首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4878篇
  免费   193篇
  国内免费   5篇
电工技术   39篇
综合类   5篇
化学工业   1157篇
金属工艺   82篇
机械仪表   79篇
建筑科学   216篇
矿业工程   20篇
能源动力   166篇
轻工业   371篇
水利工程   35篇
石油天然气   36篇
武器工业   2篇
无线电   446篇
一般工业技术   806篇
冶金工业   896篇
原子能技术   14篇
自动化技术   706篇
  2023年   33篇
  2022年   51篇
  2021年   91篇
  2020年   62篇
  2019年   72篇
  2018年   90篇
  2017年   93篇
  2016年   90篇
  2015年   89篇
  2014年   132篇
  2013年   368篇
  2012年   225篇
  2011年   306篇
  2010年   193篇
  2009年   226篇
  2008年   224篇
  2007年   240篇
  2006年   203篇
  2005年   162篇
  2004年   123篇
  2003年   123篇
  2002年   129篇
  2001年   98篇
  2000年   79篇
  1999年   83篇
  1998年   120篇
  1997年   104篇
  1996年   80篇
  1995年   96篇
  1994年   62篇
  1993年   58篇
  1992年   49篇
  1991年   51篇
  1990年   64篇
  1989年   47篇
  1988年   45篇
  1987年   39篇
  1986年   40篇
  1985年   57篇
  1984年   58篇
  1983年   45篇
  1982年   42篇
  1981年   36篇
  1980年   42篇
  1979年   47篇
  1978年   49篇
  1977年   40篇
  1976年   40篇
  1975年   36篇
  1973年   35篇
排序方式: 共有5076条查询结果,搜索用时 15 毫秒
121.
In this article a switching model predictive attitude controller for an unmanned quadrotor helicopter subject to atmospheric disturbances is presented. The proposed control scheme is computed based on a piecewise affine (PWA) model of the quadrotor's attitude dynamics, where the effects of the atmospheric turbulence are taken into consideration as additive disturbances. The switchings among the PWA models are ruled by the rate of the rotation angles and for each PWA system a corresponding model predictive controller is computed. The suggested algorithm is verified in experimental studies in the execution of sudden maneuvers subject to forcible wind disturbances. The quadrotor rejects the induced wind disturbances while performing accurate attitude tracking.  相似文献   
122.
In recent years, studies have shown that video game experience is related to improvements across a variety of cognitive and visuospatial tasks. This study investigated the relationship between prior video game experience and spatial performance in virtual and real environments. Across two experiments, gaming experience was related to performance in desktop virtual environments; those with more video game experience were more accurate in pointing to nonvisible targets. In contrast, gaming experience was unrelated to three different real environment tasks, suggesting that video games may primarily influence perceptual and cognitive abilities in the visual domain over abilities that also involve kinesthetic or vestibular input. Contrary to expectations, gaming experience was also related to performance in immersive virtual environments, which may be related to the use of a joystick interface during immersive travel. Video game experience was also positively related to performance in a dynamic spatial task and to verbal SAT and math SAT scores. Sex differences in desktop virtual navigation and dynamic spatial ability were eliminated when game experience was included as a covariate.  相似文献   
123.
Many applications require teams of robots to cooperatively execute tasks. Among these domains are those in which successful coordination must respect intra-path constraints, which are constraints that occur on the paths of agents and affect route planning. This work focuses on multi-agent coordination for disaster response with intra-path precedence constraints, a compelling application that is not well addressed by current coordination methods. In this domain a group of fire truck agents attempt to address fires spread throughout a city in the wake of a large-scale disaster. The disaster has also caused many city roads to be blocked by impassable debris, which can be cleared by bulldozer robots. A high-quality coordination solution must determine not only a task allocation but also what routes the fire trucks should take given the intra-path precedence constraints and which bulldozers should be assigned to clear debris along those routes.  相似文献   
124.
In this paper, we propose an efficient algorithm, called CMP-Miner, to mine closed patterns in a time-series database where each record in the database, also called a transaction, contains multiple time-series sequences. Our proposed algorithm consists of three phases. First, we transform each time-series sequence in a transaction into a symbolic sequence. Second, we scan the transformed database to find frequent patterns of length one. Third, for each frequent pattern found in the second phase, we recursively enumerate frequent patterns by a frequent pattern tree in a depth-first search manner. During the process of enumeration, we apply several efficient pruning strategies to remove frequent but non-closed patterns. Thus, the CMP-Miner algorithm can efficiently mine the closed patterns from a time-series database. The experimental results show that our proposed algorithm outperforms the modified Apriori and BIDE algorithms.  相似文献   
125.
