首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10025篇
  免费   705篇
  国内免费   16篇
电工技术   68篇
综合类   2篇
化学工业   3118篇
金属工艺   160篇
机械仪表   233篇
建筑科学   317篇
矿业工程   17篇
能源动力   284篇
轻工业   2695篇
水利工程   125篇
石油天然气   63篇
无线电   433篇
一般工业技术   1406篇
冶金工业   611篇
原子能技术   38篇
自动化技术   1176篇
  2024年   42篇
  2023年   141篇
  2022年   503篇
  2021年   639篇
  2020年   374篇
  2019年   441篇
  2018年   467篇
  2017年   458篇
  2016年   462篇
  2015年   340篇
  2014年   486篇
  2013年   745篇
  2012年   708篇
  2011年   738篇
  2010年   545篇
  2009年   566篇
  2008年   470篇
  2007年   419篇
  2006年   307篇
  2005年   246篇
  2004年   192篇
  2003年   163篇
  2002年   150篇
  2001年   93篇
  2000年   103篇
  1999年   105篇
  1998年   188篇
  1997年   122篇
  1996年   94篇
  1995年   66篇
  1994年   64篇
  1993年   45篇
  1992年   33篇
  1991年   18篇
  1990年   16篇
  1989年   39篇
  1988年   22篇
  1987年   20篇
  1986年   18篇
  1985年   17篇
  1984年   16篇
  1983年   5篇
  1982年   5篇
  1981年   6篇
  1980年   11篇
  1979年   4篇
  1978年   4篇
  1977年   6篇
  1976年   14篇
  1974年   3篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two generic entities that can solve the problem of delegated access to the telematic services provided by public authorities. The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation. Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token has been revoked. Implications for theory and practice and suggestions for future research are discussed.  相似文献   
92.
In a preordered set, or preset, consequence operators in the sense of Tarski, defined on families of subsets, are introduced. From them, the corresponding sets of conjectures, hypotheses, speculations and refutations are considered, studying the relationships between these sets and those previously defined on ortholattices. All the concepts introduced are illustrated with three particular consequence operators, whose behavior is studied in detail. The results obtained are applied to the case of fuzzy sets endowed with the usual pointwise ordering.  相似文献   
93.
This paper proposes a new approach for the segmentation of both near-end and far-end intima-media regions of the common carotid artery in ultrasound images. The method requires minimal user interaction and is able to segment the near-end wall in arteries with large, hypoechogenic and irregular plaques, issues usually not considered previously due to the increased segmentation difficulty.  相似文献   
94.
This paper focuses on a restrained concretization of the general NP-hard Container Loading Problem that arises from a real world application. This particular problem can be informally described as: given different sets of bins and boxes, find the packing of the boxes into the smallest number of bins obeying some additional restrictions on the placement. The mathematical programming formulation that appears to better model this application is the Three-dimensional Bin-Packing Problem (3D-BPP) which is no more than an extension of the classic Bin-Packing Problem to the orthogonal packing of solid objects.We present an alternative non-linear formulation for the 3D-BPP version as well as new designed heuristic algorithms (CPBOX and BOXCP) for the approximation of the optimal solution using boxes and bins of heterogeneous dimensions. Moreover, we also present a heuristic specifically designed to work under very particular storage application restrictions. The numerical results indicate that all of these new heuristics have good performance standards especially when applied to replications of real input data.  相似文献   
95.
Autonomous robots are leaving the laboratories to master new outdoor applications, and walking robots in particular have already shown their potential advantages in these environments, especially on a natural terrain. Gait generation is the key to success in the negotiation of natural terrain with legged robots; however, most of the algorithms devised for hexapods have been tested under laboratory conditions. This paper presents the development of crab and turning gaits for hexapod robots on a natural terrain characterized by containing uneven ground and forbidden zones. The gaits we have developed rely on two empirical rules that derive three control modules that have been tested both under simulation and by experiment. The geometrical model of the SILO-6 walking robot has been used for simulation purposes, while the real SILO-6 walking robot has been used in the experiments. This robot was built as a mobile platform for a sensory system to detect and locate antipersonnel landmines in humanitarian demining missions.  相似文献   
96.
