首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6923篇
  免费   335篇
  国内免费   11篇
电工技术   67篇
综合类   14篇
化学工业   1695篇
金属工艺   116篇
机械仪表   156篇
建筑科学   318篇
矿业工程   36篇
能源动力   241篇
轻工业   851篇
水利工程   53篇
石油天然气   20篇
无线电   507篇
一般工业技术   1097篇
冶金工业   621篇
原子能技术   54篇
自动化技术   1423篇
  2024年   13篇
  2023年   55篇
  2022年   206篇
  2021年   260篇
  2020年   157篇
  2019年   161篇
  2018年   222篇
  2017年   216篇
  2016年   271篇
  2015年   177篇
  2014年   249篇
  2013年   503篇
  2012年   401篇
  2011年   490篇
  2010年   371篇
  2009年   395篇
  2008年   392篇
  2007年   346篇
  2006年   313篇
  2005年   237篇
  2004年   198篇
  2003年   197篇
  2002年   150篇
  2001年   94篇
  2000年   107篇
  1999年   101篇
  1998年   205篇
  1997年   124篇
  1996年   98篇
  1995年   83篇
  1994年   57篇
  1993年   61篇
  1992年   32篇
  1991年   34篇
  1990年   24篇
  1989年   31篇
  1988年   21篇
  1987年   22篇
  1986年   20篇
  1985年   23篇
  1984年   19篇
  1983年   15篇
  1982年   20篇
  1981年   23篇
  1980年   10篇
  1979年   12篇
  1978年   10篇
  1977年   11篇
  1976年   10篇
  1973年   6篇
排序方式: 共有7269条查询结果,搜索用时 15 毫秒
101.
An order-clique-based approach for mining maximal co-locations   总被引:2,自引:0,他引:2  
Most algorithms for mining spatial co-locations adopt an Apriori-like approach to generate size-k prevalence co-locations after size-(k − 1) prevalence co-locations. However, generating and storing the co-locations and table instances is costly. A novel order-clique-based approach for mining maximal co-locations is proposed in this paper. The efficiency of the approach is achieved by two techniques: (1) the spatial neighbor relationships and the size-2 prevalence co-locations are compressed into extended prefix-tree structures, which allows the order-clique-based approach to mine candidate maximal co-locations and co-location instances; and (2) the co-location instances do not need to be stored after computing some characteristics of the corresponding co-location, which significantly reduces the execution time and space required for mining maximal co-locations. The performance study shows that the new method is efficient for mining both long and short co-location patterns, and is faster than some other methods (in particular the join-based method and the join-less method).  相似文献   
102.
Electromagnetic suspension systems are inherently nonlinear and often face hardware limitation when digitally controlled. The main contributions of this paper are: the design of a nonlinear H controller, including dynamic weighting functions, applied to a large gap electromagnetic suspension system and the presentation of a procedure to implement this controller on a fixed-point DSP, through a methodology able to translate a floating-point algorithm into a fixed-point algorithm by using l norm minimization due to conversion error. Experimental results are also presented, in which the performance of the nonlinear controller is evaluated specifically in the initial suspension phase.  相似文献   
103.
The three-compartment model (3CM) was validated previously for prediction of endurance times by modifying its fatigue and recovery rates. However, endurance times do not typically represent work demands, and it is unknown if the current version of the 3CM is applicable for ergonomics analysis of all occupational tasks. The purpose of this study was to add biological fidelity to the 3CM, and validate the model against a series of submaximal force plateaus. The fatigue and recovery rates were modified to represent graded physiological motor unit characteristics (termed 3CMGMU). In nine experiments of submaximal efforts, the 3CMGMU produced a root-mean squared difference (RMSD) of 4.1 ± 0.5% MVC over experiments with an average strength loss (i.e. fatigue) of 31.0 ± 1.1% MVC. The 3CMGMU model performed poorly for endurance tasks. The 3CMGMU model is an improvement for evaluating submaximal force patterns consisting of intermittent muscle contractions of the hand and forearm.

Practitioner Summary: We modified an existing fatigue model using known physiological properties in order to predict fatigue during nine different submaximal force profiles; consistent with efforts seen in industrial work. We expect this model to be included in digital human modelling software, for the assessment of repetitive work and muscle fatigue in repetitive tasks.

