首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5565篇
  免费   277篇
  国内免费   53篇
电工技术   78篇
综合类   13篇
化学工业   1158篇
金属工艺   126篇
机械仪表   164篇
建筑科学   121篇
矿业工程   29篇
能源动力   296篇
轻工业   463篇
水利工程   59篇
石油天然气   42篇
无线电   635篇
一般工业技术   1259篇
冶金工业   545篇
原子能技术   66篇
自动化技术   841篇
  2024年   24篇
  2023年   117篇
  2022年   287篇
  2021年   437篇
  2020年   263篇
  2019年   295篇
  2018年   312篇
  2017年   268篇
  2016年   260篇
  2015年   174篇
  2014年   222篇
  2013年   429篇
  2012年   257篇
  2011年   286篇
  2010年   190篇
  2009年   162篇
  2008年   151篇
  2007年   136篇
  2006年   117篇
  2005年   85篇
  2004年   65篇
  2003年   80篇
  2002年   61篇
  2001年   52篇
  2000年   50篇
  1999年   66篇
  1998年   154篇
  1997年   128篇
  1996年   98篇
  1995年   73篇
  1994年   61篇
  1993年   56篇
  1992年   36篇
  1991年   43篇
  1990年   36篇
  1989年   31篇
  1988年   25篇
  1987年   29篇
  1986年   34篇
  1985年   32篇
  1984年   26篇
  1983年   29篇
  1982年   13篇
  1981年   13篇
  1980年   11篇
  1978年   16篇
  1977年   17篇
  1976年   23篇
  1973年   8篇
  1972年   8篇
排序方式: 共有5895条查询结果,搜索用时 0 毫秒
71.
Detection of rapidly evolving malware requires classification techniques that can effectively and efficiently detect zero-day attacks. Such detection is based on a robust model of benign behavior and deviations from that model are used to detect malicious behavior. In this paper we propose a low-complexity host-based technique that uses deviations in static file attributes to detect malicious executables. We first develop simple statistical models of static file attributes derived from the empirical data of thousands of benign executables. Deviations among the attribute models of benign and malware executables are then quantified using information-theoretic (Kullback-Leibler-based) divergence measures. This quantification reveals distinguishing attributes that are considerably divergent between benign and malware executables and therefore can be used for detection. We use the benign models of divergent attributes in cross-correlation and log-likelihood frameworks to classify malicious executables. Our results, using over 4,000 malicious file samples, indicate that the proposed detector provides reasonably high detection accuracy, while having significantly lower complexity than existing detectors.  相似文献   
72.
The paper examines prospective memory (ProM) in programmer multitasking and reports administration of a naturalistic atypical action. The study emphasizes on how attention, time orientation, and expertise affect ProM performance in multitasking among a group of computer science and engineering students (N=108). The results suggest that attention play a crucial role in multitasking and ProM performance with respect to whether or not a word display requires more attention to be devoted in monitoring and identifying it for an appropriate action. Polychrons exhibit lesser degree of ProM performance failure than monochrons whereas expertise does not have an effect. Finally, results show that out of overall ProM performance failure, habit intrusion errors comprise of 16.22% occurring 1.75 times in every 10 valid click responses of ProM task. Moreover, experts demonstrate a superior performance over novices in programming.  相似文献   
73.
With growing interest in extending GIS to support multi-criteria decision-making (MCDM) methods, enhancing GIS-based MCDM with sensitivity analysis (SA) procedures is crucial to understand the model behavior and its limitations. This paper presents a novel approach of examining multi-criteria weight sensitivity of a GIS-based MCDM model. It explores the dependency of model output on the weights of input parameters, identifying criteria that are especially sensitive to weight changes and to show the impacts of changing criteria weights on the model outcomes in spatial dimension. A methodology was developed to perform simulations where the weights associated with all criteria used for suitability modelling were varied one-at-a-time (OAT) to investigate their relative impacts on the final evaluation results. A tool which incorporates the OAT method with the Analytical Hierarchy Process (AHP) within the ArcGIS environment was implemented. It permits a range of user defined simulations to be performed to quantitatively evaluate model dynamic changes, measures the stability of results with respect to the variation of different parameter weights, and displays spatial change dynamics. A case study of irrigated cropland suitability assessment addressing the application of the new GIS-based AHP-SA tool is described. It demonstrates that the tool is spatial, simple and flexible.  相似文献   
74.
