首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6658篇
  免费   446篇
  国内免费   18篇
电工技术   127篇
综合类   9篇
化学工业   1462篇
金属工艺   244篇
机械仪表   409篇
建筑科学   126篇
矿业工程   2篇
能源动力   234篇
轻工业   628篇
水利工程   22篇
石油天然气   6篇
无线电   1153篇
一般工业技术   1407篇
冶金工业   415篇
原子能技术   71篇
自动化技术   807篇
  2024年   7篇
  2023年   84篇
  2022年   124篇
  2021年   218篇
  2020年   154篇
  2019年   177篇
  2018年   219篇
  2017年   218篇
  2016年   247篇
  2015年   225篇
  2014年   320篇
  2013年   435篇
  2012年   447篇
  2011年   528篇
  2010年   347篇
  2009年   396篇
  2008年   347篇
  2007年   264篇
  2006年   280篇
  2005年   227篇
  2004年   209篇
  2003年   183篇
  2002年   177篇
  2001年   145篇
  2000年   123篇
  1999年   127篇
  1998年   205篇
  1997年   139篇
  1996年   78篇
  1995年   83篇
  1994年   67篇
  1993年   59篇
  1992年   45篇
  1991年   37篇
  1990年   30篇
  1989年   23篇
  1988年   10篇
  1987年   17篇
  1986年   16篇
  1985年   12篇
  1984年   15篇
  1983年   10篇
  1982年   4篇
  1981年   3篇
  1980年   5篇
  1979年   7篇
  1978年   3篇
  1977年   5篇
  1976年   10篇
  1975年   4篇
排序方式: 共有7122条查询结果,搜索用时 0 毫秒
991.
Given a set P of polygons in three-dimensional space, two points p and q are said to be visible from each other with respect to P if the line segment joining them does not intersect any polygon in P . A point p is said to be completely visible from an area source S if p is visible from every point in S . The completely visible region CV(S, P) from S with respect to P is defined as the set of all points in three-dimensional space that are completely visible from S . We present two algorithms for computing CV(S, P) for P with a total of n vertices and a convex polygonal source S with m vertices. Our first result is a divide-and-conquer algorithm which runs in O(m 2 n 2 α(mn)) time and space, where α(mn) is the inverse of Ackermann's function. We next give an incremental algorithm for computing CV(S,P) in O(m 2 n+mn 2 α(n)) time and O(mn+n 2 ) space. We also prove that CV(S,P) consists of Θ(mn+n 2 ) surface elements such as vertices, edges, and faces. Received November 16, 1995; revised November 11, 1996.  相似文献   
992.
This study seeks to validate a comprehensive model of consumer acceptance in the context of mobile payment. It uses the unified theory of acceptance and use of technology (UTAUT) model with constructs of security, trust, social influence, and self-efficacy. Structural equation modeling is used to construct a predictive model of attitudes toward the mobile wallet. Individuals’ responses to questions about attitude and intention to adopt/use a mobile wallet were collected and analyzed with various factors modified from UTAUT. While the model confirms the classical role of technology acceptance factors (i.e., perceived usefulness and ease of use are key antecedents to users’ attitude), the results also show that users’ attitudes and intentions are influenced by perceived security and trust. In the extended model, the moderating effects of demographics on the relations among the variables were found to be significant. The proposed model brings together extant research on mobile payment and provides an important cluster of antecedents to eventual technology acceptance via constructs of behavioral intention to use and actual system usage.  相似文献   
993.
This paper presents a wavelet-based texture segmentation method using multilayer perceptron (MLP) networks and Markov random fields (MRF) in a multi-scale Bayesian framework. Inputs and outputs of MLP networks are constructed to estimate a posterior probability. The multi-scale features produced by multi-level wavelet decompositions of textured images are classified at each scale by maximum a posterior (MAP) classification and the posterior probabilities from MLP networks. An MRF model is used in order to model the prior distribution of each texture class, and a factor, which fuses the classification information through scales and acts as a guide for the labeling decision, is incorporated into the MAP classification of each scale. By fusing the multi-scale MAP classifications sequentially from coarse to fine scales, our proposed method gets the final and improved segmentation result at the finest scale. In this fusion process, the MRF model serves as the smoothness constraint and the Gibbs sampler acts as the MAP classifier. Our texture segmentation method was applied to segmentation of gray-level textured images. The proposed segmentation method shows better performance than texture segmentation using the hidden Markov trees (HMT) model and the HMTseg algorithm, which is a multi-scale Bayesian image segmentation algorithm.  相似文献   
994.
995.
Many empirical studies in software engineering involve relationships between various process and product characteristics derived via linear regression analysis. We propose an alternative modeling approach using radial basis functions (RBFs) which provide a flexible way to generalize linear regression function. Further, RBF models possess strong mathematical properties of universal and best approximation. We present an objective modeling methodology for determining model parameters using our recent SG algorithm, followed by a model selection procedure based on generalization ability. Finally, we describe a detailed RBF modeling study for software effort estimation using a well-known NASA dataset  相似文献   
996.
Unlike deterministic real-time communication in which excessive resources may be required for “absolute” performance guarantees, statistical real-time communication seeks to achieve both probabilistic performance guarantees and efficient resource sharing. This paper presents a framework for statistical real-time communication in ATM networks, providing delay-guaranteed transport of MPEG-coded video traffic with a statistically-guaranteed cell-loss ratio. Delay-guaranteed communication is achieved with a modified version of Traffic-Controlled Rate-Monotonic Priority Scheduling (TCRM). A set of statistical real-time channels that share similar traffic characteristics are multiplexed into a common macrochannel. Those statistical real-time channels which are multiplexed together share the resources of a macrochannel, and individual statistical real-time channels are given timeliness and probabilistic cell-loss guarantees. A macrochannel is serviced by the modified TCRM which improves link utilization and makes channel management simpler. Based on the analysis of an M/D/1/N queueing system, we propose a procedure for determining the transmission capacity of a macrochannel necessary to statistically guarantee a cell-loss ratio bound. Our extensive trace-driven simulation has shown the superiority of the proposed framework to the other approaches. The overall cell-loss ratios for multihop statistical real-time channels are shown to be smaller than the predetermined bounds, thus verifying our analytical results  相似文献   
997.
998.
999.
1000.
Being innocuous, nanodiamonds find huge applications in bioimaging, drug delivery and biomedical sensing. Their synthesis is generally carried out by detonation or shock wave methods. This article reports novel, economical and risk-free extraction of nanodiamonds from carbonaceous waste (smoke deposits of Hawan kund). Structural and morphological studies of extracted material revealed that the nanodiamonds have a size range of 4–5 nm and consists of sp3 core and sp2 shell. Extracted nanodiamonds contain various functional groups on its surface which make it suitable for various applications. Cytotoxicity assay revealed very less toxicity of extracted nanodiamonds, which makes them suitable candidate for biological applications. The proposed method offers the possibility of economical and detonation free production of nanodiamonds.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号