首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1421篇
  免费   67篇
  国内免费   7篇
电工技术   19篇
化学工业   382篇
金属工艺   33篇
机械仪表   22篇
建筑科学   57篇
矿业工程   3篇
能源动力   41篇
轻工业   129篇
水利工程   10篇
无线电   114篇
一般工业技术   293篇
冶金工业   119篇
原子能技术   13篇
自动化技术   260篇
  2024年   3篇
  2023年   12篇
  2022年   15篇
  2021年   24篇
  2020年   25篇
  2019年   24篇
  2018年   33篇
  2017年   38篇
  2016年   48篇
  2015年   35篇
  2014年   61篇
  2013年   90篇
  2012年   88篇
  2011年   85篇
  2010年   83篇
  2009年   77篇
  2008年   92篇
  2007年   62篇
  2006年   49篇
  2005年   58篇
  2004年   54篇
  2003年   46篇
  2002年   44篇
  2001年   17篇
  2000年   22篇
  1999年   18篇
  1998年   48篇
  1997年   22篇
  1996年   19篇
  1995年   15篇
  1994年   20篇
  1993年   20篇
  1992年   8篇
  1991年   13篇
  1990年   11篇
  1989年   11篇
  1988年   9篇
  1987年   10篇
  1986年   9篇
  1985年   12篇
  1984年   11篇
  1983年   5篇
  1982年   13篇
  1981年   4篇
  1979年   4篇
  1978年   4篇
  1976年   3篇
  1975年   5篇
  1974年   3篇
  1971年   3篇
排序方式: 共有1495条查询结果,搜索用时 13 毫秒
141.
Code injection attacks are one of the most powerful and important classes of attacks on software. In these attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also a valid representation of a machine code program that performs actions chosen by the attacker. The attacker then triggers a bug in the application to divert the control flow to this injected machine code. A typical action of the injected code is to launch a command interpreter shell, and hence the malicious input is often called shellcode. Attacks are usually performed against network facing applications, and such applications often perform validations or encodings on input. Hence, a typical hurdle for attackers, is that the shellcode has to pass one or more filtering methods before it is stored in the vulnerable application??s memory space. Clearly, for a code injection attack to succeed, the malicious input must survive such validations and transformations. Alphanumeric input (consisting only of letters and digits) is typically very robust for this purpose: it passes most filters and is untouched by most transformations. This paper studies the power of alphanumeric shellcode on the ARM architecture. It shows that the subset of ARM machine code programs that (when interpreted as data) consist only of alphanumerical characters is a Turing complete subset. This is a non-trivial result, as the number of instructions that consist only of alphanumeric characters is very limited. To craft useful exploit code (and to achieve Turing completeness), several tricks are needed, including the use of self-modifying code.  相似文献   
142.
143.
A new approach for the source quantification has been developed on the basis of real air pollutant hourly concentrations of SO2, measured by three monitoring stations, during 9 h, around a group of three industrial sources. This inverse problem has been solved by coupling a direct model of diffusion (Pasquill’s Gaussian model) with a genetic algorithm, to search solutions leading to a minimum error between model outputs and measurements. The inversion performance depends on the relationship between the wind field and the configuration sources–receptors: good results are obtained when the monitoring stations are downwind from the sources, and in these cases, the order of magnitude of emissions is retrieved, sometimes with less than 10% error for at least two sources; there are some configurations (wind direction versus source and receptor locations) which do not permit to restore emissions. The latter situations reveal the need to conceive a specific network of sensors, taking into account the source locations and the most frequent weather patterns.  相似文献   
144.
The efficiency of training visual attention in the central and peripheral visual field was investigated by means of a visual detection task that was performed in a naturalistic visual environment including numerous, time-varying visual distractors. We investigated the minimum number of repetitions of the training required to obtain the top performance and whether intra-day training improved performance as efficiently as inter-day training. Additionally, our research aimed to find out whether exposure to a demanding task such as a microsurgical intervention may cancel out the effects of training.

Results showed that performance in visual attention peaked within three (for tasks in the central visual field) to seven (for tasks in the periphery) days subsequent to training. Intra-day training had no significant effect on performance. When attention training was administered after exposure to stress, improvement of attentional performance was more pronounced than when training was completed before the exposure. Our findings support the implementation of training in situ at work for more efficient results.

