首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10256篇
  免费   629篇
  国内免费   18篇
电工技术   132篇
综合类   4篇
化学工业   2914篇
金属工艺   165篇
机械仪表   287篇
建筑科学   468篇
矿业工程   27篇
能源动力   409篇
轻工业   1509篇
水利工程   103篇
石油天然气   78篇
无线电   669篇
一般工业技术   1529篇
冶金工业   463篇
原子能技术   59篇
自动化技术   2087篇
  2024年   32篇
  2023年   139篇
  2022年   381篇
  2021年   467篇
  2020年   306篇
  2019年   360篇
  2018年   407篇
  2017年   401篇
  2016年   450篇
  2015年   320篇
  2014年   471篇
  2013年   867篇
  2012年   688篇
  2011年   848篇
  2010年   592篇
  2009年   633篇
  2008年   544篇
  2007年   472篇
  2006年   383篇
  2005年   284篇
  2004年   236篇
  2003年   238篇
  2002年   211篇
  2001年   121篇
  2000年   115篇
  1999年   105篇
  1998年   92篇
  1997年   96篇
  1996年   79篇
  1995年   71篇
  1994年   57篇
  1993年   44篇
  1992年   40篇
  1991年   34篇
  1990年   27篇
  1989年   35篇
  1988年   29篇
  1987年   19篇
  1986年   16篇
  1985年   23篇
  1984年   18篇
  1983年   16篇
  1982年   17篇
  1981年   13篇
  1980年   16篇
  1979年   13篇
  1978年   22篇
  1977年   9篇
  1976年   13篇
  1975年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
In this paper, we study the sensitivity of centrality metrics as a key metric of social networks to support visual reasoning. As centrality represents the prestige or importance of a node in a network, its sensitivity represents the importance of the relationship between this and all other nodes in the network. We have derived an analytical solution that extracts the sensitivity as the derivative of centrality with respect to degree for two centrality metrics based on feedback and random walks. We show that these sensitivities are good indicators of the distribution of centrality in the network, and how changes are expected to be propagated if we introduce changes to the network. These metrics also help us simplify a complex network in a way that retains the main structural properties and that results in trustworthy, readable diagrams. Sensitivity is also a key concept for uncertainty analysis of social networks, and we show how our approach may help analysts gain insight on the robustness of key network metrics. Through a number of examples, we illustrate the need for measuring sensitivity, and the impact it has on the visualization of and interaction with social and other scale-free networks.  相似文献   
42.
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS).  相似文献   
43.
Spam has become a major issue in computer security because it is a channel for threats such as computer viruses, worms, and phishing. More than 86% of received e-mails are spam. Historical approaches to combating these messages, including simple techniques such as sender blacklisting or the use of e-mail signatures, are no longer completely reliable. Many current solutions feature machine-learning algorithms trained using statistical representations of the terms that most commonly appear in such e-mails. However, these methods are merely syntactic and are unable to account for the underlying semantics of terms within messages. In this paper, we explore the use of semantics in spam filtering by introducing a pre-processing step of Word Sense Disambiguation (WSD). Based upon this disambiguated representation, we apply several well-known machine-learning models and show that the proposed method can detect the internal semantics of spam messages.  相似文献   
44.
In response to K. Danzinger's (see record 1986-00068-001) suggestion that the first use of the term subject in the English-language psychological literature occurred in 1886 in the context of experiments involving the hypnotic state, the present author points out that there are examples of the use of the term in discussions of experiments on thought transference published by the Society for Psychical Research in the 1880's. (8 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
45.
In the study of mass transfer between partially miscible liquids, temperature perturbations have been found to have an important effect in the generation of interfacial activity. Micro- and macro-generated interfacial convection usually occurs in combination with one another even in fairly simple heat or mass transfer events. These combinations are responsible for the enhancement of mass transfer rates. In an effort to acquire a better understanding of the heat transfer effects in ternary liquid-liquid systems, temperature difference profiles were measured when contacting two partially miscible phases. A vertical and a rotational transfer cell were designed to contact the partially miscible phases without inducing external disturbances. Five thermocouples were immersed in the bottom liquid phase at predetermined positions below the interface. In order to understand the influence of the convection generated, the vertical cell was designed to hinder convection in one phase, while the rotational cell permits convection in both phases. The experimental results showed larger temperature differences in the rotational cell after the contact of the phases. Also, systems which were initially unsaturated presented larger heat effects than those in which the partially miscible solvents were initially saturated. Several parameters indicating the importance of heat effects in the ternary systems studied are reported.  相似文献   
46.
This paper addresses the problem of designing controllers that are robust to a great uncertainty in a time constant of the plant. Plants must be represented by minimum phase rational transfer functions of an arbitrary order. The design specifications are: (1) a phase margin for the nominal plant, (2) a gain crossover frequency for the nominal plant, (3) zero steady state error to step commands, and (4) a constant phase margin for all the possible values of the time constant (TT): 0<T<∞0<T<. We propose a theorem that defines the structure of the set of controllers that fulfil these specifications and show that it is necessary for these robust controllers to include a fractional-order PIPI term. Examples are developed for both stable and unstable plants, and the results are compared with a standard PIPI controller and a robust controller designed using the QFTQFT methodology.  相似文献   
47.
While it is possible to analyze the run-time behavior of a business process through process mining techniques, in practice there is often a gap between the low-level nature of the events recorded in an event log and the high-level of abstraction at which the process is modeled. This makes it difficult to understand the recorded behavior in terms of the high-level activities in the process model. Also, it makes it difficult to improve the model based on run-time data about the process. In this work we present an approach to mine mappings between the events in the log and the activities in the model. These mappings can be used to generate suggestions of how the process model can be extended in order to capture the behavior recorded in the event log. Using a real-world and publicly available event log, we show how the approach can improve the model in a stepwise manner, until it covers all the behavior recorded in the event log.  相似文献   
48.
A series of fracture mechanics tests of a set of random and impact copolymers of polypropylene, in which the ethylene content was varied, is described. The plane strain toughness is found to change from the homopolymer value, but thereafter to be independent of ethylene content. The yield stress of the impact copolymers decreases markedly with ethylene content, while that for random copolymers increases only slightly. This is reflected in toughness values in tension. A comparison with the behavior of other rubber-modified materials is made and it is concluded that crazing is an important mechanism in polypropylene and is perhaps more rate and temperature sensitive than in acrylonitrile-butadiene-styrene (ABS).  相似文献   
49.
Sensor Web Enablement (SWE) technologies have been successfully applied to a great variety of outdoor scenarios but, in practical terms, little effort has been applied for indoor environments, and even less in the field of industrial applications. This article presents an intelligent SWE application for an indoor and industrial scenario, with the aim of improving and increasing the levels of human safety. The base low-level architecture is built on top of wireless sensor networks (WSN) connected to a Sensor Observation Service (SOS). Higher layers in the architecture include services that make real time decisions based on the collected data. Both simulation and experimental results are presented. The paper shows the viability of our approach in terms of performance, scalability, modularity and safety.  相似文献   
50.
The exponential growth of Internet during the last decade leads us to make more efforts in the researching and developing of sustainable Web servers in order to decrease the global energy demand. In this paper, we cover, as a first step, a proper review of the literature related to the energy efficiency research in Web server systems to depict the state of the art to plan further contributions as more research in sustainable Web systems. We also propose and implement an energy metric that permits to establish a relation between the Quality of Service (QoS) obtained by the system and the power it consumes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号