首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3128篇
  免费   97篇
  国内免费   17篇
电工技术   57篇
综合类   4篇
化学工业   688篇
金属工艺   102篇
机械仪表   70篇
建筑科学   45篇
矿业工程   1篇
能源动力   171篇
轻工业   141篇
水利工程   36篇
石油天然气   21篇
无线电   352篇
一般工业技术   796篇
冶金工业   308篇
原子能技术   16篇
自动化技术   434篇
  2023年   40篇
  2022年   86篇
  2021年   119篇
  2020年   89篇
  2019年   81篇
  2018年   111篇
  2017年   107篇
  2016年   94篇
  2015年   68篇
  2014年   105篇
  2013年   204篇
  2012年   129篇
  2011年   170篇
  2010年   133篇
  2009年   151篇
  2008年   125篇
  2007年   104篇
  2006年   85篇
  2005年   80篇
  2004年   63篇
  2003年   59篇
  2002年   57篇
  2001年   47篇
  2000年   46篇
  1999年   42篇
  1998年   76篇
  1997年   65篇
  1996年   48篇
  1995年   47篇
  1994年   48篇
  1993年   45篇
  1992年   27篇
  1991年   36篇
  1990年   35篇
  1989年   27篇
  1988年   27篇
  1987年   25篇
  1986年   21篇
  1985年   38篇
  1984年   37篇
  1983年   21篇
  1982年   24篇
  1981年   20篇
  1980年   24篇
  1979年   15篇
  1978年   14篇
  1977年   20篇
  1976年   26篇
  1975年   11篇
  1973年   16篇
排序方式: 共有3242条查询结果,搜索用时 9 毫秒
51.
Anonymizing bipartite graph data using safe groupings   总被引:1,自引:0,他引:1  
Private data often come in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a large, sparse bipartite graph. As with tabular data, it is desirable to be able to publish anonymized versions of such data, to allow others to perform ad hoc analysis of aggregate graph properties. However, existing tabular anonymization techniques do not give useful or meaningful results when applied to graphs: small changes or masking of the edge structure can radically change aggregate graph properties. We introduce a new family of anonymizations for bipartite graph data, called (k, ℓ)-groupings. These groupings preserve the underlying graph structure perfectly, and instead anonymize the mapping from entities to nodes of the graph. We identify a class of “safe” (k, ℓ)-groupings that have provable guarantees to resist a variety of attacks, and show how to find such safe groupings. We perform experiments on real bipartite graph data to study the utility of the anonymized version, and the impact of publishing alternate groupings of the same graph data. Our experiments demonstrate that (k, ℓ)-groupings offer strong tradeoffs between privacy and utility.  相似文献   
52.
A dynamical model is proposed to study self-diffusion coefficient by confining the fluid in rectangular nanotube. The theoretical model is based on the consideration that the confinement affects the movement at atomic level. The model predicts that the diffusion parallel to walls of channel is different from that of diffusion perpendicular to the walls. Near the walls the dynamics of fluid has been found to slow down to an extent that below a certain value of ratio of width to the diameter of particle, the molecules behave as if these belong to solid. The results are contrasted with the result obtained from the model based on similar considerations for a fluid confined only in one direction. It is found that tendency of freezing near the wall increases due to confinement from second direction. Empirical relation which governs the behavior of diffusion coefficient as function of distance from the confining walls has also been proposed. The effect of confinement is more pronounced for denser fluids than for dilute fluid.  相似文献   
53.
基于SIMD指令的柔性物体并行碰撞检测   总被引:2,自引:0,他引:2  
复杂场景中柔性物体间的碰撞检测依然难以满足交互设计的要求.为了提高处理速度,文中给出了一种充分利用现代CPU的并行处理能力的碰撞检测算法.算法基于两方面的并行处理:即基于SIMD指令的指令级并行处理和基于多线程的任务级并行处理.算法给出了一种针对SIMD指令特别优化的k-DOP模型--SIMD-DOP,从理论上分析了该包围盒的高效性,并与常规的16-DOP和24-DOP进行了运行效率对比.通过使用SIMD-DOP同时在多核间进行负载均衡,算法获得了优化的并行加速.文中算法已经在一台16核工作站上针对一组复杂测试场景进行了验证.  相似文献   
54.