Social Media Summary: The proposed model has applications for estimating task fatigue in proactive ergonomic analyses of complex force patterns using digital human models.  相似文献   

104.
This work presents a strategy to minimise the network usage and the energy consumption of wireless battery-powered sensors in the observer problem over networks. The sensor nodes implement a periodic send-on-delta approach, sending new measurements when a measure deviates considerably from the previous sent one. The estimator node implements a jump observer whose gains are computed offline and depend on the combination of available new measurements. We bound the estimator performance as a function of the sending policies and then state the design procedure of the observer under fixed sending thresholds as a semidefinite programming problem. We address this problem first in a deterministic way and, to reduce conservativeness, in a stochastic one after obtaining bounds on the probabilities of having new measurements and applying robust optimisation problem over the possible probabilities using sum of squares decomposition. We relate the network usage with the sending thresholds and propose an iterative procedure for the design of those thresholds, minimising the network usage while guaranteeing a prescribed estimation performance. Simulation results and experimental analysis show the validity of the proposal and the reduction of network resources that can be achieved with the stochastic approach.  相似文献   
105.
Recommender systems usually suggest items by exploiting all the previous interactions of the users with a system (e.g., in order to decide the movies to recommend to a user, all the movies she previously purchased are considered). This canonical approach sometimes could lead to wrong results due to several factors, such as a change in user preferences over time, or the use of her account by third parties. This kind of incoherence in the user profiles defines a lower bound on the error the recommender systems may achieve when they generate suggestions for a user, an aspect known in literature as magic barrier. This paper proposes a novel dynamic coherence-based approach to define the user profile used in the recommendation process. The main aim is to identify and remove, from the previously evaluated items, those not semantically adherent to the others, in order to make a user profile as close as possible to the user’s real preferences, solving the aforementioned problems. Moreover, reshaping the user profile in such a way leads to great advantages in terms of computational complexity, since the number of items considered during the recommendation process is highly reduced. The performed experiments show the effectiveness of our approach to remove the incoherent items from a user profile, increasing the recommendation accuracy.  相似文献   
106.
The recent availability of reliable schemes for physically unclonable constants (PUC) opens interesting possibilities in the field of security. In this paper, we explore the possibility of using PUCs to embed in a chip random permutations to be used, for example, as building blocks in cryptographic constructions such as sponge functions, substitution–permutation networks, and so on. We show that the most difficult part is the generation of random integers using as the only randomness source the bit-string produced by the PUC. In order to solve the integer generation problem, we propose a partial rejection method that allows the designer to trade-off between entropy and efficiency. The results show that the proposed schemes can be implemented with reasonable complexity.  相似文献   
107.
Suffix arrays are a key data structure for solving a run of problems on texts and sequences, from data compression and information retrieval to biological sequence analysis and pattern discovery. In their simplest version, they can just be seen as a permutation of the elements in {1,2,…,n}, encoding the sorted sequence of suffixes from a given text of length n, under the lexicographic order. Yet, they are on a par with ubiquitous and sophisticated suffix trees. Over the years, many interesting combinatorial properties have been devised for this special class of permutations: for instance, they can implicitly encode extra information, and they are a well characterized subset of the n! permutations. This paper gives a short tutorial on suffix arrays and their compressed version to explore and review some of their algorithmic features, discussing the space issues related to their usage in text indexing, combinatorial pattern matching, and data compression.  相似文献   
108.
This paper introduces and motivates ADL, a new formal notation for the specification of the temporal and functional behaviour of concurrent processes. ADL is tailored to be directly compatible with the DORIS design method. It combines a graphical Activity State-Machine (ASM) notation and a model-based Activity Functional Behaviour (AFB) notation. The abstract syntax, and static and dynamic semantics for the ASM notation are given, the dynamic semantics being given proof-theoretically in many-sorted logic extended with the RTL ‘occurrence’ relation, Θ, and the ERTL ‘holding’ relation, Φ. ADL is used to specify a small network, and proofs are given of its timeliness and safety properties. Received November 1998 / Accepted in revised form May 2000  相似文献   
109.
Who Are You? The Trade-Off between Information Utility and Privacy   总被引:1,自引:0,他引:1  
There's no doubt that personal information can be valuable to companies. People are willing to give up information about themselves not because they're stupid or because they're being tricked by evil corporations, but because it can sometimes be in their best interests to do so. From this perspective, the important questions are how users can provide or limit access to that information, what benefits they might receive in exchange for a bit of information, and how they perceive the value of those benefits.  相似文献   
110.
Service Science     
This paper is a first exploration of the relationship between service science and Grid computing. Service science is the study of value co-creation interactions among entities, known as service systems. Within the emerging service science community, service is often defined as the application of competences (resources) for the benefit of another. Grid computing is the study of resource sharing among entities, known as virtual organizations, which solve complex business, societal, scientific, and engineering problems. Within the Grid computing community, service is sometimes defined as protocols plus behavior. Both Grid computing and service science are connecting academic, industry, government, and volunteer sector collaborators on a range of projects including eScience, healthcare, environmental sustainability, and more. This paper compares and contrasts the notions of resource, entity, service, interaction, and success criteria for the two areas of study. In conclusion, new areas for collaborative inquiry are proposed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号