首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1671篇
  免费   104篇
  国内免费   3篇
电工技术   15篇
综合类   1篇
化学工业   550篇
金属工艺   80篇
机械仪表   75篇
建筑科学   44篇
矿业工程   2篇
能源动力   110篇
轻工业   229篇
水利工程   11篇
石油天然气   10篇
无线电   105篇
一般工业技术   271篇
冶金工业   47篇
原子能技术   9篇
自动化技术   219篇
  2024年   12篇
  2023年   33篇
  2022年   53篇
  2021年   91篇
  2020年   66篇
  2019年   59篇
  2018年   87篇
  2017年   93篇
  2016年   93篇
  2015年   77篇
  2014年   88篇
  2013年   259篇
  2012年   81篇
  2011年   100篇
  2010年   97篇
  2009年   98篇
  2008年   70篇
  2007年   56篇
  2006年   45篇
  2005年   25篇
  2004年   24篇
  2003年   4篇
  2002年   21篇
  2001年   15篇
  2000年   11篇
  1999年   16篇
  1998年   19篇
  1997年   7篇
  1996年   14篇
  1995年   6篇
  1994年   10篇
  1993年   5篇
  1992年   11篇
  1991年   2篇
  1990年   5篇
  1989年   5篇
  1988年   2篇
  1987年   1篇
  1986年   1篇
  1985年   3篇
  1982年   1篇
  1981年   1篇
  1980年   3篇
  1979年   1篇
  1978年   4篇
  1975年   1篇
  1973年   1篇
  1970年   1篇
排序方式: 共有1778条查询结果,搜索用时 15 毫秒
1.
Physically based simulation of human hair is a well studied and well known problem. But the “pure” physically based representation of hair (and other animation elements) is not the only concern of the animators, who want to “control” the creation and animation phases of the content. This paper describes a sketch-based tool, with which a user can both create hair models with different styling parameters and produce animations of these created hair models using physically and key frame-based techniques. The model creation and animation production tasks are all performed with direct manipulation techniques in real-time.  相似文献   
2.
BACKGROUND: Aortic aneurysm anatomy is crucial when considering patients for endovascular repair. The aim of this study was to determine the proportion of patients with aortic aneurysm suitable for endovascular repair with three different graft-stent systems. METHODS: Spiral computed tomographic angiography was used to assess the anatomy of 154 abdominal aortic aneurysms. Measurements were made of aneurysm neck length and diameter, renal artery to aortic bifurcation length, common iliac artery diameter and length, and external iliac artery diameter. Aneurysms were assessed for anatomical suitability for currently available aortoaortic, aortobi-iliac and aortouni-iliac devices. RESULTS: Six patients (4 per cent) had a distal aortic neck suitable for implantation of a straight aortic graft. Fifteen patients (10 per cent) had arterial anatomy suitable for implantation of a bifurcated graft and 85 (55 per cent) patients were suitable for endovascular repair with an aortouni-iliac graft. The primary reasons for unsuitability were: proximal neck length less than 1.5 cm (44 patients), proximal neck diameter greater than 3.0 cm (12), and angulation of the proximal neck (three). A further ten patients were considered unsuitable for an aortouni-iliac graft because of bilateral common iliac artery aneurysms (four), tortuous iliac arteries (four) and narrow external iliac arteries (two). CONCLUSION: The aortouni-iliac device has the widest applicability of the currently available endovascular systems but open repair remains the only option for a large proportion of patients.  相似文献   
3.
Simulation of very fast surge phenomena in a three-dimensional (3-D) structure requires a method based on Maxwell's equations, such as the finite-difference time-domain (FDTD) method or the method of moments, because circuit-equation-based methods cannot handle the phenomena. This paper uses a method of thin-wire representation of the vertical conductor system for the FDTD method which is suitable for the 3-D surge simulation. The thin-wire representation is indispensable to simulate electromagnetic surges on wires or steel frames in which the radius is smaller than a discretized space step used in the FDTD simulation. In this paper, a general surge analysis program named the virtual surge test lab based on the Maxwell's equations formulated by the FDTD method, is used to simulate the surge phenomena of a vertical conductor, including the effects of horizontal wave incidence and vertical wave incidence. Experimental results on the reduced scale model have been presented in order to compare among the simulation results by the FDTD method and the results using numerical electromagnetic code based on the MoM.  相似文献   
4.