Determination of the thermo-mechanical structure of the crust for seismically active regions using available geophysical and geological data is of great importance. The most important feature of the intraplate earthquakes in the Indian region are that the seismicity occurs within the entire crust. In Latur region of India an earthquake occurred in the upper crust. In such situations, quantifying the uncertainties in seismogenic depths becomes very important. The stochastic heat conduction equation has been solved for different sets of boundary conditions, an exponentially decreasing radiogenic heat generation and randomness in thermal conductivity. Closed form analytical expressions for mean and variance in the temperature depth distribution have been used and an automatic formulation has been developed in Matlab for computing and plotting the thermal structure. The Matlab toolbox presented allows us to display the controlling thermal parameters on the screen directly, and plot the subsurface thermal structure along with its error bounds. The software can be used to quantify the thermal structure for any given region and is applied here to the Latur earthquake region of India.  相似文献   
55.
The scientific approach to understand the nature of consciousness revolves around the study of the human brain. Neurobiological studies that compare the nervous system of different species have accorded the highest place to humans on account of various factors that include a highly developed cortical area comprising of approximately 100 billion neurons, that are intrinsically connected to form a highly complex network. Quantum theories of consciousness are based on mathematical abstraction and the Penrose–Hameroff Orch-OR theory is one of the most promising ones. Inspired by the Penrose–Hameroff Orch-OR theory, Behrman et al. have simulated a quantum Hopfield neural network with the structure of a microtubule. They have used an extremely simplified model of the tubulin dimers with each dimer represented simply as a qubit, a single quantum two-state system. The extension of this model to n-dimensional quantum states or n-qudits presented in this work holds considerable promise for even higher mathematical abstraction in modelling consciousness systems.  相似文献   
56.
In this study, novel designs of single‐band and tri‐band pattern reconfigurable antennas are proposed. The design of single‐band pattern reconfigurable antenna is accomplished by the use of varactor diodes with the parasitic elements placed on both sides of the driven conventional printed dipole antenna. By tuning the capacitance of varactor, the antenna operates in four different configurations of radiation pattern which include bi‐directional end‐fire, broadside, and uni‐directional end‐fire radiation patterns. The tri‐band pattern reconfigurable antenna design is achieved by the use of parasitic elements on both sides of a tri‐band driven dipole antenna. Dual‐band LC resonators are used as loading elements along the arms of printed dipole to get two lower order modes in addition to the reference dipole mode, resulting in a triband operation of the driven element. The electrical lengths of the parasitic elements with respect to the tri‐band driven element are controlled by suitably embedding varactor and PIN diodes with them. The proposed tri‐band antenna operates in ten different configurations of radiation patterns in the three operating bands. Fully functional prototypes of single‐band and tri‐band pattern reconfigurable antennas along with the DC bias networks have been fabricated to validate the results obtained in simulation.  相似文献   
57.
Multimedia Tools and Applications - In this paper, a blind image watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed. In this scheme,...  相似文献   
58.
Constructing plans that can handle multiple problem instances is a longstanding open problem in AI. We present a framework for generalized planning that captures the notion of algorithm-like plans and unifies various approaches developed for addressing this problem. Using this framework, and building on the TVLA system for static analysis of programs, we develop a novel approach for computing generalizations of classical plans by identifying sequences of actions that will make measurable progress when placed in a loop. In a wide class of problems that we characterize formally in the paper, these methods allow us to find generalized plans with loops for solving problem instances of unbounded sizes and also to determine the correctness and applicability of the computed generalized plans. We demonstrate the scope and scalability of the proposed approach on a wide range of planning problems.  相似文献   
59.
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.  相似文献   
60.
This paper proposes an invariance based recognition scheme for scenes with multiple repeated components. The scheme considers three component subsets which characterize the scene completely. Each such three component subset is reconstructed using single image based information. We have developed a mathematical framework for the projective reconstruction based on relative affine structure of each such three component building block. This is extended to the case when each of the components is a quadric. A set of projective invariants of three quadrics has also been obtained by us. Although the reconstruction scheme is general and applicable to all multiple repeated components, it requires the computation of infinite homography. The infinite homography and hence the reconstruction scheme are only image computable with the given information in the case of translational repetition. We therefore develop a recognition strategy for the specific case of translationally repeated quadrics. As a recognition strategy for scenes with multiple translationally repeated quadric components, we propose to compute and store invariant values for each such three component subsets. Experiments on real data have shown the applicability of this approach for recognition of aerial images of power plants. The discriminatory power of the invariants and the stability of the recognition results have also been experimentally demonstrated.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号