首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1613篇
  免费   54篇
  国内免费   18篇
电工技术   38篇
综合类   1篇
化学工业   213篇
金属工艺   31篇
机械仪表   47篇
建筑科学   99篇
矿业工程   1篇
能源动力   52篇
轻工业   63篇
水利工程   2篇
石油天然气   2篇
无线电   303篇
一般工业技术   233篇
冶金工业   294篇
原子能技术   15篇
自动化技术   291篇
  2023年   9篇
  2022年   17篇
  2021年   25篇
  2020年   12篇
  2019年   13篇
  2018年   33篇
  2017年   17篇
  2016年   14篇
  2015年   24篇
  2014年   30篇
  2013年   90篇
  2012年   40篇
  2011年   77篇
  2010年   71篇
  2009年   75篇
  2008年   82篇
  2007年   72篇
  2006年   61篇
  2005年   67篇
  2004年   56篇
  2003年   73篇
  2002年   38篇
  2001年   53篇
  2000年   47篇
  1999年   42篇
  1998年   123篇
  1997年   58篇
  1996年   40篇
  1995年   45篇
  1994年   28篇
  1993年   33篇
  1992年   24篇
  1991年   18篇
  1990年   29篇
  1989年   29篇
  1988年   25篇
  1987年   11篇
  1986年   9篇
  1985年   8篇
  1984年   3篇
  1983年   4篇
  1982年   9篇
  1981年   3篇
  1980年   7篇
  1979年   6篇
  1978年   5篇
  1977年   9篇
  1976年   10篇
  1974年   2篇
  1973年   5篇
排序方式: 共有1685条查询结果,搜索用时 15 毫秒
101.
This study was initiated to examine the feasibility of providing multimedia mail, in particular video mail, on the existing World Wide Web platform. In this instance, the Web browser will act as the user agent of the mailing system. With this, users will be able to compose, send and read video mail directly on the Web. This paper examines a number of possible system architectures that can be employed for the development of video mail. Based on the following key issues: portability of system, flexibility of system, Internet standard support, security and authentication, and message compression and storage, a final architecture was selected to build video mail. The approach taken is that the system will be interfaced to the Web using a standard HyperText Transfer Protocol (HTTP) server and a standard Web browser. This is achieved through the use of Common Gateway Interface (CGI) programs and forms which reside in a standard HTTP server to provide the functionality of video mail, and a separate mail server for the storage and management of messages. This will cause the HTTP server to behave as if it is an electronic mail (E-mail) system. Video mail has been successfully implemented at the School of Applied Science, Nanyang Technological University, Singapore. The development work has been carried out on a Sun SPARC5 workstation and the Typhoon relational database system was used to construct the mail server. All software codes were written in C or C++. A video capturing application used in conjunction with a SunVideo card has been developed for video and audio recording. The paper also addresses implementation issues pertaining to the use of CGI programs, mail server development, and video and audio management.  相似文献   
102.
Massively multiplayer online role‐playing game (MMORPG) addiction presents a serious issue worldwide and has attracted increasing attention from academic and other public communities. This article addresses this critical issue and fills research gaps by proposing and testing a research model of MMORPG addiction. Building on the conceptual foundation of the hedonic management model of addiction and the technology affordance perspective, we develop a research model explaining how MMORPG affordances (ie, achievement, social and immersion affordances) are associated with the duality of hedonic effects (ie, perceived positive mood enhancement and perceived negative mood reduction) and the extent of MMORPG addiction. Using structural equation modelling, we empirically test our research model with 406 MMORPG players. The results show that both perceived positive mood enhancement and perceived negative mood reduction positively correlate with the extent of MMORPG addiction. Furthermore, achievement and immersion affordances are positively associated with the duality of hedonic effects, whereas social affordance is not. Our study contributes to the growing body of technology addiction literature by revealing the relationships between the two hedonic effects and the extent of MMORPG addiction, and by offering a contextualised explanation of the role of MMORPG affordances in these relationships. We offer an alternative perspective on the far‐reaching, unintended relationships between technological affordances and addictive technology use. Our study provides game developers and policymakers with insights into preventing MMORPG addiction to create an entertaining, healthy virtual playground.  相似文献   
103.
Recently, there has been a dramatic increase in the use of XML data to deliver information over the Web. Personal Weblogs, news Web sites, and discussion forums are now publishing RSS feeds for their subscribers to retrieve new postings. As the popularity of personal Weblogs and RSS feeds grows rapidly, RSS aggregation services and blog search engines have appeared, which try to provide a central access point for simpler access and discovery of new content from a large number of diverse RSS sources. In this paper, we study how the RSS aggregation services should monitor the data sources to retrieve new content quickly using minimal resources and to provide its subscribers with fast news alerts. We believe that the change characteristics of RSS sources and the general user access behavior pose distinct requirements that make this task significantly different from the traditional index refresh problem for Web search engines. Our studies on a collection of 10,000 RSS feeds reveal some general characteristics of the RSS feeds and show that, with proper resource allocation and scheduling, the RSS aggregator provides news alerts significantly faster than the best existing approach.  相似文献   
104.
