首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   643979篇
  免费   8487篇
  国内免费   1971篇
电工技术   11749篇
综合类   597篇
化学工业   97554篇
金属工艺   25243篇
机械仪表   18559篇
建筑科学   15878篇
矿业工程   2957篇
能源动力   17586篇
轻工业   57229篇
水利工程   6294篇
石油天然气   11305篇
武器工业   39篇
无线电   72793篇
一般工业技术   123415篇
冶金工业   126684篇
原子能技术   13200篇
自动化技术   53355篇
  2021年   5690篇
  2020年   4063篇
  2019年   5245篇
  2018年   9008篇
  2017年   8832篇
  2016年   9282篇
  2015年   6532篇
  2014年   10815篇
  2013年   29293篇
  2012年   17363篇
  2011年   23989篇
  2010年   18971篇
  2009年   21344篇
  2008年   21704篇
  2007年   21433篇
  2006年   18720篇
  2005年   17194篇
  2004年   16461篇
  2003年   16076篇
  2002年   15345篇
  2001年   15451篇
  2000年   14417篇
  1999年   15251篇
  1998年   39510篇
  1997年   27702篇
  1996年   21162篇
  1995年   15938篇
  1994年   13755篇
  1993年   13458篇
  1992年   9729篇
  1991年   9167篇
  1990年   8955篇
  1989年   8737篇
  1988年   8186篇
  1987年   7311篇
  1986年   7150篇
  1985年   8014篇
  1984年   7484篇
  1983年   6701篇
  1982年   6314篇
  1981年   6426篇
  1980年   6058篇
  1979年   5977篇
  1978年   5723篇
  1977年   6927篇
  1976年   9062篇
  1975年   4975篇
  1974年   4734篇
  1973年   4866篇
  1972年   4002篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
972.
We show new upper bounds for problems in the W-hierarchy of fixed-parameter complexity. A crucial ingredient of our proofs is an extension to the W-RAM model, which permits more-powerful operations but remains equivalent to the original. We use the extended model to give new upper bounds for Subsetsum, Maximum Irredundant Set, and various problems concerning intersection of finite-state machines.  相似文献   
973.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2) to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs, the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing.  相似文献   
974.
In this paper, AssetCollector is presented, which is a system for managing collections of cultural assets. AssetCollector covers the needs of collection curators towards defining, populating and searching a collection in a flexible way, while supporting them in generating reports based on the collection’s assets and reusing them in order to build web sites and CD-ROMs. In order to support the above functionality, the system provides the content structuring subsystem, the content input subsystem, the search subsystem and the report subsystem. The use of the subsystems is straightforward and requires no technical skills from the curators. AssetCollector has been successfully applied for organizing various collections of cultural assets in Greece, such as archaeological sites, museums and published books. In the future, an evaluation procedure is planned in order to further refine the use of the system according to the targeted users’ needs. Furthermore, more import and export facilities will be provided, which will make the system compliant with widely accepted standards.  相似文献   
975.
976.
977.
Unicode is rapidly becoming the preferred means for representing symbols used in creating multimedia content, especially for information that's presented in multiple languages. This article discusses a unicode vulnerability that makes such content susceptible to being used for creation of covert channel communications. We also developed a solution architecture, the unified secure message augmentation (USMA) service. The USMA service incorporates rules (in an XML vocabulary) that we can apply to unicode transmissions that will detect an attempt to transmit a potential exploit, alert network managers to the presence of the unicode anomaly, and take action to mitigate the exploit.  相似文献   
978.
Packing two-dimensional shapes on a surface such that no shapes overlap and the uncovered surface area is minimized is an important problem that arises in a variety of industrial applications. This paper introduces an intelligent system which tackles the most difficult instance of this problem, where two-dimensional irregular shapes have to be packed on a regularly or irregularly shaped surface. The proposed system utilizes techniques not previously applied to packing, drawn from computer vision and artificial intelligence, and achieves high-quality solutions with short computational times. In addition, the system deals with complex shapes and constraints that occur in industrial applications, such as defective regions and irregularly shaped sheets. We evaluate the effectiveness and efficiency of the proposed method using 14 established benchmark problems that are available from the EURO Special Interest Group on Cutting and Packing.  相似文献   
979.
Tracked vehicles capable of locomotion in the deep sea are used for manganese nodule mining. This requires specific technical solutions in various respects. Locomotion in the soft sea bed is one of them. For the Crawler to safely maneuver, an automatic drive mode with slip control of the driving tracks is essential. Based on experimental studies at IKS, University of Siegen, slip control for the NIOT-IKS mining machine has been developed and implemented. The experimental setup for the development of the slip control along with the logic of the automatic driving mode is described. The system is critically discussed and the test results and future work are briefly outlined. Note to Practitioners-The work is carried out as part of the polymetallic nodule mining program of the Government of India. The technique of slip control is a specific requirement for a tracked vehicle used in the deep sea. Slip is common in many vehicles-tracked and otherwise. Examples are steam engines in the early days and ordinary cars while negotiating slush or snow/ice and dozers working in soft soil. While these are manually controlled by drivers who have firsthand knowledge of the environmental conditions, in the case of a mining machine in deep sea, it has to be completely automatic and, hence, is challenging. The knowledge generated in this work could be effectively used by practitioners in other related areas of automobile engineering for updating their expertise. Also, similar techniques may be used for maneuvering vehicles sent to other planets  相似文献   
980.
Existing wireless networks provide dynamically varying resources with only limited support for the quality of service required by the bandwidth-intense, loss-tolerant and delay-sensitive multimedia applications. This variability of resources does not significantly impact delay insensitive data transmission (e.g., file transfers), but has considerable consequences for multimedia applications. Recently, the research focus has been to adapt existing algorithms and protocols at the lower layers of the protocol stack to better support multimedia transmission applications and conversely, to modify application layer solutions to cope with the varying wireless networks resources. In this paper, we show that significant improvements in wireless multimedia performance can be obtained by deploying a joint application-layer adaptive packetization and prioritized scheduling and MAC-layer retransmission strategy. We deploy a state-of-the-art wavelet coder for the compression of the video data that enables on-the-fly adaptation to changing channel conditions and inherent prioritization of the video bitstream. We pose the cross-layer problem as a distortion minimization given delay constraints and derive analytical solutions by modifying existing joint source-channel coding theory aimed at fulfilling rate, rather than delay, constraints. We also propose real-time algorithms that explicitly consider the available information about previously transmitted packets. The obtained results show significant improvements in terms of video quality as opposed to ad-hoc optimizations currently deployed, while the complexity associated with performing this optimization in real time, i.e., at transmission time, is limited  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号