Practitioner Summary: Visual attention is important in an increasing number of workplaces, such as with surveillance, inspection, or driving. This study shows that it is possible to train visual attention efficiently within three to seven days. Because our study was executed in a naturalistic environment, training results are more likely to reflect the effects in the real workplace.  相似文献   

145.
This paper deals with multimedia information access. We propose two new approaches for hybrid text-image information processing that can be straightforwardly generalized to the more general multimodal scenario. Both approaches fall in the trans-media pseudo-relevance feedback category. Our first method proposes using a mixture model of the aggregate components, considering them as a single relevance concept. In our second approach, we define trans-media similarities as an aggregation of monomodal similarities between the elements of the aggregate and the new multimodal object. We also introduce the monomodal similarity measures for text and images that serve as basic components for both proposed trans-media similarities. We show how one can frame a large variety of problem in order to address them with the proposed techniques: image annotation or captioning, text illustration and multimedia retrieval and clustering. Finally, we present how these methods can be integrated in two applications: a travel blog assistant system and a tool for browsing the Wikipedia taking into account the multimedia nature of its content.
Gabriela CsurkaEmail:

Dr. Julien Ah-Pine   joined the XRCE Grenoble as Research Engineer in 2007. He is part of the Textual and Visual Pattern Analysis group and his current research activities are related to multi-modal information retrieval and machine learning. He received his PhD degree in mathematics from Pierre and Marie Curie University (University of Paris 6). From 2003 to 2007, he was with Thales Communications, working on relational analysis, data and text mining methods and social choice theory. Dr. Marco Bressan   is Area Manager of the Textual and Visual Pattern Analysis area at Xerox Research Centre Europe. His main research interests are statistical learning and classification; image and video semantic scene understanding; image enhancement and aesthetics; object detection and recognition, particularly when dealing with uncontrolled environments. Prior to Xerox, several of his contributions in these fields were applied to a variety of scenarios including biometric solutions, data mining, CBIR and industrial vision. Dr. Bressan holds a BA in Applied Mathematics from the University of Buenos Aires, a M.Sc. in Computer Vision from the Computer Vision Centre in Spain and a Ph.D. in Computer Science and Artificial Intelligence from the Autonomous University of Barcelona. He is an active member of the network of Argentinean researchers abroad and one of the founders of the network of computer vision and cognitive science researchers. Stephane Clinchant   is Ph.D. Student at University Joseph Fourier (Grenoble, France) and at the Xerox Research Centre Europe, that he joined in 2005. Before joining XRCE, Stephane obtained a Master Degree in Computer Sciences in 2005 from the Ecole Nationale Superieure d’Electrotechnique, d’Informatique, d’Hydraulique et des Telecommunications (France). His current research interests mainly focus on Machine Learning for Natural Language Processing and Multimedia Information Access. Dr. Gabriela Csurka   is a research scientist in the Textual and Visual Pattern Analysis team at Xerox Research Centre Europe (XRCE). She obtained her Ph.D. degree (1996) in Computer Science from University of Nice Sophia - Antipolis. Before joining XRCE in 2002, she worked in fields such as stereo vision and projective reconstruction at INRIA (Sophia Antipolis, Rhone Alpes and IRISA) and image and video watermarking at University of Geneva and Institute Eurécom, Sophia Antipolis. Author of several publications in main journals and international conferences, she is also an active reviewer both for journals and conferences. Her current research interest concerns the exploration of new technologies for image content and aesthetic analysis, cross-modal image categorization and semantic based image segmentation. Yves Hoppenot   is in charge of the development and integration of new technologies in our European research Technology Showroom. He is a software expert for the production, office and services sectors. Yves joined the Xerox Research Centre Europe in 2001. He graduated from the Ecole National Superieure des Telecommunications, Brest in France, and received a Master of Science degree from the Tampere University of Technology in Finland. Dr. Jean-Michel Renders   joined the XRCE Grenoble as Research Engineer in 2001. His current research interests mainly focus on Machine Learning techniques applied to Statistical Natural Language Processing and Text Mining. Before joining XRCE, Jean-Michel obtained a PhD in Applied Sciences from the University of Brussels in 1993. He started his research activities in 1988, in the field of Robotics Dynamics and Control. Then, he joined the Joint Research Center of the European Communities to work on biologial metaphors (Genetic Algorithms, Neural Networks and Immune Networks) applied to process control. After spending one year as Visiting Scientist at York University (England), he spent 4 years applying Artificial Intelligence and Machine Learning Techniques in Industry (Tractebel - Suez). Then, he worked as Data Mining Senior Consultant and led projects in most major Belgian banks and utilities.   相似文献   
146.
