首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1939篇
  免费   66篇
  国内免费   7篇
电工技术   20篇
综合类   3篇
化学工业   267篇
金属工艺   40篇
机械仪表   47篇
建筑科学   77篇
能源动力   38篇
轻工业   79篇
水利工程   13篇
石油天然气   2篇
无线电   429篇
一般工业技术   351篇
冶金工业   354篇
原子能技术   5篇
自动化技术   287篇
  2023年   8篇
  2022年   11篇
  2021年   28篇
  2020年   19篇
  2019年   23篇
  2018年   27篇
  2017年   40篇
  2016年   34篇
  2015年   27篇
  2014年   44篇
  2013年   91篇
  2012年   63篇
  2011年   96篇
  2010年   55篇
  2009年   81篇
  2008年   95篇
  2007年   95篇
  2006年   83篇
  2005年   72篇
  2004年   61篇
  2003年   51篇
  2002年   74篇
  2001年   53篇
  2000年   43篇
  1999年   52篇
  1998年   153篇
  1997年   84篇
  1996年   57篇
  1995年   43篇
  1994年   29篇
  1993年   34篇
  1992年   39篇
  1991年   31篇
  1990年   19篇
  1989年   23篇
  1988年   12篇
  1987年   12篇
  1986年   11篇
  1985年   10篇
  1984年   9篇
  1983年   15篇
  1982年   19篇
  1981年   11篇
  1980年   15篇
  1979年   8篇
  1977年   8篇
  1976年   18篇
  1975年   5篇
  1973年   4篇
  1972年   6篇
排序方式: 共有2012条查询结果,搜索用时 31 毫秒
41.
We propose a visualization based approach for digital signature authentication. Using our method, the speed and pressure aspects of a digital signature process can be clearly and intuitively conveyed to the user for digital signature authentication. Our design takes into account both the expressiveness and aesthetics of the derived visual patterns. With the visual aid provided by our method, digital signatures can be authenticated with better accuracy than using existing methods—even novices can examine the authenticity of a digital signature in most situations using our method. To validate the effectiveness of our method, we conducted a comprehensive user study which confirms positively the advantages of our approach. Our method can be employed as a new security enhancement measure for a range of business and legal applications in reality which involve digital signature authorization and authentication.  相似文献   
42.
The development of evolutionary algorithms for optimization has always been a stimulating and growing research area with an increasing demand in using them to solve complex industrial optimization problems. A novel immunity-based hybrid evolutionary algorithm known as Hybrid Artificial Immune Systems (HAIS) for solving both unconstrained and constrained multi-objective optimization problems is developed in this research. The algorithm adopts the clonal selection and immune suppression theories, with a sorting scheme featuring uniform crossover, multi-point mutation, non-dominance and crowding distance sorting to attain the Pareto optimal front in an efficient manner. The proposed algorithm was verified with nine benchmarking functions on its global optimal search ability as well as compared with four optimization algorithms to assess its diversity and spread. Sensitivity analysis was also carried out to investigate the selection of key parameters of the algorithm. It is found that the developed immunity-based hybrid evolutionary algorithm provides a useful means for solving optimization problems and has successfully applied to the problem of global repositioning of containers, which is one of a constrained multi-objective optimization problem. The developed HAIS will assist shipping liners on timely decision making and planning of container repositioning operations in global container transportation business in an optimized and cost effective manner.  相似文献   
43.
Fault based testing aims at detecting hypothesized faults based on specifications or program source. There are some fault based techniques for testing Boolean expressions which are commonly used to model conditions in specifications as well as logical decisions in program source. The MUMCUT strategy has been proposed to generate test cases from Boolean expressions. Moreover, it detects eight common types of hypothesized faults provided that the original expression is in irredundant disjunctive normal form, IDNF. Software practitioners are more likely to write the conditions and logical decisions in general form rather than IDNF. Hence, it is interesting to investigate the fault detecting capability of the MUMCUT strategy with respect to general form Boolean expressions. In this article, we perform empirical studies to investigate the fault detection capability of the MUMCUT strategy with respect to general form Boolean expressions as well as mutated expressions. A mutated expression can be obtained from the original given Boolean expression by making a syntactic change based on a particular type of fault.
