首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1295篇
  免费   80篇
  国内免费   1篇
电工技术   7篇
综合类   8篇
化学工业   207篇
金属工艺   30篇
机械仪表   17篇
建筑科学   38篇
矿业工程   3篇
能源动力   20篇
轻工业   209篇
水利工程   9篇
石油天然气   3篇
无线电   46篇
一般工业技术   132篇
冶金工业   536篇
原子能技术   6篇
自动化技术   105篇
  2024年   2篇
  2023年   4篇
  2022年   19篇
  2021年   33篇
  2020年   28篇
  2019年   26篇
  2018年   37篇
  2017年   44篇
  2016年   35篇
  2015年   22篇
  2014年   39篇
  2013年   63篇
  2012年   45篇
  2011年   66篇
  2010年   37篇
  2009年   57篇
  2008年   52篇
  2007年   40篇
  2006年   27篇
  2005年   19篇
  2004年   21篇
  2003年   23篇
  2002年   17篇
  2001年   15篇
  2000年   13篇
  1999年   24篇
  1998年   156篇
  1997年   112篇
  1996年   65篇
  1995年   42篇
  1994年   19篇
  1993年   35篇
  1992年   6篇
  1991年   3篇
  1990年   5篇
  1989年   6篇
  1988年   4篇
  1987年   2篇
  1985年   9篇
  1984年   1篇
  1983年   3篇
  1982年   5篇
  1981年   5篇
  1980年   11篇
  1979年   3篇
  1978年   1篇
  1977年   18篇
  1976年   54篇
  1975年   1篇
  1974年   1篇
排序方式: 共有1376条查询结果,搜索用时 656 毫秒
31.

For an autonomous system to perform maintenance tasks in a networking device or a radio base station (RBS), it has to deal with a series of technological challenges ranging from identifying hardware-related problems to manipulating connectors. This paper describes the development of a robot maintenance system dedicated to detect and resolve faulty links caused by unplugged or poorly connected cables. Although the maintenance system relies on four subsystems, we significantly focus on our low-cost and efficient custom gripper solution developed to handle RJ45 Ethernet connectors. To examine our gripper, we conducted three experiments. First, a qualitative questionnaire was submitted to 30 users in the case of the teleoperated scenario of the gripper attached to a robotic arm. Similarly, we also tested the automatic operation mode. The results showed that our system is reliable and delivers a highly efficient maintenance tool in both teleoperated and autonomous operation modes. The practical experiment containing the removal or unplugging of connectors demonstrated our gripper’s ability to adequately handle these, whereas the feedback from the questionnaire pointed to a positive user experience. The automatic test assessed the gripper’s robustness against the continuous operation.

  相似文献   
32.
The objective of this investigation is to study the influence of vanadium(5.0wt%–10.0wt%) and chromium(0–9.0wt%) on the microstructure and hardness of Cr-V-Mn-Ni white cast irons with spheroidal vanadium carbides. The alloys' microstructural features are presented and discussed with regard to the distribution of phase elements. The structural constituents of the alloys are spheroidal VC, proeutectoid cementite, ledeburite eutectic, rosette-shaped carbide eutectic(based on M7C3), pearlite, martensite, and austenite. Their combinations and area fraction(AF) ratios are reported to be influenced by the alloys' chemical composition. Spheroidized VC particles are found to be sites for the nucleation of carbide eutectics. Cr and V are shown to substitute each other in the VC and M7C3 carbides, respectively. Chromium alloying leads to the formation of a eutectic(γ-Fe + М7С3), preventing the appearance of proeutectoid cementite in the structure. Vanadium and chromium are revealed to increase the total carbide fraction and the amount of austenite in the matrix. Cr is observed to play a key role in controlling the metallic matrix microstructure.  相似文献   
33.
从信息隐藏技术理论提出后,相关技术得到了很快的发展。ICMP隧道、HTTP隧道、TCP/IP头部携带数据等技术,是黑客常用的入侵手段,而位图填充等技术则广泛应用于数据保密领域。信息隐藏技术发展较晚,技术较复杂,随着应用的深入,必将得到长足发展。  相似文献   
34.
The uptake of digital photos vs. print photos has altered the practice of photo-sharing. Print photos are easy to share within the home, but much harder to share outside of it. The opposite is true of digital photos. People easily share digital photos outside the home, e.g., to family and friends by e-mail gift-giving, and to social networks and the broader public by web publishing. Yet within the home, collocated digital photo-sharing is harder, primarily because digital photos are typically stored on personal accounts in desktop computers located in home offices. This leads to several consequences. (1) The invisibility of digital photos implies few opportunities for serendipitous photo-sharing. (2) Access control and navigation issues inhibit family members from retrieving photo collections. (3) Photo viewing is compromised as digital photos are displayed on small screens in an uncomfortable viewing setting.To mitigate some of these difficulties, we explore how physical memorabilia collected by family members can create opportunities that encourage social and collocated digital photo-sharing. First, we studied (via contextual interviews with 20 households) how families currently practice photo-sharing and how they keep memorabilia. We identified classes of memorabilia that can serve as memory triggers to family events, trips, and times when people took photos. Second, we designed Souvenirs, a photo-viewing system that exploits memorabilia as a social instrument. Using Souvenirs, a family member can meaningfully associate physical memorabilia with particular photo-sets. Later, any family member can begin their story-telling with others through the physical memento, and then enrich the story by displaying its associated photos simply by moving the memento close to the home's large-format television screen. Third, we re-examined our design premises by evoking household reactions to an early version of Souvenirs. Based on these interviews, we redesigned Souvenirs to better reflect the preferences and real practices of photo and memorabilia use in the home.  相似文献   
35.
This paper presents Latency-Energy Minimization Medium Access (LEMMA), a new TDMA-based MAC protocol for Wireless Sensor Networks (WSNs), specially suited to extend the lifetime of networks supporting alarm-driven, delay-sensitive applications characterized by convergecast traffic patterns and sporadic traffic generation. Its cascading time-slot assignment scheme conciliates low end-to-end latency with a low duty-cycle, while supporting multi-sink WSN topologies. Unlike most of the current solutions, LEMMA’s time-slot allocation protocol makes decisions based on the interference actually experienced by the nodes, instead of following the simple but potentially ineffective n-hop approach. Simulation results are presented to demonstrate the ineffectiveness of the n-hop time-slot allocation in comparison with LEMMA, as well as to evaluate the performance of LEMMA against L-MAC, T-MAC and Low Power Listening. The results show that under the target scenario conditions, LEMMA presents lower interference between assigned time-slots and lower end-to-end latency, while matching its best contender in terms of energy-efficiency.  相似文献   
36.
Magnetic Resonance Materials in Physics, Biology and Medicine - Histogram-based metrics extracted from diffusion-tensor imaging (DTI) have been suggested as potential biomarkers for cerebral small...  相似文献   
37.

