首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4819篇
  免费   265篇
  国内免费   11篇
电工技术   34篇
综合类   5篇
化学工业   1012篇
金属工艺   96篇
机械仪表   100篇
建筑科学   239篇
矿业工程   8篇
能源动力   153篇
轻工业   456篇
水利工程   47篇
石油天然气   18篇
武器工业   2篇
无线电   432篇
一般工业技术   888篇
冶金工业   835篇
原子能技术   28篇
自动化技术   742篇
  2024年   6篇
  2023年   42篇
  2022年   82篇
  2021年   136篇
  2020年   94篇
  2019年   111篇
  2018年   145篇
  2017年   126篇
  2016年   157篇
  2015年   118篇
  2014年   159篇
  2013年   275篇
  2012年   276篇
  2011年   339篇
  2010年   240篇
  2009年   264篇
  2008年   300篇
  2007年   285篇
  2006年   228篇
  2005年   240篇
  2004年   173篇
  2003年   148篇
  2002年   152篇
  2001年   75篇
  2000年   64篇
  1999年   58篇
  1998年   71篇
  1997年   62篇
  1996年   70篇
  1995年   52篇
  1994年   49篇
  1993年   50篇
  1992年   38篇
  1991年   28篇
  1990年   38篇
  1989年   38篇
  1988年   31篇
  1987年   41篇
  1986年   39篇
  1985年   32篇
  1984年   25篇
  1983年   27篇
  1982年   25篇
  1981年   13篇
  1980年   14篇
  1979年   9篇
  1978年   13篇
  1976年   9篇
  1975年   8篇
  1974年   5篇
排序方式: 共有5095条查询结果,搜索用时 15 毫秒
71.
The DTN architecture is based around sender-initiated unicast communication that is insufficient or inconvenient to meet the needs of many applications. To address these limitations, we define a DTN session layer and associated extensions to the DTN bundle protocol that more naturally support receiver-driven applications and multicast communication. Within a session, we provide mechanisms allowing applications to convey ordering relationships between successive transmissions that can be used by the network to help ensure a distributed application’s delivery ordering expectations are met. We also extend the bundle protocol’s expiration procedures to support more efficient network utilization by allowing in-network deletion of obsolete messages. We present the design rationale and describe our implementation of these mechanisms and discuss their advantages in meeting the needs of several popular types of applications.  相似文献   
72.
We propose a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector's underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector. Experiments with real malware and antivirus interfaces on Windows operating systems justify the effectiveness of our approach.  相似文献   
73.
Detecting communities is of great importance in social network analysis. However it is an issue that has not yet been satisfactorily solved, despite the efforts made by interdisciplinary research communities over the past few years, because of the nature of complexity in deciding how community structures should be recognized. In this paper we propose an approach based on cooperative game theory for community detection in social networks. We regard individuals as players, and regard communities as coalitions formed by players, and model community detection problem as the formation and optimization of coalitions. Furthermore, we define coalition profile for players to indicate coalitions that players joined, the order of a coalition profile is defined as the number of coalitions in a coalition profile, and we introduce a utility function to measure preference of coalition profiles. Accordingly, we propose an algorithm to detect a coalition profile with maximal utility function values. We have implemented the algorithms developed in this study and experimental results demonstrate the effectiveness of our approaches.  相似文献   
74.
The objective of this paper is to elucidate an organizational process for the design of generic technologies (GTs). While recognizing the success of GTs, the literature on innovation management generally describes their design according to evolutionary strategies featuring multiple and uncertain trials, resulting in the discovery of common features among multiple applications. This random walk depends on multiple market and technological uncertainties that are considered exogenous: as smart as he can be, the ‘gambler’ must play in a given probability space. However, what happens when the innovator is not a gambler but a designer, i.e., when the actor is able to establish new links between previously independent emerging markets and technologies? Formally speaking, the actor designs a new probability space. Building on a case study of two technological development programmes at the French Center for Atomic Energy, we present cases of GTs that correspond to this logic of designing the probability space, i.e. the logic of intentionally designing common features that bridge the gap between a priori heterogeneous applications and technologies. This study provides another example showing that the usual trial‐and‐learning strategy is not the only strategy to design GTs and that these technologies can be designed by intentionally building new interdependences between markets and technologies. Our main result is that building these interdependences requires organizational patterns that correspond to a ‘design of exploration’ phase in which multiple technology suppliers and application providers are involved in designing both the probability space itself and the instruments to explore and benefit from this new space.  相似文献   
75.
This paper describes Team THOR's approach to human‐in‐the‐loop disaster response robotics for the 2015 DARPA Robotics Challenge (DRC) Finals. Under the duress of unpredictable networking and terrain, fluid operator interactions and dynamic disturbance rejection become major concerns for effective teleoperation. We present a humanoid robot designed to effectively traverse a disaster environment while allowing for a wide range of manipulation abilities. To complement the robot hardware, a hierarchical software foundation implements network strategies that provide real‐time feedback to an operator under restricted bandwidth using layered user interfaces. Our strategy for humanoid locomotion includes a backward‐facing knee configuration paired with specialized toe and heel lifting strategies that allow the robot to traverse difficult surfaces while rejecting external perturbations. With an upper body planner that encodes operator preferences, predictable motion plans are executed in unforeseen circumstances. These plans are critical for manipulation in unknown environments. Our approach was validated during the DRC Finals competition, where Team THOR scored three points in 18 min of operation time, and the results are presented along with an analysis of each task.  相似文献   
76.
