首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1101篇
  免费   98篇
  国内免费   1篇
电工技术   10篇
综合类   4篇
化学工业   339篇
金属工艺   16篇
机械仪表   13篇
建筑科学   40篇
矿业工程   8篇
能源动力   33篇
轻工业   198篇
水利工程   13篇
石油天然气   2篇
无线电   58篇
一般工业技术   152篇
冶金工业   110篇
原子能技术   9篇
自动化技术   195篇
  2024年   3篇
  2023年   16篇
  2022年   40篇
  2021年   53篇
  2020年   37篇
  2019年   36篇
  2018年   32篇
  2017年   46篇
  2016年   42篇
  2015年   51篇
  2014年   47篇
  2013年   79篇
  2012年   66篇
  2011年   88篇
  2010年   56篇
  2009年   67篇
  2008年   42篇
  2007年   41篇
  2006年   32篇
  2005年   31篇
  2004年   25篇
  2003年   12篇
  2002年   15篇
  2001年   12篇
  2000年   9篇
  1999年   8篇
  1998年   30篇
  1997年   20篇
  1996年   21篇
  1995年   18篇
  1994年   14篇
  1993年   14篇
  1992年   14篇
  1990年   9篇
  1989年   6篇
  1988年   10篇
  1987年   10篇
  1986年   4篇
  1985年   3篇
  1984年   6篇
  1983年   7篇
  1982年   2篇
  1979年   3篇
  1978年   6篇
  1977年   2篇
  1976年   2篇
  1975年   4篇
  1974年   2篇
  1971年   1篇
  1970年   1篇
排序方式: 共有1200条查询结果,搜索用时 140 毫秒
21.
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference.  相似文献   
22.
23.

Optimization problems in software engineering typically deal with structures as they occur in the design and maintenance of software systems. In model-driven optimization (MDO), domain-specific models are used to represent these structures while evolutionary algorithms are often used to solve optimization problems. However, designing appropriate models and evolutionary algorithms to represent and evolve structures is not always straightforward. Domain experts often need deep knowledge of how to configure an evolutionary algorithm. This makes the use of model-driven meta-heuristic search difficult and expensive. We present a graph-based framework for MDO that identifies and clarifies core concepts and relies on mutation operators to specify evolutionary change. This framework is intended to help domain experts develop and study evolutionary algorithms based on domain-specific models and operators. In addition, it can help in clarifying the critical factors for conducting reproducible experiments in MDO. Based on the framework, we are able to take a first step toward identifying and studying important properties of evolutionary operators in the context of MDO. As a showcase, we investigate the impact of soundness and completeness at the level of mutation operator sets on the effectiveness and efficiency of evolutionary algorithms.