A new monomer, octa(thiophenephenyl)silsesquioxane (OThiophenePS) was synthesized via click chemistry. The chemical structure of OThiophenePS was characterized by nuclear magnetic resonance (1H NMR) and Fourier transform infrared (FT-IR) spectroscopies. Electrochemical polymerization of pyrrole with OThiophenePS was performed resulting in polypyrrole-attached, polyhedral oligomeric silsesquioxane (OPS–PPy). The spectroelectrochemical studies show that the electrochromic properties of (OPS–PPy) are superior to those of polypyrrole (PPy). This great improvement can be attributed to the more accessible doping sites and the facile ion movement during the redox switching brought by the loose packing of the PPy chains.  相似文献   
5.
Back pain is an important public health problem but there is a paucity of knowledge about risk factors and causal mechanisms. Previous studies have shown that tall men are more at risk of back pain, although observations in women have been less consistent. This paper presents findings from a national longitudinal study of 3262 men and women aged 43 yr. Standing height and sitting height were related to 18-month reported prevalence of 'sciatica, lumbago or severe backache' in both men and women. The paper investigates explanations for these findings using previously collected data on childhood growth and detailed lifetime occupational histories. Neither greater susceptibility of tall men to heavy lifting, nor the timing of growth, were able to account for these relationships. To assess further the association between height and back pain, information is needed on the relationship between stature and characteristics of spinal structure.  相似文献   
6.
Conventional constant false alarm rate (CFAR) methods use a fixed number of cells to estimate the background variance. For homogeneous environments, it is desirable to increase the number of cells, at the cost of increased computation and memory requirements, in order to improve the estimation performance. For nonhomogeneous environments, it is desirable to use less number of cells in order to reduce the number of false alarms around the clutter edges. In this work, we present a solution with two exponential smoothers (first order IIR filters) having different time-constants to leverage the conflicting requirements of homogeneous and nonhomogeneous environments. The system is designed to use the filter having the large time-constant in homogeneous environments and to promptly switch to the filter having the small time constant once a clutter edge is encountered. The main advantages of proposed Switching IIR CFAR method are computational simplicity, small memory requirement (in comparison to windowing based methods) and its good performance in homogeneous environments (due to the large time-constant smoother) and rapid adaptation to clutter edges (due to the small time-constant smoother).  相似文献   
7.
Any sniffer can see the information sent through unprotected ‘probe request messages’ and ‘probe response messages’ in wireless local area networks (WLAN). A station (STA) can send probe requests to trigger probe responses by simply spoofing a genuine media access control (MAC) address to deceive access point (AP) controlled access list. Adversaries exploit these weaknesses to flood APs with probe requests, which can generate a denial of service (DoS) to genuine STAs. The research examines traffic of a WLAN using supervised feed-forward neural network classifier to identify genuine frames from rogue frames. The novel feature of this approach is to capture the genuine user and attacker training data separately and label them prior to training without network administrator’s intervention. The model’s performance is validated using self-consistency and fivefold cross-validation tests. The simulation is comprehensive and takes into account the real-world environment. The results show that this approach detects probe request attacks extremely well. This solution also detects an attack during an early stage of the communication, so that it can prevent any other attacks when an adversary contemplates to start breaking into the network.  相似文献   
8.
9.
10.
With the emergence of new media, interactive film projects have mainly struggled to resolve the contradiction between dramatic structures and interaction. Dramatic film presents identification with the main character, where the viewer is constantly oppressed by the narrative, and therefore lost in illusion. In this context, when we bring on the scene interaction, the drama apparently starts to lose its power.

In this article, a new interactive film model based on Brechtian film theory is proposed. This model presents a new way of spatiotemporal construction where different audiovisual combinations can be viewed successively, and this way the viewer can actively construct his/her own story. Theoretical framework of the Brechtian interactive film model is supported by an interactive film application, named Academia. The main feature of the model is that, while interaction is very simple, the continuity of the narrative is preserved and the film requiring an intellectual level of interpretation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号