首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3043篇
  免费   246篇
  国内免费   31篇
电工技术   56篇
综合类   15篇
化学工业   744篇
金属工艺   71篇
机械仪表   113篇
建筑科学   150篇
矿业工程   9篇
能源动力   218篇
轻工业   209篇
水利工程   51篇
石油天然气   35篇
无线电   277篇
一般工业技术   510篇
冶金工业   183篇
原子能技术   33篇
自动化技术   646篇
  2024年   10篇
  2023年   59篇
  2022年   106篇
  2021年   191篇
  2020年   164篇
  2019年   203篇
  2018年   203篇
  2017年   196篇
  2016年   187篇
  2015年   122篇
  2014年   205篇
  2013年   319篇
  2012年   227篇
  2011年   258篇
  2010年   161篇
  2009年   161篇
  2008年   93篇
  2007年   57篇
  2006年   61篇
  2005年   45篇
  2004年   31篇
  2003年   30篇
  2002年   28篇
  2001年   20篇
  2000年   15篇
  1999年   15篇
  1998年   26篇
  1997年   14篇
  1996年   13篇
  1995年   12篇
  1994年   6篇
  1993年   10篇
  1991年   6篇
  1990年   8篇
  1989年   2篇
  1987年   5篇
  1986年   4篇
  1985年   4篇
  1984年   6篇
  1983年   5篇
  1982年   4篇
  1981年   3篇
  1980年   2篇
  1979年   2篇
  1978年   4篇
  1977年   5篇
  1975年   6篇
  1970年   1篇
  1969年   1篇
  1965年   1篇
排序方式: 共有3320条查询结果,搜索用时 37 毫秒
981.
A generic grouping algorithm and its quantitative analysis   总被引:1,自引:0,他引:1  
This paper presents a generic method for perceptual grouping and an analysis of its expected grouping quality. The grouping method is fairly general: It may be used for the grouping of various types of data features, and to incorporate different grouping cues operating over feature sets of different sizes. The proposed method is divided into two parts: constructing a graph representation of the available perceptual grouping evidence, and then finding the “best” partition of the graph into groups. The first stage includes a cue enhancement procedure, which integrates the information available from multifeature cues into very reliable bifeature cues. Both stages are implemented using known statistical tools such as Wald's SPRT algorithm (1952) and the maximum likelihood criterion. The accompanying theoretical analysis of this grouping criterion quantifies intuitive expectations and predicts that the expected grouping quality increases with cue reliability. It also shows that investing more computational effort in the grouping algorithm leads to better grouping results. This analysis, which quantifies the grouping power of the maximum likelihood criterion, is independent of the grouping domain. To our best knowledge, such an analysis of a grouping process is given here for the first time. Three grouping algorithms, in three different domains, are synthesized as instances of the generic method. They demonstrate the applicability and generality of this grouping method  相似文献   
982.
A genetic algorithm approach is used to solve a multi-objective discrete reliability optimization problem in a k dissimilar-unit non-repairable cold-standby redundant system. Each unit is composed of a number of independent components with generalized Erlang distributions arranged in a series–parallel configuration. There are multiple component choices with different distribution parameters available for being replaced with each component of the system. The objective of the reliability optimization problem is to select the best components, from the set of available components, to be placed in the standby system in order to minimize the initial purchase cost of the system, maximize the system MTTF (mean time to failure), minimize the system VTTF (variance of time to failure) and also maximize the system reliability at the mission time. Finally, we apply a genetic algorithm with double strings using continuous relaxation based on reference solution updating (GADSCRRSU) to solve this multi-objective problem, using goal attainment formulation. The results are also compared against the results of a discrete-time approximation technique to show the efficiency of the proposed GA approach.  相似文献   
983.
In their seminal article “Why Johnny Can't Encrypt” [Whitten A, Tygar JD. Why Johnny can't encrypt: a usability case study of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; August 1999.], Whitten and Tygar showed that usability weaknesses of encryption software may result in failure to protect users, in spite of good cryptography. A similar situation happens, on a huge scale, on the Web: the widely deployed SSL/TLS protocols provide good cryptography, yet there is a growing amount of successful attacks on web users, causing massive damages. In this article, we focus on password theft via fake websites, to which we refer as phishing. We believe that phishing is currently the most severe threat facing web users.We begin with a brief review of SSL/TLS. Many sensitive sites do not use SSL/TLS, or use it incorrectly (e.g. to encrypt password, filled into an unprotected login form); we explain why.Even if sites use SSL/TLS (correctly), this may not be enough to prevent phishing – at least, using the basic security and identification indicators of most browsers (URL, padlock and HTTPS). We discuss basic and advanced indicators, and their usability problems. We review recent usability studies, whose results are rather alarming, and put in question the ability of users to avoid phishing sites based on security and identification indicators.  相似文献   
984.
