首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1168篇
  免费   121篇
  国内免费   1篇
电工技术   12篇
综合类   2篇
化学工业   318篇
金属工艺   8篇
机械仪表   21篇
建筑科学   66篇
矿业工程   1篇
能源动力   32篇
轻工业   260篇
水利工程   9篇
石油天然气   2篇
无线电   46篇
一般工业技术   197篇
冶金工业   38篇
原子能技术   1篇
自动化技术   277篇
  2024年   5篇
  2023年   12篇
  2022年   22篇
  2021年   49篇
  2020年   43篇
  2019年   38篇
  2018年   66篇
  2017年   56篇
  2016年   63篇
  2015年   47篇
  2014年   73篇
  2013年   123篇
  2012年   104篇
  2011年   100篇
  2010年   63篇
  2009年   71篇
  2008年   58篇
  2007年   75篇
  2006年   42篇
  2005年   37篇
  2004年   35篇
  2003年   40篇
  2002年   15篇
  2001年   6篇
  2000年   5篇
  1999年   5篇
  1998年   4篇
  1997年   5篇
  1996年   5篇
  1995年   2篇
  1994年   4篇
  1993年   1篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1986年   1篇
  1984年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1976年   2篇
排序方式: 共有1290条查询结果,搜索用时 15 毫秒
21.
As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available.  相似文献   
22.
Business Intelligence (BI) applications have been gradually ported to the Web in search of a global platform for the consumption and publication of data and services. On the Internet, apart from techniques for data/knowledge management, BI Web applications need interfaces with a high level of interoperability (similar to the traditional desktop interfaces) for the visualisation of data/knowledge. In some cases, this has been provided by Rich Internet Applications (RIA). The development of these BI RIAs is a process traditionally performed manually and, given the complexity of the final application, it is a process which might be prone to errors. The application of model-driven engineering techniques can reduce the cost of development and maintenance (in terms of time and resources) of these applications, as they demonstrated by other types of Web applications. In the light of these issues, the paper introduces the Sm4RIA-B methodology, i.e., a model-driven methodology for the development of RIA as BI Web applications. In order to overcome the limitations of RIA regarding knowledge management from the Web, this paper also presents a new RIA platform for BI, called RI@BI, which extends the functionalities of traditional RIAs by means of Semantic Web technologies and B2B techniques. Finally, we evaluate the whole approach on a case study—the development of a social network site for an enterprise project manager.  相似文献   
23.
We present a complete mechanized proof of the result in homological algebra known as basic perturbation lemma. The proof has been carried out in the proof assistant Isabelle, more concretely, in the implementation of higher-order logic (HOL) available in the system. We report on the difficulties found when dealing with abstract algebra in HOL, and also on the ongoing stages of our project to give a certified version of some of the algorithms present in the Kenzo symbolic computation system. J. Aransay was partially supported by Ministerio de Educación y Ciencia, MTM2006/06513, and by Gobierno de La Rioja ANGI2005/19 and J. Rubio was partially supported by Ministerio de Educación y Ciencia, MTM2006/06513, and by Gobierno de La Rioja ANGI2005/19.  相似文献   
24.
An extension of the Cauer ladder development for synthesizing singly terminated filters with symmetric and asymmetric responses is presented. Basically, a driving‐point immittance including reactive constant elements is carried out in such a way that provides the transmission zeros. The reactive constant elements are introduced into the synthesis for two reasons. The first is to consider the possibility of the asymmetric position of transmission zeros in the real frequency axis. The second one is to obtain canonical forms, i.e. networks with the minimum number of elements in the case of symmetrical responses. To validate the proposed method, a filter with asymmetrical response has been synthesized, comparing different topologies for its use in multiplexers. This fact is illustrated with a Ku‐band elliptic response diplexer designed in H‐plane rectangular waveguide. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2009.  相似文献   
25.
The electrochemical CO2 reduction reaction (CO2RR) to value-added chemicals with renewable electricity is a promising method to decarbonize parts of the chemical industry. Recently, single metal atoms in nitrogen-doped carbon (MNC) have emerged as potential electrocatalysts for CO2RR to CO with high activity and faradaic efficiency, although the reaction limitation for CO2RR to CO is unclear. To understand the comparison of intrinsic activity of different MNCs, two catalysts are synthesized through a decoupled two-step synthesis approach of high temperature pyrolysis and low temperature metalation (Fe or Ni). The highly meso-porous structure results in the highest reported electrochemical active site utilization based on in situ nitrite stripping; up to 59±6% for NiNC. Ex situ X-ray absorption spectroscopy (XAS) confirms the penta-coordinated nature of the active sites. The catalysts are amongst the most active in the literature for CO2 reduction to CO. The density functional theory calculations (DFT) show that their binding to the reaction intermediates approximates to that of Au surfaces. However, it is found that the turnover frequencies (TOFs) of the most active catalysts for CO evolution converge, suggesting a fundamental ceiling to the catalytic rates.  相似文献   
26.