This paper aims to contribute to the goal of finding influential legal precedents by quantitative methods. A lot of work has been made in this direction worldwide, especially in the context of common law jurisdictions. However, this type of work is extremely scarce in the Brazilian literature. In addition, our work also contributes to the research of network analysis and the law by applying these methods to unprecedented amount of data and narrowing our inquiry to a single law area, corporate law. Furthermore, whereas most of the literature applying network analysis to judicial decisions had access to readily available data on the citations to precedent within each ruling, our raw data was nothing but the full text of decisions. We focus on data produced by the Superior Court of Justice (STJ), the highest court in Brazil for matters of federal law, including statutory interpretation of civil, criminal and corporate law. The Court issued an astonishing 282040 opinions tagged as related to corporate law between 2008 and 2018. This amount of cases is unparalleled internationally for superior courts and for studies in network analysis and law. In our results, we rank precedents quantitatively based on the citations they receive and make. We also qualitatively analyze some of the results, especially related to groups identified in the network with the Modularity algorithm. Our findings also reveal that corporate law jurisprudence in the STJ is quantitatively dominated by a few legal issues around one single theme that is only tangentially related to corporate law. That is, a type of contract used for the expansion of telephone landlines, which also allowed the consumer to become a shareholder of the telecommunication company. This comparison is especially pertinent because the utter lack of data on the quantitative weight of STJ precedents means the national literature has been operating in a void of objective measurements, one which has been filled with cherry-picked rulings and subjective ranking criteria.

  相似文献   
38.
Fusion of laser and vision in object detection has been accomplished by two main approaches: (1) independent integration of sensor-driven features or sensor-driven classifiers, or (2) a region of interest (ROI) is found by laser segmentation and an image classifier is used to name the projected ROI. Here, we propose a novel fusion approach based on semantic information, and embodied on many levels. Sensor fusion is based on spatial relationship of parts-based classifiers, being performed via a Markov logic network. The proposed system deals with partial segments, it is able to recover depth information even if the laser fails, and the integration is modeled through contextual information—characteristics not found on previous approaches. Experiments in pedestrian detection demonstrate the effectiveness of our method over data sets gathered in urban scenarios.  相似文献   
39.
本文针对局域网中发生的ARP欺骗基本原理进行介绍,分析了ARP协议所存在的安全漏洞,同时介绍几种常见的ARP欺骗和攻击方式,并且从客户端、网关等多个方面提出关于如何防御ARP攻击的多种方法,以达到全面防御维护局域网络安全的目的。  相似文献   
40.
Approximate data matching aims at assessing whether two distinct instances of data represent the same real-world object. The comparison between data values is usually done by applying a similarity function which returns a similarity score. If this score surpasses a given threshold, both data instances are considered as representing the same real-world object. These score values depend on the algorithm that implements the function and have no meaning to the user. In addition, score values generated by different functions are not comparable. This will potentially lead to problems when the scores returned by different similarity functions need to be combined for computing the similarity between records. In this article, we propose that thresholds should be defined in terms of the precision that is expected from the matching process rather than in terms of the raw scores returned by the similarity function. Precision is a widely known similarity metric and has a clear interpretation from the user's point of view. Our approach defines mappings from score values to precision values, which we call adjusted scores. In order to obtain such mappings, our approach requires training over a small dataset. Experiments show that training can be reused for different datasets on the same domain. Our results also demonstrate that existing methods for combining scores for computing the similarity between records may be enhanced if adjusted scores are used.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号