首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56569篇
  免费   2654篇
  国内免费   198篇
电工技术   867篇
综合类   93篇
化学工业   10830篇
金属工艺   2067篇
机械仪表   3065篇
建筑科学   1235篇
矿业工程   52篇
能源动力   2156篇
轻工业   4065篇
水利工程   252篇
石油天然气   210篇
武器工业   1篇
无线电   10017篇
一般工业技术   11228篇
冶金工业   5817篇
原子能技术   630篇
自动化技术   6836篇
  2023年   531篇
  2022年   833篇
  2021年   1402篇
  2020年   990篇
  2019年   1009篇
  2018年   1332篇
  2017年   1325篇
  2016年   1648篇
  2015年   1302篇
  2014年   2031篇
  2013年   3480篇
  2012年   3192篇
  2011年   3903篇
  2010年   2970篇
  2009年   3163篇
  2008年   2918篇
  2007年   2462篇
  2006年   2243篇
  2005年   1937篇
  2004年   1848篇
  2003年   1699篇
  2002年   1650篇
  2001年   1290篇
  2000年   1204篇
  1999年   1182篇
  1998年   2194篇
  1997年   1436篇
  1996年   1203篇
  1995年   961篇
  1994年   724篇
  1993年   683篇
  1992年   490篇
  1991年   494篇
  1990年   417篇
  1989年   404篇
  1988年   321篇
  1987年   275篇
  1986年   254篇
  1985年   231篇
  1984年   199篇
  1983年   151篇
  1982年   152篇
  1981年   130篇
  1980年   129篇
  1979年   102篇
  1978年   94篇
  1977年   123篇
  1976年   158篇
  1975年   80篇
  1974年   74篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
961.
This paper presents a compact and unified hardware architecture implementing SHA-1 and SHA-256 algorithms that is suitable for the mobile trusted module (MTM), which should satisfy small area and low-power condition. The built-in hardware hash engine in a MTM is one of the most important circuit blocks and dominates the performance of the whole platform because it is used as a key primitive to support most MTM commands concerning to the platform integrity and the command authentication. Unlike the general trusted platform module (TPM) for PCs, the MTM, that is to be employed in mobile devices, has very stringent limitations with respect to available power, circuit area, and so on. Therefore, MTM needs the spatially optimized architecture and design method for the construction of a compact SHA hardware. The proposed hardware for unified SHA-1 and SHA-256 component can compute a sequence of 512-bit data blocks and has been implemented into 12,400 gates of 0.25 μm CMOS process. Furthermore, in the processing speed and power consumption, it shows the better performance in comparison with commercial TPM chips and software-only implementation. The highest operation frequency and throughput of the proposed architecture are 137 MHz and 197.6 Mbps, respectively, which satisfy the processing requirement for the mobile application.  相似文献   
962.
There are many methods of healing wounds. Among these, light therapy is reported to be beneficial, as beams assist the human body in treating, sterilizing, and regenerating cells. Both Laser and LED irradiation with specific wavelengths induce proliferation of fibroblasts depending on the wound area or wavelength and are effective in wound healing. This study used 8-week-old 250–300 g Male Sprague–Dawley Rats (ILAR Code: NTacSam:SD). The experiment was carried out for the non-irradiation group and the Red–Green–Blue LEDs irradiation groups (n of each group = 5). The experiment animals were relieved for 24 h after wounds had been excised and then the Red–Green–Blue LEDs irradiation groups were given irradiation therapy over 9 days 1 h per day. Immunohistochemical staining was conducted for cytokeratin in order to precisely measure the defect size. Also, Masson’s trichrome staining was conducted for comparison of collagen between the Red–Green–Blue LEDs irradiation groups and the non-irradiation group. Animals treated with Blue LEDs irradiation (p < 0.05), Green LEDs irradiation (p < 0.05), and Red LEDs irradiation (N.S.) healed at a faster rate than non-irradiated group. The LEDs irradiated groups also had more collagen, according to Masson’s trichrome staining for collagen analysis. The Red–Green–Blue LEDs irradiation had a beneficial effect on wound healing and could probably replace low power laser treatment.  相似文献   
963.