Although Berman and Hafner [Berman 1989, pp. 928–938] presented the possibility to adapt the model of reasoning of development of an expert system for medical diagnosis to the reasoning of a judge when he/she sentences criminals does not resemble the reasoning found in the decisions of physicians, mathematicians or statisticians.When a lawyer reasons, he/she not only looks for the solution of a case; he/she simultaneously looks for the bases on which his/her reasoning can rest [Galindo 1992, pp. 363–367]. That is to say, he/she not only needs to find the solution but moreover he/she has to find the references (laws, jurisprudence and bibliography) that allow him/her to argue the solution.In many cases, computer solutions to these reasoning processes have been made in a separated way: the solution to the cases using expert systems, and the search of documentation using information retrieval systems.This paper presents the ARPO-2 prototype, a solution integrating the two aspects of legal reasoning: an expert system which is able to simultaneously find the solution to a problem and to give the necessary references so that the lawyer argues the solution. The subject on which the prototype solves problems is the breach of building contracts.In this paper, we describe the process of development of an expert system for solving, justification and documentation of breach of contracts, giving details on the way how the objects that intervene in the case were defined as well as on the reasoning followed.This paper was funded in part by DGICYT, Spanish Civil Law Computerization Project: PB870-632.  相似文献   
27.
The localization of the components of an object near to a device before obtaining the real interaction is usually determined by means of a proximity measurement to the device of the object’s features. In order to do this efficiently, hierarchical decompositions are used, so that the features of the objects are classified into several types of cells, usually rectangular.In this paper we propose a solution based on the classification of a set of points situated on the device in a little-known spatial decomposition named tetra-tree. Using this type of spatial decomposition gives us several quantitative and qualitative properties that allow us a more realistic and intuitive visual interaction, as well as the possibility of selecting inaccessible components. These features could be used in virtual sculpting or accessibility tasks.In order to show these properties we have compared an interaction system based on tetra-trees to one based on octrees.  相似文献   
28.
In this work, we propose new techniques to analyze the behavior, the performance, and specially the scalability of High Performance Computing (in short, HPC) applications on different computing architectures. Our final objective is to test applications using a wide range of architectures (real or merely designed) and scaling it to any number of nodes or components. This paper presents a new simulation framework, called SIMCAN, for HPC architectures. The main characteristic of the proposed simulation framework is the ability to be configured for simulating a wide range of possible architectures that involve any number of components. SIMCAN is developed to simulate complete HPC architectures, but putting special emphasis on the storage and network subsystems. The SIMCAN framework can handle complete components (nodes, racks, switches, routers, etc.), but also key elements of the storage and network subsystems (disks, caches, sockets, file systems, schedulers, etc.). We also propose several methods to implement the behavior of HPC applications. Each method has its own advantages and drawbacks. In order to evaluate the possibilities and the accuracy of the SIMCAN framework, we have tested it by executing a HPC application called BIPS3D on a hardware-based computing cluster and on a modeled environment that represent the real cluster. We also checked the scalability of the application using this kind of architecture by simulating the same application with an increased number of computing nodes.  相似文献   
29.
We present a novel strategy for computing disparity maps from omni-directional stereo images obtained with fish-eye lenses in forest environments. At a first segmentation stage, the method identifies textures of interest to be either matched or discarded. Two of them are identified by applying the powerful Support Vector Machines approach. At a second stage, a stereovision matching process is designed based on the application of four stereovision matching constraints: epipolarity, similarity, uniqueness and smoothness. The epipolarity guides the process. The similarity and uniqueness are mapped once again through the Support Vector Machines, but under a different way to the previous case; after this an initial disparity map is obtained. This map is later filtered by applying the Discrete Simulated Annealing framework where the smoothness constraint is conveniently mapped. The combination of the segmentation and stereovision matching approaches makes the main contribution. The method is compared against the usage of simple features and combined similarity matching strategies.  相似文献   
30.
In this paper, we present a 3D face photography system based on a facial expression training dataset, composed of both facial range images (3D geometry) and facial texture (2D photography). The proposed system allows one to obtain a 3D geometry representation of a given face provided as a 2D photography, which undergoes a series of transformations through the texture and geometry spaces estimated. In the training phase of the system, the facial landmarks are obtained by an active shape model (ASM) extracted from the 2D gray-level photography. Principal components analysis (PCA) is then used to represent the face dataset, thus defining an orthonormal basis of texture and another of geometry. In the reconstruction phase, an input is given by a face image to which the ASM is matched. The extracted facial landmarks and the face image are fed to the PCA basis transform, and a 3D version of the 2D input image is built. Experimental tests using a new dataset of 70 facial expressions belonging to ten subjects as training set show rapid reconstructed 3D faces which maintain spatial coherence similar to the human perception, thus corroborating the efficiency and the applicability of the proposed system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号