As a joint effort between the Chinese Academy of Sciences and the Hong Kong University of Science and Technology, the BLOSSOMS sensor network project aims to identify research issues at all levels from practical applications down to the design of sensor nodes. In this project, a heterogeneous sensor array including different types of application-dependent sensors as well as monitoring sensors and intruding sensors are being developed. Application-dependent power-aware communication protocols are also being studied for communications among sensor nodes. An ontology-based middleware is built to relieve the burden of application developers from collecting, classifying and processing messy sensing contexts. This project is also developing a set of tools allowing researchers to model, simulate/emulate, analyze, and monitor various functions of sensor networks.  相似文献   
105.
This paper addresses the information-modeling issue for SAIL 1, an integrated shopfloor manufacturing system with flexible manufacturing and material-handling capabilities at the City University of Hong Kong. Based on analyses of the system configuration and information flow structure of SAIL 1, this paper presents a data-modeling strategy to model its information system from the system-physical configuration, system-operation control and system-operation monitoring, respectively. By using the IDEF1x methodology to abstract, classify and define the information objects and the interrelationships between them, three semantic data models were constructed in accordance with the system requirements and modeling strategy, from which the internal and external schemata of the SAIL 1 information system can be derived correspondingly.  相似文献   
106.
Automated behavior analysis is a valuable technique in the development and maintenance of distributed systems. In this paper, we present a tractable dataflow analysis technique for the detection of unreachable states and actions in distributed systems. The technique follows an approximate approach described by Reif and Smolka, but delivers a more accurate result in assessing unreachable states and actions. The higher accuracy is achieved by the use of two concepts: action dependency and history sets. Although the technique does not exhaustively detect all possible errors, it detects nontrivial errors with a worst-case complexity quadratic to the system size. It can be automated and applied to systems with arbitrary loops and nondeterministic structures. The technique thus provides practical and tractable behavior analysis for preliminary designs of distributed systems. This makes it an ideal candidate for an interactive checker in software development tools. The technique is illustrated with case studies of a pump control system and an erroneous distributed program. Results from a prototype implementation are presented  相似文献   
107.
Automatic generation of artistic chinese calligraphy   总被引:1,自引:0,他引:1  
Chinese calligraphy is among the finest and most important of all Chinese art forms and an inseparable part of Chinese history. Its delicate aesthetic effects are generally considered to be unique among all calligraphic arts. Its subtle power is integral to traditional Chinese painting. A novel intelligent system uses a constraint-based analogous-reasoning process to automatically generate original Chinese calligraphy that meets visually aesthetic requirements. We propose an intelligent system that can automatically create novel, aesthetically appealing Chinese calligraphy from a few training examples of existing calligraphic styles. To demonstrate the proposed methodology's feasibility, we have implemented a prototype system that automatically generates new Chinese calligraphic art from a small training set.  相似文献   
108.
Area and test time are two major overheads encountered during data path high level synthesis for BIST.This paper presents an approach to behavioral synthesis for loop-based BIST.y taking into account the requirements of the BIST scheme during behavioral synthesis processes,an area optimal BIST solution can be obtained.This approach is based on the use of test resources reusability that results in a fewer number of registers being modified to be test registers.This is achieved by incorporating self-testability constraints during register assignment operations.Experimental results on benchmarks are presented to demonstrate the effectiveness of the approach.  相似文献   
109.
Similarity search is a core module of many data analysis tasks, including search by example, classification, and clustering. For time series data, Dynamic Time Warping (DTW) has been proven a very effective similarity measure, since it minimizes the effects of shifting and distortion in time. However, the quadratic cost of DTW computation to the length of the matched sequences makes its direct application on databases of long time series very expensive. We propose a technique that decomposes the sequences into a number of segments and uses cheap approximations thereof to compute fast lower bounds for their warping distances. We present several, progressively tighter bounds, relying on the existence or not of warping constraints. Finally, we develop an index and a multi-step technique that uses the proposed bounds and performs two levels of filtering to efficiently process similarity queries. A thorough experimental study suggests that our method consistently outperforms state-of-the-art methods for DTW similarity search.  相似文献   
110.
Management of unstructured information, such as emails, is vital for supporting knowledge work in professional services. However, the conventional way for managing unstructured information is inadequate as the knowledge work and associated tasks are becoming more complex, are dynamically changing with time and involve multiple concepts. This paper attempts to address the inadequacy, deficiency and limitations of the methods presently used to elicit knowledge from masses of unstructured information. These methods rely heavily on manpower, are time consuming and costly. With the development of a multi-faceted and automatic knowledge elicitation system (MAKES) manpower, time and cost can be dramatically reduced. The MAKES integrates the processes of collecting data, classifying unstructured information, modelling knowledge flow and social network analysis, and makes all of these actions into a connected process to audit unstructured information automatically. This audit is based on specific search criteria, search keywords, and the user behaviours of the knowledge workers. The unstructured information is automatically organized, classified and presented in a multi-facet taxonomy map. New concepts and knowledge are uncovered, analyzed and updated continuously from the incoming unstructured information, using a purpose-built knowledge elicitation algorithm named self-associated concept mapping (SACM). The capability and advantages of the MAKES are demonstrated through a successful trial implementation and a verification test conducted in an electronics trading company. Encouraging results have been achieved and a number of potential advantages have been realized. The area of application in this first deployment is based on an email-intensive organization and the proposed study will contribute to the advancement of methods and tools for managing other kinds of unstructured information.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号