首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   26023篇
  免费   1546篇
  国内免费   52篇
电工技术   186篇
综合类   123篇
化学工业   7154篇
金属工艺   506篇
机械仪表   459篇
建筑科学   863篇
矿业工程   63篇
能源动力   811篇
轻工业   5633篇
水利工程   227篇
石油天然气   194篇
武器工业   1篇
无线电   1262篇
一般工业技术   4095篇
冶金工业   2264篇
原子能技术   139篇
自动化技术   3641篇
  2024年   53篇
  2023年   258篇
  2022年   818篇
  2021年   1081篇
  2020年   673篇
  2019年   783篇
  2018年   945篇
  2017年   966篇
  2016年   1016篇
  2015年   791篇
  2014年   1197篇
  2013年   2174篇
  2012年   1760篇
  2011年   1959篇
  2010年   1417篇
  2009年   1365篇
  2008年   1207篇
  2007年   1096篇
  2006年   904篇
  2005年   670篇
  2004年   624篇
  2003年   615篇
  2002年   528篇
  2001年   405篇
  2000年   336篇
  1999年   348篇
  1998年   855篇
  1997年   564篇
  1996年   402篇
  1995年   283篇
  1994年   235篇
  1993年   191篇
  1992年   102篇
  1991年   75篇
  1990年   75篇
  1989年   84篇
  1988年   80篇
  1987年   70篇
  1986年   54篇
  1985年   69篇
  1984年   61篇
  1983年   51篇
  1982年   48篇
  1981年   37篇
  1980年   54篇
  1979年   25篇
  1978年   21篇
  1977年   35篇
  1976年   62篇
  1973年   23篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
91.
Conventional constant false alarm rate (CFAR) methods use a fixed number of cells to estimate the background variance. For homogeneous environments, it is desirable to increase the number of cells, at the cost of increased computation and memory requirements, in order to improve the estimation performance. For nonhomogeneous environments, it is desirable to use less number of cells in order to reduce the number of false alarms around the clutter edges. In this work, we present a solution with two exponential smoothers (first order IIR filters) having different time-constants to leverage the conflicting requirements of homogeneous and nonhomogeneous environments. The system is designed to use the filter having the large time-constant in homogeneous environments and to promptly switch to the filter having the small time constant once a clutter edge is encountered. The main advantages of proposed Switching IIR CFAR method are computational simplicity, small memory requirement (in comparison to windowing based methods) and its good performance in homogeneous environments (due to the large time-constant smoother) and rapid adaptation to clutter edges (due to the small time-constant smoother).  相似文献   
92.
Shift work situations occur in almost all safety‐critical organizations, and the investigations of some catastrophes like Chernobyl, Exxon Valdez, and the Gol/Legacy mid‐air collision indicated that shift work information exchange played an important role during the evolution of the situation before the accidents. Inadequate communications during shift changeovers challenged operators' work in the moments that preceded these accidents, because they got inadequate information about the current situation. Our research focuses on the information exchange activities (verbal, written, and nonverbal) of nuclear power plant control operators during shift changeovers. Our aim is to investigate how verbal exchanges and other representations enable operator crews to share information regarding the events that occurred in the previous shift to achieve adequate situation awareness. Our findings indicated the importance and richness of the information exchange during the shift changeover process to update and validate individual and collective situation awareness, showing that information adequately shared enables the ad hoc configurations of regulation loops and a safer use of simplified strategies that can be understood and be validated by other operators, reducing the occurrence of cognitive overloads and contributing to the construction of a common cognitive ground that enhances system resilience. © 2010 Wiley Periodicals, Inc.  相似文献   
93.
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments.  相似文献   
94.
