首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6949篇
  免费   403篇
  国内免费   6篇
电工技术   99篇
综合类   28篇
化学工业   1948篇
金属工艺   184篇
机械仪表   153篇
建筑科学   416篇
矿业工程   39篇
能源动力   243篇
轻工业   470篇
水利工程   49篇
石油天然气   5篇
无线电   603篇
一般工业技术   1479篇
冶金工业   299篇
原子能技术   38篇
自动化技术   1305篇
  2024年   14篇
  2023年   101篇
  2022年   152篇
  2021年   268篇
  2020年   187篇
  2019年   191篇
  2018年   190篇
  2017年   186篇
  2016年   282篇
  2015年   299篇
  2014年   350篇
  2013年   506篇
  2012年   472篇
  2011年   627篇
  2010年   413篇
  2009年   420篇
  2008年   402篇
  2007年   354篇
  2006年   276篇
  2005年   248篇
  2004年   189篇
  2003年   151篇
  2002年   149篇
  2001年   74篇
  2000年   101篇
  1999年   92篇
  1998年   94篇
  1997年   85篇
  1996年   86篇
  1995年   57篇
  1994年   48篇
  1993年   50篇
  1992年   46篇
  1991年   33篇
  1990年   20篇
  1989年   12篇
  1988年   16篇
  1987年   16篇
  1986年   12篇
  1985年   13篇
  1984年   8篇
  1983年   7篇
  1982年   4篇
  1981年   5篇
  1980年   12篇
  1976年   5篇
  1975年   5篇
  1972年   4篇
  1971年   3篇
  1954年   3篇
排序方式: 共有7358条查询结果,搜索用时 15 毫秒
121.
K-hyperline clustering is an iterative algorithm based on singular value decomposition and it has been successfully used in sparse component analysis. In this paper, we prove that the algorithm converges to a locally optimal solution for a given set of training data, based on Lloyd’s optimality conditions. Furthermore, the local optimality is shown by developing an Expectation-Maximization procedure for learning dictionaries to be used in sparse representations and by deriving the clustering algorithm as its special case. The cluster centroids obtained from the algorithm are proved to tessellate the space into convex Voronoi regions. The stability of clustering is shown by posing the problem as an empirical risk minimization procedure over a function class. It is proved that, under certain conditions, the cluster centroids learned from two sets of i.i.d. training samples drawn from the same probability space become arbitrarily close to each other, as the number of training samples increase asymptotically.  相似文献   
122.
In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the clock synchronization by intercepting messages, replaying intercepted messages (after the adversary’s choice of delay), and capturing nodes (i.e., revealing their secret keys and impersonating them). We present an efficient clock sampling algorithm which tolerates attacks by this adversary, collisions, a bounded amount of losses due to ambient noise, and a bounded number of captured nodes that can jam, intercept, and send fake messages. The algorithm is self-stabilizing, so if these bounds are temporarily violated, the system can efficiently stabilize back to a correct state. Using this clock sampling algorithm, we construct the first self-stabilizing algorithm for secure clock synchronization in sensor networks that is resilient to the aforementioned adversarial attacks.  相似文献   
123.
Multimedia group applications often operate in an environment where the various participants are located on systems and communication links with different capabilities. Mechanisms are required that ensure full-quality media for high-performance workstations but lower-quality media for playout at low-end systems. QoS filters have been proposed as a way to adapt QoS to the user specified level by changing the structure of a media stream in a well defined way. Resource reservation and QoS filter instantiation should be closely integrated since both represent one particular aspect of the provision of individualistic QoS for heterogeneous users in multipeer communications. The Internet reservation protocol RSVP is receiver oriented and allows each receiver to specify its resource requirements. However, no actual mechanisms are defined that adapt the data stream to the receiver specified QoS requirements.In this paper we present an enhanced version of RSVP (called RSVP++) that integrates resource reservation and QoS filter control. In order to achieve this integration we extend the RSVP functional model and define a new QoS service class. RSVP++ can coexist with common RSVP systems, thus, openness and interoperability of the system are ensured.  相似文献   
124.
125.
At the development of commercial vehicles, it is necessary to develop cost-optimized components with respect to their entire lifetime. This requires a product development process that utilizes the possibility to simulate the product performance using modeling of different degrees of sophistication at any predefined level-of-detail (LOD). For example, the mechanical properties of a cast component depend strongly on the casting process, the simulation of which requires complex modeling at a high LOD. In this article, we propose an optimization strategy that is based on the LOD concept to develop cost-effective components. A sizing optimization of a cast model component is carried out with respect to both the mechanical and thermal response to exemplify the process. In particular, a (novel) global measure of the temperature in energy norm is introduced as an indicator of the “production fitness” to ensure high quality of the material properties. This measure is the thermal counterpart of the well-accepted mechanical strain energy.  相似文献   
126.
We report on the experimental realization of an ultrahigh vacuum (UHV) indium sealing between a conflat knife edge and an optical window. The sealing requires a very low clamping force and thus allows for the use of very thin and fragile windows.  相似文献   
127.
128.
Photorealistic visualization of a huge number of individual filaments like in the case of hair, fur, or knitwear is a challenging task: Explicit rendering approaches for simulating radiance transfer at a filament get totally impracticable with respect to rendering performance and it is also not obvious how to derive efficient scattering functions for different levels of (geometric) abstraction or how to deal with very complex scattering mechanisms. We present a novel uniform formalism for light scattering from filaments in terms of radiance, which we call the bidirectional fiber scattering distribution function (BFSDF). We show that previous specialized approaches, which have been developed in the context of hair rendering, can be seen as instances of the BFSDF. Similar to the role of the BSSRDF for surface scattering functions, the BFSDF can be seen as a general approach for light scattering from filaments, which is suitable for deriving approximations in a canonic and systematic way. For the frequent cases of distant light sources and observers, we deduce an efficient far field approximation (bidirectional curve scattering distribution function, BCSDF). We show that on the basis of the BFSDF, parameters for common rendering techniques can be estimated in a non-ad-hoc, but physically-based way  相似文献   
129.
This paper describes a segmentation method combining a texture based technique with a contour based method. The technique is designed to enable the study of cell behaviour over time by segmenting brightfield microscope image sequences. The technique was tested on artificial images, based on images of living cells and on real sequences acquired from microscope observations of neutrophils and lymphocytes as well as on a sequence of MRI images. The results of the segmentation are compared with the results of the watershed and snake segmentation methods. The results show that the method is both effective and practical.
Anna KorzynskaEmail:
  相似文献   
130.
We analyze the influence of B2C e-commerce on IT structure and brand architecture based on conceptual considerations, a case study and an empirical survey. We first discuss the changes in transaction costs that are induced by B2C e-commerce. The effects of B2C e-commerce on IT structure and brand architecture, which are anticipated from a transaction cost perspective, are illustrated using a case study from the tourism industry. We conducted a quantitative study among 101 chief information officers (CIOs) and chief marketing officers (CMOs) from the most important consumer brand companies in Austria. The results of a correspondence analysis show that a high importance of e-commerce triggers a typical bundle of changes in IT structure and brand architecture, which point toward a stronger integration within and between these two structural elements. We therefore conclude that B2C e-commerce calls for a better coordination of those measures that impact IT structure and brand architecture.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号