首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2879篇
  免费   175篇
  国内免费   5篇
电工技术   36篇
化学工业   757篇
金属工艺   67篇
机械仪表   69篇
建筑科学   65篇
矿业工程   4篇
能源动力   95篇
轻工业   395篇
水利工程   22篇
石油天然气   21篇
无线电   244篇
一般工业技术   568篇
冶金工业   341篇
原子能技术   13篇
自动化技术   362篇
  2023年   30篇
  2022年   130篇
  2021年   133篇
  2020年   75篇
  2019年   84篇
  2018年   95篇
  2017年   79篇
  2016年   93篇
  2015年   87篇
  2014年   114篇
  2013年   176篇
  2012年   183篇
  2011年   218篇
  2010年   158篇
  2009年   161篇
  2008年   153篇
  2007年   125篇
  2006年   106篇
  2005年   79篇
  2004年   80篇
  2003年   65篇
  2002年   61篇
  2001年   42篇
  2000年   32篇
  1999年   46篇
  1998年   103篇
  1997年   75篇
  1996年   51篇
  1995年   48篇
  1994年   30篇
  1993年   26篇
  1992年   11篇
  1991年   12篇
  1990年   6篇
  1989年   15篇
  1988年   11篇
  1987年   9篇
  1986年   8篇
  1985年   8篇
  1984年   6篇
  1983年   4篇
  1982年   5篇
  1981年   4篇
  1980年   8篇
  1979年   1篇
  1978年   2篇
  1976年   7篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
排序方式: 共有3059条查询结果,搜索用时 15 毫秒
51.
Mattei GO  Gil MA 《Applied optics》1994,33(22):5187-5191
The influence that the width of an intermediate slit has on the incoherent modulation optical transfer function of two identical systems coupled by a slit placed in the image plane of the first system is studied. The special case of a double-pass parabolized Ebert monochromator is considered in detail.  相似文献   
52.
Knowledge and Information Systems - In the era of massive sharing of information, the term social provenance is used to denote the ownership, source or origin of a piece of information which has...  相似文献   
53.
54.
In order to find out biochemical markers for the botanical origin of heather (Erica) honey, the phenolic metabolites present in heather floral nectar, collected from the honey-stomach of bees gathering nectar from these flowers, were analysed. The flavonoid fraction of nectar contained four main flavonoids. Two of them were quercetin and kaempferol 3-rhamnosides, and the other two were tentatively identified as myricetin 3-methyl ether and isorhamnetin 3-rhamnosides. Since the natural glycosides are hydrolysed by bee enzymes to render the corresponding aglycones, which are the metabolites detected in honey, acid hydrolysis of the nectar glycosides was achieved. The aglycones quercetin, myricetin 3-methyl ether, kaempferol and isorhamnetin were identified, as well as the gallic acid derivative ellagic acid. The analysis of Portuguese heather honey samples showed that ellagic acid was present in all the samples in significant amounts ranging between 100 g and 600 g per 100 g honey. The other nectar-derived flavonoids were also present, although some of them in very variable amounts. Ellagic acid and myricetin 3-methyl ether, which have not been detected in any of the monofloral honey samples investigated so far, with the only exception being a French honey sample of the botanically relatedCalluna (Ericaceae) which also contained ellagic acid, seem to be the most useful potential markers for the floral origin of heather honey. However, more detailed and extensive investigations are needed to prove the utility of these markers.  相似文献   
55.
56.
In this paper we present a hybrid reactive/deliberative approach to the multi-robot integrated exploration problem. In contrast to other works, the design of the reactive and deliberative processes is exclusively oriented to the exploration having both the same importance level. The approach is based on the concepts of expected safe zone and gateway cell. The reactive exploration of the expected safe zone of the robot by means of basic behaviours avoids the presence of local minima. Simultaneously, a planner builds up a decision tree in order to decide between exploring the current expected safe zone or changing to other zone by means of travelling to a gateway cell. Furthermore, the model takes into account the degree of localization of the robots to return to previously explored areas when it is necessary to recover the certainty in the position of the robots. Several simulations demonstrate the validity of the approach.  相似文献   
57.
Policy integration and inter-operation is often a crucial requirement when parties with different access control policies need to participate in collaborative applications and coalitions. Such requirement is even more difficult to address for dynamic large-scale collaborations, in which the number of access control policies to analyze and compare can be quite large. An important step in policy integration and inter-operation is to analyze the similarity of policies. Policy similarity can sometimes also be a pre-condition for establishing a collaboration, in that a party may enter a collaboration with another party only if the policies enforced by the other party match or are very close to its own policies. Existing approaches to the problem of analyzing and comparing access control policies are very limited, in that they only deal with some special cases. By recognizing that a suitable approach to the policy analysis and comparison requires combining different approaches, we propose in this paper a comprehensive environment—EXAM. The environment supports various types of analysis query, which we categorize in the paper. A key component of such environment, on which we focus in the paper, is the policy analyzer able to perform several types of analysis. Specifically, our policy analyzer combines the advantages of existing MTBDD-based and SAT-solver-based techniques. Our experimental results, also reported in the paper, demonstrate the efficiency of our analyzer.  相似文献   
58.
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of conditional purpose-based access control model is defined and investigated through dynamic roles. Access purpose is verified in a dynamic behavior, based on subject attributes, context attributes and authorization policies. Intended purposes are dynamically associated with the requested data object during the access decision. An algorithm is developed to achieve the compliance computation between access purposes and intended purposes and is illustrated with Role-based access control (RBAC) in a dynamic manner to support conditional purpose-based access control. According to this model, more information from data providers can be extracted while at the same time assuring privacy that maximizes the usability of consumers’ data. It extends traditional access control models to a further coverage of privacy preserving in data mining atmosphere. The structure helps enterprises to circulate clear privacy promise, to collect and manage user preferences and consent.  相似文献   
59.
We address the self-calibration of a smooth generic central camera from only two dense rotational flows produced by rotations of the camera about two unknown linearly independent axes passing through the camera centre. We give a closed-form theoretical solution to this problem, and we prove that it can be solved exactly up to a linear orthogonal transformation ambiguity. Using the theoretical results, we propose an algorithm for the self-calibration of a generic central camera from two rotational flows.  相似文献   
60.
Many applications require teams of robots to cooperatively execute tasks. Among these domains are those in which successful coordination must respect intra-path constraints, which are constraints that occur on the paths of agents and affect route planning. This work focuses on multi-agent coordination for disaster response with intra-path precedence constraints, a compelling application that is not well addressed by current coordination methods. In this domain a group of fire truck agents attempt to address fires spread throughout a city in the wake of a large-scale disaster. The disaster has also caused many city roads to be blocked by impassable debris, which can be cleared by bulldozer robots. A high-quality coordination solution must determine not only a task allocation but also what routes the fire trucks should take given the intra-path precedence constraints and which bulldozers should be assigned to clear debris along those routes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号