Permeability, porosity and pore geometry of hot-pressed calcite   总被引:1,自引:0,他引:1  
Permeability may be altered in the Earth by plastic flow of the rock matrix. In order to better understand the relation between plastic flow and pore geometry, we measured the permeability of a suite of hot-pressed calcite samples with differing porosities. We found that the permeability dramatically decreased with decreasing porosity, particularly in the range of 10 to 4% total porosity. These results agree with a model for pore geometry changes during hot-pressing as previously developed for ceramics. Measurements of unconnected and interconnected porosity showed that the interconnected porosity virtually disappeared in samples with a total porosity of 4% or less. Scanning electron microscope observations showed that the porosity of samples above 10% total porosity were composed of large ‘spheroidal’ pores which were often connected by ‘tubular’ pores. During the last stage of hot-pressing, these ‘tubes’ are thought to collapse making the pore network disconnected.  相似文献   
147.
The new calcium ferrite Ca4Fe9O17, belonging to the CaFe2+nO4+n family (n = 14), has not the same stacking process of “FeO” blocks in “CaFeO4” blocks, as the others terms of the series.It crystallizes in the monoclinic system, space group C2 with the parameters: a = 10,441 A?, b = 6,025 A?, c = 11,384 a? and β = 98°80. Its structure is characterized by the presence of iron atoms in oxygen octahedra and trigonal based bipyramides stacking in hexagonal layers along c.These layers are linked by iron atoms on tetrahedral sites. Calcium atoms are hexagonaly located around each tetrahedron.  相似文献   
148.
149.
In semi-arid African regions (annual rainfall between 200 and 600 mm), variability of vegetative activity is mainly due to the rainfall of the current rainy season. In most of South Africa, the rainy season occurs from October to March. On average, vegetative activity lags rainfall by 1 to 2 months. The interannual variability in early summer (December to September) normalized difference vegetation index (NDVI) depends primarily on precipitation at the beginning (October to November) of the rainy season. However, once this primary control is removed, the residual interannual variability in NDVI highlights a double memory effect: a 1-year effect, referred to as Mem1, and a 7- to 10-month effect, referred to as Mem2. This article aims at better describing the influence of soil and vegetation characteristics on these two memory effects. The data sets used in this study are as follows: (1) a 19-year NDVI time series from National Oceanic and Atmospheric Administration (NOAA) satellites, (2) rainfall records from a network of 1160 rain-gauge stations compiled by the Water Research Commission (WRC), (3) vegetation types from Global Land Cover (GLC) 2000 and (4) soil characteristics from the soil and terrain database for Southern Africa (SOTERSAF). Results indicate that among 20–30% of NDVI variance that is not explained by the concurrent rainfall, one-third is explained by the two memory effects. Mem1 is found to have maximum effect in the northwest of our study domain, near the Botswana boundary, in the South Kalahari. Associated conditions are open grasslands growing on Arenosols. Mem1 is less important in the southeast, particularly in open grassland with shrubs growing on Cambisols. Thus, Mem1 mainly depends on soil texture. Mem2 is more widespread and its influence is the greatest in the centre, the south and the east of our domain. It is related to rainfall from January to April, which controls, beyond the intervening dry season, the interannual variations of NDVI (December to September) at the beginning of the next rainy season. Through these new findings, this article emphasizes again the high potential of remote-sensing techniques to monitor and understand the dynamics of semi-arid environments.  相似文献   
150.
Some aspects of the generation and detection of ultrasound with laser beams are presented. The objective of the study is (1) to present some experimental results on the generation of ultrasound with an array of optical fibers, (2) to discuss the possibility of generating directional surface waves with acousto-optic scanning in a very narrow frequency band, thus increasing the signal-to-noise ratio, and (3) to discuss the feasibility of the directional detection of ultrasound by using an array of optical fibers as a receiver, also with the goal of increasing the signal-to-noise ratio.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号