首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4094篇
  免费   298篇
  国内免费   4篇
电工技术   91篇
综合类   19篇
化学工业   1023篇
金属工艺   85篇
机械仪表   73篇
建筑科学   325篇
矿业工程   18篇
能源动力   115篇
轻工业   290篇
水利工程   28篇
石油天然气   2篇
无线电   338篇
一般工业技术   886篇
冶金工业   319篇
原子能技术   16篇
自动化技术   768篇
  2024年   6篇
  2023年   61篇
  2022年   140篇
  2021年   161篇
  2020年   123篇
  2019年   101篇
  2018年   130篇
  2017年   115篇
  2016年   173篇
  2015年   170篇
  2014年   199篇
  2013年   273篇
  2012年   266篇
  2011年   326篇
  2010年   269篇
  2009年   213篇
  2008年   217篇
  2007年   215篇
  2006年   166篇
  2005年   157篇
  2004年   109篇
  2003年   89篇
  2002年   82篇
  2001年   55篇
  2000年   51篇
  1999年   55篇
  1998年   84篇
  1997年   40篇
  1996年   61篇
  1995年   44篇
  1994年   32篇
  1993年   27篇
  1992年   13篇
  1991年   16篇
  1990年   15篇
  1989年   17篇
  1988年   5篇
  1987年   5篇
  1986年   11篇
  1985年   15篇
  1984年   5篇
  1983年   4篇
  1982年   6篇
  1981年   7篇
  1979年   9篇
  1977年   9篇
  1976年   10篇
  1973年   9篇
  1970年   3篇
  1935年   3篇
排序方式: 共有4396条查询结果,搜索用时 31 毫秒
71.
A selective acoustic activation of defects based on the concept of local defect resonance enables to enhance considerably the intensity of defect vibrations and makes it possible to reduce the input acoustic powers to the levels permissible for noncontact nondestructive inspection. Since for cm-size defects in composite materials, the LDR frequencies lie in the low kHz-range, the resonant noncontact activation shifts to an audible frequency range and can be provided by conventional sonic equipment. In this paper, the feasibility of the resonant noncontact inspection is validated for the most “problematic” methodologies of nonlinear, thermosonic and shearosonic NDE that usually require an elevated acoustic power and, therefore, a reliable contact between the specimen and the transducer. In contrast, the noncontact versions developed employ commercial loudspeakers which can simultaneously insonify large areas and be applied for a contactless sonic inspection of different materials and various scale components.  相似文献   
72.
Dennis Dobler  Markus Pauly 《TEST》2018,27(3):639-658
The Mann–Whitney effect is an intuitive measure for discriminating two survival distributions. Here we analyse various inference techniques for this parameter in a two-sample survival setting with independent right-censoring, where the survival times are even allowed to be discretely distributed. This allows for ties in the data and requires the introduction of normalized versions of Kaplan–Meier estimators from which adequate point estimates are deduced. Asymptotically exact inference procedures based on standard normal, bootstrap, and permutation quantiles are developed and compared in simulations. Here, the asymptotically robust and—under exchangeable data—even finitely exact permutation procedure turned out to be the best. Finally, all procedures are illustrated using a real data set.  相似文献   
73.
74.
Single point incremental forming: state-of-the-art and prospects   总被引:1,自引:0,他引:1  
Incremental sheet metal forming in general and Single Point Incremental Forming (SPIF) specifically have gone through a period of intensive development with growing attention from research institutes worldwide. The result of these efforts is significant progress in the understanding of the underlying forming mechanisms and opportunities as well as limitations associated with this category of flexible forming processes. Furthermore, creative process design efforts have enhanced the process capabilities and process planning methods. Also, simulation capabilities have evolved substantially. This review paper aims to provide an overview of the body of knowledge with respect to Single Point Incremental Forming. Without claiming to be exhaustive, each section aims for an up-to-date state-of-the-art review with corresponding conclusions on scientific progress and outlook on expected further developments.  相似文献   
75.
GOST 34.10 is Russia's DSA. Like its US counterpart, GOST is an ElGamal-like signature scheme used in Schnorr mode. It is similar to NIST DSA in many aspects. In this paper we will overview GOST 34.10 and discuss the three main differences between the two algorithms, (i) GOST's principal design criterion does not seem to be computational efficiency: the algorithm is 1.6 times slower than the DSA and produces 512-bit signatures. This is mainly due to the usage of the modulus q which is at least 254 bits long. During verification, modular inverses are computed by exponentiation (while the Extended Euclidian algorithm is roughly 100 times faster for this parameter size) and the generation of the public parameters is much more complicated than in the DSA. This choice of the parameters makes GOST 34.10 very secure. (ii) GOST signers do not have to generate modular inverses as the basic signature equation is s = xr + mk (mod q) instead of (mod q). (iii) GOST's hash function (the Russian equivalent of the SHA) is the standard GOST 34.11 which uses the block cipher GOST 28147 (partially classified) as a building block. The hash function will be briefly described. Copyright  相似文献   
76.
This paper presents efficient and portable implementations of a powerful image enhancement process, the Symmetric Neighborhood Filter (SNF), and an image segmentation technique that makes use of the SNF and a variant of the conventional connected components algorithm which we call -Connected Components. We use efficient techniques for distributing and coalescing data as well as efficient combinations of task and data parallelism. The image segmentation algorithm makes use of an efficient connected components algorithm based on a novel approach for parallel merging. The algorithms have been coded in Split-C and run on a variety of platforms, including the Thinking Machines CM-5, IBM SP-1 and SP-2, Cray Research T3D, Meiko Scientific CS-2, Intel Paragon, and workstation clusters. Our experimental results are consistent with the theoretical analysis (and provide the best known execution times for segmentation, even when compared with machine-specific implementations). Our test data include difficult images from the Landsat Thematic Mapper (TM) satellite data.Also affiliated with the Department of Electrical Engineering.Also affiliated with the Department of Computer Science and the Center for Automation Research.  相似文献   
77.
