首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   909465篇
  免费   11160篇
  国内免费   2107篇
电工技术   16555篇
综合类   807篇
化学工业   139174篇
金属工艺   35289篇
机械仪表   27535篇
建筑科学   21576篇
矿业工程   5557篇
能源动力   23701篇
轻工业   76002篇
水利工程   10117篇
石油天然气   19115篇
武器工业   64篇
无线电   99712篇
一般工业技术   178870篇
冶金工业   171364篇
原子能技术   20007篇
自动化技术   77287篇
  2021年   8347篇
  2020年   6146篇
  2019年   7874篇
  2018年   13441篇
  2017年   13477篇
  2016年   14191篇
  2015年   9376篇
  2014年   15604篇
  2013年   41503篇
  2012年   24392篇
  2011年   33430篇
  2010年   26654篇
  2009年   29765篇
  2008年   30394篇
  2007年   30005篇
  2006年   26068篇
  2005年   23786篇
  2004年   22752篇
  2003年   22398篇
  2002年   21465篇
  2001年   21142篇
  2000年   19977篇
  1999年   20564篇
  1998年   51139篇
  1997年   36442篇
  1996年   28146篇
  1995年   21286篇
  1994年   18857篇
  1993年   18477篇
  1992年   13707篇
  1991年   12988篇
  1990年   12869篇
  1989年   12456篇
  1988年   11825篇
  1987年   10629篇
  1986年   10381篇
  1985年   11683篇
  1984年   10678篇
  1983年   9909篇
  1982年   9136篇
  1981年   9274篇
  1980年   8839篇
  1979年   8781篇
  1978年   8587篇
  1977年   9909篇
  1976年   12841篇
  1975年   7582篇
  1974年   7214篇
  1973年   7370篇
  1972年   6170篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
911.
912.
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in literature. Some examples illustrate the proposed approach.  相似文献   
913.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2) to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs, the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing.  相似文献   
914.
In this paper, AssetCollector is presented, which is a system for managing collections of cultural assets. AssetCollector covers the needs of collection curators towards defining, populating and searching a collection in a flexible way, while supporting them in generating reports based on the collection’s assets and reusing them in order to build web sites and CD-ROMs. In order to support the above functionality, the system provides the content structuring subsystem, the content input subsystem, the search subsystem and the report subsystem. The use of the subsystems is straightforward and requires no technical skills from the curators. AssetCollector has been successfully applied for organizing various collections of cultural assets in Greece, such as archaeological sites, museums and published books. In the future, an evaluation procedure is planned in order to further refine the use of the system according to the targeted users’ needs. Furthermore, more import and export facilities will be provided, which will make the system compliant with widely accepted standards.  相似文献   
915.
916.
Pervasive computing is as much about the user as it is about the technology. So, the Fifth International Conference on Pervasive Computing emphasized desirability rather than just feasibility. Featured themes included user benefits, human-computer interaction, group and social interactions, context awareness, finding and positioning people and objects, and personal privacy.  相似文献   
917.
Unicode is rapidly becoming the preferred means for representing symbols used in creating multimedia content, especially for information that's presented in multiple languages. This article discusses a unicode vulnerability that makes such content susceptible to being used for creation of covert channel communications. We also developed a solution architecture, the unified secure message augmentation (USMA) service. The USMA service incorporates rules (in an XML vocabulary) that we can apply to unicode transmissions that will detect an attempt to transmit a potential exploit, alert network managers to the presence of the unicode anomaly, and take action to mitigate the exploit.  相似文献   
918.
Packing two-dimensional shapes on a surface such that no shapes overlap and the uncovered surface area is minimized is an important problem that arises in a variety of industrial applications. This paper introduces an intelligent system which tackles the most difficult instance of this problem, where two-dimensional irregular shapes have to be packed on a regularly or irregularly shaped surface. The proposed system utilizes techniques not previously applied to packing, drawn from computer vision and artificial intelligence, and achieves high-quality solutions with short computational times. In addition, the system deals with complex shapes and constraints that occur in industrial applications, such as defective regions and irregularly shaped sheets. We evaluate the effectiveness and efficiency of the proposed method using 14 established benchmark problems that are available from the EURO Special Interest Group on Cutting and Packing.  相似文献   
919.
Tracked vehicles capable of locomotion in the deep sea are used for manganese nodule mining. This requires specific technical solutions in various respects. Locomotion in the soft sea bed is one of them. For the Crawler to safely maneuver, an automatic drive mode with slip control of the driving tracks is essential. Based on experimental studies at IKS, University of Siegen, slip control for the NIOT-IKS mining machine has been developed and implemented. The experimental setup for the development of the slip control along with the logic of the automatic driving mode is described. The system is critically discussed and the test results and future work are briefly outlined. Note to Practitioners-The work is carried out as part of the polymetallic nodule mining program of the Government of India. The technique of slip control is a specific requirement for a tracked vehicle used in the deep sea. Slip is common in many vehicles-tracked and otherwise. Examples are steam engines in the early days and ordinary cars while negotiating slush or snow/ice and dozers working in soft soil. While these are manually controlled by drivers who have firsthand knowledge of the environmental conditions, in the case of a mining machine in deep sea, it has to be completely automatic and, hence, is challenging. The knowledge generated in this work could be effectively used by practitioners in other related areas of automobile engineering for updating their expertise. Also, similar techniques may be used for maneuvering vehicles sent to other planets  相似文献   
920.
Existing wireless networks provide dynamically varying resources with only limited support for the quality of service required by the bandwidth-intense, loss-tolerant and delay-sensitive multimedia applications. This variability of resources does not significantly impact delay insensitive data transmission (e.g., file transfers), but has considerable consequences for multimedia applications. Recently, the research focus has been to adapt existing algorithms and protocols at the lower layers of the protocol stack to better support multimedia transmission applications and conversely, to modify application layer solutions to cope with the varying wireless networks resources. In this paper, we show that significant improvements in wireless multimedia performance can be obtained by deploying a joint application-layer adaptive packetization and prioritized scheduling and MAC-layer retransmission strategy. We deploy a state-of-the-art wavelet coder for the compression of the video data that enables on-the-fly adaptation to changing channel conditions and inherent prioritization of the video bitstream. We pose the cross-layer problem as a distortion minimization given delay constraints and derive analytical solutions by modifying existing joint source-channel coding theory aimed at fulfilling rate, rather than delay, constraints. We also propose real-time algorithms that explicitly consider the available information about previously transmitted packets. The obtained results show significant improvements in terms of video quality as opposed to ad-hoc optimizations currently deployed, while the complexity associated with performing this optimization in real time, i.e., at transmission time, is limited  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号