This work presents a study of RTP multiplexing schemes, which are compared with the normal use of RTP, in terms of experienced quality. Bandwidth saving, latency and packet loss for different options are studied, and some tests of Voice over IP (VoIP) traffic are carried out in order to compare the quality obtained using different implementations of the router buffer. Voice quality is calculated using ITU R-factor, which is a widely accepted quality estimator. The tests show the bandwidth savings of multiplexing, and also the importance of packet size for certain buffers, as latency and packet loss may be affected. The customer’s experience improvement is measured, showing that the use of multiplexing can be interesting in some scenarios, like an enterprise with different offices connected via the Internet. The system is also tested using different numbers of samples per packet, and the distribution of the flows into different tunnels is found to be an important factor in order to achieve an optimal perceived quality for each kind of buffer. Grouping all the flows into a single tunnel will not always be the best solution, as the increase of the number of flows does not improve bandwidth efficiency indefinitely. If the buffer penalizes big packets, it will be better to group the flows into a number of tunnels. The router processing capacity has to be taken into account too, as the limit of packets per second it can manage must not be exceeded. The obtained results show that multiplexing is a good way to improve customer’s experience of VoIP in scenarios where many RTP flows share the same path.  相似文献   
95.
We focus on two aspects of the face recognition, feature extraction and classification. We propose a two component system, introducing Lattice Independent Component Analysis (LICA) for feature extraction and Extreme Learning Machines (ELM) for classification. In previous works we have proposed LICA for a variety of image processing tasks. The first step of LICA is to identify strong lattice independent components from the data. In the second step, the set of strong lattice independent vector are used for linear unmixing of the data, obtaining a vector of abundance coefficients. The resulting abundance values are used as features for classification, specifically for face recognition. Extreme Learning Machines are accurate and fast-learning innovative classification methods based on the random generation of the input-to-hidden-units weights followed by the resolution of the linear equations to obtain the hidden-to-output weights. The LICA-ELM system has been tested against state-of-the-art feature extraction methods and classifiers, outperforming them when performing cross-validation on four large unbalanced face databases.  相似文献   
96.
The IEEE 802.3az standard provides a new low power mode that Ethernet network interfaces can use to save energy when there is no traffic to transmit. Simultaneously with the final standard approval, several algorithms were proposed to govern the physical interface state transition between the normal active mode and the new low power mode. In fact, the standard leaves this sleeping algorithm unspecified to spur competition among different vendors and achieve the greatest energy savings. In this paper, we try to bring some light to the most well known sleeping algorithms, providing mathematical models for the expected energy savings and the average packet delay inflicted on outgoing traffic. We will then use the models to derive optimum configuration parameters for them under given efficiency constraints.  相似文献   
97.
Kinematic redundancy occurs when a manipulator possesses more degrees of freedom than those required to execute a given task. Several kinematic techniques for redundant manipulators control the gripper through the pseudo-inverse of the Jacobian, but lead to a kind of chaotic inner motion with unpredictable arm configurations. Such algorithms are not easy to adapt to optimization schemes and, moreover, often there are multiple optimization objectives that can conflict between them. Unlike single optimization, where one attempts to find the best solution, in multi-objective optimization there is no single solution that is optimum with respect to all indices. Therefore, trajectory planning of redundant robots remains an important area of research and more efficient optimization algorithms are needed. This paper presents a new technique to solve the inverse kinematics of redundant manipulators, using a multi-objective genetic algorithm. This scheme combines the closed-loop pseudo-inverse method with a multi-objective genetic algorithm to control the joint positions. Simulations for manipulators with three or four rotational joints, considering the optimization of two objectives in a workspace without and with obstacles are developed. The results reveal that it is possible to choose several solutions from the Pareto optimal front according to the importance of each individual objective.  相似文献   
98.
