首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3235篇
  免费   186篇
  国内免费   5篇
电工技术   57篇
综合类   1篇
化学工业   738篇
金属工艺   71篇
机械仪表   60篇
建筑科学   97篇
矿业工程   4篇
能源动力   115篇
轻工业   408篇
水利工程   24篇
石油天然气   15篇
武器工业   1篇
无线电   336篇
一般工业技术   528篇
冶金工业   396篇
原子能技术   16篇
自动化技术   559篇
  2023年   33篇
  2022年   40篇
  2021年   90篇
  2020年   75篇
  2019年   91篇
  2018年   102篇
  2017年   101篇
  2016年   106篇
  2015年   84篇
  2014年   120篇
  2013年   219篇
  2012年   179篇
  2011年   228篇
  2010年   165篇
  2009年   137篇
  2008年   178篇
  2007年   137篇
  2006年   120篇
  2005年   96篇
  2004年   97篇
  2003年   88篇
  2002年   71篇
  2001年   48篇
  2000年   42篇
  1999年   48篇
  1998年   141篇
  1997年   93篇
  1996年   69篇
  1995年   45篇
  1994年   38篇
  1993年   45篇
  1992年   20篇
  1991年   21篇
  1990年   21篇
  1989年   13篇
  1988年   20篇
  1987年   15篇
  1986年   16篇
  1985年   17篇
  1984年   21篇
  1983年   16篇
  1982年   9篇
  1981年   8篇
  1980年   9篇
  1979年   7篇
  1978年   7篇
  1976年   19篇
  1975年   8篇
  1973年   6篇
  1972年   8篇
排序方式: 共有3426条查询结果,搜索用时 15 毫秒
91.
92.
This article explores the strategies used by Israeli students to resolve the Israeli-Palestinian conflict in the interactive computer game, PeaceMaker. Students played PeaceMaker in the roles of both the Israeli Prime Minister and the Palestinian President in random order. Students must take actions satisfying constituents on both sides of the conflict in order to win the game. The diversity of actions taken in each role was measured. Several hypotheses test the degree to which Israeli students, depending on which role they played and their own demographic variables, exploited a consistent set of actions or explored a more diverse range of actions across three main types: construction, political, and security. The results show that (1) greater action diversity increases success in both roles, (2) Israeli students engaged in less diverse actions when playing the Israeli role than when playing the Palestinian role, (3) students’ religiosity and political Hawkishness negatively predicted action diversity when playing the Palestinian role, and (4) action diversity mediates the relationship between a student’s background knowledge about the conflict and success in the Israeli role. The significance of these findings for understanding attitudes about the Israeli-Palestinian conflict are discussed, including implications for conflict resolution more generally.  相似文献   
93.
The iPhone SDK provides a powerful platform for the development of applications that make use of iPhone capabilities, such as sensors, GPS, Wi‐Fi, or Bluetooth connectivity. We observe that so far the development of iPhone applications has mostly been restricted to using Objective‐C. However, developing applications in plain Objective‐C on the iPhone OS suffers from limitations, such as the need for explicit memory management and lack of syntactic extension mechanism. Moreover, when developing distributed applications in Objective‐C, programmers have to manually deal with distribution concerns, such as service discovery, remote communication, and failure handling. In this paper, we discuss our experience in porting the Scheme programming language to the iPhone OS and how it can be used together with Objective‐C to develop iPhone applications. To support the interaction between Scheme programs and the underlying iPhone APIs, we have implemented a language symbiosis layer that enables programmers to access the iPhone SDK libraries from Scheme. In addition, we have designed high‐level distribution constructs to ease the development of distributed iPhone applications in an event‐driven style. We validate and discuss these constructs with a series of examples, including an iPod controller, a maps application, and a distributed multiplayer Scrabble‐like game. We discuss the lessons learned from this experience for other programming language ports to mobile platforms. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
94.
95.
Nowadays video surveillance systems are widely deployed in many public places. However, the widespread use of video surveillance violates the privacy rights of the people. Many authors have addressed the privacy issues from various points of view. In this paper we propose a novel, on-demand selectively revocable, privacy preserving mechanism. The surveillance video can be tuned to view with complete privacy or by revoking the privacy of any subset of pedestrians while ensuring complete privacy to the remaining pedestrians. We achieve this by tracking the pedestrians using a novel Markov chain algorithm with two hidden states, detecting the head contour of the tracked pedestrians and obscuring their faces using an encryption mechanism. The detected pedestrian face/head is obscured by encrypting with a unique key derived from a master key for the privacy preservation purpose. The performance evaluations on many challenging surveillance scenarios show that the proposed mechanism can effectively and robustly track as well as identify multiple pedestrians and obscure/unobscure their faces/head in real time.  相似文献   
96.
This paper adapts some literature results on stabilizing discrete time-varying input delay systems to the case of having a predictor-based controller. The objective of the paper is showing that the incorporation of predictors to the referred results is relatively simple and, by means of such predictors, robustness against delay mismatch in the input channel may be improved. In this way, larger delay variation margins are proved with predictors when compared to standard memoryless state feedback, as intuitively expected, due to the extra past information available.  相似文献   
97.
Oxidation state of titanium was determined in CaO‐SiO2‐TiOx slags in the composition range 25‐53 percent CaO, 27‐46 percent SiO2, 10‐55 percent TiOx at 1873K using gas equilibration method. In the experiments, slags with different titanium oxide contents were equilibrated with a known carbon monoxide and carbon dioxide ratio. The results were used to determine the Ti3+ and Ti4+ contents as well as the activity coefficient ratio of corresponding oxides in the slag. The dependence of the activity coefficient ratio as a function of oxygen partial pressure was determined.  相似文献   
98.
We present an algorithm for the gossiping problem defined over an n processor communication network, N, where message multicasting is allowed. The algorithm generates a communication schedule with a total communication time at most N+r, where r is the radius of the network. Our algorithm begins by constructing a spanning tree (or tree network T) with the least possible radius. Then, all the communications are carried out in the tree network as follows: each processor waits its turn to transmit "almost" consecutively to its parent and children all the messages in its subtree. During other times, each processor transmits to its children all the messages emanating elsewhere in the network.  相似文献   
99.
The enlarged Horn formulas generalize the extended Horn formulas introduced by Chandru and Hooker (1991). Their satisfying truth assignments can be generated with polynomial delay. Unfortunately no polynomial algorithm is known for recognizing enlarged Horn formulas or extended Horn formulas. In this paper we define the class of simple enlarged Horn formulas, a subclass of the enlarged Horn formulas, that contains the simple extended Horn formulas introduced by Swaminathan and Wagner (1995). We present recognition algorithms for the simple enlarged Horn formulas and the simple extended Horn formulas whose complexity is bounded by the complexity of the arborescence-realization problem.  相似文献   
100.
This paper defines direction relations (e.g., north, northeast) between two-dimensional objects and shows how they can be efficiently retrieved using B-, KDB- and R- tree-based data structures. Essentially, our work studies optimisation techniques for 2D range queries that arise during the processing of direction relations. We test the efficiency of alternative indexing methods through extensive experimentation and present analytical models that estimate their performance. The analytical estimates are shown to be very close to the actual results and can be used by spatial query optimizers in order to predict the retrieval cost. In addition, we implement modifications of the existing structures that yield better performance for certain queries. We conclude the paper by discussing the most suitable method depending on the type of the range and the properties of the data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号