首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1781篇
  免费   101篇
  国内免费   3篇
电工技术   17篇
综合类   1篇
化学工业   442篇
金属工艺   39篇
机械仪表   48篇
建筑科学   68篇
矿业工程   4篇
能源动力   75篇
轻工业   214篇
水利工程   15篇
石油天然气   6篇
武器工业   1篇
无线电   168篇
一般工业技术   324篇
冶金工业   75篇
原子能技术   12篇
自动化技术   376篇
  2024年   2篇
  2023年   28篇
  2022年   63篇
  2021年   79篇
  2020年   61篇
  2019年   67篇
  2018年   63篇
  2017年   59篇
  2016年   55篇
  2015年   62篇
  2014年   74篇
  2013年   148篇
  2012年   115篇
  2011年   157篇
  2010年   103篇
  2009年   88篇
  2008年   117篇
  2007年   77篇
  2006年   68篇
  2005年   49篇
  2004年   48篇
  2003年   51篇
  2002年   36篇
  2001年   22篇
  2000年   11篇
  1999年   8篇
  1998年   17篇
  1997年   15篇
  1996年   23篇
  1995年   15篇
  1994年   15篇
  1993年   14篇
  1992年   4篇
  1991年   7篇
  1990年   6篇
  1989年   2篇
  1988年   8篇
  1987年   6篇
  1985年   11篇
  1984年   3篇
  1983年   3篇
  1979年   3篇
  1977年   2篇
  1976年   4篇
  1975年   3篇
  1972年   1篇
  1971年   1篇
  1970年   2篇
  1969年   1篇
  1911年   2篇
排序方式: 共有1885条查询结果,搜索用时 15 毫秒
51.
In the theory of graph rewriting, the use of coalescing rules, i.e., of rules which besides deleting and generating graph items, can coalesce some parts of the graph, turns out to be quite useful for modelling purposes, but, at the same time, problematic for the development of a satisfactory partial order concurrent semantics for rewrites. Rewriting over graphs with equivalences, i.e., (typed hyper)-graphs equipped with an equivalence over nodes provides a technically convenient replacement of graph rewriting with coalescing rules, for which a truly concurrent semantics can be easily defined. The expressivity of such a formalism is tested in a setting where coalescing rules typically play a basic role: the encoding of calculi with name passing as graph rewriting systems. Specifically, we show how the (monadic fragment) of the solo calculus, one of the dialect of those calculi whose distinctive feature is name fusion, can be encoded as a rewriting system over graph with equivalences.  相似文献   
52.
This paper develops a model for evaluating the consequences of increasing block tariff pricing policies when multiple households share a connection and applies it to a sample from Kumasi, Ghana. Results show that for any given consumption, a household's average share of total monthly water bill for shared connections can either be higher or lower than its single-household equivalent. Significant differences between the average and single-household equivalent bills were found in these cases, although this difference is under-estimated if the sample is not disaggregated by payment group.  相似文献   
53.
We present new and effective lower bounds for the resource constrained project scheduling problem. This problem is widely known to be notoriously difficult to solve due to the lack of lower bounds that are both tight and fast. In this paper, we propose several new lower bounds that are based on the concept of energetic reasoning. A major contribution of this work is to investigate several enhanced new feasibility tests that prove useful for deriving new lower bounds that consistently outperform the classical energetic reasoning-based lower bound. In particular, we present the results of a comprehensive computational study, carried out on 1560 benchmark instances, that provides strong evidence that a deceptively simple dual feasible function-based lower bound is highly competitive with a state-of-the-art lower bound while being extremely fast. Furthermore, we found that an effective shaving procedure enables to derive an excellent lower bound that often outperforms the best bound from the literature while being significantly simpler.  相似文献   
54.
55.
56.
Nowadays video surveillance systems are widely deployed in many public places. However, the widespread use of video surveillance violates the privacy rights of the people. Many authors have addressed the privacy issues from various points of view. In this paper we propose a novel, on-demand selectively revocable, privacy preserving mechanism. The surveillance video can be tuned to view with complete privacy or by revoking the privacy of any subset of pedestrians while ensuring complete privacy to the remaining pedestrians. We achieve this by tracking the pedestrians using a novel Markov chain algorithm with two hidden states, detecting the head contour of the tracked pedestrians and obscuring their faces using an encryption mechanism. The detected pedestrian face/head is obscured by encrypting with a unique key derived from a master key for the privacy preservation purpose. The performance evaluations on many challenging surveillance scenarios show that the proposed mechanism can effectively and robustly track as well as identify multiple pedestrians and obscure/unobscure their faces/head in real time.  相似文献   
57.
The enlarged Horn formulas generalize the extended Horn formulas introduced by Chandru and Hooker (1991). Their satisfying truth assignments can be generated with polynomial delay. Unfortunately no polynomial algorithm is known for recognizing enlarged Horn formulas or extended Horn formulas. In this paper we define the class of simple enlarged Horn formulas, a subclass of the enlarged Horn formulas, that contains the simple extended Horn formulas introduced by Swaminathan and Wagner (1995). We present recognition algorithms for the simple enlarged Horn formulas and the simple extended Horn formulas whose complexity is bounded by the complexity of the arborescence-realization problem.  相似文献   
58.
This paper defines direction relations (e.g., north, northeast) between two-dimensional objects and shows how they can be efficiently retrieved using B-, KDB- and R- tree-based data structures. Essentially, our work studies optimisation techniques for 2D range queries that arise during the processing of direction relations. We test the efficiency of alternative indexing methods through extensive experimentation and present analytical models that estimate their performance. The analytical estimates are shown to be very close to the actual results and can be used by spatial query optimizers in order to predict the retrieval cost. In addition, we implement modifications of the existing structures that yield better performance for certain queries. We conclude the paper by discussing the most suitable method depending on the type of the range and the properties of the data.  相似文献   
59.
In this paper, a method for robust design of a neural network (NN) model for prediction of delamination (Da), damage width (Dw), and hole surface roughness (Ra) during drilling in carbon fiber reinforced epoxy (BMS 8-256) is presented. This method is based on a parametric analysis of neural network models using a design of experiments approach. The effects of number of neurons (N), hidden layers (L), activation function (AF), and learning algorithm (LA) on the mean square error (MSE) of model prediction are quantified. Using the aforementioned method, a robust NN model was developed that predicted process-induced damage with high accuracy.  相似文献   
60.
In the last years, the interest in methods and techniques for circumventing the security of the available digital video broadcasting systems is continuously increasing. Digital TV providers are struggling to restrict access to their video contents only to authorized users, by deploying more and more sophisticated conditional access systems. At the state-of-the-art, the most significant menace is the card-sharing activity which exploits a known weakness allowing an authorized subscriber to provide access to digital contents to a potentially large group of unauthorized ones connected over a communication network. This is usually realized by using ad hoc customized devices. Detecting the presence of these illegal systems on a network, by recognizing their related traffic is an issue of primary importance. Unfortunately, to avoid the identification of such traffic, payload obfuscation strategies based on encryption are often used, hindering packet inspection techniques.This paper presents a strategy for the detection of card-sharing traffic, empowered by machine-learning-driven traffic classification techniques and based on the natural capability of wavelet analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas have been used for the proof-of-concept implementation of an SVM-based binary classification scheme that relies only on time regularities of the traffic and not on the packet contents and hence is immune to payload obfuscation techniques.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号