首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5211篇
  免费   329篇
  国内免费   8篇
电工技术   70篇
化学工业   1378篇
金属工艺   94篇
机械仪表   158篇
建筑科学   187篇
矿业工程   17篇
能源动力   187篇
轻工业   925篇
水利工程   67篇
石油天然气   31篇
无线电   332篇
一般工业技术   777篇
冶金工业   405篇
原子能技术   53篇
自动化技术   867篇
  2024年   15篇
  2023年   63篇
  2022年   177篇
  2021年   267篇
  2020年   165篇
  2019年   203篇
  2018年   214篇
  2017年   213篇
  2016年   234篇
  2015年   175篇
  2014年   265篇
  2013年   415篇
  2012年   355篇
  2011年   370篇
  2010年   282篇
  2009年   271篇
  2008年   241篇
  2007年   228篇
  2006年   159篇
  2005年   114篇
  2004年   136篇
  2003年   83篇
  2002年   101篇
  2001年   74篇
  2000年   63篇
  1999年   49篇
  1998年   133篇
  1997年   98篇
  1996年   53篇
  1995年   67篇
  1994年   39篇
  1993年   32篇
  1992年   19篇
  1991年   17篇
  1990年   21篇
  1989年   20篇
  1988年   17篇
  1987年   9篇
  1986年   13篇
  1985年   13篇
  1984年   11篇
  1983年   6篇
  1982年   6篇
  1981年   8篇
  1980年   3篇
  1979年   4篇
  1978年   3篇
  1977年   3篇
  1976年   9篇
  1966年   2篇
排序方式: 共有5548条查询结果,搜索用时 15 毫秒
81.
Virtual Worlds (VW), such as Massive Multiplayer Online Social Games, have been gaining increasing attention in the last few years, mainly due to the new way users interact with them. However, little effort has been devoted to understand their traffic profile and the implications to the traffic management area. With the current growing rate of VWs’ usage, their traffic demand could eventually impose a significant burden on the operation of a typical Internet Service Provider (ISP) network. In this paper, we seek to understand the traffic behavior of an increasingly popular VW application, namely Second Life (SL), from both the connection and network level perspectives. We also show results of a traffic analysis of a SL client, when an avatar performs different actions in the VW, at different places and under different network conditions. Our results show that SL makes intensive use of network resources (mostly bandwidth), since the capacity needed for having a full SL experience (listening to live music) may reach 500 kbps. We then extend the traffic analysis work on SL by providing analytical models for its traffic profile. We aim at helping the network management and planning area to estimate the impact of an intense use of such VW on access links or core networks. Such synthetic models are also useful to the networking research community for the use in network simulations.  相似文献   
82.
In this paper, we address the problem of determining whether a mobile robot, called the pursuer, is able to maintain strong mutual visibility (a visibility notion between regions over a convex partition of the environment) of an antagonist agent, called the evader. We frame the problem as a non cooperative game. We consider the case in which the pursuer and the evader move at bounded speed, traveling in a known polygonal environment with or without holes, and in which there are no restrictions as to the distance that might separate the agents. Unlike our previous efforts (Murrieta-Cid et al. in Int J Robot Res 26:233–253, 2007), we give special attention to the combinatorial problem that arises when searching for a solution through visiting several locations in an environment with obstacles. In this paper we take a step further, namely, we assume an antagonistic evader who moves continuously and unpredictably, but with a constraint over its set of admissible motion policies, as the evader moves in the shortest-path roadmap, also called the reduced visibility graph (RVG). The pursuer does not know which among the possible paths over the RVG the evader will choose, but the pursuer is free to move within all the environment. We provide a constructive method to solve the decision problem of determining whether or not the pursuer is able to maintain strong mutual visibility of the evader. This method is based on an algorithm that computes the safe areas (areas that keep evader surveillance) at all times. We prove decidability of this problem, and provide a complexity measure to this evader surveillance game; both contributions hold for any general polygonal environment that might or not contain holes. All our algorithms have been implemented and we show simulation results.  相似文献   
83.
