79.
The Jackfish Bay Remedial Action Plan is the first of Lake Superior's Areas of Concern (AOCs) to consider recognition as an Area in Recovery (AiR). As a result of a high degree of complexity and uncertainty, ecosystem recovery in Jackfish Bay has been determined using a combination of regulatory policies and scientific evidence and extensive public and expert-based decision making. As a result, the conceptualization of the AiR status in Jackfish Bay has been developed with the adaptive management and the ecosystem approach, which provide the basic principles of assessing, monitoring, and managing the Area of Concern. To determine the status of beneficial use impairments caused by effluent from the Terrace Bay Pulp Inc., three public advisory committees—an academic panel of experts, a government technical review committee, and the Jackfish Bay Public Area in Recovery Review Committee (PARRC)—reviewed relevant scientific data and documents, including peer-reviewed publications, to assess changes in pollution levels in Jackfish Bay and improvements to aquatic, biotic, and benthic environments of the bay. The public decision-making process concluded with recommendations by the PARRC to develop a systematic monitoring program so that the ecosystem recovery process in the bay could be assessed on a continued basis, leading to its eventual delisting as an AOC. The entire process provides an example of blending science and public policies for remediation of a degraded ecosystem on the Great Lakes.  相似文献   
80.
We present a scheme for the implementation of three-qubit Grover’s algorithm using four-level superconducting quantum interference devices (SQUIDs) coupled to a superconducting resonator. The scheme is based on resonant, off-resonant interaction of the cavity field with SQUIDs and application of classical microwave pulses. We show that adjustment of SQUID level spacings during the gate operations, adiabatic passage, and second-order detuning are not required that leads to faster implementation. We also show that the marked state can be searched with high fidelity even in the presence of unwanted off-resonant interactions, level decay, and cavity dissipation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号