首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3068篇
  免费   120篇
  国内免费   5篇
电工技术   35篇
综合类   8篇
化学工业   754篇
金属工艺   70篇
机械仪表   35篇
建筑科学   188篇
矿业工程   9篇
能源动力   76篇
轻工业   258篇
水利工程   22篇
石油天然气   5篇
无线电   282篇
一般工业技术   559篇
冶金工业   412篇
原子能技术   24篇
自动化技术   456篇
  2023年   46篇
  2022年   56篇
  2021年   108篇
  2020年   56篇
  2019年   63篇
  2018年   61篇
  2017年   60篇
  2016年   94篇
  2015年   77篇
  2014年   131篇
  2013年   150篇
  2012年   172篇
  2011年   201篇
  2010年   130篇
  2009年   128篇
  2008年   142篇
  2007年   143篇
  2006年   129篇
  2005年   119篇
  2004年   102篇
  2003年   75篇
  2002年   80篇
  2001年   44篇
  2000年   59篇
  1999年   47篇
  1998年   107篇
  1997年   73篇
  1996年   64篇
  1995年   53篇
  1994年   48篇
  1993年   41篇
  1992年   26篇
  1991年   21篇
  1990年   15篇
  1989年   17篇
  1988年   11篇
  1987年   13篇
  1986年   9篇
  1985年   20篇
  1984年   17篇
  1983年   20篇
  1982年   17篇
  1981年   15篇
  1980年   10篇
  1979年   12篇
  1978年   16篇
  1977年   10篇
  1976年   20篇
  1975年   7篇
  1973年   7篇
排序方式: 共有3193条查询结果,搜索用时 15 毫秒
31.

In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information from various sources, which brings the importance of securing the data. Many researchers implemented techniques to hide secret information to maintain the integrity and privacy of data. In order to protect confidential data, histogram-based reversible data hiding with other cryptographic algorithms are widely used. Therefore, in the proposed work, a robust method for securing digital video is suggested. We implemented histogram bit shifting based reversible data hiding by embedding the encrypted watermark in featured video frames. Histogram bit shifting is used for hiding highly secured watermarks so that security for the watermark symbol is also being achieved. The novelty of the work is that only based on the quality threshold a few unique frames are selected, which holds the encrypted watermark symbol. The optimal value for this threshold is obtained using the Firefly Algorithm. The proposed method is capable of hiding high-capacity data in the video signal. The experimental result shows the higher capacity and video quality compared to other reversible data hiding techniques. The recovered watermark provides better identity identification against various attacks. A high value of PSNR and a low value of BER and MSE is reported from the results.

  相似文献   
32.
33.
34.
This study explores how distributing the controls of a video game among multiple players affects the sociality and engagement experienced in game play. A video game was developed in which the distribution of game controls among the players could be varied, thereby affecting the abilities of the individual players to control the game. An experiment was set up in which eight groups of three players were asked to play the video game while the distribution of the game controls was increased in three steps. After each playing session, the players’ experiences of sociality and engagement were assessed using questionnaires. The results showed that distributing game control among the players increased the level of experienced sociality and reduced the level of experienced control. The game in which the controls were partly distributed led to the highest levels of experienced engagement, because the game allowed social play while still giving the players a sense of autonomy. The implications for interaction design are discussed.  相似文献   
35.
Service orientation has been a major buzz-word in recent years. While the buzz is on a decline, organizations are slowly, but steadily moving towards service oriented designs. However, service orientation turns out to be as much of a managerial challenge as of a technical one. The most important complexity drivers in the service oriented design of information systems seem to be (a) inconsistent design goals of stakeholders and (b) the pursuit of exhaustive service orientation coverage. This research focuses on the following two questions: (1) What are the characteristics of successful implementations of service oriented information systems, and (2) what are the critical success factors influencing, driving and/or determining these characteristics? Data of an empirical analysis is used to test a set of cause-effect relationship hypotheses based on nine latent variables. In the core of this model we differentiate the variables ??overall service orientation infrastructure success?? and ??service orientation project success??. The hypothesized interrelationships between the nine variables lead to a causal model which is proven to hold.  相似文献   
36.
A Lie-algebra based recipe for smoothing gauge links in lattice field theory is presented, building on the matrix logarithm. With or without hypercubic nesting, this LOG/HYL smearing yields fat links which are differentiable with respect to the original ones. This is essential for defining UV-filtered (“fat link”) fermion actions which may be simulated with a HMC-type algorithm. The effect of this smearing on the distribution of plaquettes and on the residual mass of tree-level O(a)-improved clover fermions in quenched QCD is studied.  相似文献   
37.
The current paper focuses on several mechanical aspects of a waferlevel packaging approach using a direct face-to-face Chip-to-Wafer (C2W) bonding of a MEMS device on an ASIC substrate wafer. Requirements of minimized inherent stress from packaging and good decoupling from forces applied in manufacturing and application are discussed with particular attention to the presence of through-silicon vias (TSV) in the substrate wafer. The paper deals with FEM analysis of temperature excursion, pressure during molding, materials used and handling load influence on mechanical stress within the TSV system and on wafer level, which can be large enough to disintegrate the system.  相似文献   
38.
Wool handling is an important rural occupation where workers process 200 or more fleeces daily, separating them into various quality components. Loads and postures they experience carry substantial risk of low back pain (LBP). Although a formal skill training structure exists, interaction with loads and LBP is unknown. We examined whether skill and LBP influenced trunk postures and loads of 60 wool handlers representing 3 skill levels. LBP prevalence ranged from 20% for junior (lowest skill) to 45% for open class (highest skill) wool handlers. Open class wool handlers demonstrated increased lateral bend and more axially twisted postures, generating greater medio-lateral shear forces and lateral bend and axial twist moments. LBP was associated with open class wool handlers spending more time in severe axially twisted postures. These findings suggest that skill-based training needs to be reviewed to reduce the quantity of axially twisted posture which may help reduce the prevalence of LBP in this workforce.  相似文献   
39.
40.
In this paper we consider uncountable classes recognizable by ω-automata and investigate suitable learning paradigms for them. In particular, the counterparts of explanatory, vacillatory and behaviourally correct learning are introduced for this setting. Here the learner reads in parallel the data of a text for a language L from the class plus an ω-index α and outputs a sequence of ω-automata such that all but finitely many of these ω-automata accept the index α if and only if α is an index for L.It is shown that any class is behaviourally correct learnable if and only if it satisfies Angluin’s tell-tale condition. For explanatory learning, such a result needs that a suitable indexing of the class is chosen. On the one hand, every class satisfying Angluin’s tell-tale condition is vacillatorily learnable in every indexing; on the other hand, there is a fixed class such that the level of the class in the hierarchy of vacillatory learning depends on the indexing of the class chosen.We also consider a notion of blind learning. On the one hand, a class is blind explanatorily (vacillatorily) learnable if and only if it satisfies Angluin’s tell-tale condition and is countable; on the other hand, for behaviourally correct learning, there is no difference between the blind and non-blind version.This work establishes a bridge between the theory of ω-automata and inductive inference (learning theory).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号