Cloud technologies can provide elasticity to real-time audio and video (A/V) collaboration applications. However, cloud-based collaboration solutions generally operate on a best-effort basis, with neither delivery nor quality guarantees, and high-quality business focused solutions rely on dedicated infrastructure and hardware-based components. This article describes our 2-year of research in the EMD project, which targets to migrate a hardware-based and business focused A/V collaboration solution to a software-based platform hosted in the cloud, providing higher levels of elasticity and reliability. Our focus during this period was an educational collaboration scenario with teachers and students (locally present in the classroom or remotely following the classes). A model of collaboration streaming (e.g. network topology, codecs, stream, streaming workflow, software components) is defined as base for software deployment and preemptive VM allocation techniques. These heuristics are evaluated using a version of the CloudSim simulator extended to generate and simulate realistic collaboration scenarios, to manage network congestion and to monitor a.o. cost and session delay metrics. Our results show that the algorithms reduce costs when compared to previously designed approaches, having an effectiveness of 99% in meeting A/V collaboration setup deadlines, which is a stringent requirement for this collaboration application.  相似文献   
84.
The Home Reef volcano (Tonga, Southwest Pacific Ocean) erupted in August 2006. Initially a submarine eruption it quickly evolved into a subaerial event upon the formation of an ephemeral island.Remote sensing data from different sensors including MODIS, ASTER, EO-1 ALI and Landsat-7 ETM+ were used to analyze the event, focusing on the plumes of discolored water, ocean chlorophyll-a concentration (OCC) and sea surface temperature.An early classification system for the plumes was devised based on spectral properties and point of origin. Plumes originated at the volcano were named Type-I and those associated to the pumice rafts Type-II.Anomalies in ocean chlorophyll-a concentration, measured using MODIS data, were analyzed and a large bloom, presumably dominated by Trichodesmium sp. was identified. The bloom, which contributed to OCC values 17 times higher than the background, was spatially and temporally coincident with a Type-I plume of discolored water. The OCC increase appears to have been caused by a combined effect of both ocean fertilizations by the subsurface volcanic plume and rising sea surface temperatures.The Home Reef event offers a good candidate for a case of ocean enrichment by a submarine volcano and highlights the need for continuous monitoring of the eruptions even after the end of the explosive, more spectacular stages.  相似文献   
85.
In this work, we address the problem of transforming seismic reflection data into an intrinsic rock property model. Specifically, we present an application of a methodology that allows interpreters to obtain effective porosity 3D maps from post-stack 3D seismic amplitude data, using measured density and sonic well log data as constraints. In this methodology, a 3D acoustic impedance model is calculated from seismic reflection amplitudes by applying an L1-norm sparse-spike inversion algorithm in the time domain, followed by a recursive inversion performed in the frequency domain. A 3D low-frequency impedance model is estimated by kriging interpolation of impedance values calculated from well log data. This low-frequency model is added to the inversion result which otherwise provides only a relative numerical scale. To convert acoustic impedance into a single reservoir property, a feed-forward Neural Network (NN) is trained, validated and tested using gamma-ray and acoustic impedance values observed at the well log positions as input and effective porosity values as target. The trained NN is then applied for the whole reservoir volume in order to obtain a 3D effective porosity model. While the particular conclusions drawn from the results obtained in this work cannot be generalized, such results suggest that this workflow can be applied successfully as an aid in reservoir characterization, especially when there is a strong non-linear relationship between effective porosity and acoustic impedance.  相似文献   
86.
