首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2310篇
  免费   92篇
  国内免费   5篇
电工技术   16篇
综合类   3篇
化学工业   388篇
金属工艺   48篇
机械仪表   26篇
建筑科学   53篇
矿业工程   5篇
能源动力   68篇
轻工业   189篇
水利工程   7篇
石油天然气   9篇
无线电   320篇
一般工业技术   337篇
冶金工业   656篇
原子能技术   14篇
自动化技术   268篇
  2024年   5篇
  2023年   36篇
  2022年   54篇
  2021年   99篇
  2020年   71篇
  2019年   86篇
  2018年   76篇
  2017年   75篇
  2016年   111篇
  2015年   56篇
  2014年   82篇
  2013年   113篇
  2012年   97篇
  2011年   107篇
  2010年   89篇
  2009年   73篇
  2008年   78篇
  2007年   52篇
  2006年   39篇
  2005年   46篇
  2004年   30篇
  2003年   30篇
  2002年   33篇
  2001年   27篇
  2000年   30篇
  1999年   35篇
  1998年   192篇
  1997年   122篇
  1996年   63篇
  1995年   45篇
  1994年   38篇
  1993年   49篇
  1992年   21篇
  1991年   22篇
  1990年   24篇
  1989年   15篇
  1988年   15篇
  1987年   16篇
  1986年   19篇
  1985年   13篇
  1984年   5篇
  1983年   10篇
  1982年   14篇
  1981年   8篇
  1980年   4篇
  1979年   9篇
  1978年   7篇
  1977年   20篇
  1976年   34篇
  1975年   3篇
排序方式: 共有2407条查询结果,搜索用时 0 毫秒
41.
The planar Hall effect (PHE) sensor with a junction size of 3 μm × 3 μm for a single micro-bead detection has been fabricated successfully using a typical spin-valve thin film Ta(5)/NiFe(16)/Cu(1.2)/NiFe(2)/IrMn(15)/Ta(5) nm. The PHE sensor exhibits a sensitivity of about 7.2 μV Oe?1 in the magnetic field range of ±7 Oe approximately. We have performed an experiment to illustrated the possibility of single micro-bead detection by using a PHE sensor. A single micro-bead of 2.8 μm diameter size is secluded from 0.1% dilute solution of the Dynabeads® M-280 dropped on the sensor surface and is located on the sensor junction by using a micro magnetic needle. The comparison of the PHE voltage profiles in the field range from 0 to 20 Oe in the absence and presence of a single micro-bead identifies a single Dynabeads® M-280, the maximal signal change as large as ΔV  1.1 μV can be obtained at the field ~6.6 Oe. The results are well described in terms of the reversal of a basic single domain structure.  相似文献   
42.
Trust mechanisms are used in peer‐to‐peer (P2P) networks to help well‐behaving peers find other well‐behaving peers with which to trade. Unfortunately, these trust mechanisms often do little to keep badly behaving peers from entering and taking advantage of the network, which makes the resulting network difficult or impossible to use for legitimate purposes such as e‐commerce. We propose trust by association, a way of tying peers together in invitation‐only P2P networks in such a way as to encourage the removal of badly behaving peers. We use invitations to create a structure within the otherwise ad hoc P2P network. Using this structure, we create a meta‐reputation system where we measure a peer’s trustworthiness not only by its own behavior, but also by the behavior of the peers it has invited to join. The connection created between the peers takes advantage of the external social relationship that must exist before a peer can be invited into the network. The result is a P2P network where, rather than just trying to marginalize badly behaving peers, there is incentive to kick them out of the network. We present results from a simple simulation showing that our approach works well in general when combined with and compared to an existing trust mechanism.  相似文献   
43.
This paper presents a study on improving the traversability of a quadruped walking robot in 3D rough terrains. The key idea is to exploit body movement of the robot. The position and orientation of the robot are systematically adjusted and the possibility of finding a valid foothold for the next swing is maximized, which makes the robot have more chances to overcome the rough terrains. In addition, a foothold search algorithm that provides the valid foothold while maintaining a high traversability of the robot, is investigated and a gait selection algorithm is developed to help the robot avoid deadlock situations. To explain the algorithms, new concepts such as reachable area, stable area, potential search direction, and complementary kinematic margin are introduced, and the effectiveness of the algorithms is validated via simulations and experiments.  相似文献   
44.