Worst-case execution time (WCET) analysis is concerned with computing a precise-as-possible bound for the maximum time the execution of a program can take. This information is indispensable for developing safety-critical real-time systems, e. g., in the avionics and automotive fields. Starting with the initial works of Chen, Mok, Puschner, Shaw, and others in the mid and late 1980s, WCET analysis turned into a well-established and vibrant field of research and development in academia and industry. The increasing number and diversity of hardware and software platforms and the ongoing rapid technological advancement became drivers for the development of a wide array of distinct methods and tools for WCET analysis. The precision, generality, and efficiency of these methods and tools depend much on the expressiveness and usability of the annotation languages that are used to describe feasible and infeasible program paths. In this article we survey the annotation languages which we consider formative for the field. By investigating and comparing their individual strengths and limitations with respect to a set of pivotal criteria, we provide a coherent overview of the state of the art. Identifying open issues, we encourage further research. This way, our approach is orthogonal and complementary to a recent approach of Wilhelm et al. who provide a thorough survey of WCET analysis methods and tools that have been developed and used in academia and industry.  相似文献   
78.
IntroductionAll hospitals in the province of Styria (Austria) are well equipped with sophisticated Information Technology, which provides all-encompassing on-screen patient information. Previous research made on the theoretical properties, advantages and disadvantages, of reading from paper vs. reading from a screen has resulted in the assumption that reading from a screen is slower, less accurate and more tiring. However, recent flat screen technology, especially on the basis of LCD, is of such high quality that obviously this assumption should now be challenged. As the electronic storage and presentation of information has many advantages in addition to a faster transfer and processing of the information, the usage of electronic screens in clinics should outperform the traditional hardcopy in both execution and preference ratings.This study took part in a County hospital Styria, Austria, with 111 medical professionals, working in a real-life setting. They were each asked to read original and authentic diagnosis reports, a gynecological report and an internal medical document, on both screen and paper in a randomly assigned order. Reading comprehension was measured by the Chunked Reading Test, and speed and accuracy of reading performance was quantified. In order to get a full understanding of the clinicians' preferences, subjective ratings were also collected.ResultsWilcoxon Signed Rank Tests showed no significant differences on reading performance between paper vs. screen. However, medical professionals showed a significant (90%) preference for reading from paper. Despite the high quality and the benefits of electronic media, paper still has some qualities which cannot provided electronically do date.  相似文献   
79.
The display units integrated in today's head-mounted displays (HMDs) provide only a limited field of view (FOV) to the virtual world. In order to present an undistorted view to the virtual environment (VE), the perspective projection used to render the VE has to be adjusted to the limitations caused by the HMD characteristics. In particular, the geometric field of view (GFOV), which defines the virtual aperture angle used for rendering of the 3D scene, is set up according to the display field of view (DFOV). A discrepancy between these two fields of view distorts the geometry of the VE in a way that either minifies or magnifies the imagery displayed to the user. It has been shown that this distortion has the potential to affect a user's perception of the virtual space, sense of presence, and performance on visual search tasks. In this paper, we analyze the user's perception of a VE displayed in a HMD, which is rendered with different GFOVs. We introduce a psychophysical calibration method to determine the HMD's actual field of view, which may vary from the nominal values specified by the manufacturer. Furthermore, we conducted two experiments to identify perspective projections for HMDs, which are identified as natural by subjects--even if these perspectives deviate from the perspectives that are inherently defined by the DFOV. In the first experiment, subjects had to adjust the GFOV for a rendered virtual laboratory such that their perception of the virtual replica matched the perception of the real laboratory, which they saw before the virtual one. In the second experiment, we displayed the same virtual laboratory, but restricted the viewing condition in the real world to simulate the limited viewing condition in a HMD environment. We found that subjects evaluate a GFOV as natural when it is larger than the actual DFOV of the HMD--in some cases up to 50 percent--even when subjects viewed the real space with a limited field of view.  相似文献   
80.
While the demand for mobile broadband wireless services continues to increase, radio resources remain scarce. Even with the substantial increase in the supported bandwidth in the next generation broadband wireless access systems (BWASs), it is expected that these systems will severely suffer from congestion, due to the rapid increase in demand of bandwidth-intensive multimedia services. Without efficient bandwidth management and congestion control schemes, network operators may not be able to meet the increasing demand of users for multimedia services, and hence they may suffer an immense revenue loss. In this paper, we propose an admission-level bandwidth management scheme consisting of call admission control (CAC) and dynamic pricing. The main aim of our proposed scheme is to provide monetary incentives to users to use the wireless resources efficiently and rationally, hence, allowing efficient bandwidth management at the admission level. By dynamically determining the prices of units of bandwidth, the proposed scheme can guarantee that the number of connection requests to the system are less than or equal to certain optimal values computed dynamically, hence, ensuring a congestion-free system. The proposed scheme is general and can accommodate different objective functions for the admission control as well as different pricing functions. Comprehensive simulation results with accurate and inaccurate demand modeling are provided to show the effectiveness and strengths of our proposed approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号