Simultaneous aligning and smoothing of surface triangulations   总被引:1,自引:0,他引:1  
In this work we develop a procedure to deform a given surface triangulation to obtain its alignment with interior curves. These curves are defined by splines in a parametric space and, subsequently, mapped to the surface triangulation. We have restricted our study to orthogonal mapping, so we require the curves to be included in a patch of the surface that can be orthogonally projected onto a plane (our parametric space). For example, the curves can represent interfaces between different materials or boundary conditions, internal boundaries or feature lines. Another setting in which this procedure can be used is the adaption of a reference mesh to changing curves in the course of an evolutionary process. Specifically, we propose a new method that moves the nodes of the mesh, maintaining its topology, in order to achieve two objectives simultaneously: the piecewise approximation of the curves by edges of the surface triangulation and the optimization of the resulting mesh. We will designate this procedure as projecting/smoothing method and it is based on the smoothing technique that we have introduced for surface triangulations in previous works. The mesh quality improvement is obtained by an iterative process where each free node is moved to a new position that minimizes a certain objective function. The minimization process is done on the parametric plane attending to the surface piece-wise approximation and to an algebraic quality measure (mean ratio) of the set of triangles that are connected to the free node. So, the 3-D local projecting/smoothing problem is reduced to a 2-D optimization problem. Several applications of this method are presented.  相似文献   
87.
This work presents a multi‐agent system for knowledge‐based high‐level event composition, which interprets activities, behaviour and situations semantically in a scenario with multi‐sensory monitoring. A perception agent (plurisensory agent and visual agent)‐based structure is presented. The agents process the sensor information and identify (agent decision system) significant changes in the monitored signals, which they send as simple events to the composition agent that searches for and identifies pre‐defined patterns as higher‐level semantic composed events. The structure has a methodology and a set of tools that facilitate its development and application to different fields without having to start from scratch. This creates an environment to develop knowledge‐based systems generally for event composition. The application task of our work is surveillance, and event composition/inference examples are shown which characterize an alarming situation in the scene and resolve identification and tracking problems of people in the scenario being monitored.  相似文献   
88.
The increasing volume of eGovernment‐related services is demanding new approaches for service integration and interoperability in this domain. Semantic web (SW) technologies and applications can leverage the potential of eGovernment service integration and discovery, thus tackling the problems of semantic heterogeneity characterizing eGovernment information sources and the different levels of interoperability. eGovernment services will therefore be semantically described in the foreseeable future. In an environment with semantically annotated services, software agents are essential as the entities responsible for exploiting the semantic content in order to automate some tasks, and so enhance the user's experience. In this paper, we present a framework that provides a seamless integration of semantic web services and intelligent agents technologies by making use of ontologies to facilitate their interoperation. The proposed framework can assist in the development of powerful and flexible distributed systems in complex, dynamic, heterogeneous, unpredictable and open environments. Our approach is backed up by a proof‐of‐concept implementation, where the breakthrough of integrating disparate eGovernment services has been tested.  相似文献   
89.
The present work is intended to address two of the major difficulties that can be found when tackling the estimation of the local orientation of the data in a scene, a task which is usually accomplished by means of the computation of the structure tensor-based directional field. On one hand, the orientation information only exists in the non-homogeneous regions of the dataset, while it is zero in the areas where the gradient (i.e. the first-order intensity variation) remains constant. Due to this lack of information, there are many cases in which the overall shape of the represented objects cannot be precisely inferred from the directional field. On the other hand, the orientation estimation is highly dependent on the particular choice of the averaging window used for its computation (since a collection of neighboring gradient vectors is needed to obtain a dominant orientation), typically resulting in vector fields which vary from very irregular (thus yielding a noisy estimation) to very uniform (but at the expense of a loss of angular resolution). The proposed solution to both drawbacks is the regularization of the directional field; this process extends smoothly the previously computed vectors to the whole dataset while preserving the angular information of relevant structures. With this purpose, the paper introduces a suitable mathematical framework and deals with the d-dimensional variational formulation which is derived from it. The proposed formulation is finally translated into the frequency domain in order to obtain an increase of insight on the regularization problem, which can be understood as a low-pass filtering of the directional field. The frequency domain point of view also allows for an efficient implementation of the resulting iterative algorithm. Simulation experiments involving datasets of different dimensionality prove the validity of the theoretical approach.  相似文献   
90.
The operation principle of the mass-controlled capillary viscometer is presented for a Newtonian liquid. The derived equation for the temporal changes of the mass in a liquid column draining under gravity through a discharge capillary tube accounts self-consistently for the inertial convective term associated with the acceleration effect. The viscosity of water measured at different temperatures using the new approach is in good agreement with literature data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号