  相似文献   
24.
Hub location problems deal with finding the location of hub facilities and with the allocation of demand nodes to these located hub facilities. In this paper, we study the single allocation hub covering problem over incomplete hub networks and propose an integer programming formulation to this end. The aim of our model is to find the location of hubs, the hub links to be established between the located hubs, and the allocation of non-hub nodes to the located hub nodes such that the travel time between any origin–destination pair is within a given time bound. We present an efficient heuristic based on tabu search and test the performance of our heuristic on the CAB data set and on the Turkish network.  相似文献   
25.
This paper responds to the recent call for understanding the nature and consequences of the digital mediation of everyday experiences. We do so in the context of online opinion sharing. We propose that the unique design features of mobile computing devices and the intention and purpose of their users, meld into a technology affordance we label: Triggered essential reviewing. We empirically investigate the effect of this technology affordance on opinion characteristics (i.e., timing and length), and outcomes (i.e., opinion valence and content). We find that triggered essential reviewing engenders opinions that cover a narrower range of aspects of the experience and that it produces a negative evaluative bias—a bias that mitigates over time. Our work makes two contributions to the application of affordance theory in Information Systems. First, it shows the importance of IT design in studying experiential computing. While not taking a deterministic view of technology, we validate the notion that different technology designs produce a variation of effects around a predictable central tendency. Second, it empirically demonstrates that the affordances of embodied digital experiences have an effect on actual behavior as well as on the outcome of the experience itself.  相似文献   
26.
This work describes a system for acoustic‐based navigation that relies on the addition of localization services to underwater networks. The localization capability has been added on top of an existing network, without imposing constraints on its structure/operation. The approach is based on the inclusion of timing information within acoustic messages through which it is possible to know the time of an acoustic transmission in relation to its reception. Exploiting such information at the network application level makes it possible to create an interrogation scheme similar to that of a long baseline. The advantage is that the nodes/autonomous underwater vehicles (AUVs) themselves become the transponders of a network baseline, and hence there is no need for dedicated instrumentation. The paper reports at sea results obtained from the COLLAB–NGAS14 experimental campaign. During the sea trial, the approach was implemented within an operational network in different configurations to support the navigation of the two Centre for Maritime Research and Experimentation Ocean Explorer (CMRE OEX) vehicles. The obtained results demonstrate that it is possible to support AUV navigation without constraining the network design and with a minimum communication overhead. Alternative solutions (e.g., synchronized clocks or two‐way‐travel‐time interrogations) might provide higher precision or accuracy, but they come at the cost of impacting on the network design and/or on the interrogation strategies. Results are discussed, and the performance achieved at sea demonstrates the viability to use the system in real, large‐scale operations involving multiple AUVs. These results represent a step toward location‐aware underwater networks that are able to provide node localization as a service.  相似文献   
27.
An often used methodology for reasoning with probabilistic conditional knowledge bases is provided by the principle of maximum entropy (so-called MaxEnt principle) that realises an idea of least amount of assumed information and thus of being as unbiased as possible. In this paper we exploit the fact that MaxEnt distributions can be computed by solving nonlinear equation systems that reflect the conditional logical structure of these distributions. We apply the theory of Gröbner bases that is well known from computational algebra to the polynomial system which is associated with a MaxEnt distribution, in order to obtain results for reasoning with maximum entropy. We develop a three-phase compilation scheme extracting from a knowledge base consisting of probabilistic conditionals the information which is crucial for MaxEnt reasoning and transforming it to a Gröbner basis. Based on this transformation, a necessary condition for knowledge bases to be consistent is derived. Furthermore, approaches to answering MaxEnt queries are presented by demonstrating how inferring the MaxEnt probability of a single conditional from a given knowledge base is possible. Finally, we discuss computational methods to establish general MaxEnt inference rules.  相似文献   
28.
SAR interferometry based on Permanent Scatterers (PS-InSAR™) is used here to study the present crustal mobility of a large area of NW Italy, in the Piemonte region.Thirty-eight satellite scenes (ERS SAR), taken from May 1992 to January 2001, were analysed for detecting more than 2 million PS on the study area. Continuous velocity surface maps (Iso-Kinematic Maps: IKM) were obtained from geo-statistical and spatial cluster techniques (Hot Spot analysis) of PS “short-period” data, to identify relative ground motions and to compare them with “long-period” tectonic mobility trends, i.e. those inferred at regional scale over geological times (some million years).The comparison was made by individuation of homogeneous kinematic areas, represented in the IKM, and characterization of the boundaries between them (Iso-Kinematic Boundaries: IKB). The IKB were used as tools to asses if the PS-InSAR data on present-day crustal mobility could fit with the distribution of real tectonic structures or field geological elements.IKM were drawn for uplifting geological sectors of Piemonte (Maritime Alps, Gran Paradiso, Langhe) where moderate to very low seismicity is recorded, and gravitational instabilities of rock mass on mountain slopes are widespread. The land sectors have been chosen in order to test the suitability of IKM in very different geo-morphological conditions.Different types of correspondence between the IKM and the geological kinematic trend were found:
-
a first type in which the kinematic trend of short-period (a decade of years, i.e. the PS-InSAR detection time span) is in agreement with a long-period tectonic trend (some million years) and seem to be driven by well known faults subparallel to the IKB. These kinematic trends can be hidden by the slope movement due to gravitational instabilities;
-
a second type in which the kinematic trend of short-period does not strictly correspond to the long-period trend, but can be considered as minor-order, uplifting-subsidence cycles, even if in contrast with the long-period kinematic trend. Alternatively, the short-period kinematic trends could reflect the action of deep-seated geological forces or structures, not yet known or inferable (at least with the recorded PS-InSAR velocities) on the basis of the available geological data and models.
  相似文献   
29.
Abstract— A polymer‐dispersed liquid‐crystal (PDLC) matrix template embedded with nano/microparticles can be backfilled/infiltrated with a dye‐doped liquid crystal for a paper‐like reflective display. In this way, a desirable degree of diffusion can be realized to reduce the viewing‐angle dependency of a gain reflector and metallic glare without changing other electro‐optical properties.  相似文献   
30.
Increasingly in the recent years, passengers’ services are extended into the ascent and descent flight phases on short distance flights. Trolleys containing the required meal and beverage items are used for these service operations and pushed or pulled along the aisles of the aircraft. Flight attendants reported about increased musculo-skeletal disorders and had been complaining about high physical workload from handling trolleys. In order to ensure acceptable load levels for pushing or pulling operations of trolleys, the physical capabilities of the collective “flight attendants” had been investigated by means of force measurements at maximum voluntary contraction (MVC) level and associated relevant anthropometrical and biometrical data. CEN and ISO standards as well as international and national German methods were used to derive recommended force limits for pushing/pulling operations with respect to the physical capabilities of the target group “flight attendants”. Comparing these recommended limits with the force requirements per shift under various conditions of trolley handlings (inclination of the floor, type and weight of trolley, mode of handling, frequency of operation) showed that especially for higher floor inclinations and trolley weights, flight attendants work (substantially) above recommended limits. It became also apparent that the handling of half-size trolleys is unexpectedly high demanding due to high vertical force components, caused by the unfavorable location of their center of gravity.

Relevance to industry

On short-distance flights, passengers’ services are performed by means of trolleys from the ascent to the descent flight phases. Flight attendants had been complaining about high physical workload. This study offers recommendations on maximum force limits for the handling of trolleys with respect to the muscular capacities and work situations of flight attendants on short-distance flights.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号