Practical and financial constraints associated with traditional field-based lithological mapping are often responsible for the generation of maps with insufficient detail and inaccurately located contacts. In arid areas with well exposed rocks and soils, high-resolution multi- and hyperspectral imagery is a valuable mapping aid as lithological units can be readily discriminated and mapped by automatically matching image pixel spectra to a set of reference spectra. However, the use of spectral imagery in all but the most barren terrain is problematic because just small amounts of vegetation cover can obscure or mask the spectra of underlying geological substrates. The use of ancillary information may help to improve lithological discrimination, especially where geobotanical relationships are absent or where distinct lithologies exhibit inherent spectral similarity. This study assesses the efficacy of airborne multispectral imagery for detailed lithological mapping in a vegetated section of the Troodos ophiolite (Cyprus), and investigates whether the mapping performance can be enhanced through the integration of LiDAR-derived topographic data. In each case, a number of algorithms involving different combinations of input variables and classification routine were employed to maximise the mapping performance. Despite the potential problems posed by vegetation cover, geobotanical associations aided the generation of a lithological map - with a satisfactory overall accuracy of 65.5% and Kappa of 0.54 - using only spectral information. Moreover, owing to the correlation between topography and lithology in the study area, the integration of LiDAR-derived topographic variables led to significant improvements of up to 22.5% in the overall mapping accuracy compared to spectral-only approaches. The improvements were found to be considerably greater for algorithms involving classification with an artificial neural network (the Kohonen Self-Organizing Map) than the parametric Maximum Likelihood Classifier. The results of this study demonstrate the enhanced capability of data integration for detailed lithological mapping in areas where spectral discrimination is complicated by the presence of vegetation or inherent spectral similarities.  相似文献   
77.
Satellite images, along with oceanographic, meteorological, and whale aerial survey data, are used to illustrate aspects of ocean circulation associated with a bowhead whale feeding ‘hotspot’ near Barrow, Alaska. In response to weak winds, a strong front forms near the shelf-break along the southern edge of Barrow Canyon when the Alaska Coastal Current flows adjacent to the southern flank of Barrow Canyon or intrudes onto the western Beaufort shelf. This front is of particular local interest because it is indicative of aggregation and retention of zooplankton on the western Beaufort shelf and, as a result, is a locus for bowhead whales pausing to feed during their westward fall migration. Groups (4 or more individuals) of bowhead whales are primarily seen on the western Beaufort shelf following wind conditions that promote the formation of this front.  相似文献   
78.
We give the first algorithm that is both query-efficient and time-efficient for testing whether an unknown function f:{0,1} n →{−1,1} is an s-sparse GF(2) polynomial versus ε-far from every such polynomial. Our algorithm makes poly(s,1/ε) black-box queries to f and runs in time n⋅poly(s,1/ε). The only previous algorithm for this testing problem (Diakonikolas et al. in Proceedings of the 48th Annual Symposium on Foundations of Computer Science, FOCS, pp. 549–558, 2007) used poly(s,1/ε) queries, but had running time exponential in s and super-polynomial in 1/ε.  相似文献   
79.
Genetic adaptive state estimation   总被引:1,自引:0,他引:1  
A genetic algorithm (GA) uses the principles of evolution, natural selection, and genetics to offer a method for parallel search of complex spaces. This paper describes a GA that can perform on-line adaptive state estimation for linear and nonlinear systems. First, it shows how to construct a genetic adaptive state estimator where a GA evolves the model in a state estimator in real time so that the state estimation error is driven to zero. Next, several examples are used to illustrate the operation and performance of the genetic adaptive state estimator. Its performance is compared to that of the conventional adaptive Luenberger observer for two linear system examples. Next, a genetic adaptive state estimator is used to predict when surge and stall occur in a nonlinear jet engine. Our main conclusion is that the genetic adaptive state estimator has the potential to offer higher performance estimators for nonlinear systems over current methods.  相似文献   
80.
The rapidly growing field of neuroproteomics has expanded to track global proteomic changes underlying various neurological conditions such as traumatic brain injury (TBI), stroke, and Alzheimer's disease. TBI remains a major health problem with approximately 2?million incidents occurring annually in the United States, yet no affective treatment is available despite several clinical trials. The absence of brain injury diagnostic biomarkers was identified as a significant road-block to therapeutic development for brain injury. Recently, the field of neuroproteomics has undertaken major advances in the area of neurotrauma research, where several candidate markers have been identified and are being evaluated for their efficacy as biological biomarkers in the field of TBI. One scope of this review is to evaluate the current status of TBI biomarker discovery using neuroproteomics techniques, and at what stage we are at in their clinical validation. In addition, we will discuss the need for strengthening the role of systems biology and its application to the field of neuroproteomics due to its integral role in establishing a comprehensive understanding of specific brain disorder and brain function in general. Finally, to achieve true clinical input of these neuroproteomic findings, these putative biomarkers should be validated using preclinical and clinical samples and linked to clinical diagnostic assays including ELISA or other high-throughput assays.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号