The alcohol lost by evaporation during the bioethanol fermentation process may be collected and recovered using an absorption column. This equipment is also used in the carbonic gas treatment, a by-product from the sugar cane fermentation. In the present work, the development of nonlinear feedforward–feedback controllers, based on neural network inverse models, was proposed and tested to manipulate the absorbent flow rates. The control purposes are: to keep low ethanol concentration in the effluent gas phase from the first absorption column (ethanol recovery column); and to reduce the residual water concentration in the CO2 gas effluent from the second tower (CO2 treatment column).Based on simulation studies, the neural network (ANN) controller performance was compared with the conventional PID control scheme application. The best ANN architecture was set up according to the Foresse and Hagan (1997) criterion, while the PID parameters were found from the well-known Cohen–Coon Equations and trial-and-error fine tuning.Initially, performances were evaluated for the system without concentration measurement uncertainties. From these tests, the ANN controller presented the smallest response time and overshoot for regulator and servo problems. Three uncertainty levels were applied afterwards: 5%, 10%, and 15%.The ANN controller outperformed the PID for all uncertainty levels tested for the ethanol recovery column. For the CO2 treatment column, the ANN controller proceeded successfully under uncertainties of 5% and 10%, while the PID did not deal properly with uncertainties above 5%. The statistical F-test, besides the ITAE, ISE, and IAE performance criteria, were calculated for both controllers applications and then compared. They proved the superiority of the ANN control scheme.Using appropriately the proposed well-controlled absorption columns increases the efficiency of the bioethanol production plant and can also provide carbon credits by avoiding CO2 emission into the atmosphere.  相似文献   
97.
98.
Wireless networks can vary both the transmission power and modulation of links. Existing routing protocols do not take transmission power control (TPC) and modulation adaptation (also known as rate adaptation – RA) into account at the same time, even though the performance of wireless networks can be significantly improved when routing algorithms use link characteristics to build their routes. This article proposes and evaluates extensions to routing protocols to cope with TPC and RA. The enhancements can be applied to any link state or distance vector routing protocols. An evaluation considering node density, node mobility and link error show that TPC- and RA-aware routing algorithms improve the average latency and the end-to-end throughput, while consuming less energy than traditional protocols.  相似文献   
99.
The development of instructional content using Information Technologies is an expensive, time-consuming and complex process that requires new methodologies. It was in this context that the concept of Learning Objects (LOs) was proposed in order to promote reuse. However, this goal is not yet fully attained and new contributions to increase reuse are still welcome. Besides, if content is conveyed in LOs that are easier to reuse, they must be combined and sequenced in order to build more elaborated and complex content. This paper presents a strategy to deal with these problems based on the definition of small LOs here called Component Objects (COs). These COs are structured and combined according to a conceptual metamodel, which is the basis for the definition of conceptual schemas representing the existing material, including not only content but also practice. This strategy for searching, extracting, and sequencing COs, supports a teacher to better control the implementation of complex content, reducing errors in the authoring process. This approach includes a specification language and an algorithm for semi-automatic sequencing learning content and practice. Finally, a case study that shows the proposed approach and some results of using the algorithm are presented.  相似文献   
100.
Facilitating meetings is not an easy task. To assist the facilitator, we have been designing intelligent support systems, which can help contextual sensemaking, decision making and action. However, these systems are constructed based on behavioral models that provide guidelines to understand participant behaviors. This paper presents an ontology to describe participants’ behaviors in collaborative design meetings and rules that correlate them with the group’s acceptance of the final product. This ontology describes the group dynamics at collocated meetings, using verbal and non-verbal cues of attention shifts and attention maintenance as its basic constructs. The objective of creating this ontology was to better understand face-to-face meetings to eventually help meeting facilitators identify issues that may lead to dissatisfaction with the final product through behavioral cues. The ontology was derived through extensive analysis of a series of engineering design session videos. The design group was composed of experts with similar backgrounds, but working in different divisions of the same company. Different points of view were argued and decisions were made at the end of each meeting. After each meeting, participants were asked to asynchronously commit to the decisions made in the group. Our ontology can be used to identify the factors that lead to an undesired outcome, and now serves as a basis for a new project, which uses rules to support design meetings, improve final artifact acceptance and reduce rework. Our conclusions point out correlations between designers’ behaviors and future artifact acceptance and actions that interrupt or bring back group attention. The ontology was validated through application to other meeting situations. These findings may guide software developers in the creation of tools to support group design, and may be applied by an intelligent system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号