首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1768篇
  免费   116篇
  国内免费   1篇
电工技术   12篇
化学工业   422篇
金属工艺   36篇
机械仪表   32篇
建筑科学   67篇
矿业工程   2篇
能源动力   53篇
轻工业   149篇
水利工程   7篇
石油天然气   4篇
无线电   208篇
一般工业技术   360篇
冶金工业   102篇
原子能技术   24篇
自动化技术   407篇
  2023年   21篇
  2022年   34篇
  2021年   37篇
  2020年   50篇
  2019年   51篇
  2018年   56篇
  2017年   65篇
  2016年   67篇
  2015年   53篇
  2014年   63篇
  2013年   125篇
  2012年   110篇
  2011年   153篇
  2010年   101篇
  2009年   98篇
  2008年   112篇
  2007年   87篇
  2006年   87篇
  2005年   73篇
  2004年   60篇
  2003年   47篇
  2002年   40篇
  2001年   15篇
  2000年   17篇
  1999年   26篇
  1998年   25篇
  1997年   40篇
  1996年   23篇
  1995年   18篇
  1994年   19篇
  1993年   18篇
  1992年   12篇
  1991年   8篇
  1990年   9篇
  1989年   5篇
  1988年   7篇
  1987年   4篇
  1986年   4篇
  1985年   4篇
  1984年   6篇
  1983年   5篇
  1982年   5篇
  1981年   2篇
  1977年   5篇
  1976年   6篇
  1975年   4篇
  1973年   1篇
  1971年   2篇
  1967年   1篇
  1954年   1篇
排序方式: 共有1885条查询结果,搜索用时 625 毫秒
41.
Wireless Personal Communications - The Invisible Internet Project (I2P) as a secure protocol uses robust mechanisms and strong algorithms to reinforce the security and the anonymity of the...  相似文献   
42.

The joint estimation of the location vector and the shape matrix of a set of independent and identically Complex Elliptically Symmetric (CES) distributed observations is investigated from both the theoretical and computational viewpoints. This joint estimation problem is framed in the original context of semiparametric models allowing us to handle the (generally unknown) density generator as an infinite-dimensional nuisance parameter. In the first part of the paper, a computationally efficient and memory saving implementation of the robust and semiparmaetric efficient R-estimator for shape matrices is derived. Building upon this result, in the second part, a joint estimator, relying on the Tyler’s M-estimator of location and on the R-estimator of shape matrix, is proposed and its Mean Squared Error (MSE) performance compared with the Semiparametric Cramér-Rao Bound (SCRB).

  相似文献   
43.
Journal of Automated Reasoning - Algebraic datatypes, and among them lists and trees, have attracted a lot of interest in automated reasoning and Satisfiability Modulo Theories (SMT). Since its...  相似文献   
44.
Recent advances in design theory help clarify the logic, forms and conditions of generativity. In particular, the formal model of forcing predicts that high-level generativity (so-called generic generativity) can only be reached if the knowledge structure meets the ‘splitting condition’. We test this hypothesis for the case of Bauhaus (1919–1933), where we can expect strong generativity and where we have access to the structures of knowledge provided by teaching. We analyse teaching at Bauhaus by focusing on the courses of Itten and Klee. We show that these courses aimed to increase students’ creative design capabilities by providing the students with methods of building a knowledge base with two critical features: (1) a knowledge structure that is characterized by non-determinism and non-modularity and (2) a design process that helps students progressively ‘superimpose’ languages on the object. From the results of the study, we confirm the hypothesis deduced from design theory; we reveal unexpected conditions on the knowledge structure required for generativity and show that the structure is different from the knowledge structure and design process of engineering systematic design and show that the conditions required for generativity, which can appear as a limit on generativity, can also be positively interpreted. The example of Bauhaus shows that enabling a splitting condition is a powerful way to increase designers’ generativity.  相似文献   
45.
This paper proposes to decompose the nonlinear dynamic of a chaotic system with Chebyshev polynomials to improve performances of its estimator. More widely than synchronization of chaotic systems, this algorithm is compared to other nonlinear stochastic estimator such as Extended Kalman Filter (EKF) and Unscented Kalman Filter (UKF). Chebyshev polynomials orthogonality properties is used to fit a polynomial to a nonlinear function. This polynomial is then used in an Exact Polynomial Kalman Filter (ExPKF) to run real time state estimation. The ExPKF offers mean square error optimality because it can estimate exact statistics of transformed variables through the polynomial function. Analytical expressions of those statistics are derived so as to lower ExPKF algorithm computation complexity and allow real time applications. Simulations under the Additive White Gaussian Noise (AWGN) hypothesis, show relevant performances of this algorithm compared to classical nonlinear estimators.  相似文献   
46.
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and authorization technologies is presented. Related to this, recent developments in Grid authentication and authorization infrastructures suggest adoption of the Shibboleth technology which offers advantages in terms of usability, confidentiality, scalability and manageability. When combined with advanced authorization technologies, Shibboleth-based authentication and authorization infrastructures provide role-based, fine-grained authorization. We share our experience in constructing a Shibboleth-based authentication and authorization infrastructure and believe that such infrastructure provides a promising solution for the security of many application domains.  相似文献   
47.
The finite element method is coupled with the topology gradient (TG) and level‐set (LS) methods for optimizing the shape of microwave components using a computer‐aided design model. On the one hand, the LS approach is based on the classical shape derivative; while on the other hand, the TG method is precisely designed for introducing new perturbations in the optimization domain. These two approaches, which consist in minimizing a cost function related to the component behavior, are first described. Regarding given electrical specifications, these techniques are applied to optimize the distribution of ceramic parts of a dual‐mode resonator in order to improve its behavior. The optimized dielectric resonators result in a wide spurious‐free stop band. A comparison between classical and optimized dual mode resonator is presented. Theoretical results are then validated by careful measurements. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE 2010.  相似文献   
48.
49.
Motion study of the hip joint in extreme postures   总被引:2,自引:0,他引:2  
Many causes can be at the origin of hip osteoarthritis (e.g., cam/pincer impingements), but the exact pathogenesis for idiopathic osteoarthritis has not yet been clearly delineated. The aim of the present work is to analyze the consequences of repetitive extreme hip motion on the labrum cartilage. Our hypothesis is that extreme movements can induce excessive labral deformations and lead to early arthritis. To verify this hypothesis, an optical motion capture system is used to estimate the kinematics of patient-specific hip joint, while soft tissue artifacts are reduced with an effective correction method. Subsequently, a physical simulation system is used during motion to compute accurate labral deformations and to assess the global pressure of the labrum, as well as any local pressure excess that may be physiologically damageable. Results show that peak contact pressures occur at extreme hip flexion/abduction and that the pressure distribution corresponds with radiologically observed damage zones in the labrum.
Nadia Magnenat-ThalmannEmail:
  相似文献   
50.
We present a Hoare logic for proving semantic security and determining exact security bounds of a block cipher mode of operation. We propose a simple yet expressive programming language to specify encryption modes, semantic functions for each command (statement) in the language, an assertion language that allows to state predicates and axioms, and rules to propagate the predicates through the commands of a program. We also provide heuristics for finding loop invariants that are necessary for the application of our rule on for-loops. This enables us to prove the security of protocols that take arbitrary length messages as input. We implemented a prototype that uses this logic to automatically prove the security of block cipher modes of operation. This prototype can prove the security of many standard modes of operation, such as Cipher Block Chaining (CBC), Cipher FeedBack mode (CFB), Output FeedBack (OFB), and CounTeR mode (CTR).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号