In this paper, we present a personal area situation understanding (PASU) system, a novel application of a smart device using wireless camera sensor networks. The portability of a PASU system makes it an attractive solution for monitoring and understanding the current situation of the personal area around a user. The PASU system allows its user to construct a 3D scene of the environment and view the scene from various vantage points for better understanding of the environment. The paper describes the architecture and implementation of the PASU system addressing limitations of wireless camera sensor networks, such as low bandwidth and limited computational capabilities. The capabilities of PASU are validated with extensive experiments. The PASU system demonstrates the potential of a portable system combining a smart device and a wireless camera sensor network for personal area monitoring and situation understanding.  相似文献   
964.
Lee JD 《Human factors》2008,50(3):404-410
OBJECTIVE: This paper considers the influence of "Humans and Automation: Use, Misuse, Disuse, Abuse" and examines how it relates to the evolving issue of human-automation interaction. BACKGROUND: Automation presents important practical challenges that can dramatically affect satisfaction, performance, and safety; philosophical challenges also arise as automation changes the nature of work and human cognition. METHOD: Papers cited by and citing "Humans and Automation" were reviewed to identify enduring and emerging themes in human-automation research. RESULTS: "Humans and Automation" emerges as an important node in the network of automation-related papers, citing many and being cited by many recent influential automation-related papers. In their article, Parasuraman and Riley (1997) integrated previous research and identified differing expectations across designers, managers, and operators regarding the need to support operators as a source of automation problems. They also foresaw and inspired research that addresses problems of overreliance and underreliance on automation. CONCLUSION: This pivotal article and associated research show that even though automation seems to relieve people of tasks, automation requires more, not less, attention to training, interface design, and interaction design. The original article also alludes to the emergence of vicious cycles and dysfunctional meta-control. These problems reflect the coevolution of automation and humans, in which both adapt to the responses of the other. APPLICATION: Understanding this coevolution has important philosophical implications for the nature of human cognition and practical implications for satisfaction, performance, and safety.  相似文献   
965.
T. L. Lee  T. Y. Li  C. H. Tsai 《Computing》2008,83(2-3):109-133
HOM4PS-2.0 is a software package in FORTRAN 90 which implements the polyhedral homotopy continuation method for solving polynomial systems. It updates its original version HOM4PS in three key aspects: (1) new method for finding mixed cells, (2) combining the polyhedral and linear homotopies in one step, (3) new way of dealing with curve jumping. Numerical results show that this revision leads to a spectacular speed-up, ranging up to 1950s, over its original version on all benchmark systems, especially for large ones. It surpasses the existing packages in finding isolated zeros, such as PHCpack (Verschelde in ACM Trans Math Softw 25:251–276, 1999), PHoM (Gunji et al. in Computing 73:57–77, 2004), and Bertini (Bates et al. in Software for numerical algebraic geometry. Available at http://www.nd.edu/~sommese/bertini), in speed by big margins.  相似文献   
966.
Lee JD 《Human factors》2008,50(3):521-528
OBJECTIVE: This brief review covers the 50 years of driving-related research published in Human Factors, its contribution to driving safety, and emerging challenges. BACKGROUND: Many factors affect driving safety, making it difficult to assess the impact of specific factors such as driver age, cell phone distractions, or collision warnings. METHOD: The author considers the research themes associated with the approximately 270 articles on driving published in Human Factors in the past 50 years. RESULTS: To a large extent, current and past research has explored similar themes and concepts. Many articles published in the first 25 years focused on issues such as driver impairment, individual differences, and perceptual limits. Articles published in the past 25 years address similar issues but also point toward vehicle technology that can exacerbate or mitigate the negative effect of these issues. Conceptual and computational models have played an important role in this research. CONCLUSION: Improved crash-worthiness has contributed to substantial improvements in driving safety over the past 50 years, but future improvements will depend on enhancing driver performance and perhaps, more important, improving driver behavior. Developing models to guide this research will become more challenging as new technology enters the vehicle and shifts the focus from driver performance to driver behavior. APPLICATION: Over the past 50 years, Human Factors has accumulated a large base of driving-related research that remains relevant for many of today's design and policy concerns.  相似文献   
967.