This paper presents the design and fabrication of a micro Pirani gauge using VO x as the sensitive material for monitoring the pressure inside a hermetical package for micro bolometer focal plane arrays (FPAs). The designed Pirani gauge working in heat dissipating mode was intentionally fabricated using standard MEMS processing which is highly compatible with the FPAs fabrication. The functional layer of the micro Pirani gauge is a VO x thin film designed as a 100 × 200 μm pixel, suspended 2 μm above the substrate. By modeling of rarefied gas heat conduction using the Extended Fourier’s law, finite element analysis is used to investigate the sensitivity of the pressure gauge. Also the thermal interactions between the micro Pirani gauge and bolometer FPAs are verified. From the fabricated prototype, the measured device TCR is about −0.8% K−1 and the sensitivity about 1.84 × 10−3 W K−1 mbar−1.  相似文献   
45.
Semantic analysis is very important and very helpful for many researches and many applications for a long time. SVM is a famous algorithm which is used in the researches and applications in many different fields. In this study, we propose a new model using a SVM algorithm with Hadoop Map (M)/Reduce (R) for English document-level emotional classification in the Cloudera parallel network environment. Cloudera is also a distributed system. Our English testing data set has 25,000 English documents, including 12,500 English positive reviews and 12,500 English negative reviews. Our English training data set has 90,000 English sentences, including 45,000 English positive sentences and 45,000 English negative sentences. Our new model is tested on the English testing data set and we achieve 63.7% accuracy of sentiment classification on this English testing data set.  相似文献   
46.
Natural language processing has been studied for many years, and it has been applied to many researches and commercial applications. A new model is proposed in this paper, and is used in the English document-level emotional classification. In this survey, we proposed a new model by using an ID3 algorithm of a decision tree to classify semantics (positive, negative, and neutral) for the English documents. The semantic classification of our model is based on many rules which are generated by applying the ID3 algorithm to 115,000 English sentences of our English training data set. We test our new model on the English testing data set including 25,000 English documents, and achieve 63.6% accuracy of sentiment classification results.  相似文献   
47.
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy with relatively small computational complexity compared with other conventional detection methods.  相似文献   
48.
In recent years, the number of peer-to-peer (P2P) applications has increased significantly. One important problem in many P2P applications is how to efficiently disseminate data from a single source to multiple receivers on the Internet. A successful model used for analyzing this problem is a graph consisting of nodes and edges, with a capacity assigned to each edge. In some situations however, it is inconvenient to use this model. To that end, we propose to study the problem of efficient data dissemination in a source constraint network. A source constraint network is modeled as a graph in which, the capacity is associated with a node, rather than an edge. The contributions of this paper include (a) a quantitative data dissemination in any source constraint network, (b) a set of topologies suitable for data dissemination in P2P networks, and (c) an architecture and implementation of a P2P system based on the proposed optimal topologies. We will present the experimental results of our P2P system deployed on PlanetLab nodes demonstrating that our approach achieves near optimal throughput while providing scalability, low delay and bandwidth fairness among peers.  相似文献   
49.
This study presents an efficient variational region-based active contour model for segmenting images without priori knowledge about the object or background. In order to handle intensity inhomogeneities and noise, we propose to integrate into the region-based local intensity model a global density distance inspired by the Bhattacharyya flow. The local term based on local information of segmented image allows the model to deal with bias field artifact, which arises in data acquisition processes. The global term, which is based on the density distance between the probability distribution functions of image intensity inside and outside the active contour, provides information for accurate segmentation, keeps the curve from spilling, and addresses noise in the image. Intensive 2D and 3D experiments on many imaging modalities of medical fields such as computed tomography, magnetic resonance imaging, and ultrasound images demonstrate the effectiveness of the model when dealing with images with blurred object boundary, intensity inhomogeneities, and noise.  相似文献   
50.
The paper focuses on debonding propagation along an interface, notably on the major influence of the interlocking between the two faces of the debonding interface. The aim of the study is to obtain the data necessary for relevant and efficient debonding modelling. The work associates experiment and simulation with the purpose of quantifying the interlocking along the interface. The overlay material investigated was a fibre reinforced mortar (FRM). Direct tension tests of notched FRM specimens were firstly conducted to obtain the tensile strength and the residual normal stress—crack width relationship. Its Young's modulus was determined from compression tests. The substrate-overlay interface was investigated by direct tension tests and flexure tests performed on composite substrate-overlay specimens. The direct tension tests provided the interface tensile strength and the relationship between debonding-opening and residual normal tensile stress. Three point flexural static tests informed on the structural behaviour of the interface. The debonding interface propagation was monitored using a video-microscope with a maximum enlargement of ×175. Using the identified and quantified parameters, modelling of the above mentioned static tests was carried out by the finite elements method using CAST3M code developed in France by CEA (Centre for Atomic Energy). The comparison of modelling and experiment results shows a good coherence and proves the important role of interlocking on the debonding mechanism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号