M. F. LauEmail:

T. Y. Chen   obtained his BSc and MPhil from the University of Hong Kong, MSc and DIC from the Imperial College of Science and Technology, PhD from the University of Melbourne. He is currently a Professor of Software Engineering at the Swinburne University of Technology. Prior to joining Swinburne, he has taught at the University of Hong Kong and the University of Melbourne. His research interests include software testing, debugging, maintenance, and validation of requirements. M. F. Lau   received the Ph.D. degree in Software Engineering from the University of Melbourne, Australia. He is currently a Senior Lecturer in the Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia. His research publications have appeared in various scholarly journals, including ACM Transactions on Software Engineering and Methodology, The Journal of Systems and Software, The Computer Journal, Software Testing, Verification and Reliability, Information and Software Technology, Information Sciences, and Information Processing Letters. His research interests include software testing, software quality, software specification and computers in education. K. Y. Sim   received his Bachelor of Engineering in Electrical, Electronics and Systems from the National University of Malaysia in 1999 and the Master of Computer Science from the University of Malaya, Malaysia in 2001. Currently, he is a Senior Lecturer in the School of Engineering, Swinburne University of Technology, Sarawak Campus, Malaysia. His current research interests include software testing and information security. C. A. Sun   received the PhD degree in Computer Software and Theory in 2002 from Beijing University of Aeronautics and Astronautics, China; the bachelor degree in Computer and Its application in 1997 from University of Science and Technology Beijing, China. He is currently an Assistant Professor in the School of Computer and Information Technology, Beijing Jiaotong University, China. His research areas are software testing, software architecture and service-oriented computing. He has published about 40 referred papers in the above areas. He is an IEEE member.   相似文献   
44.
We introduce Process Overview, a situation awareness characterisation of the knowledge derived from monitoring process plants. Process Overview is based on observational studies of process control work in the literature. The characterisation is applied to develop a query-based measure called the Process Overview Measure. The goal of the measure is to improve coupling between situation and awareness according to process plant properties and operator cognitive work. A companion article presents the empirical evaluation of the Process Overview Measure in a realistic process control setting. The Process Overview Measure demonstrated sensitivity and validity by revealing significant effects of experimental manipulations that corroborated with other empirical results. The measure also demonstrated adequate inter-rater reliability and practicality for measuring SA based on data collected by process experts.

Practitioner Summary: The Process Overview Measure is a query-based measure for assessing operator situation awareness from monitoring process plants in representative settings.  相似文献   

45.
The bacterial component of marine biofilms plays an important role in the induction of larval settlement in the polychaete Hydroides elegans. In this study, we provide experimental evidence that bacterial metabolites comprise the chemical signal for larval settlement. Bacteria were isolated from biofilms, purified and cultured according to standard procedures. Bacterial metabolites were isolated from spent culture broth by chloroform extraction as well as by closed-loop stripping and adsorption of volatile components on surface-modified silica gel. A pronounced biological activity was exclusively observed when concentrated metabolites were adsorbed on activated charcoal. Larvae did not respond to waterborne metabolites when prevented from contacting the bacterial film surface. These results indicate that an association of the chemical signal with a sorbent-like substratum may be an essential cofactor for the expression of biological activity. The functional role of bacterial exopolymers as an adsorptive matrix for larval settlement signals is discussed.  相似文献   
46.
