首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   687篇
  免费   38篇
电工技术   5篇
综合类   2篇
化学工业   203篇
金属工艺   18篇
机械仪表   9篇
建筑科学   49篇
矿业工程   2篇
能源动力   23篇
轻工业   39篇
水利工程   2篇
无线电   54篇
一般工业技术   135篇
冶金工业   41篇
原子能技术   6篇
自动化技术   137篇
  2023年   15篇
  2022年   18篇
  2021年   20篇
  2020年   12篇
  2019年   13篇
  2018年   12篇
  2017年   16篇
  2016年   28篇
  2015年   15篇
  2014年   32篇
  2013年   33篇
  2012年   33篇
  2011年   45篇
  2010年   48篇
  2009年   45篇
  2008年   39篇
  2007年   43篇
  2006年   17篇
  2005年   26篇
  2004年   25篇
  2003年   14篇
  2002年   6篇
  2001年   9篇
  2000年   16篇
  1999年   12篇
  1998年   11篇
  1997年   10篇
  1996年   14篇
  1995年   3篇
  1994年   7篇
  1993年   6篇
  1992年   9篇
  1991年   6篇
  1990年   2篇
  1989年   3篇
  1988年   6篇
  1987年   4篇
  1986年   8篇
  1985年   2篇
  1983年   6篇
  1982年   4篇
  1981年   7篇
  1980年   2篇
  1979年   4篇
  1978年   3篇
  1977年   2篇
  1976年   3篇
  1974年   2篇
  1966年   3篇
  1964年   1篇
排序方式: 共有725条查询结果,搜索用时 15 毫秒
11.
Multimedia analysis and reuse of raw un-edited audio visual content known as rushes is gaining acceptance by a large number of research labs and companies. A set of research projects are considering multimedia indexing, annotation, search and retrieval in the context of European funded research, but only the FP6 project RUSHES is focusing on automatic semantic annotation, indexing and retrieval of raw and un-edited audio-visual content. Even professional content creators and providers as well as home-users are dealing with this type of content and therefore novel technologies for semantic search and retrieval are required. In this paper, we present a summary of the most relevant achievements of the RUSHES project, focusing on specific approaches for automatic annotation as well as the main features of the final RUSHES search engine.  相似文献   
12.
13.
14.
We compare four tools regarding their suitability for teaching formal software verification, namely the Frege Program Prover, the Key system, Perfect Developer, and the Prototype Verification System (PVS). We evaluate them on a suite of small programs, which are typical of courses dealing with Hoare-style verification, weakest preconditions, or dynamic logic. Finally we report our experiences with using Perfect Developer in class.  相似文献   
15.
We investigate the effects of precision on the efficiency of various local search algorithms on 1-D unimodal functions. We present a (1+1)-EA with adaptive step size which finds the optimum in O(log n) steps, where n is the number of points used. We then consider binary (base-2) and reflected Gray code representations with single bit mutations. The standard binary method does not guarantee locating the optimum, whereas using the reflected Gray code does so in Θ((log n)2) steps. A(1+1)-EA with a fixed mutation probability distribution is then presented which also runs in O((log n)2). Moreover, a recent result shows that this is optimal (up to some constant scaling factor), in that there exist unimodal functions for which a lower bound of Ω((log n)2) holds regardless of the choice of mutation distribution. For continuous multimodal functions, the algorithm also locates the global optimum in O((log n)2). Finally, we show that it is not possible for a black box algorithm to efficiently optimise unimodal functions for two or more dimensions (in terms of the precision used).  相似文献   
16.
Traditional database query languages are based on set theory and crisp first order logic. However, many applications require retrieval-like queries which return result objects associated with a degree of being relevant to the query. Historically, retrieval systems estimate relevance by exploiting hidden object semantics whereas query processing in database systems relies on matching select-conditions with attribute values. Thus, different mechanisms were developed for database and information retrieval systems. In consequence, there is a lack of support for queries involving both retrieval and database search terms. In this work, we introduce the quantum query language (QQL). Its underlying unifying theory is based on the mathematical formalism of quantum mechanics and quantum logic. Van Rijsbergen already discussed the strong relation between the formalism of quantum mechanics and information retrieval. In this work, we interrelate concepts from database query processing to concepts from quantum mechanics and logic. As result, we obtain a common theory which allows us to incorporate seamlessly retrieval search into traditional database query processing.  相似文献   
17.
A Comparison of Free BDDs and Transformed BDDs   总被引:2,自引:0,他引:2  
Ordered binary decision diagrams (OBDDs) introduced by Bryant (IEEE Trans. on Computers, Vol. 35, pp. 677–691, 1986) have found a lot of applications in verification and CAD. Their use is limited if the OBDD size of the considered functions is too large. Therefore, a variety of generalized BDD models has been presented, among them FBDDs (free BDDs) and TBDDs (transformed BDDs). Here the quite tight relations between these models are revealed and their advantages and disadvantages are discussed.  相似文献   
18.
The design of two custom sample holders with a spherical cavity for commercial vibrating sample magnetometer systems is described. For such cavities, the magnetization M[over ->] and the internal magnetic field H(i)[over ->] of a sample are both homogeneous. Consequently, the material parameter M(H(i)) of a sample can be determined even for liquids and powders with a high magnetic susceptibility.  相似文献   
19.
The nanocrystalline Eu^3+ doped calcium phosphate was prepared by calcining precursors, which were got by precipitation method combined with ultrasound treatment and some polysaccharide. The existence of Eu^3+ inhibited the reaction of Na^+ ion and SO4^2- radical with apatite and resulted in the transformation of HAP to β- TCP by replacing the calcium ions. The strongest excitation peak was at 393 nm, and other lower peaks were at 361 nm, 375 nm, 381 nm, 418nm. The strongest emission spectrum appeared at about 618nm. The emission peak (579 nm) showed that Eu^3+ ions distributed on Ca^2+ sites of the apatitic structure.  相似文献   
20.
Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow security guidelines? Using an organizational control lens, we build a model to explain individual information security precaution-taking behavior. Specific hypotheses are developed and tested using a field survey. We examine elements of control and introduce the concept of ‘mandatoriness,’ which we define as the degree to which individuals perceive that compliance with existing security policies and procedures is compulsory or expected by organizational management. We find that the acts of specifying policies and evaluating behaviors are effective in convincing individuals that security policies are mandatory. The perception of mandatoriness is effective in motivating individuals to take security precautions, thus if individuals believe that management watches, they will comply.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号