We point out a subtle error in the proof of Chrobak's theorem that every unary NFA can be represented as a union of arithmetic progressions that is at most quadratically large. We propose a correction for this and show how Martinez's polynomial time algorithm, which realizes Chrobak's theorem, can be made correct accordingly. We also show that Martinez's algorithm cannot be improved to have logarithmic space, unless L = NL.  相似文献   
126.
This paper describes a new method for code space optimization for interpreted languages called LZW‐CC . The method is based on a well‐known and widely used compression algorithm, LZW , which has been adapted to compress executable program code represented as bytecode. Frequently occurring sequences of bytecode instructions are replaced by shorter encodings for newly generated bytecode instructions. The interpreter for the compressed code is modified to recognize and execute those new instructions. When applied to systems where a copy of the interpreter is supplied with each user program, space is saved not only by compressing the program code but also by automatically removing the unused implementation code from the interpreter. The method's implementation within two compiler systems for the programming languages Haskell and Java is described and implementation issues of interest are presented, notably the recalculations of target jumps and the automated tailoring of the interpreter to program code. Applying LZW‐CC to nhc98 Haskell results in bytecode size reduction by up to 15.23% and executable size reduction by up to 11.9%. Java bytecode is reduced by up to 52%. The impact of compression on execution speed is also discussed; the typical speed penalty for Java programs is between 1.8 and 6.6%, while most compressed Haskell executables run faster than the original. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   
127.
Actuated artificial whiskers modeled on rat macrovibrissae can provide effective tactile sensor systems for autonomous robots. This article focuses on texture classification using artificial whiskers and addresses a limitation of previous studies, namely, their use of whisker deflection signals obtained under relatively constrained experimental conditions. Here we consider the classification of signals obtained from a whiskered robot required to explore different surface textures from a range of orientations and distances. This procedure resulted in a variety of deflection signals for any given texture. Using a standard Gaussian classifier we show, using both hand-picked features and ones derived from studies of rat vibrissal processing, that a robust rough-smooth discrimination is achievable without any knowledge of how the whisker interacts with the investigated object. On the other hand, finer discriminations appear to require knowledge of the target’s relative position and/or of the manner in which the whisker contact its surface. Electronic Supplementary Material  The online version of this article () contains supplementary material, which is available to authorized users.
Anthony G. Pipe
  相似文献   
128.
It is widely agreed that employee non-adherence to information security policies poses a major problem for organizations. Previous research has pointed to the potential of theories of moral reasoning to better understand this problem. However, we find no empirical studies that examine the influence of moral reasoning on compliance with information security policies. We address this research gap by proposing a theoretical model that explains non-compliance in terms of moral reasoning and values. The model integrates two well-known psychological theories: the Theory of Cognitive Moral Development by Kohlberg and the Theory of Motivational Types of Values by Schwartz. Our empirical findings largely support the proposed model and suggest implications for practice and research on how to improve information security policy compliance.  相似文献   
129.
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can affect decisions. Existing trust and reputation mechanisms typically rely on reports from as many sources as possible to mitigate the influence of misleading reports on decisions. In the real world, however, it is often the case that querying information sources can be costly in terms of energy, bandwidth, delay overheads, and other constraints. We present a model of source selection and fusion in resource-constrained environments, where there is uncertainty regarding the trustworthiness of sources. We exploit diversity among sources to stratify them into homogeneous subgroups to both minimise redundant sampling and mitigate the effect of certain biases. Through controlled experiments, we demonstrate that a diversity-based approach is robust to biases introduced due to dependencies among source reports, performs significantly better than existing approaches when sampling budget is limited and equally as good with an unlimited budget.  相似文献   
130.
Structured text is a general concept that is implicit in a variety of approaches to handling information. Syntactically, an item of structured text is a number of grammatically simple phrases together with a semantic label for each phrase. Items of structured text may be nested within larger items of structured text. The semantic labels in a structured text are meant to parameterize a stereotypical situation, and so a particular item of structured text is an instance of that stereotypical situation. Much information is potentially available as structured text including tagged text in XML, text in relational and object-oriented databases, and the output from information extraction systems in the form of instantiated templates. In this paper, we formalize the concept of structured text, and then focus on how we can identify inconsistency in the logical representation of items of structured text. We then present a new framework for merging logical theories that can be employed to merge inconsistent items of structured text. To illustrate, we consider the problem of merging reports such as weather reports.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号