985.
Policies supporting the rapid and open sharing of proteomic data are being implemented by the leading journals in the field. The proteomics community is taking steps to ensure that data are made publicly accessible and are of high quality, a challenging task that requires the development and deployment of methods for measuring and documenting data quality metrics. On September 18, 2010, the U.S. National Cancer Institute (NCI) convened the "International Workshop on Proteomic Data Quality Metrics" in Sydney, Australia, to identify and address issues facing the development and use of such methods for open access proteomics data. The stakeholders at the workshop enumerated the key principles underlying a framework for data quality assessment in mass spectrometry data that will meet the needs of the research community, journals, funding agencies, and data repositories. Attendees discussed and agreed up on two primary needs for the wide use of quality metrics: (i) an evolving list of comprehensive quality metrics and (ii) standards accompanied by software analytics. Attendees stressed the importance of increased education and training programs to promote reliable protocols in proteomics. This workshop report explores the historic precedents, key discussions, and necessary next steps to enhance the quality of open access data. By agreement, this article is published simultaneously in Proteomics, Proteomics Clinical Applications, Journal of Proteome Research, and Molecular and Cellular Proteomics, as a public service to the research community. The peer review process was a coordinated effort conducted by a panel of referees selected by the journals.  相似文献   
986.
Every Boolean function on n variables can be expressed as a unique multivariate polynomial modulo p for every prime p. In this work, we study how the degree of a function in one characteristic affects its complexity in other characteristics. We establish the following general principle: functions with low degree modulo p must have high complexity in every other characteristic q. More precisely, we show the following results about Boolean functions f : {0, 1}n → {0, 1} which depend on all n variables, and distinct primes pq:
  o If f has degree o(log n) modulo p, then it must have degree Ω(n1−o(1)) modulo q. Thus a Boolean function has degree o(log n) in at most one characteristic. This result is essentially tight as there exist functions that have degree log n in every characteristic.  相似文献   
987.
Swarm intelligence, as demonstrated by a natural biological swarm, such as an ant colony, has many powerful properties that are desirable for effective routing in communications networks. In this paper, we propose an intelligent routing algorithm that we are calling Fuzzy Logic Ant-based Routing (FLAR), which is inspired by ant colonies and enhanced by fuzzy logic techniques. Using a fuzzy system as an intelligent and expert mechanism allows multiple constraints to be considered in a simple and intuitive way. Simulation results and a comparison of the proposed method with two state-of-the-art routing algorithms show better performance and a higher fault tolerance for our approach, particularly in regard to link failures.  相似文献   
988.
Human hand recognition plays an important role in a wide range of applications ranging from sign language translators, gesture recognition, augmented reality, surveillance and medical image processing to various Human Computer Interaction (HCI) domains. Human hand is a complex articulated object consisting of many connected parts and joints. Therefore, for applications that involve HCI one can find many challenges to establish a system with high detection and recognition accuracy for hand posture and/or gesture. Hand posture is defined as a static hand configuration without any movement involved. Meanwhile, hand gesture is a sequence of hand postures connected by continuous motions. During the past decades, many approaches have been presented for hand posture and/or gesture recognition. In this paper, we provide a survey on approaches which are based on Hidden Markov Models (HMM) for hand posture and gesture recognition for HCI applications.  相似文献   
989.
990.
This paper investigates the problems of kinematics, Jacobian, singularity and workspace analysis of a spatial type of 3-PSP parallel manipulator. First, structure and motion variables of the robot are addressed. Two operational modes, non-pure translational and coupled mixed-type are considered. Two inverse kinematics solutions, an analytical and a numerical, for the two operational modes are presented. The direct kinematics of the robot is also solved utilizing a new geometrical approach. It is shown, unlike most parallel robots, the direct kinematics problem of this robot has a unique solution. Next, analytical expressions for the velocity and acceleration relations are derived in invariant form. Auxiliary vectors are introduced to eliminate passive velocity and acceleration vectors. The three types of conventional singularities are analyzed. The notion of non-pure rotational and non-pure translational Jacobian matrices is introduced. The non-pure rotational and non-pure translational Jacobian matrices are combined to form the Jacobian of constraint matrix which is then used to obtain the constraint singularity. Finally, two methods, a discretization method and one based on direct kinematics are presented and robot non-pure translation and coupled mixed-type reachable workspaces are obtained. The influence of tool length on workspace is also studied.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号