首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5046篇
  免费   261篇
  国内免费   12篇
电工技术   32篇
综合类   5篇
化学工业   1030篇
金属工艺   104篇
机械仪表   104篇
建筑科学   258篇
矿业工程   8篇
能源动力   155篇
轻工业   483篇
水利工程   48篇
石油天然气   18篇
武器工业   2篇
无线电   439篇
一般工业技术   910篇
冶金工业   929篇
原子能技术   36篇
自动化技术   758篇
  2024年   7篇
  2023年   43篇
  2022年   84篇
  2021年   139篇
  2020年   94篇
  2019年   113篇
  2018年   147篇
  2017年   127篇
  2016年   159篇
  2015年   118篇
  2014年   164篇
  2013年   285篇
  2012年   280篇
  2011年   349篇
  2010年   247篇
  2009年   268篇
  2008年   312篇
  2007年   294篇
  2006年   242篇
  2005年   245篇
  2004年   175篇
  2003年   152篇
  2002年   153篇
  2001年   80篇
  2000年   67篇
  1999年   62篇
  1998年   89篇
  1997年   81篇
  1996年   82篇
  1995年   53篇
  1994年   56篇
  1993年   64篇
  1992年   42篇
  1991年   26篇
  1990年   40篇
  1989年   38篇
  1988年   34篇
  1987年   43篇
  1986年   42篇
  1985年   36篇
  1984年   28篇
  1983年   28篇
  1982年   30篇
  1981年   18篇
  1980年   12篇
  1979年   14篇
  1978年   16篇
  1976年   8篇
  1975年   7篇
  1973年   7篇
排序方式: 共有5319条查询结果,搜索用时 15 毫秒
21.
The results of two experiments showed that an illusion of memory can be produced by unconscious perception. In a first phase of those experiments, a long list of words was presented for study. For the test of recognition memory given in the second phase of each experiment, presentation of a "context" word preceded that of most recognition test words. Ss were to judge whether or not the test words had been presented during the earlier study phase of the experiment. Effects of a context word on this recognition memory decision were opposite when Ss were aware vs. unaware of its presentation. For example, as compared to a condition in which no context word was presented, the probability of false recognition was increased when Ss were unaware but decreased when Ss were aware of the presentation of a context word that matched the recognition test word. Results are discussed in terms of unconscious influences on an attribution process. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
22.
The Lovász ?-function (Lovász in IEEE Trans. Inf. Theory, 25:1–7, 1979) of a graph G=(V,E) can be defined as the maximum of the sum of the entries of a positive semidefinite matrix X, whose trace Tr(X) equals 1, and X ij =0 whenever {i,j}∈E. This function appears as a subroutine for many algorithms for graph problems such as maximum independent set and maximum clique. We apply Arora and Kale’s primal-dual method for SDP to design an algorithm to approximate the ?-function within an additive error of δ>0, which runs in time $O(\frac{\vartheta ^{2} n^{2}}{\delta^{2}} \log n \cdot M_{e})$ , where ?=?(G) and M e =O(n 3) is the time for a matrix exponentiation operation. It follows that for perfect graphs G, our primal-dual method computes ?(G) exactly in time O(? 2 n 5logn). Moreover, our techniques generalize to the weighted Lovász ?-function, and both the maximum independent set weight and the maximum clique weight for vertex weighted perfect graphs can be approximated within a factor of (1+?) in time O(? ?2 n 5logn).  相似文献   
23.
Local community detection aims at finding a community structure starting from a seed which is a given vertex in a network without global information, such as online social networks that are too large and dynamic to ever be known fully. Nonetheless, the existing approaches to local community detection are usually sensitive to seeds, i.e., some seeds may lead to missing of some true communities. In this paper, we present a seed-insensitive method called GMAC and its variation iGMAC for local community detection. They estimate the similarity among vertices by investigating vertices’ neighborhoods, and reveal a local community by maximizing its internal similarity and minimizing its external similarity simultaneously. Extensive experimental results on both synthetic and real-world data sets verify the effectiveness of our algorithms.  相似文献   
24.
We present several novel techniques to summarize the high-level behavior in surveillance video. Our proposed methods can employ either optical flow or trajectories as input, and incorporate spatial and temporal information together, which improve upon existing approaches for summarization. To begin, we extract common pathway regions by performing graph-based clustering on similarity matrices describing the relationships between location/orientation states. We then employ the activities along the pathway regions to extract the aggregate behavioral patterns throughout scenes. We show how our summarization methods can be applied to detect anomalies, retrieve video clips of interest, and generate adaptive-speed summary videos. We examine our approaches on multiple complex urban scenes and present experimental results.  相似文献   
25.