There is no doubt that clustering is one of the most studied data mining tasks. Nevertheless, it remains a challenging problem to solve despite the many proposed clustering approaches. Graph-based approaches solve the clustering task as a global optimization problem, while many other works are based on local methods. In this paper, we propose a novel graph-based algorithm “GBR” that relaxes some well-defined method even as improving the accuracy whilst keeping it simple. The primary motivation of our relaxation of the objective is to allow the reformulated objective to find well distributed cluster indicators for complicated data instances. This relaxation results in an analytical solution that avoids the approximated iterative methods that have been adopted in many other graph-based approaches. The experiments on synthetic and real data sets show that our relaxation accomplishes excellent clustering results. Our key contributions are: (1) we provide an analytical solution to solve the global clustering task as opposed to approximated iterative approaches; (2) a very simple implementation using existing optimization packages; (3) an algorithm with relatively less computation time over the number of data instances to cluster than other well defined methods in the literature.  相似文献   
968.
Applying dither to highly nonlinear systems may suppress chaotic phenomena, but dynamic performance, such as convergence rate and disturbance attenuation, is usually not guaranteed. This paper presents a dithered H robust fuzzy control scheme to stabilize chaotic systems that ensures disturbance attenuation bounds. In the proposed scheme, Takagi-Sugeno (T-S) fuzzy linear models are used to describe the relaxed models of the dithered chaotic system, and fuzzy controllers are designed based on an extension to the concept of parallel distributed compensation (PDC). Sufficient condition for the existence of the H robust fuzzy controllers is presented in terms of a novel linear matrix inequalities (LMI) form which takes full consideration of modeling error and disturbances, but cannot be solved by the standard procedures. In order to solve the LMI problem and to identify the chaotic systems as T-S fuzzy modes, we propose a compound optimization strategy called the island-based random-walk algorithm (IRA). The algorithm is composed of a set of communicating random-walk optimization procedures concatenated with the down-hill simplex method. The design procedure and validity of the proposed scheme is demonstrated via numerical simulation of the dithered fuzzy control of a chaotic system.  相似文献   
969.
In a load balancing algorithm [O. Lee, M. Anshel, I. Chung, Design of an efficient load balancing algorithm on distributed networks by employing symmetric balanced incomplete block design, IEE Proceedings - Communications 151 (6) (2004) 535-538] based on the SBIBD (Symmetric Balanced Incomplete Block Design), each node receives global workload information by only two round message exchange with traffic overhead, where v is the number of nodes. It is very efficient and works well only when v=p2+p+1 is used for a prime number p. In this paper, we generated a special incidence structure using the SBIBD and then propose a new load balancing algorithm, which executes well for an arbitrary number of nodes. To accomplish this, we add a number of links to nodes in order for each node to receive more than 80% of the workload information by two round message exchange. For performance of our algorithm, we carried out an experiment for the number of nodes, w, which was up to 5000. Traffic overhead is less than in a round and standard deviation of traffic overhead shows that each node has a mostly well-balanced amount of traffic.  相似文献   
970.
Missing data are common in range images, due to geometric occlusions, limitations in the sensor field of view, poor reflectivity, depth discontinuities, and cast shadows. Using registration to align these data often fails, because points without valid correspondences can be incorrectly matched. This paper presents a maximum likelihood method for registration of scenes with unmatched or missing data. Using ray casting, correspondences are formed between valid and missing points in each view. These correspondences are used to classify points by their visibility properties, including occlusions, field of view, and shadow regions. The likelihood of each point match is then determined using statistical properties of the sensor, such as noise and outlier distributions. Experiments demonstrate a high rates of convergence on complex scenes with varying degrees of overlap.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号