The aim of the study was to examine the pattern of the change in discomfort for combined wrist deviation and forearm rotation as joint angles increased away from neutral in a repetitive task. There were five levels of wrist deviation (neutral, 35% and 55% of the range of motion (ROM) in radial and ulnar deviation) and five levels of forearm rotation (neutral, 30% and 60% of the ROM in pronation and supination). Twenty-five participants performed a repetitive flexion task with a force of 10 N +/- 1 N at a frequency of 15 exertions per min, with replication after 1 week for six of the participants. A visual analogue scale was used for recording the discomfort scores. Repeated measures analysis of covariance with the Greenhouse-Geisser correction, where necessary, was used on transformed values of the discomfort scores. Grip test endurance time at 50% of maximum voluntary contraction was included as a covariate. Wrist deviation (p = 0.007) and forearm rotation (p = 0.001) were found to have significant effects. Interactions of the main factors were not significant and nor was the covariate. Quadratic regression equations were derived and were used to generate iso-discomfort contours, which show a useful area of low discomfort around the central neutral zone of wrist postures, but with steep increases in discomfort at the extreme combinations of wrist ulnar/radial deviation with forearm pronation/supination. Discomfort equations and contours, showing wrist and forearm postures, which are either acceptable or potentially injurious, are useful for the design of industrial tools, machine controls and workspaces. Reference to these can help to reduce the risk of musculoskeletal injury associated with the tasks or tools by avoiding poor postures with unacceptable deviations from neutral posture.  相似文献   
75.
Driven by the emergence of mobile and pervasive computing there is a growing demand for context‐aware software systems that can dynamically adapt to their run‐time environment. We present the results of project MADAM that has delivered a comprehensive solution for the development and operation of context‐aware, self‐adaptive applications. The main contributions of MADAM are (a) a sophisticated middleware that supports the dynamic adaptation of component‐based applications, and (b) an innovative model‐driven development methodology that is based on abstract adaptation models and corresponding model‐to‐code transformations. MADAM has demonstrated the viability of a general, integrated approach to application‐level adaptation. We discuss our experiences with two real‐world case studies that were built using the MADAM approach. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   
76.
Numerical modelling of the deformation of a polymer using the finite elements method in axisymetrical mode was performed using the LsDyna® software to describe the filling of micro-cavities during the forming process of the material using the hot embossing. These simulations firstly allow verifying whether the chosen forming process conditions promote or not an optimized filling of the superficial cavities in order to achieve precise replicas which best reproduce the superficial topography of the mould. The simulations were carried out to evaluate the filling of the cavities taking into account the mechanical behaviour of the selected polymer into the model. Moreover, these models were developed to verify the effect of the distribution of the mould cavities on their filling. The influence of the mobility of non deformable rigid plates on the filling of the cavities represents an auxiliary variable. In the approach presented, the compression plates are assumed to be parallel and non deformable, whereas the polymer disk follows a rubbery behaviour around a temperature equal to 140°C. Globally the modelling results are satisfactory for they are rather close to the experimental observations conducted. In summary, the effect of the normal stress as also the distribution of micro-cavities at the mould surface seem to prevail in the case of the forming process by hot embossing.  相似文献   
77.
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of ICT resource capacities (e.g., network bandwidth, processing speed, response time, etc.). Several recent papers have tried to address the issue of improving energy efficiency in allocating cloud resources to applications with varying degree of success. However, to the best of our knowledge there is no published literature on this subject that clearly articulates the research problem and provides research taxonomy for succinct classification of existing techniques. Hence, the main aim of this paper is to identify open challenges associated with energy efficient resource allocation. In this regard, the study, first, outlines the problem and existing hardware and software-based techniques available for this purpose. Furthermore, available techniques already presented in the literature are summarized based on the energy-efficient research dimension taxonomy. The advantages and disadvantages of the existing techniques are comprehensively analyzed against the proposed research dimension taxonomy namely: resource adaption policy, objective function, allocation method, allocation operation, and interoperability.  相似文献   
78.
Wind energy has emerged as a strong alternative to fossil fuels for power generation. To generate this energy, wind turbines are placed in a wind farm. The extraction of maximum energy from these wind farms requires optimal placement of wind turbines. Due to complex nature of micrositing of wind turbines, the wind farm layout design problem is considered a complex optimization problem. In the recent past, various techniques and algorithms have been developed for optimization of energy output from wind farms. The present study proposes an optimization approach based on the cuckoo search (CS) algorithm, which is relatively a recent technique. A variant of CS is also proposed that incorporates a heuristic-based seed solution for a better performance. The proposed CS algorithms are compared with genetic and particle swarm optimization (PSO) algorithms, which have been extensively applied to wind farm layout design. Empirical results indicate that the proposed CS algorithms outperformed the genetic and PSO algorithms for the given test scenarios in terms of yearly power output and efficiency.  相似文献   
79.
This paper mainly addresses formation control problem of non-holonomic systems in an optimized manner. Instead of using linearization to solve this problem approximately, we designed control laws with guaranteed global convergence by leveraging nonlinear transformations. Under this nonlinear transformation, consensus of non-holonomic robots can be converted into a stabilization problem, to which optimal treatment applies. This concept is then extended to the formation control and tracking problem for a team of robots following leader-follower strategy. A trajectory generator prescribes the feasible motion of virtual reference robot, a decentralized control law is used for each robot to track the reference while maintaining the formation. The asymptotic convergence of follower robots to the position and orientation of the reference robot is ensured using the Lyapunov function which is also generated using chained form differential equations. In order to witness the efficacy of the scheme, simulations results are presented for Unicycle and Car-like robots.  相似文献   
80.
In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号