Radial Basis Function Neural Networks (RBFNNs) have been successfully employed in several function approximation and pattern recognition problems. The use of different RBFs in RBFNN has been reported in the literature and here the study centres on the use of the Generalized Radial Basis Function Neural Networks (GRBFNNs). An interesting property of the GRBF is that it can continuously and smoothly reproduce different RBFs by changing a real parameter τ. In addition, the mixed use of different RBF shapes in only one RBFNN is allowed. Generalized Radial Basis Function (GRBF) is based on Generalized Gaussian Distribution (GGD), which adds a shape parameter, τ, to standard Gaussian Distribution. Moreover, this paper describes a hybrid approach, Hybrid Algorithm (HA), which combines evolutionary and gradient-based learning methods to estimate the architecture, weights and node topology of GRBFNN classifiers. The feasibility and benefits of the approach are demonstrated by means of six gene microarray classification problems taken from bioinformatic and biomedical domains. Three filters were applied: Fast Correlation-Based Filter (FCBF), Best Incremental Ranked Subset (BIRS), and Best Agglomerative Ranked Subset (BARS); this was done in order to identify salient expression genes from among the thousands of genes in microarray data that can directly contribute to determining the class membership of each pattern. After different gene subsets were obtained, the proposed methodology was performed using the selected gene subsets as new input variables. The results confirm that the GRBFNN classifier leads to a promising improvement in accuracy.  相似文献   
99.
As peer-to-peer networks are proving capable of handling huge volumes of data, the need for effective search tools is lasting and imperative. During the last years, a number of research studies have been published, which attempt to address the problem of search in large, decentralized networks. In this article, we mainly focus on content and concept-based retrieval. After providing a useful discussion on terminology, we introduce a representative sample of such studies and categorize them according to basic functional and non-functional characteristics. Following our analysis and discussion we conclude that future work should focus on information filtering, re-ranking and merging of results, relevance feedback and content replication as well as on related user-centric aspects of the problem.  相似文献   
100.
Summary The effects of cooking and sterilization at several temperatures on the free amino acids (FAA) content in albacore (Thunnus alalunga) muscle were studied during the processing of canned tuna. FAAs were derivatized witho-phtalaldehyde, separated on a C18 column by HPLC and detected by both fluorescence and ultra-violet detectors. After cooking the loss of FAAs was not significant. However, in the final product sterilized at 115 °C and 110 °C (throughout the whole process) there were significant losses with regard to the start material, but not at 118 °C (all temperatures leading to the same lethal F-value). The influence of the thermal process time at 115 °C was evaluated for 60 and 100 min. Significant losses were found between both canned products (25%) and between the raw fish and the final product (12% and 34%, process time 60 and 100 min, respectively). The determination of the content of FAA present in canned albacore may be a useful indication of the severity of the thermal processing.
Veränderung im Gehalt an freien Aminosäuren in Thunfischmuskel (Tunnus alalunga) während der Wärmebehandlung
Zusammenfassung Die Wirkung des Kochens und Sterilisierens bei verschiedenen Temperaturen auf den Gehalt an freien Aminosäuren (FAA) im Thunfischmuskel (Thunnus alalunga) wurde während der Herstellung von Thunfischkonserven untersucht. Die freien Aminosäuren wurden mito-Phtalaldehyd derivatisiert, auf einer C-18-Kolonne mit HPLC abgetrennt und durch Fluorescenz und UV-Detektoren nachgewiesen. Nach dem Kochen war der Verlust an FAA nicht signifikant, jedoch in dem bei 110° und 115 °C sterilisierten Endprodukt ergaben sich signifikante Verluste bezogen auf das Ausgangsmaterial, aber nicht auf das bei 118 °C erhitzte; alle Erhitzungstemperaturen führen zu demselben letalen F-Wert. Der Zeiteinfluß der Erhitzung bei 115 °C wurde bei 60 und 100 min bewertet. Signifikante Verluste sind bei beiden Dosenkonserven aufgetreten (25%) und zwischen diesen und dem Rohfisch ( 12% und 34%) bei einer Erhitzungszeit von 60 und 100 min). Die Bestimmung des FAA-Gehalts in Thunfischkonserven kann für den Nachweis der Einwandfreiheit des thermischen Prozesses sehr nützlich sein.
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号