This study, which deals with the distribution of hydrocarbons in seven types of rabbit tissues, was done for the purpose of providing information that might help shed light on the biological relevance of the hydrocarbons in mammalian metabolism. Liver, kidneys, brain, spleen, skeletal muscle, perinephric adipose, and a sample of blood serum were collected from a single animal for analysis of their hydrocarbon composition. The analytical methodology consisted of solvent extraction, saponification (adipose), elution chromatography on hydrated alumina, and combined gas chromatography-mass spectrometry. Hydrocarbons were detected in all of the tissues examined at concentrations estimated to range from 0.1 to 0.01% of the total lipid extracted. Three quite distinct distribution modes were recognized. The bulk of the identified components consisted of normal, saturated, nonterpenoid hydrocarbons in the C16 to C33 range. Squalene, phytene, phytadiene, and pristane were the only terpenoids detected. Nonterepenoid branched (iso andanteiso) hydrocarbons were identified unequivocally and in significant amounts in the muscle only. The adipose was the only tissue which was relatively rich in monoalkenes, and its overall hydrocarbon composition closely resembled that of the feed. The results of the study are not consistent with metabolic inertness. The observed qualitative and quantitative differences might reflect function and metabolic activities of the individual organs in a way yet to be elucidated. Presented in part at the AOCS Spring Meeting, New Orleans, April, 1976.  相似文献   
26.
Adsorbate interactions and reactions on metal surfaces have been investigated using scanning tunneling microscopy. The manners in which adsorbates perturb the surface electronic structure in their vicinity are discussed. The effects these perturbations have on other molecules are shown to be important in overlayer growth. Interactions of molecules with surface steps are addressed, and each molecule's electron affinity is shown to dictate its adsorption sites at step edges. Standing waves emanating from steps are demonstrated to effect transient molecular adsorption up to 40 A away from the step edge. Halobenzene derivatives are used to demonstrate how the surface is important in aligning reactive intermediates.  相似文献   
27.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
28.
The ACM Code of Ethics asserts that computing professionals have an ethical responsibility to minimize the negative consequences of information and communication technologies (ICT). Negative consequences are rarely intended, but they can often be foreseen with careful sociotechnical analysis in advance of system building. Motivated by an interest in extremely complex sociotechnical contexts (e.g., mortgage lending and automated trading) where ICT appears to be having negative consequences in addition to many benefits, this paper identifies and evaluates future-oriented problem analysis and solution design tools in three potentially relevant literatures: 1) ICT ethics, 2) environmental sustainability, and 3) technology hazards. Several promising future-oriented technology analysis techniques (e.g., anticipatory technology ethics, technology roadmapping, morphological analysis, and control structure analysis) were found and are discussed in this paper, but much work remains to be done to customize them, integrate them, and codify them for use in education and high-quality IS research on very complex sociotechnical contexts like the global financial network.  相似文献   
29.
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud.  相似文献   
30.
The viewing of video increasingly occurs in a wide range of public and private environments via a range of static and mobile devices. The proliferation of content on demand and the diversity of the viewing situations means that delivery systems can play a key role in introducing audiences to contextually relevant content of interest whilst maximising the viewing experience for individual viewers. However, for video delivery systems to do this, they need to take into account the diversity of the situations where video is consumed, and the differing viewing experiences that users desire to create within them. This requires an ability to identify different contextual viewing situations as perceived by users. This paper presents the results from a detailed, multi-method, user-centred field study with 11 UK-based users of video-based content. Following a review of the literature (to identify viewing situations of interest on which to focus), data collection was conducted comprising observation, diaries, interviews and self-captured video. Insights were gained into whether and how users choose to engage with content in different public and private spaces. The results identified and validated a set of contextual cues that characterise distinctive viewing situations. Four archetypical viewing situations were identified: ‘quality time’, ‘opportunistic planning’, ‘sharing space but not content’ and ‘opportunistic self-indulgence’. These can be differentiated in terms of key contextual factors: solitary/shared experiences, public/private spaces and temporal characteristics. The presence of clear contextual cues provides the opportunity for video delivery systems to better tailor content and format to the viewing situation or additionally augment video services through social media in order to provide specific experiences sensitive to both temporal and physical contexts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号