We propose an adaptive and energy-efficient TDMA-based MAC protocol that significantly reduces energy consumption in the network, while efficiently handling network traffic load variations and optimizing channel utilization through a timeslot stealing mechanism and a timeslot reassignment procedure. We have analytically derived the average delay performance of our MAC protocol, with and without the timeslot stealing mechanism. Our delay model, validated via simulations, shows that the timeslot stealing mechanism can substantially improve the protocol throughput in scenarios with varying and asymmetric traffic patterns. Evaluation results show that the timeslot reassignment procedure is efficient in handling the longer timescale changes in the traffic load, while the timeslot stealing mechanism is better in handling the shorter timescale changes in the traffic patterns.  相似文献   
47.
The subject of power quality embraces a very wide and diverse field of both system and customer problems. There are many requirements for appropriate solutions, from simple power factor corrections of a load to sophisticated load flow control in a high-voltage transmission system. It can be simply defined as the quality of power supplied to the end user. The evaluation of power quality improvement alternatives is an exercise in economics. Utility engineers must evaluate the economic impacts of the power quality variations against the costs of improving performance for the different available alternatives. The best choice will depend on the costs of the solution and its total operating costs. Improving facility performance during power quality variations can result in significant savings and can be a competitive advantage. Therefore, it is important for customers and suppliers to work together in identifying the best alternative for achieving the required level of performance  相似文献   
48.
The authors tested the acculturation gap-distress hypothesis by examining whether parent-adolescent acculturation gaps were associated with greater conflict and youth conduct problems among 260 high-risk Mexican American families. The authors operationalized acculturation gaps in 2 ways: parent-youth mismatches in acculturation style, and parent-youth discrepancies in acculturation toward both mainstream and heritage cultures. Acculturation gaps were common, but results of hierarchical regression analyses indicated that parent-youth discrepancies in acculturation toward mainstream and heritage cultures were not related to increased conflict or youth conduct problems. Conduct problems were no higher in families in which the adolescent was more aligned with mainstream culture than the parent. Unexpectedly, the authors found more youth conduct problems in families in which the youth was more aligned with traditional culture than the parent. The results call into question the assumption that the more rapid acculturation of adolescents to American culture inevitably leads to distress in minority families. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
49.
A distributed virtual walkthrough environment allows users connected to the geometry server to walk through a specific place of interest, without having to travel physically. This place of interest may be a virtual museum, virtual library or virtual university. There are two basic approaches to distribute the virtual environment from the geometry server to the clients, complete replication and on-demand transmission. Although the on-demand transmission approach saves waiting time and optimizes network usage, many technical issues need to be addressed in order for the system to be interactive. CyberWalk is a web-based distributed virtual walkthrough system developed based on the on-demand transmission approach. It achieves the necessary performance with a multiresolution caching mechanism. First, it reduces the model transmission and rendering times by employing a progressive multiresolution modeling technique. Second, it reduces the Internet response time by providing a caching and prefetching mechanism. Third, it allows a client to continue to operate, at least partially, when the Internet is disconnected. The caching mechanism of CyberWalk tries to maintain at least a minimum resolution of the object models in order to provide at least a coarse view of the objects to the viewer. All these features allow CyberWalk to provide sufficient interactivity to the user for virtual walkthrough over the Internet environment. In this paper, we demonstrate the design and implementation of CyberWalk. We investigate the effectiveness of the multiresolution caching mechanism of CyberWalk in supporting virtual walkthrough applications in the Internet environment through numerous experiments, both on the simulation system and on the prototype system.  相似文献   
50.
We address the challenges of building a good content adaptation service for mobile devices and propose a decision engine that is user-centric with QoS awareness, which can automatically negotiate for the appropriate adaptation decision to use in the synthesis of an optimal adapted version. The QoS-sensitive approach complements the lossy nature of the transcoding operations. The decision engine will look for the best trade off among various parameters in order to reduce the loss of quality in various domains. Quantitative methods are suggested to measure the QoS of the content versions in various quality domains. Based on the particular user perception and other contextual information on the client capability, the network connection, and the requested content, the proposed negotiation algorithm will determine a content version with a good aggregate score. We have built a prototype document adaptation system for PDF documents to demonstrate the viability of our approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号