首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   983篇
  免费   23篇
  国内免费   1篇
电工技术   13篇
化学工业   169篇
金属工艺   13篇
机械仪表   20篇
建筑科学   54篇
矿业工程   22篇
能源动力   34篇
轻工业   103篇
水利工程   19篇
石油天然气   2篇
无线电   85篇
一般工业技术   123篇
冶金工业   97篇
原子能技术   2篇
自动化技术   251篇
  2023年   9篇
  2022年   14篇
  2021年   20篇
  2020年   11篇
  2019年   19篇
  2018年   17篇
  2017年   16篇
  2016年   23篇
  2015年   23篇
  2014年   23篇
  2013年   57篇
  2012年   47篇
  2011年   85篇
  2010年   55篇
  2009年   84篇
  2008年   57篇
  2007年   56篇
  2006年   50篇
  2005年   59篇
  2004年   37篇
  2003年   35篇
  2002年   25篇
  2001年   22篇
  2000年   14篇
  1999年   18篇
  1998年   12篇
  1997年   13篇
  1996年   11篇
  1995年   6篇
  1994年   6篇
  1993年   8篇
  1992年   9篇
  1991年   2篇
  1990年   8篇
  1989年   3篇
  1988年   2篇
  1987年   8篇
  1986年   2篇
  1985年   5篇
  1984年   4篇
  1983年   2篇
  1980年   2篇
  1939年   4篇
  1938年   3篇
  1932年   4篇
  1930年   1篇
  1929年   5篇
  1928年   1篇
  1927年   2篇
  1926年   3篇
排序方式: 共有1007条查询结果,搜索用时 46 毫秒
61.
We consider a network providing Differentiated Services (DiffServ), which allow Internet Service Providers (ISPs) to offer different levels of Quality of Service (QoS) to different traffic streams. We study two types of buffering policies that are used in network switches supporting QoS. In the FIFO type, packets must be transmitted in the order they arrive. In the uniform bounded delay type, there is a maximal delay time associated with the switch and each packet must be transmitted within this time, or otherwise it is dropped. In both models the buffer space is limited, and packets are lost when the buffer overflows. Each packet has an intrinsic value, and the goal is to maximize the total value of transmitted packets. Our main contribution is an algorithm for the FIFO model with arbitrary packet values that for the first time achieves a competitive ratio better than 2, namely 2-ε for a constant ε gt; 0. We also describe an algorithm for the uniform bounded delay model which simulates our algorithm for the FIFO model, and show that it achieves the same competitive ratio.  相似文献   
62.
One‐way constraints have been incorporated in many graphical user interface toolkits because they are simple to learn, easy to write, and can express many types of useful graphical relationships. This paper is an evaluative paper that examines users' experience with one‐way constraints in two user interface development toolkits, Garnet and Amulet, over a 15‐year time span. The lessons gained from this examination can help guide the design of future constraint systems. The most important lessons are that (1) constraints should be allowed to contain arbitrary code that is written in the underlying toolkit language and does not require any annotations, such as parameter declarations, (2) constraints are difficult to debug and better debugging tools are needed, and (3) programmers will readily use one‐way constraints to specify the graphical layout of an application, but must be carefully and time‐consumingly trained to use them for other purposes. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
63.
Abstract— Thin‐film transistors (TFTs) are field‐effect transistors that can be used to create large‐scale‐integrated (LSI) circuits. The combination of high‐performance TFTs and transfer technology of the TFTs has the potential to foster the rise of a new flexible microelectronics industry. This paper discusses the current status of flexible microelectronics, using a TFT fingerprint sensor (FPS) as an example. Technology used in active‐matrix displays can easily be applied to the TFT FPS. TFT technology should not be confined to the display industry; its use should be expanded into the semiconductor industry. With the result presented in this paper, we declare a new era of flexible microelectronics open.  相似文献   
64.
65.
Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this "inside the gate" response as process threat management. The authors have initiated a joint industry/academia study to address: the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study.  相似文献   
66.
67.
68.
In vivo measurements of equivalent resistivities of skull (rho(skull)) and brain (rho(brain)) are performed for six subjects using an electric impedance tomography (EIT)-based method and realistic models for the head. The classical boundary element method (BEM) formulation for EIT is very time consuming. However, the application of the Sherman-Morrison formula reduces the computation time by a factor of 5. Using an optimal point distribution in the BEM model to optimize its accuracy, decreasing systematic errors of numerical origin, is important because cost functions are shallow. Results demonstrate that rho(skull)/rho(brain) is more likely to be within 20 and 50 rather than equal to the commonly accepted value of 80. The variation in rho(brain)(average = 301 omega x cm, SD = 13%) and rho(skull)(average = 12230 omega x cm, SD = 18%) is decreased by half, when compared with the results using the sphere model, showing that the correction for geometry errors is essential to obtain realistic estimations. However, a factor of 2.4 may still exist between values of rho(skull)/rho(brain) corresponding to different subjects. Earlier results show the necessity of calibrating rho(brain) and rho(skull) by measuring them in vivo for each subject, in order to decrease errors associated with the electroencephalogram inverse problem. We show that the proposed method is suited to this goal.  相似文献   
69.
This study focuses on the uncertainties in the fate of nitrogen (N) in the Netherlands. Nitrogen inputs into the Netherlands in products, by rivers, and by atmospheric deposition, and microbial and industrial fixation of atmospheric N2 amount to about 4450 Gg N y–1. About 60% of this N is transported out of the Netherlands in products. The fate of the remaining 40%, however, is less clear. We discuss uncertainties in losses to the atmosphere (as ammonia or through denitrification), by leaching and runoff, and in N accumulation in biomass and soils. These processes may account for the fate of about 40% of the N in the Netherlands, and for the fate of about 60% of the N in Dutch agricultural soils. Reducing uncertainties in the estimates of these fluxes is necessary for reducing the impact of excess N in the environment. In particular, monitoring the environmental effects of ammonia emissions and nitrate leaching to groundwater and aquatic systems requires an increased understanding of the fate of N. Uncertainties arise because (1) some N fluxes cannot be measured directly and are usually quantified indirectly as the balance in N budgets, (2) direct measurements of N fluxes have inevitable inaccuracies, (3) lack of experimental data and other information (e.g. statistics) needed for upscaling, (4) large spatial and temporal variability of fluxes, and (5) poor understanding of the processes involved. These uncertainties can be reduced by additional experimental studies and by further development of process-based models and N budget studies. We prioritize these future research needs according to a range of different criteria.  相似文献   
70.
There is a growing interest among teachers in using games as a part of their lesson plans. A standardised, interoperable approach to the sharing of such game-based lesson plans would allow teachers and educational technologists to compare and contrast Digital Game Based Learning scenarios, allowing best practices and lessons learned to emerge. Although games can be used as ‘add-ons’ in educational contexts, greater benefits can be attained by integrating games more fully into the educational process, i.e. by repurposing existing games to target the specific learning objectives. In this article we analyse this problem. We developed two possible solutions based on the integration and the interaction of games and learning scenarios. The first solution is based on ‘pedagogical wrappers’, where games are linked to e-learning flows but without interaction and communication. The second solution sees a tighter integration which supports ongoing interaction and communication between game and e-learning flow. We applied both solutions to a generic game. This game was firstly programmed in Action Script and later re-used for learning purposes and represented in IMS Learning Design. We analysed the pros and cons of each solution and identify research topics for further research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号